Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Guardian – WikiLeaks demands answers after Google hands staff emails to US government

Ed Pilkington and Dominic Rushe: “Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the US government, under a secret search warrant issued by a federal judge. WikiLeaks has written to Google’s executive chairman,Continue Reading

Everybody Dies: What is Your Digital Legacy?

Alethea Lange – CDT – “What happens to your email when you die? For most people this hopefully isn’t an urgent question, but a few high profile cases have made it an issue for lawmakers and judges around the world. You might think that your family could show up with a death certificate and/or aContinue Reading

70 Public Interest Groups and Companies Urge Congress to Update Email Privacy Law

“EFF, along with more than sixty civil liberties organizations, public interest groups, and companies sent two letters to the House and Senate leadership today. One supported the upcoming bipartisan Email Privacy Act by Reps. Kevin Yoder and Jared Polis, and the other supported the upcoming Electronic Communications Privacy Act Amendments Act by Sens. Mike LeeContinue Reading

CIA Releases Redacted Report on Surveillance of Congress

“Several months after EPIC filed a Freedom of Information Act lawsuit against the Central Intelligence Agency, the agency has released the Inspector General’s report on the agency’s surveillance of Congress. The Inspector General launched an investigation after the Senate accused the CIA of improperly accessing the computers of Senate staff who were investigating CIA tortureContinue Reading

DOJ IG Report on FBI Access to NSA Surveillance Data

“U.S. Federal Bureau of Investigation access to overseas surveillance collected by sister organization the National Security Agency has expanded in recent years, with the law enforcement agency gaining access to collected but unprocessed data in 2009, according to a report released by the government. The FBI’s access to email and other data collected from overseas targetsContinue Reading

Technology’s Impact on Workers

“The internet and cell phones have infiltrated every cranny of American workplaces, and digital technology has transformed vast numbers of American jobs. Work done in the most sophisticated scientific enterprises, entirely new technology businesses, the extensive array of knowledge and media endeavors, the places where crops are grown, the factory floor, and even mom-and-pop storesContinue Reading

Investigative Report Claims NSA Hacking of Cellphone Networks Is Global

Ryan Gallagher – The Intercept: “The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensureContinue Reading

Unprecedented leak of Sony Pictures internal personal data

“After sifting through almost 40GB of leaked internal data, one thing is clear: Sony Pictures appears to have suffered the most embarrassing and all-encompassing hack of internal corporate data ever made public. The data dump, which was reviewed extensively by BuzzFeed News, includes employee criminal background checks, salary negotiations, and doctors’ letters explaining the medical rationaleContinue Reading

Text of the Presidential and Federal Records Act Amendments of 2014

NARA – “On November 26, 2014, President Barack Obama signed into law H.R. 1233, the Presidential and Federal Records Act Amendments of 2014. This new law modernizes records management by focusing more directly on electronic records, and complements efforts by the National Archives and the Office of Management and Budget to implement the President’s 2011Continue Reading

Home Depot Reports Findings in Payment Data Breach Investigation

News release: “The Home Depot®, the world’s largest home improvement retailer, today disclosed additional findings related to the recent breach of its payment data systems. The findings are the result of weeks of investigation by The Home Depot, in cooperation with law enforcement and the company’s third-party IT security experts. Additional Investigation Details Disclosed – InContinue Reading

Study Calls Out Workplace Telepressure

Please Respond ASAP: Workplace Telepressure and Employee Recovery. Barber, Larissa K.; Santuzzi, Alecia M. Journal of Occupational Health Psychology, Nov 3 , 2014, No Pagination Specified. http://dx.doi.org/10.1037/a0038278 “Organizations rely heavily on asynchronous message-based technologies (e.g., e-mail) for the purposes of work-related communications. These technologies are primary means of knowledge transfer and building social networks. As a by-product, workersContinue Reading

How Secure is TextSecure? – Paper

How Secure is TextSecure? Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz, October 31, 2014. “Instant Messaging has attracted a lot of attention by users for both private and business communication and has especially gained popularity as low-cost short message replacement on mobile devices. However, most popularContinue Reading