Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Google Data Liberation Project – Download your data: FAQ

Your Account. Your Data. Download a Copy.

Why is it important that I have access to this data?

It’s important that you can access your Google data when you want it, where you want it – whether is it to import it into another service or just create your own copy for your archives. People usually don’t look to see if they can get their data out of a product until they decide that they want to leave. For this reason, we always encourage you to ask these three questions before starting to use a product that will store your data:

  • Can I get my data out in an open, interoperable, portable format?
  • How much is it going to cost to get my data out?
  • How much of my time is it going to take to get my data out?

The ideal answers to these questions are:

  • Yes.
  • Nothing more than I’m already paying.
  • As little as possible.

There shouldn’t be an additional charge to export your data. Beyond that, if it takes you weeks to get your data, it’s almost as bad as not being able to get your data out at all.”

Safeguarding the Personal Information of all People – ODNI

Office of the Director of National Intelligence (ODNI) – Safeguarding the Personal Information of all People, July 2014. “As the President said in his speech on January 17, 2014, “the challenges posed by threats like terrorism, proliferation, and cyber-attacks are not going away any time soon, and for our intelligence community to be effective over theContinue Reading

Retired NSA Technical Director Explains Snowden Docs

A Review of Security Requirements for Local Number Portability Administration

A Review of Security Requirements for Local Number Portability Administration, The Chertoff Group, September 29, 2014: “For years, Americans have had the legal right to keep their wireless and wireline telephone numbers when switching carriers, and they frequently exercise this right. Carriers must constantly keep track of this switching of carriers in order to route telephone callsContinue Reading

Appeals Court Limits Military Surveillance of Civilian Internet Use

“The U.S. Court of Appeals for the Ninth Circuit ruled in United States v. Dreyer that an agent for the Naval Criminal Investigative Service violated Defense Department regulations and the Posse Comitatus Act when he conducted a surveillance operation in Washington state to identify civilians who might be sharing illegal files. The 1878 Act prevents the U.S.Continue Reading

Academic Skills on Web Are Tied to Income Level – Report

Motoko Rich: “Wealthier students tend to perform better on tests of reading comprehension than their poorer peers, a longstanding trend that has been documented amply. But with the Internet having become an indispensable part of daily life, a new study shows that a separate gap has emerged, with lower-income students again lagging more affluent students inContinue Reading

International Law and Secret Surveillance: Binding Restrictions upon State Monitoring of Telephone and Internet Activity

CDT: “In the year that has followed Edward Snowden’s first disclosures concerning secret US and UK surveillance practices, many governments, human-rights groups, and UN bodies have debated—and at times disagreed sharply—about whether the Internet and telephone surveillance practices that governments employ today are consistent with international law. With a view to informing these discussions, thisContinue Reading

EPIC (Finally) Obtains Memos on Warrantless Wiretapping Program

“More than eight years after filing a Freedom of Information Act request for the legal justification behind the “Warrantless Wiretapping” program of President Bush, EPIC has now obtained a mostly unredacted version of two key memos (OLC54)and (OLC85) by former Justice Department official Jack Goldsmith. EPIC requested these memos just four hours after the New York Times broke the story about theContinue Reading

New on LLRX – Online tools to streamline your email

Via LLRX.com – Online tools to streamline your email – Nicole Black talks about email add-ons to assist busy lawyers respond more effectively to a continuous avalanche of communications that require sorting, prioritizing, tagging and timely actions. She highlights several effective online tools designed to solve these problems by integrating with your Gmail account and other programs as well.

The executive order that led to mass spying, as told by NSA alumni

Cyrus Farivar – Ars Technica: [Executive Order] 12333 is used to target foreigners abroad, and collection happens outside the US,” whistleblower John Tye, a former State Department official, told Ars recently. “My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known inContinue Reading

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret,Continue Reading

CIA IG Report Confirms Searches of Senate Computers

Feinstein Statement on CIA IG Report, Washington –  Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) released the following statement: “I was briefed Tuesday by CIA Inspector General David Buckley on the results of an IG investigation [summary only available at this time]. The investigation confirmed what I said on the Senate floor in March – CIA personnel inappropriatelyContinue Reading