Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Daily Archives: August 9, 2015

Cyber crimes against NATO and its members

Via Atlantic Council – New Twists in Russia’s Cyber Campaign Against NATO and Its Members By Sam Jones, Financial Times: “Russia’s aggressive actions in cyber space are all carefully designed to fall short of warranting any kind of serious military or aggressive response. One of Moscow’s new favoured tactics is to arm crime syndicates with sophisticated hacking tools and malware and subcontract them to undertake operations against adversaries or to mount so-called “false flag” attacks to muddy the water around attribution, says a senior US military cyber command officer.”

HathiTrust US Federal Government Documents Initiative

“Stemming from a proposal accepted by HathiTrust members at the 2011 constitutional convention, HathiTrust has embarked on an ambitious initiative to, “through coordinated action and collective action, expand and enhance access to US federal publications including those issued by GPO and other federal agencies.” The HathiTrust Government Documents Registry is a key component of this broad effort. Further information… Continue Reading

Someone Must Be Lying

Saltzburg, Stephen A., Someone Must Be Lying (2015). 28 Criminal Justice (2015); GWU Law School Public Law Research Paper No. 2015-30; GWU Legal Studies Research Paper No. 2015-30. Available for download at SSRN: http://ssrn.com/abstract=2641149 “There is no rule that governs all cases when determining whether it’s permissible for prosecutors to argue in closing that the… Continue Reading

GAO Report – Facial Recognition Technology

Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law, GAO-15-621: Published: Jul 30, 2015. Publicly Released: Jul 30, 2015. “Facial recognition technology can be used in numerous consumer and business applications, but the extent of its current use in commercial settings is not fully known. The technology is commonly used in software that… Continue Reading