Follow the E-Mail Trail – What you can learn from the data embedded in e-mail headers, by Mark A. Berman and Aaron Zerykier, The National Law Journal.
Follow the E-Mail Trail – What you can learn from the data embedded in e-mail headers, by Mark A. Berman and Aaron Zerykier, The National Law Journal.
Boston Globe: Bush challenges hundreds of laws:”President Bush has quietly claimed the authority to disobey more than 750 laws enacted since he took office, asserting that he has the power to set aside any statute passed by Congress when it conflicts with his interpretation of the Constitution.” VT Sen. Patrick Leahy: Bush is abusing power… Continue Reading
Archivists hone disaster plans: The loss of vital historical documents as a result of hurricanes Rita and Katrina have caused state archivists to re-evaluate the scope and effectiveness of the their disaster plans, as well as the need to establish different relationships with federal authorities. Related sites: The Georgia Archives Louisiana Division of Archives, Records… Continue Reading
“JURIST has been nominated for a prestigious Webby Award as the best Law website of 2006.” Register, and please vote for JURIST. Continue Reading
“The mission of the Sunlight Foundation is to use the transformative power of the Internet and new information technology to enable citizens to learn more about what Congress and their elected representatives are doing, and thus help reduce corruption, ensure greater transparence and accountability by government, and foster public trust in the vital institutions of… Continue Reading
PCWorld: Never Call Tech Support Again! “Why suffer though hours on hold when you can solve the problem yourself? Whether your PC won’t boot, keeps crashing, is infested with adware, or can’t get to the Net, we’ll help you fix it.” Continue Reading
AP: “The FBI secretly sought information last year on 3,501 U.S. citizens and legal residents from their banks and credit card, telephone and Internet companies without a court’s approval…” Related postings on domestic surveillance program Continue Reading
Government Reform, Minority Cmte: Terrorism Attacks Surge in 2005 – Friday, April 28, 2006 — New data from the National Counterterrorism Center shows that terrorist attacks have increased exponentially in the three years since the United States invaded Iraq – Flash Report: 2005 Data on Global Terrorism [4 pages, PDF] Special Briefing on Release of… Continue Reading
The Ins and Outs of Spyware [15 pages, PDF] April 24, 2006: “Lesley Herring discusses what spyware is, categories of spyware, types of spyware, symptoms of spyware, research sites to find out more information, prevention techniques, and removal tools in this contribution.” Continue Reading
The Cost of Iraq, Afghanistan, and Other Global War on Terror Operations Since 9/11 (40 pages, PDF) “CRS estimates that Congress has appropriated a total of about $368 billion for military operations, base security, reconstruction, foreign aid, embassy costs, and veterans’ health care for the three operations initiated since the 9/11 attacks: Operation Enduring Freedom… Continue Reading
Press release: “Commission calls for ambitious objectives in the EU for 2010 – A plan that could lead to multi billion annual savings for EU taxpayers and business was tabled by the European Commission today. With the eGovernment Action Plan the EU seeks to accelerate the delivery of tangible benefits for ALL Europeans.” eGovernment… Continue Reading
State Legislative Bill Tracking: “If you are concerned about proposed legislation in the following 21 states, are you aware that these states offer a bill-tracking service on the web? The states are Alaska, Arizona, Arkansas, California, Georgia, Indiana, Iowa, Kansas, Minnesota, Nebraska, Nevada, New Jersey, New Mexico, Oklahoma, South Dakota, Texas, Utah, Virginia, Washington, West… Continue Reading