• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: Cybersecurity

Government Can Access Individual’s Gmail Account In Money Laundering Probe.

27 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Appellate Law, Apple, Blackberry Phones, Cell Phones, Computer Forensics, Crime Scene Investigation, Criminal Law, Cybersecurity, Discovery, E-Discovery, Emails, Evidence, Experts, Forensic Evidence, Forensic Evidence, Forensic Expert Witness, Fourth Amendment - Search & Seizure, Google, Internet, iPad, iPhones, Legal Technology, Mac, PC Computers, Privacy, Search Warrants, Tablets, Trial Tips and Techniques, U.S. District Court for the District of Columbia, U.S. District Court for the Southern District of New York

≈ Comments Off on Government Can Access Individual’s Gmail Account In Money Laundering Probe.

Tags

Computers, Email, Evidence, Forensic Experts, Gmail, Google, Hard Drives, Magistrate Judge Gabriel W. Gorenstein, Money Laundering, Search & Seizure, Warrants

Federal Judge Rules Gmail Account Can Be Accessed For Investigation, by evanino in Evanino Blog

http://www.evanino.com/federal-judge-rules-gmail-account-can-accessed-investigation/

In a landmark ruling that might fuel a nationwide debate, the New York Court issued a warrant against Google, giving access to user emails.

A New York Court issued a warrant against Google Inc ruling that the government can access all mails of a Gmail account of an individual under a money laundering probe. The judge said that courts have long been waiting for law enforcement to take the required documents in the custody if it is within the purview of the warrant.

Contrary to previous rulings

This decision is not in line with the previous court rulings including courts in the Districts of Columbia and Kansas, Magistrate Judge Gabriel W. Gorenstein of the U.S. District Court for the Southern District of New York noted on Friday. Also, this latest ruling will spark a debate over the privacy, in the country, according to Computer World.

A District of Columbia judge denied from revealing the entire content of the email as this will seize a large amount of emails for which the authorities have not given any reason.

The Court in Kansas, also, did not rule in favor of a similar warrant, stating that it failed to ‘limit the universe of electronic communications and information to be turned over to the government to the specific crimes being investigated.’

However, the New York Court ruled in favor of such warrant, allowing authorities to take into account the emails and other information from a Google inc’s Gmail account, including the address book and draft mails, and also the authority to search the emails for certain specific categories of evidence.

Experts must scan emails, not Google employee

Judge Gorenstein argued that it is not possible to search the hard-disk drives of computers and other storage devices on the spot due to the complexities of electronic searches. Thus, the authorities can seize such storage.

‘We perceive no constitutionally significant difference between the searches of hard drives just discussed and searches of email accounts,’ the judge wrote. He added that in most of the cases data in an email account will be less ‘expansive’ compared to the information contained in the hard drive.

Judge Gorenstein stated that Google employees are not expert enough to know the importance of particular emails without having been given proper training in the substance of the investigation. Judge said this in response to an opinion by the District of Columbia court that gave the government the option of getting the email scanned by the host itself.

He said that an agent, who is completely absorbed in the investigation, will be able to understand the importance of a particular language in emails contrary to the employee.

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

Canvas Fingerprinting – The Online Computer Tracking Device Almost Impossible To Block.

23 Wednesday Jul 2014

Posted by Celia C. Elwell, RP in Computer Forensics, Cybersecurity, Identity Theft, Legal Technology

≈ Comments Off on Canvas Fingerprinting – The Online Computer Tracking Device Almost Impossible To Block.

Tags

AdBlock Plus, AddThis, Canvas Fingerprints, Computer Code, Computer Forensics, Computer Tracking, Julia Angwin, Mashable, Privacy, ProPublica, User Profiles

Meet the Online Tracking Device That is Virtually Impossible to Block, by Julia Angwin, ProPublica

(This story was co-published with Mashable.)

http://tinyurl.com/mbqqrw

Update: After this article was published, YouPorn contacted us to say it had removed AddThis technology from its website, saying that the website was ‘completely unaware that AddThis contained a tracking software that had the potential to jeopardize the privacy of our users.’  A spokeswoman for the German digital marketer Ligatus also said that is no longer running its test of canvas fingerprinting, and that it has no plans to use it in the future.

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

*      *     *

Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles, or other types of content are displayed to them.

But fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.

The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites. . . .

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

10 Top Law-Related TED Videos.

20 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Bad Legal Writing, Computer Forensics, Computer Fraud and Abuse Act, Computer Virus, Copyright, Criminal Law, Cybersecurity, Digital Millenium Copyright Act, Discovery, Encryption, Evidence, Finance and Banking Law, Fraud, Google, Government, Identity Theft, Intellectual Property, Law Office Management, Legal Technology, Legal Writing, Legalese, Malware, Management, Patent Law, PC Computers, Plain Language, Presentations, Search Engines, Trial Tips and Techniques, Trojans, Video

≈ Comments Off on 10 Top Law-Related TED Videos.

Tags

Copyright, Crime, Eyewitness, Fashion Industry, Government, Internet, Legal Productivity Blog, Legalese, Patent Troll, Plain Language, TED, Tim Baran

Top 10 Legal TED Talks, by Tim Baran, Legal Productivity Blog

http://www.legalproductivity.com/op-ed/top-10-legal-ted-talks/

Have you heard of TED? It began in 1984 as a conference and now covers a wide range of topics in more than 100 languages.  Think of it as a massive brain trust that shares great ideas and information.

Each of the law-related TED talks listed in this article are worthwhile on their own: (1) four ways to fix a broken legal system; (2) eliminate legalese by using plain English; (3) how to beat a patent troll; (4) how the Internet will change government; (5) laws that choke creativity; (6) copyright law; (7) why eyewitnesses get it wrong; (8) how technology could make crime worse; (9) the Internet and anonymity online; and (10) how great leaders inspire. -CCE

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

01 Tuesday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Cell Phones, Clouds, Computer Forensics, Confidentiality, Cybersecurity, Disaster Preparedness, Emails, Encryption, Google, Intellectual Property, iPad, iPhones, Law Office Management, Legal Blogs, Legal Ethics, Legal Technology, Mac, Management, Marketing, Passwords, PC Computers, Social Media, Supervising Support Staff, Tablets, Technology, Using Social Media

≈ Comments Off on Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

Tags

Apple, Blackberry Phone, Cell Phones, Confidentiality, Curo Legal Blog, Cybersecurity, iPads, iPhones, Legal Ethics, Mobile Device Policy, Passwords, Tablets, Will Harrelson

Mobile Device Security for Lawyers: How Solos and Small Firms can Ethically Allow Bring Your Own Device, by Will Harrelson, Curo Legal Blog (with hat tip to Jeff Richardson, iPhone J.D. Blog!)

http://tinyurl.com/lrrnp7g

The Start of Bring Your Own Device Policies

It really is the iPhone’s fault. Yes, Apple is to blame for designing the most desirable piece of technology of the last decade. So desirable, in fact, that employees of all stripes requested (and, often, begged) their IT departments to toss the increasingly-‘corporate’ Blackberry out the window and allow the use of their personal iPhones for corporate emails and calls. As a result, we have been living in the age of ‘Bring Your Own Device’ where employees use a single personal mobile phone (or tablet) for both their personal email, texting, and social media while also using it for work email, word processing, and other enterprise applications.

Before the Bring Your Own Device era, a company’s greatest out-of-office security concern was an employee who left a briefcase in a taxi. Today, the worry is an employee misplacing a device the size of wallet containing almost limitless amounts of data that criminals or hackers would easily and quickly exploit if given the chance. Clearly, there is an obvious financial motivation for all businesses to protect their own or customer’s sensitive data.

However, lawyers face particular ethical consequences if they fail to take reasonable efforts to either investigate the technologies that they implement or protect their client’s confidential information. . . .

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

Android App Honey Pot For Lawyers and Law Students.

18 Wednesday Jun 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cybersecurity, Legal Technology

≈ Comments Off on Android App Honey Pot For Lawyers and Law Students.

Tags

Android, Apps, Digital Devices, Smart Phones, University of Wisconsin Law Library

Android Applications for Lawyers, Law Faculty and Law Students, University of Wisconsin Law Library

http://tinyurl.com/qccykbw

I’ve already posted Jeff Richardson’s fantastic “60 Apps in 60 Minutes” presented at the ABA TECHSHOW this year. It seemed only fair that Android devices get their own honey pot as well. So, here it is. Legal Research Apps, Legal Professional Apps, Productivity Apps, Security Apps, Government Apps, Fun Apps, and more – all for Android devices. Yes, there is more out there, but this may get you by for now. -CCE

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

The Hole In Mobile Security Making Your Phone An Easy Target.

15 Sunday Jun 2014

Posted by Celia C. Elwell, RP in Android Phones, Cell Phones, Cybersecurity, Encryption, Fraud, Identity Theft, iPad, iPhones, Legal Technology, Malware, Tablets

≈ Comments Off on The Hole In Mobile Security Making Your Phone An Easy Target.

Tags

All Tech Considered, Apple, AT&T, Comcast, Dave Porcello, Encryption, Facebook, Google, Hackers, Internet, Mobile Phones, NPR, Pwn Plug, Sean Gallagher, Security, Starbucks, Steve Henn, Twitter, Wi-Fi, Yahoo

Here’s One Big Way Your Mobile Phone Could Be Open To Hackers, by Steve Henn, All Tech Considered, NPR

http://tinyurl.com/l2re8ll

Despite the fact that every major Internet provider has added some kind of encryption to its services over the past year, tracking your online traffic is easier than you think.

And you don’t have to be the target of the hacker or the NSA for your traffic to be intercepted. There is a hole in mobile security that could make tens of millions of Americans vulnerable.

Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even the most unsophisticated hacker capture your traffic and possibly steal your identity. . . .

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

When You Share Files, Are They Secure?

31 Saturday May 2014

Posted by Celia C. Elwell, RP in Clouds, Confidentiality, Cybersecurity, Dropbox, Emails, Encryption, Legal Ethics, Legal Technology, Technology

≈ 2 Comments

Tags

Attorney-Client Privilege, Computer Security, Confidentiality, Dropbox, Email, File Sharing, Legal Ethics, Robert Ambrogi's Law Sites

File Sharing by Lawyers Largely Insecure, Survey Suggests, by Robert Ambrogi, Robert Ambrogi’s Law Sites

http://tinyurl.com/pr3apcc

If I were to leave a document on a table entitled, ‘My Deepest, Darkest Secrets,’ under which I wrote, ‘Please do not read this unless you are someone I intended to read this,’ how securely would you think I’d protected myself?

That, effectively, is all the majority of lawyers do to protect confidential documents they share with clients and colleagues, according to a LexisNexis survey published this week. . . .

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...

Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

27 Tuesday May 2014

Posted by Celia C. Elwell, RP in Cybersecurity, Law Office Management, Legal Technology, Malware, Office Procedures, Technology, Trojans, Using Social Media

≈ Comments Off on Why Are U.S. Employees The Weakest Link In America’s Cybersecurity?

Tags

Chinese, Comment Crew, Cybersecurity, e-Discovery Team®, Hackers, Ralph Loosey, Unit 61398

U.S. Employees Are Weakest Link In America’s Cybersecurity – Part One, by Ralph Loosey, e-Discovery Team®

http://tinyurl.com/kkltm9p

The Chinese army knows this vulnerability and attacks American employees every day to steal trade secrets and gain commercial advantage for Chinese businesses.

Criminal hackers can cause tremendous damage, whether trained in China or not. If a high level expert, such as any member of China’s elite Unit 61398, aka Comment Crew, gets into your system, they can seize root control, and own it. They can then plant virtually undetectable back doors into your systems. This allows them to later come and go as they please. . . .

Share this:

  • Click to print (Opens in new window) Print
  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • Share on Tumblr
  • Pocket
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Telegram (Opens in new window) Telegram
Like Loading...
Newer posts →
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • June 2024
  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

lawyersonia's avatarlawyersonia on In Custodia Legis – Lega…
Eric Voigt's avatarEric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt's avatarprofvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999's avatarmadlaw291282999 on Using Hyperbole -Are You Riski…

Recent Comments

lawyersonia's avatarlawyersonia on In Custodia Legis – Lega…
Eric Voigt's avatarEric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt's avatarprofvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999's avatarmadlaw291282999 on Using Hyperbole -Are You Riski…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Subscribe Subscribed
    • The Researching Paralegal
    • Join 460 other subscribers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d