Saturday, October 05, 2019
We knew this was coming.
Iranian Hackers Target Trump Campaign as Threats to 2020 Mount
The 2020 presidential election is still 13 months away, but already Iranians are following in the footsteps of Russia and have begun cyberattacks aimed at disrupting the campaigns.
Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and former United States government officials, journalists covering political campaigns and accounts associated with a presidential campaign.
Though the company would not identify the presidential campaign involved, two people with knowledge of the hacking, who were not allowed to discuss it publicly, said it was President Trump’s.
In addition to Iran, hackers from Russia and North Korea have started targeting organizations that work closely with presidential candidates, according to security researchers and intelligence officials.
Phone Phreaks called this a ‘harmonica bug.’
Signal Bug Could Have Let Hackers Listen to Android Users Via Microphone
On Friday, a researcher at Google's elite vulnerability hunting team Project Zero published details about an issue in the Android version of Signal. The bug allowed a hacker to phone a target device, and the call would be answered without the recipient needing to even accept the call, essentially letting the hacker listen-in on the victim.
Have they bothered to ask?
FBI investigating if attempted 2018 voting app hack was linked to Michigan college course
… The sources told CNN that the FBI is investigating a person or people who tried to hack the app as a part of a University of Michigan election security course. Michigan is one of the main academic hubs of election security research in the country, housing the trailblazing Michigan Election Security Commission.
… He added that "no legal conclusions whatsoever have been made regarding the conduct of the activity or whether any federal laws were violated."
Otherwise, we couldn’t run any political ads.
Facebook says Trump can lie in his Facebook ads
Last week, Facebook quietly changed the language of its advertising policies to make it easier for politicians to lie in ads.
On Tuesday, the Trump campaign launched a new ad on Facebook, which includes a claim that was ruled false by Facebook-approved third-party fact-checkers. On the surface, such an ad appears to violate Facebook's rules against false content in ads. But Facebook quietly amended its policy on "misinformation" in advertising, allowing it to accept nearly any from a politician, including this new one from the Trump campaign.
In the last week, the Trump campaign has exponentially increased its Facebook spending, shelling out over $1.5 million for ads.
Does approval of this App have the potential to get Apple banned in China?
Apple Approves Controversial Hong Kong App After Rejection
’s App Store reversed a recent decision to reject a Hong Kong app that shows police activity in the midst of pro-democracy protests in the city.
Would that also apply to Denver’s Light Rail?
Do I need ID to ride a train?
We’ve been trying for years to find out what the real story is with respect to especially on Amtrak.
are of paramount importance to the mobility of undocumented people and people who, whether or not they are eligible for or have chosen to obtain government-issued ID credentials, don’t want to show their papers to government agents as a condition of exercising their right to freedom of movement.
Amtrak and Greyhound policies and practices will become even more important if the government and/or airlines further restrict air travel by people who don’t have, or don’t show, ID credentials that comply with the
The latest responses to our requests for Federal and state public records reveal more about passenger railroad policies and practices, but still don’t give a clear answer.
Friday, October 04, 2019
We called this “target acquisition.”
Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure
A researcher has used a free tool that he created and open source intelligence (OSINT) to demonstrate how easy it is for adversaries to gather intelligence on critical infrastructure in the United States.
The researcher, known online as Wojciech, used his Kamerka tool to find industrial control systems (ICS) in the United States, map them to geographical locations, and identify critical infrastructure targets that could be of interest to a threat actor. He believes the U.S. government should also conduct these types of tests to identify possible targets of potentially damaging attacks.
Kamerka is an open source tool that Wojciech launched in November 2018. The tool was initially designed to identify nearby surveillance cameras exposed to the internet
Probably worth checking to see if you have languages you can’t support. (As an ‘old guy’ I programmed in a couple of these.)
5 Programming Languages That Refuse to Die
COBOL FORTRAN OBJECTIVE C R PHP
At least they haven’t claimed that “people don’t want secure communications,” yet.
Officials Push Facebook for Way to Peek at Encrypted Messages
Officials are calling on Facebook not to use encryption in its messaging services that does not provide authorities a way to see what is being sent.
The request was made in a letter signed by US Attorney General William Barr, British home secretary Priti Patel and Australian minister for home affairs Peter Dutton.
At a time when may countries are considering laws to limit facial recognition… What could possibly go wrong?
Helene Fouquet reports:
France is poised to become the first European country to use facial recognition technology to give citizens a secure digital identity — whether they want it or not.
Saying it wants to make the state more efficient, President Emmanuel Macron’s government is pushing through plans to roll out an ID program, in November, earlier than an initial Christmas target.
Read more on
(Related) A bit further down the slippery slope…
Chinese citizens must pass a facial-recognition test to use the internet as part of Beijing’s social credit system
Billie Thomson reports:
China has stepped up its internet censorship by demanding its citizens pass a facial-recognition test to be able to use web services.
People who want to have the internet installed at home or on their phones must have their faces scanned by the Chinese authority to prove their identities, according to a new regulation.
The rule, which will take effect on December 1, is said to be part of the social credit system which rates the Chinese citizens based on their daily behaviour.
Read more on
Significance beyond this case. Could I get this data for a Data Analytics class?
Victory! EFF Wins Access to License Plate Reader Data to Study How Law Enforcement Uses the Privacy Invasive Technology
San Francisco—Electronic Frontier Foundation (EFF) and the American Civil Liberties Union Foundation of Southern California (ACLU SoCal) have reached an agreement with Los Angeles law enforcement agencies under which the police and sheriff’s departments will turn over license plate data they indiscriminately collected on millions of law-abiding drivers in Southern California.
The data, which has been deidentified to protect drivers’ privacy, [Want to bet? Bob] will allow EFF and ACLU SoCal to learn how the agencies are using automated license plate reader (ALPR) systems throughout the city and county of Los Angeles and educate the public on the privacy risks posed by this intrusive technology. A weeks’ worth of data, composed of nearly 3 million data points, will be examined.
systems include cameras mounted on police cars and at fixed locations that scan every license plate that comes into view—up to 1,800 plates per minute. on each plate, including the precise time, date, and place it was encountered. The two Los Angeles agencies scan about 3 million plates every week and store the data for years at a time. Using this data, police can learn where we were in the past and infer intimate details of our daily lives such as where we work and live, who our friends are, what religious or political activities we attend, and much more.
Millions of vehicles across the country have had their license plates scanned by — and more than 99% of them weren’t associated with any crimes. Yet law enforcement agencies often share ALPR information with their counterparts in other jurisdictions, as well as with border agents, airport security, and university police.
EFF and ACLU SoCal reached the agreement with the Los Angeles Police and Sheriff’s Departments after winning a precedent-setting in 2017 from the California Supreme Court in our public records lawsuit against the two agencies. The court that the data are not investigative records under the California Public Records Act that law enforcement can keep secret.
“After of litigation, EFF and ACLU SoCal are finally getting access to millions of ALPR scans that will shed light on how the technology is being used, where it’s being used, and how it affects people’s privacy,” said EFF Surveillance Litigation Director Jennifer Lynch. “We persevered and won a tough battle against law enforcement agencies that wanted to keep this information from the public. We have a right to information about how government agencies are using high-tech systems to track our locations, surveil our neighborhoods, and collect private information without our knowledge and consent.”
The California Supreme Court ruling has significance beyond the ALPR case. It set a groundbreaking precedent that mass, indiscriminate data collection by the police can’t be withheld just because the information may contain some data related to criminal investigations.
For more on this case:
For more on ALPRs:
Lawyers using tech! (Scary, isn’t it?)
ABA Tech Report 2019
“…To keep it simple, the has focused on the basic concept of a “web-based software service or solution,” including SaaS. In practical terms, you can understand cloud computing as software or services that can be accessed and used over the internet using a browser (or, commonly now, a mobile app), where the software itself is not installed locally on the computer or phone being used by the lawyer accessing the service. Your data are also processed and stored on remote servers rather than on local computers and hard drives. Cloud applications might also be referred to as “web services” or “hosted services.” Cloud services might be hosted by a third party (most commonly Amazon or Microsoft) or, more commonly in the legal profession, by a provider running its services on Amazon, Microsoft, or another cloud data center provider. It’s also possible, though unlikely, that a law firm could host and provide its own private cloud services…The shows that for a small, but slowly growing, majority of lawyers and firms, cloud services are now part of the IT equation. Overall, reported growth in cloud use stayed relatively flat in 2019. The continuing lack of actual attention to confidentiality, security, and due diligence issues, however, remains a serious and disturbing concern, especially with the growth in mobile apps running on cloud services. The results on security procedures will continue to fuel client concerns about whether their outside law firms are making adequate efforts on cybersecurity, and the numbers indicate that they should be worried…”
Worth a read.
The Artificial Intelligence Apocalypse (Part 3)
In Part 1 of this 3-part miniseries, we discussed the origins of artificial intelligence (AI), and we considered some low-hanging AI-enabled fruit in the form of speech recognition, voice control, and machine vision. In Part 2, we noted some of the positive applications of AI, like recognizing skin cancer, identifying the source of outbreaks of food poisoning, and the early detection of potential pandemics.
A sure sign of things to come. (The Tax Man comeith!) I’m surprised it took them this long to ‘determine’ what is taxable.
Italy to Investigate Netflix for Failing to File Tax Return
Italian prosecutors are investigating Netflix Inc. after the U.S. streaming company failed to file a tax return, according to people familiar with the matter.
The Milan tribunal opened the probe as the prosecutors believe Netflix has enough of a physical presence in Italy -- including fiber optic cables and servers -- to qualify as a local business that should be paying taxes, said the people, who asked not to be named as the investigation is not public.
Expensive. Will it be worth it?
5G explained for the rest of us
5G is the fifth generation of wireless data networks and an upgrade that you will want sooner or later, depending on your appetite for wireless bugs and growing pains. It is on your phone that you're used to from the history of 4G and 3G before it. 5G boasts low latency, intelligent power consumption, high density and network slicing -- attributes that make it a breakthrough, and perhaps a confusing bore.
So we've decided to make 5G understandable for you, the person who just wants to use it and understand what it's worth, because it will come at additional cost.
… To get there you will need to replace everything you currently own that accesses a cellular network, as the 5G wireless gear is distinct from today's 4G technology. That means billions of new devices over the next few years, making it clear why carriers and device makers are pretty excited about 5G.
Thursday, October 03, 2019
Get ready, the attack is coming.
HIGH-IMPACT RANSOMWARE ATTACKS THREATEN U.S. BUSINESSES AND ORGANIZATIONS
… The most important defense for any organization against ransomware is a robust system of backups. Having a recent backup to restore from could prevent a ransomware attack from crippling your organization. The time to invest in backups and other cyber defenses is before an attacker strikes, not afterward when it may be too late.
As ransomware techniques and malware continue to evolve and become more sophisticated, even the most robust prevention controls are no guarantee against exploitation. This makes contingency and remediation planning crucial to business recovery and continuity. Those plans should be tested regularly to ensure the integrity of sensitive data in the event of a compromise.
(Related) And we’re not getting ready.
Marsh-Microsoft Survey: Business Leaders Spend Less Than a Day Per Year Focusing on Cyber Risk
Despite all the attention that cyber threats and cyber attacks get in the mainstream media, top business leaders and executives are still not paying enough attention to cyber risk. That’s the big takeaway from a new report from Marsh and Microsoft (“2019 Global Cyber Risk Perception Survey”) that surveyed more than 1,500 global organizations about cyber risk management practices. In fact, only 17% of C-suite or board members who are responsible for cyber risk management spend more than a few days per year focusing on cyber risk. And more than half (51%) of those responsible for cyber risk management spend less than a day per year focusing on cyber risk issues.
[The survey: https://www.microsoft.com/security/blog/wp-content/uploads/2019/09/Marsh-Microsoft-2019-Global-Cyber-Risk-Perception-Survey.pdf
If you are not doing this, should you?
How to Set Your Google Data to Self-Destruct
– “For years, Google has kept a record of our internet searches by default. The company hoards that data so it can build detailed profiles on us, which helps it make personalized recommendations for content but also While there have been tools we can use to manually purge our Google search histories, few of us remember to do so. So I’m recommending that we all try Google’s new privacy tools. In May, the company introduced related to our Google searches, requests made with its virtual assistant and our location history…
Takedowns go global again.
E.U.’s Top Court Rules Against Facebook in Global Takedown Case
Europe’s top court said on Thursday that an individual country can order Facebook to take down posts, photographs and videos and restrict global access to that material, in a ruling that has implications for how countries can expand content bans beyond their borders.
The European Court of Justice’s decision came after a former Austrian politician sought to have Facebook remove disparaging comments about her that had been posted on an individual’s personal page, as well as “equivalent” messages posted by others. The politician, Eva Glawischnig-Piesczek, a former leader of Austria’s Green Party, argued that Facebook needed to delete the material in the country and limit worldwide access.
The decision is a blow to big internet platforms like Facebook, placing more responsibility on them to patrol their sites for content ruled illegal.
… Last week, the European Court of Justice which allows European citizens to demand Google remove links to sensitive personal data from search results. The court said Google could not be ordered to remove links to websites globally, except in certain circumstances when weighed against the rights to free expression and the public’s right to information
Fighting fire with fire.
Adopting AI: the new cybersecurity playbook
… recent Capgemini research has revealed that over half (56%) of senior executives have admitted that their cybersecurity analysts are overwhelmed by the unparalleled volume of data points they need to monitor to detect and prevent cyberattacks. In 2018, Cisco alone reported that they blocked seven trillion threats on behalf of their customers.
… Here is a three-step programme organisations should follow when implementing AI into their cybersecurity defences:
Identify data sources and create data platforms to operationalise AI
Collaborate externally to enhance threat intelligence
Deploy security orchestration, automation and response to improve security management
… The three above steps are all integral to successfully leveraging AI for cybersecurity defences. However, they all depend on one fundamental parameter – the right human talent. The skills deficit is a growing business challenge, given the shortage of three million experts and data scientists globally. Our survey data showed that 69% of respondents struggle to source qualified experts who can build, optimise and train AI algorithms to detect threats efficiently. For implementation to be successful, organisations must plug this skills gap and invest in upskilling employees to be AI literate.
The article does not explain how AI is involved, but the numbers are interesting.
How A.I. is driving restaurant revenue
Delivery sales are projected to grow at more than three times the rate of revenue from customers dining in at restaurants, according to a report from L.E.K. consulting. And more than half of customers are ordering food directly from a restaurant's app or website, according to the same report.
Looks like another visit to the library is in order. (And my library has it!)
Raging robots, hapless humans: the AI dystopia
Stuart Russell’s latest book examines how artificial intelligence could spin out of control. David Leslie critiques it.
Human Compatible: Artificial Intelligence and the Problem of Control Stuart Russell Viking (2019)
… What is certain is that Human Compatible marks a major stride in AI studies, not least in its emphasis on ethics. At the book’s heart, Russell incisively discusses the misuses of AI. He warns about how, deployed in combination with invasive data collection, AI applications such as voice and facial-recognition technologies, deepfake generators and information-integration systems can be used for surveillance, control and mass-behavioural manipulation. Stressing human vulnerability to such technologies, he emphasizes the right to the mental security of living “in a largely true information environment”. And he makes a persuasive argument for rejecting lethal autonomous weapons as “scalable weapons of mass destruction”.
Wednesday, October 02, 2019
Much more possible today than when I was
about Computer Security.
I wonder how many of my students knew this was coming?
Just How Far Does California’s New IoT Security Law Reach?
On January 1, 2020, California’s new Internet of Things (IoT) Security Law goes into effect. The law is the first IoT-specific security law in the United States and, simply put, requires all IoT devices sold in California to be equipped with reasonable security measures.
There has been a significant amount of discussion regarding exactly what types of devices are covered by the new regulations and what “reasonable security measures” entail.
… Fortunately, on February 26, 2016, the California Department of Justice (CDOJ) released the California Data Breach Report (Breach Report), which provided analyses of approximately 657 data breaches reported to the CDOJ between 2012 and 2015. The Breach Report defines compliance with the 20 security controls promulgated in the CIS Critical Security Controls for Effective Cyber Defense as the “floor” for “reasonable” cybersecurity and data protection.
DataGrail is something I’ve got to explore.
Entering the New Age of Privacy in the US: Learning from GDPR — An Interview with Daniel Barber
I had the chance to interview Daniel Barber, CEO and Co-founder of DataGrail. DataGrail is a purpose-built privacy management platform that ensures sustained compliance with the GDPR, CCPA, and forthcoming regulations. Their customers span a variety of industries and include Databricks, Plexus Worldwide, TRI Pointe Homes, Outreach, Intercom, and SaaStr. Daniel and I spoke about the lessons we’ve learned one year on from GDPR and how companies can apply those lessons as they think about CCPA and laws like Nevada’s SB 220.
Caselaw Access Project
What does do? The Caselaw Access Project is making all U.S. case law freely accessible online. With the Caselaw Access Project API (CAPAPI) and bulk data service, we can share 40 million pages of published U.S. court cases. Why does Caselaw Access Project exist? Access to our common law – the written decisions issued by our state and federal courts – supports equality and enables innovation in legal services.
Between 2013 and 2018, the Harvard Law School Library digitized over 40 million pages of U.S. court decisions in collaboration with legal startup Ravel Law, transforming them into a dataset of over 6.7 million cases that represent 360 years of U.S. legal history. The Caselaw Access Project API (CAPAPI) and bulk data service put this important dataset within the reach of researchers, members of the legal community, and the general public. Learn more about how Caselaw Access Project data is being used in our and repository on GitHub….”
The sky is about to get crowded.
UPS Flight Forward Attains FAA’s First Full Approval For Drone Airline
“subsidiary today announced it has received the U.S. government’s first full Part 135 Standard certification to operate a drone airline. The company will initially expand its drone delivery service further to support hospital campuses around the country, and to provide solutions for customers beyond those in the healthcare industry. UPS Flight Forward plans in the future to transport a variety of items for customers in many industries, and regularly fly drones beyond the operators’ visual line of sight. The U.S. Federal Aviation Administration (FAA) awarded UPS Flight Forward a Part 135 Standard certification on Friday. The UPS subsidiary immediately launched the first drone delivery flight by any company under Part 135 Standard at WakeMed’s hospital campus in Raleigh, N.C. That flight, using a M2 quadcopter, was flown under a government exemption allowing for a “beyond visual line of sight” (BVLOS) operation, also a first in the U.S. for a regular revenue-generating delivery…”
Okay, now this is serious!
Tuesday, October 01, 2019
Another risk you have to convince your BoD is real.
Rogue fears rise inside corporations as hacks evolve into ‘home invasions’
… The percentage of technology executives who said state-sponsored cyberwarfare was the most dangerous cyberthreat their company faced declined from 38% to 26% in the third-quarter 2019 CNBC Technology Executive Council survey. But concerns about rogue employees rose, from 14% to over 18% of executives citing it as the biggest danger. And for the first time, rogue vendors showed up in the results, with near-6% of tech executives saying this was their biggest cyberthreat.
… Victimized corporations’ networks are used to attack their customers and partners via what Kellermann called “island hopping,” which is occurring 51% of the time. Recent attacks that were a result of island hopping, including the attacks against 24 towns and cities in Texas; the Marriott International breach and, most notably, the Chinese Cloud Hopper campaign reportedly targeted companies including IBM and Hewlett Packard Enterprises to attack their customers.
An IT problem becomes a brand problem
NSA on the Future of National Cybersecurity
Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting for the where he outlined a long list of cyber risks facing the US.
There are four key implications of this revolution that policymakers in the national security sector will need to address:
The first is that the unprecedented scale and pace of technological change will outstrip our ability to effectively adapt to it. Second, we will be in a world of ceaseless and pervasive cyberinsecurity and cyberconflict against nation-states, businesses and individuals. Third, the flood of data about human and machine activity will put such extraordinary economic and political power in the hands of the private sector that it will transform the fundamental relationship, at least in the Western world, between government and the private sector. Finally, and perhaps most ominously, the digital revolution has the potential for a pernicious effect on the very legitimacy and thus stability of our governmental and societal structures.
He then goes on to explain these four implications. It's all interesting, and it's the sort of stuff you don't generally hear from the NSA. He talks about technological changes causing social changes, and the need for people who understand that. (Hooray for .) He talks about national security infrastructure in private hands, at least in the US. He talks about a massive geopolitical restructuring -- a fundamental change in the relationship between private tech corporations and government. He talks about recalibrating the Fourth Amendment (of course).
The essay is more about the problems than the solutions, but there is a bit at the end:
The first imperative is that our national security agencies must quickly accept this forthcoming reality and embrace the need for significant changes to address these challenges. This will have to be done in short order, since the digital revolution's pace will soon outstrip our ability to deal with it, and it will have to be done at a time when our national security agencies are confronted with complex new geopolitical threats.
Much of what needs to be done is easy to see -- developing the requisite new technologies and attracting and retaining the expertise needed for that forthcoming reality. What is difficult is executing the solution to those challenges, most notably including whether our nation has the resources and political will to effect that solution. The roughly $60 billion our nation spends annually on the intelligence community might have to be significantly increased during a time of intense competition over the federal budget. Even if the amount is indeed so increased, spending additional vast sums to meet the challenges in an effective way will be a daunting undertaking. Fortunately, the same digital revolution that presents these novel challenges also sometimes provides the new tools (A.I., for example) to deal with them.
The second imperative is we must adapt to the unavoidable conclusion that the fundamental relationship between government and the private sector will be greatly altered. The national security agencies must have a vital role in reshaping that balance if they are to succeed in their mission to protect our democracy and keep our citizens safe. While there will be good reasons to increase the resources devoted to the intelligence community, other factors will suggest that an increasing portion of the mission should be handled by the private sector. In short, addressing the challenges will not necessarily mean that the national security sector will become massively large, with the associated risks of inefficiency, insufficient coordination and excessively intrusive surveillance and data retention.
A smarter approach would be to recognize that as the capabilities of the private sector increase, the scope of activities of the national security agencies could become significantly more focused, undertaking only those activities in which government either has a recognized advantage or must be the only actor. A greater burden would then be borne by the private sector.
It's an extraordinary essay, less for its contents and more for the speaker. This is not the sort of thing the NSA publishes. The NSA doesn't opine on broad technological trends and their social implications. It doesn't publicly try to predict the future. It doesn't philosophize for 6000 unclassified words. And, given how hard it would be to get something like this approved for public release, I am left to wonder what the purpose of the essay is. Is the NSA trying to lay the groundwork for some policy initiative? Some legislation? A budget request? What?
DHS lacks a cyber workforce strategy four years later
The can’t ensure it’s prepared for increasing national cybersecurity threats because it has yet to complete a thorough workforce assessment, according to an inspector general
The tools of surveillance.
Welcome To A World Of 500-Megapixel Cameras, And Surveillance Systems Able To Zoom In On Small Objects A Kilometer Away
Glyn Moody reports:
Here on Techdirt, we love digital technology. We love how Moore’s Law and its equivalents help drive continual innovation and open up interesting new uses and possibilities. But powerful technology is just a tool, and like any other tool it can be used in good and bad ways. Which brings us to this latest piece of high-tech wizardry: a developed in China. The English-language Global Times, which is closely aligned with the views of the Chinese government, explains one possible use of such a system:
For example, in a stadium with tens of thousands of people, the camera can shoot a panoramic photo with a clear image of every single human face, the report said.
Read more on
Rearchitecting the enterprise.
Putting AI in the Internet of Things
The central nervous system is made up of the brain, the spinal cord and nerves. Your nerves respond to external stimuli, such as temperature or pressure, and transmit signals back to the brain, which decides on the appropriate reaction. In manufacturing, the myriad of connected Internet of Things devices act as the nerves, measuring parameters and collecting data, but what’s the brains behind the operation? Here Sophie Hand, UK country manager at explains how artificial intelligence might just be the brains we need.
Gartner predicts that by 2022, more than 80 per cent of enterprise IoT projects will include an AI component, skyrocketing up from just ten per cent in 2019.
A 20-Year Community Roadmap for Artificial Intelligence Research in the US
… These are the major recommendations of a recent community effort coordinated by the Computing Community Consortium and the Association for the Advancement of Artificial Intelligence to formulate a Roadmap for AI research and development over the next two decades.
I’ll take all the education I can get.
has often highlighted the significance of artificial intelligence (AI) in recent months. In June, the tech giant, citing a study, in the coming years, among other advantages. On the same day, that are being used to keep infrastructure safe. In the more recent past, we've also seen a couple of utilizing
Now, centered around the technology wave in different fields of education. Titled "Artificial Intelligence in Education", the first episode of this podcast has been released.
… on Spotify, Apple Podcasts, Google Podcasts, and other podcast apps. Alternatively, you can also listen to it directly on its official website.
Nothing introduces error faster than reentering data that was entered, then printed, and then faxed.
Collaborative Law Firm: The Fax is Dead, Long Live the Fax
Via – – The long heralded death of fax machines has yet to materialize as doctors, pharmacists, state, local and federal government, to name just a few groups, continue to rely on systems that originated in the 19th century. a member of Justia’s Engineering team identifies multiple ways that faxes continue to be used in law firms.