SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Advanced Legal Research
Week One:
Law in the Internet Age
Neal R. Axton & Simon Canick,
Information Resources
Introductions & Expectations
• Instructors
• Students
• Auditors
• Technology
– Gmail
– Blackboard
• Quizzes
• Research Assignments
• http://www.pewinternet.org/
Pew Internet & American Life Project (2010)
Tablet Ownership Exploding
Are you smarter than your phone?
Internet Citation
• Typewriters – 1714 & 1867
• Bluebook
• Practitioner Style
– Typewriters = Underlining
• Law Review Style
– Type Setting
• Small Caps
• Italics
• Font?
• Size?
Online Resources
More formats
• 18.2.2 Direct Citations to Internet Sources
• 18.2.3 Parallel Cites – available at
• 18.3 Commercial Databases
• 18.3.1 Cases
– Unreported
• 18.3.2 Constitutions and Statutes
• 18.3.3 Legislative, Administrative & Executive Materials
• 18.3.4 Books, Periodicals, Other Secondary Sources
• 18.4 CD-Rom
• 18.5 Microform
• 18.6 Film
• 18.7 Audio
– Podcasts
Websites
Other Sources
Direct Citations
• Hard copy “practically unavailable”
– e.g. Rule 18.1’s Conference Report
• Cite directly
– Due Diligence Required?
• Worldcat.org
– Hard Copy Not Cataloged and/or not Published
(e.g. Press Release)
• Citing to Westlaw for current statues
• Minn. Stat. Ann. 169
Some Legal Innovations
• WestlawNext
– Federated Search
• Fdsys
– Federated Search
• Electronic Court Filing System
– PACER/ECF
– Bloomberg’s Docket Search
– Minnesota moving online too…
• Save Money, Reduce Staff
Terrorists or Freedom Fighters?
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
The Online Menagerie
• Hacktivists
• Hackerspaces
• Black Hats
• White Hats
• Cypherpunks
• Cyberpunks
• Wikileaks
– Bradley Manning & Julian Assange
• 4chan, anonymous, lulzboat & lulzsec
• Edward Snowden & Glenn Greenwald
• Pirate Bay & Pirate Party
Attorney Job Security
What’s new [to the music
industry] is this amazingly
efficient distribution system for
stolen property called the
Internet — and no one’s gonna
shut down the Internet.
— Steve Jobs, Rolling Stone, Dec. 3, 2003
http://wikileaks.org/
Julian Assange on Fear
“Fear exists largely in the imagination. That’s
what powerful people prey on. It simply isn’t
possible to police the world’s citizens, so what
they rely on is fear.
Once you realise that fear exists largely in your
own mind, then you are on the way to
liberation. Also I have this righteous indignation.
It spurs me on. Makes me feel invincible.”
Daily Mail: http://bit.ly/qCpYSx
Jurisdiction
The geometrically-enhanced
capabilities of the emerging web
technology spotlights the long-ignored
issues of who owns the worldwide
web, who manages the worldwide
web, and who has jurisdiction over the
worldwide web? The answer now is:
nobody!
- Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police
Futurists Int’l Working Group) http://bit.ly/pA51OV.
•http://bit.ly/12vQ4k1
Those leftists at the Economist…
A Higher Moral Order?
Ruminations
1. States passive and reactive
2. NGO's running the show
3. Media autonomous of nation-state
4. States no longer in control of "normative frameworks"
5. Concept of Spying obsolete
6. Polycentric Governance
Implications
• Global Citizens
cf. United Nations
• Information Wants to be Free!
– What do We Want for Information?
• Technology Changes Us
– Information Technology
– Mass Communication
– Internet & Cell Phones
– Firearms?
Ethical Compliance
http://lprb.mncourts.gov/Pages/Default.aspx
MN LPRB Opinion 22
Tracked Changes Metadata
More on Metadata
• Metadata
– Data about Data
– Industrial Strength Organizational Data
– Telephony Metadata
• Originating Phone Number
• Dialed Phone Number
• Duration of Call
• Call Waiting
• Call Forwarding
• Cell Phone Tower used during Call
• Cell Phone Transfers During Call
• Signal Strength During Call
Scintilla of Knowledge
• Black Boxes
–Irreducible Complexity
–Invisible Data
• Metadata
• Any sufficiently advanced technology is
indistinguishable from magic.
- Arthur C. Clarke
Location Data
Distinctions with a difference
• Applying GPS device = 4th
Amendment Violation
– aka Bird-dogging
• Using Cell Phone Tower Metadata = Okey-Dokey
• Reasonable Expectation of Privacy
– Katz v. U.S., 389 U.S. 347 (1967)
– Fiat Declaration
– One Size Fits All
Social Network Analysis
• Pivot People & Opinion Leaders
Complex Social Networks
Cloud Computing
Search for Cloud Computing on LPRB site
Cloud Computing and Legal Ethics
Ethical Pitfalls
• [T]he use of technologies such as cloud
storage will never lessen—and may, in fact,
increase and make more complicated—an
attorney’s obligations under the Rules of
Professional Conduct.
• As an initial matter, an attorney must have at
least a base-level comprehension of the
technology and the implications of [cloud
computing’s] use.
Head in the Clouds
• Cloud computing
– Software as a service
– Infrastructure & Bandwidth
• Client-Server Architecture
Computing Platforms
• Thick Clients
– PC with local Central Processing Unit (CPU)
• Thin Clients
– e.g. Smart Phones
– Push Everything Possible to the Cloud
Root
DNS DNS DNS DNS DNS DNS DNS
ISP
Servers Users/Clients
IXP
Root Root
ISP ISPISP
FBI Intercepts
• Communications Assistance for Law Enforcement Act, Pub.L.
103–414, 108 Stat. 4279 (1994) codified at
• 47 USC §§ 1001-10.
• FBI’s older Carnivore system
• DCSNet and DCS-3000
– Captures VOIP
– Mobile Cell Tower Vans
Combining Topics
• Search Incident to Arrest
• Seize iPhone
• Access iCloud
• Can law enforcement access contacts on a phone?
• Can law enforcement access everything on the defendant’s
iCloud?
Lawyering in the 21st
Century
• E-Discovery
– Costs impact litigation
– Smoking Gun
• Legal Blogging
– Lawyer Advertising?
– Blog Consultant
• Social Networking
– Due Diligence
– Discrimination?
• Social Networking Independent Reviewer
• False and Misleading Statements
• Unauthorized Practice
• Privacy implications of email
Geek Speak and Lawyering
“One of the primary reasons that electronic data is lost is
ineffective communication with information technology
personnel.
By taking possession of, or otherwise safeguarding, all
potentially relevant backup tapes, counsel eliminates the
possibility that such tapes will be inadvertently recycled…
Counsel failed to communicate the litigation hold order to all key
players. They also failed to ascertain each of the key players'
document management habits…
This case represents a failure of communication, and that failure
falls on counsel and client alike.”
Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)
History of Mass Media
• Typewriters
• Telegraph
• Teletype Machines
• Advertising
• Female Typists
– Context of AMC’s Mad Men Show
• Newspapers
• Postal Service
– Bribing Postmasters
– Transit Fees
– International Relations and Subservience
Theoretical Frameworks
• Social Contract Theory
• Rights Theory
– Rights Enforced by a Sovereign
• Ethics
– Intentionalism vs Consequentialism
• Privacy
– Secrecy
• Trade Secrets
– Transparency
• Data Practices Act
– Security
• Privacy
• Network Theory

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics for the paralegal
Ethics for the paralegalEthics for the paralegal
Ethics for the paralegalLauren Doucette
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016asiara
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curseArif Farhan
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft Shane Tilton
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyDan Houser
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالثBunayan ALdosari
 
Media & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMedia & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMarie K. Shanahan
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 

Was ist angesagt? (20)

Ethics for the paralegal
Ethics for the paralegalEthics for the paralegal
Ethics for the paralegal
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Conference - ITechLaw CyberSpaceCamp
Conference - ITechLaw CyberSpaceCampConference - ITechLaw CyberSpaceCamp
Conference - ITechLaw CyberSpaceCamp
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curse
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالث
 
Media & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMedia & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st Century
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 

Andere mochten auch

Perils of Social Networking
Perils of Social NetworkingPerils of Social Networking
Perils of Social NetworkingNeal Axton
 
Sierra sur times
Sierra sur timesSierra sur times
Sierra sur timesyorogo74
 
Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001rickhird
 
Cyberspace and Transportation
Cyberspace and TransportationCyberspace and Transportation
Cyberspace and Transportationmcusack
 
Marketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis ByrneMarketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis ByrneCaroline Greener
 
Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)yorogo74
 
Administrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power SharingAdministrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power SharingNeal Axton
 
Content Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale SummitContent Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale SummitAngie Pascale
 
Blink about us
Blink about usBlink about us
Blink about usBlink
 
St Patricks Words
St Patricks WordsSt Patricks Words
St Patricks Wordsyorogo74
 
Social Networking at William Mitchell College of Law
Social Networking at William Mitchell College of LawSocial Networking at William Mitchell College of Law
Social Networking at William Mitchell College of LawNeal Axton
 
חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011Blink
 

Andere mochten auch (20)

Percorso Sportivo 1
Percorso Sportivo 1Percorso Sportivo 1
Percorso Sportivo 1
 
Perils of Social Networking
Perils of Social NetworkingPerils of Social Networking
Perils of Social Networking
 
Sierra sur times
Sierra sur timesSierra sur times
Sierra sur times
 
Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001
 
About Google Inc.
About Google Inc.About Google Inc.
About Google Inc.
 
Percorso Artistico 4
Percorso Artistico 4Percorso Artistico 4
Percorso Artistico 4
 
Cyberspace and Transportation
Cyberspace and TransportationCyberspace and Transportation
Cyberspace and Transportation
 
Marketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis ByrneMarketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis Byrne
 
Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)
 
Agao0108 fic
Agao0108 ficAgao0108 fic
Agao0108 fic
 
Abecedario
AbecedarioAbecedario
Abecedario
 
Bragbook
BragbookBragbook
Bragbook
 
Administrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power SharingAdministrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power Sharing
 
Content Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale SummitContent Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale Summit
 
Social Media
Social MediaSocial Media
Social Media
 
Blink about us
Blink about usBlink about us
Blink about us
 
St Patricks Words
St Patricks WordsSt Patricks Words
St Patricks Words
 
Social Networking at William Mitchell College of Law
Social Networking at William Mitchell College of LawSocial Networking at William Mitchell College of Law
Social Networking at William Mitchell College of Law
 
Hopelessly devoted to #
Hopelessly devoted to #Hopelessly devoted to #
Hopelessly devoted to #
 
חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011
 

Ähnlich wie Legal Research in the Age of Cloud Computing

Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfjyothimuppasani1
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensicRahul Badekar
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesKathirvel Ayyaswamy
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfHari319621
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 

Ähnlich wie Legal Research in the Age of Cloud Computing (20)

Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 

Mehr von Neal Axton

Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Neal Axton
 
Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014Neal Axton
 
2013 local state_law_drinks_v04
2013 local state_law_drinks_v042013 local state_law_drinks_v04
2013 local state_law_drinks_v04Neal Axton
 
Legal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsLegal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsNeal Axton
 
Administrative Legal Research Introduction
Administrative Legal Research IntroductionAdministrative Legal Research Introduction
Administrative Legal Research IntroductionNeal Axton
 
Nursing home law_v4
Nursing home law_v4Nursing home law_v4
Nursing home law_v4Neal Axton
 
Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4Neal Axton
 
Thomas.Gov Introduction
Thomas.Gov IntroductionThomas.Gov Introduction
Thomas.Gov IntroductionNeal Axton
 
Online Collaborative Tools
Online Collaborative ToolsOnline Collaborative Tools
Online Collaborative ToolsNeal Axton
 
Introduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law LibrariesIntroduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law LibrariesNeal Axton
 
Applied Administrative Law: Water Law
Applied Administrative Law: Water LawApplied Administrative Law: Water Law
Applied Administrative Law: Water LawNeal Axton
 

Mehr von Neal Axton (11)

Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
 
Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014
 
2013 local state_law_drinks_v04
2013 local state_law_drinks_v042013 local state_law_drinks_v04
2013 local state_law_drinks_v04
 
Legal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsLegal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research Paradigms
 
Administrative Legal Research Introduction
Administrative Legal Research IntroductionAdministrative Legal Research Introduction
Administrative Legal Research Introduction
 
Nursing home law_v4
Nursing home law_v4Nursing home law_v4
Nursing home law_v4
 
Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4
 
Thomas.Gov Introduction
Thomas.Gov IntroductionThomas.Gov Introduction
Thomas.Gov Introduction
 
Online Collaborative Tools
Online Collaborative ToolsOnline Collaborative Tools
Online Collaborative Tools
 
Introduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law LibrariesIntroduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law Libraries
 
Applied Administrative Law: Water Law
Applied Administrative Law: Water LawApplied Administrative Law: Water Law
Applied Administrative Law: Water Law
 

Kürzlich hochgeladen

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Kürzlich hochgeladen (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Legal Research in the Age of Cloud Computing

  • 1. Advanced Legal Research Week One: Law in the Internet Age Neal R. Axton & Simon Canick, Information Resources
  • 2. Introductions & Expectations • Instructors • Students • Auditors • Technology – Gmail – Blackboard • Quizzes • Research Assignments
  • 4. Pew Internet & American Life Project (2010)
  • 6. Are you smarter than your phone?
  • 7.
  • 8. Internet Citation • Typewriters – 1714 & 1867 • Bluebook • Practitioner Style – Typewriters = Underlining • Law Review Style – Type Setting • Small Caps • Italics • Font? • Size?
  • 10. More formats • 18.2.2 Direct Citations to Internet Sources • 18.2.3 Parallel Cites – available at • 18.3 Commercial Databases • 18.3.1 Cases – Unreported • 18.3.2 Constitutions and Statutes • 18.3.3 Legislative, Administrative & Executive Materials • 18.3.4 Books, Periodicals, Other Secondary Sources • 18.4 CD-Rom • 18.5 Microform • 18.6 Film • 18.7 Audio – Podcasts
  • 13. Direct Citations • Hard copy “practically unavailable” – e.g. Rule 18.1’s Conference Report • Cite directly – Due Diligence Required? • Worldcat.org – Hard Copy Not Cataloged and/or not Published (e.g. Press Release) • Citing to Westlaw for current statues • Minn. Stat. Ann. 169
  • 14. Some Legal Innovations • WestlawNext – Federated Search • Fdsys – Federated Search • Electronic Court Filing System – PACER/ECF – Bloomberg’s Docket Search – Minnesota moving online too… • Save Money, Reduce Staff
  • 15.
  • 16. Terrorists or Freedom Fighters? We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
  • 17. The Online Menagerie • Hacktivists • Hackerspaces • Black Hats • White Hats • Cypherpunks • Cyberpunks • Wikileaks – Bradley Manning & Julian Assange • 4chan, anonymous, lulzboat & lulzsec • Edward Snowden & Glenn Greenwald • Pirate Bay & Pirate Party
  • 18. Attorney Job Security What’s new [to the music industry] is this amazingly efficient distribution system for stolen property called the Internet — and no one’s gonna shut down the Internet. — Steve Jobs, Rolling Stone, Dec. 3, 2003
  • 20. Julian Assange on Fear “Fear exists largely in the imagination. That’s what powerful people prey on. It simply isn’t possible to police the world’s citizens, so what they rely on is fear. Once you realise that fear exists largely in your own mind, then you are on the way to liberation. Also I have this righteous indignation. It spurs me on. Makes me feel invincible.” Daily Mail: http://bit.ly/qCpYSx
  • 21. Jurisdiction The geometrically-enhanced capabilities of the emerging web technology spotlights the long-ignored issues of who owns the worldwide web, who manages the worldwide web, and who has jurisdiction over the worldwide web? The answer now is: nobody! - Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police Futurists Int’l Working Group) http://bit.ly/pA51OV.
  • 23. Those leftists at the Economist…
  • 24. A Higher Moral Order?
  • 25. Ruminations 1. States passive and reactive 2. NGO's running the show 3. Media autonomous of nation-state 4. States no longer in control of "normative frameworks" 5. Concept of Spying obsolete 6. Polycentric Governance
  • 26. Implications • Global Citizens cf. United Nations • Information Wants to be Free! – What do We Want for Information? • Technology Changes Us – Information Technology – Mass Communication – Internet & Cell Phones – Firearms?
  • 28.
  • 31. More on Metadata • Metadata – Data about Data – Industrial Strength Organizational Data – Telephony Metadata • Originating Phone Number • Dialed Phone Number • Duration of Call • Call Waiting • Call Forwarding • Cell Phone Tower used during Call • Cell Phone Transfers During Call • Signal Strength During Call
  • 32. Scintilla of Knowledge • Black Boxes –Irreducible Complexity –Invisible Data • Metadata • Any sufficiently advanced technology is indistinguishable from magic. - Arthur C. Clarke
  • 33.
  • 35. Distinctions with a difference • Applying GPS device = 4th Amendment Violation – aka Bird-dogging • Using Cell Phone Tower Metadata = Okey-Dokey • Reasonable Expectation of Privacy – Katz v. U.S., 389 U.S. 347 (1967) – Fiat Declaration – One Size Fits All
  • 36. Social Network Analysis • Pivot People & Opinion Leaders
  • 39. Search for Cloud Computing on LPRB site
  • 40. Cloud Computing and Legal Ethics
  • 41. Ethical Pitfalls • [T]he use of technologies such as cloud storage will never lessen—and may, in fact, increase and make more complicated—an attorney’s obligations under the Rules of Professional Conduct. • As an initial matter, an attorney must have at least a base-level comprehension of the technology and the implications of [cloud computing’s] use.
  • 42. Head in the Clouds • Cloud computing – Software as a service – Infrastructure & Bandwidth • Client-Server Architecture Computing Platforms • Thick Clients – PC with local Central Processing Unit (CPU) • Thin Clients – e.g. Smart Phones – Push Everything Possible to the Cloud
  • 43. Root DNS DNS DNS DNS DNS DNS DNS ISP Servers Users/Clients IXP Root Root ISP ISPISP
  • 44. FBI Intercepts • Communications Assistance for Law Enforcement Act, Pub.L. 103–414, 108 Stat. 4279 (1994) codified at • 47 USC §§ 1001-10. • FBI’s older Carnivore system • DCSNet and DCS-3000 – Captures VOIP – Mobile Cell Tower Vans
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Combining Topics • Search Incident to Arrest • Seize iPhone • Access iCloud • Can law enforcement access contacts on a phone? • Can law enforcement access everything on the defendant’s iCloud?
  • 53. Lawyering in the 21st Century • E-Discovery – Costs impact litigation – Smoking Gun • Legal Blogging – Lawyer Advertising? – Blog Consultant • Social Networking – Due Diligence – Discrimination? • Social Networking Independent Reviewer • False and Misleading Statements • Unauthorized Practice • Privacy implications of email
  • 54. Geek Speak and Lawyering “One of the primary reasons that electronic data is lost is ineffective communication with information technology personnel. By taking possession of, or otherwise safeguarding, all potentially relevant backup tapes, counsel eliminates the possibility that such tapes will be inadvertently recycled… Counsel failed to communicate the litigation hold order to all key players. They also failed to ascertain each of the key players' document management habits… This case represents a failure of communication, and that failure falls on counsel and client alike.” Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)
  • 55. History of Mass Media • Typewriters • Telegraph • Teletype Machines • Advertising • Female Typists – Context of AMC’s Mad Men Show • Newspapers • Postal Service – Bribing Postmasters – Transit Fees – International Relations and Subservience
  • 56. Theoretical Frameworks • Social Contract Theory • Rights Theory – Rights Enforced by a Sovereign • Ethics – Intentionalism vs Consequentialism • Privacy – Secrecy • Trade Secrets – Transparency • Data Practices Act – Security • Privacy • Network Theory