LLRX Articles and Columns for February 2022
- Offense v. Defense – The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.
- 2022 Guide to Internet Privacy Resources and Tools – The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.
- Using News and Social Media for Finding Financial Assets – 5 Top Tips – Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.
- International law says Putin’s war against Ukraine is illegal. Does that matter? Hurst Hannum, Professor of International Law, Fletcher School of Law & Diplomacy, Tufts University acknowledges that International laws are in place to prevent war and help protect civilians and combatants alike. But he further states that these laws are challenging to enforce and are unlikely to stop the unfolding Russia-Ukraine war.
- Biden nominates Ketanji Brown Jackson to the Supreme Court: 7 questions answered – Alexis Karteron, constitutional law professor, Rutgers University, Newark, provides insight on what Judge Ketanji Brown Jackson, the first Black woman nominated to the Supreme Court, could mean for how that court works.
- Putin’s claim to rid Ukraine of Nazis is especially absurd given its history – Jeffrey Veidlinger, a Holocaust historian at the University of Michigan, explains why Ukrainian history needs to be understood in terms of both past violence against Jews as well as the state’s pluralistic vision.
- Pete Recommends – Weekly highlights on cyber security issues, February 26, 2022 – Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.
- Pete Recommends – Weekly highlights on cyber security issues, February 19, 2022 – Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.
- Pete Recommends – Weekly highlights on cyber security issues, February 12, 2022 – Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.
- Pete Recommends – Weekly highlights on cyber security issues, February 5, 2022 – Five highlights from this week: The modern workplace: Will remote tech workers tolerate being monitored?; How to Protect Yourself From Common Scams; Academic Journal Claims it Fingerprints PDFs for ‘Ransomware,’ Not Surveillance; Security agency director urges governors to teach cybersecurity basics; Best Password Manager Reviews; and Democratic Lawmakers Call for Ban of Surveillance Advertising.