SlideShare uma empresa Scribd logo
1 de 56
Advanced Legal Research
Week One:
Law in the Internet Age
Neal R. Axton & Simon Canick,
Information Resources
Introductions & Expectations
• Instructors
• Students
• Auditors
• Technology
– Gmail
– Blackboard
• Quizzes
• Research Assignments
• http://www.pewinternet.org/
Pew Internet & American Life Project (2010)
Tablet Ownership Exploding
Are you smarter than your phone?
Internet Citation
• Typewriters – 1714 & 1867
• Bluebook
• Practitioner Style
– Typewriters = Underlining
• Law Review Style
– Type Setting
• Small Caps
• Italics
• Font?
• Size?
Online Resources
More formats
• 18.2.2 Direct Citations to Internet Sources
• 18.2.3 Parallel Cites – available at
• 18.3 Commercial Databases
• 18.3.1 Cases
– Unreported
• 18.3.2 Constitutions and Statutes
• 18.3.3 Legislative, Administrative & Executive Materials
• 18.3.4 Books, Periodicals, Other Secondary Sources
• 18.4 CD-Rom
• 18.5 Microform
• 18.6 Film
• 18.7 Audio
– Podcasts
Websites
Other Sources
Direct Citations
• Hard copy “practically unavailable”
– e.g. Rule 18.1’s Conference Report
• Cite directly
– Due Diligence Required?
• Worldcat.org
– Hard Copy Not Cataloged and/or not Published
(e.g. Press Release)
• Citing to Westlaw for current statues
• Minn. Stat. Ann. 169
Some Legal Innovations
• WestlawNext
– Federated Search
• Fdsys
– Federated Search
• Electronic Court Filing System
– PACER/ECF
– Bloomberg’s Docket Search
– Minnesota moving online too…
• Save Money, Reduce Staff
Terrorists or Freedom Fighters?
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
The Online Menagerie
• Hacktivists
• Hackerspaces
• Black Hats
• White Hats
• Cypherpunks
• Cyberpunks
• Wikileaks
– Bradley Manning & Julian Assange
• 4chan, anonymous, lulzboat & lulzsec
• Edward Snowden & Glenn Greenwald
• Pirate Bay & Pirate Party
Attorney Job Security
What’s new [to the music
industry] is this amazingly
efficient distribution system for
stolen property called the
Internet — and no one’s gonna
shut down the Internet.
— Steve Jobs, Rolling Stone, Dec. 3, 2003
http://wikileaks.org/
Julian Assange on Fear
“Fear exists largely in the imagination. That’s
what powerful people prey on. It simply isn’t
possible to police the world’s citizens, so what
they rely on is fear.
Once you realise that fear exists largely in your
own mind, then you are on the way to
liberation. Also I have this righteous indignation.
It spurs me on. Makes me feel invincible.”
Daily Mail: http://bit.ly/qCpYSx
Jurisdiction
The geometrically-enhanced
capabilities of the emerging web
technology spotlights the long-ignored
issues of who owns the worldwide
web, who manages the worldwide
web, and who has jurisdiction over the
worldwide web? The answer now is:
nobody!
- Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police
Futurists Int’l Working Group) http://bit.ly/pA51OV.
•http://bit.ly/12vQ4k1
Those leftists at the Economist…
A Higher Moral Order?
Ruminations
1. States passive and reactive
2. NGO's running the show
3. Media autonomous of nation-state
4. States no longer in control of "normative frameworks"
5. Concept of Spying obsolete
6. Polycentric Governance
Implications
• Global Citizens
cf. United Nations
• Information Wants to be Free!
– What do We Want for Information?
• Technology Changes Us
– Information Technology
– Mass Communication
– Internet & Cell Phones
– Firearms?
Ethical Compliance
http://lprb.mncourts.gov/Pages/Default.aspx
MN LPRB Opinion 22
Tracked Changes Metadata
More on Metadata
• Metadata
– Data about Data
– Industrial Strength Organizational Data
– Telephony Metadata
• Originating Phone Number
• Dialed Phone Number
• Duration of Call
• Call Waiting
• Call Forwarding
• Cell Phone Tower used during Call
• Cell Phone Transfers During Call
• Signal Strength During Call
Scintilla of Knowledge
• Black Boxes
–Irreducible Complexity
–Invisible Data
• Metadata
• Any sufficiently advanced technology is
indistinguishable from magic.
- Arthur C. Clarke
Location Data
Distinctions with a difference
• Applying GPS device = 4th
Amendment Violation
– aka Bird-dogging
• Using Cell Phone Tower Metadata = Okey-Dokey
• Reasonable Expectation of Privacy
– Katz v. U.S., 389 U.S. 347 (1967)
– Fiat Declaration
– One Size Fits All
Social Network Analysis
• Pivot People & Opinion Leaders
Complex Social Networks
Cloud Computing
Search for Cloud Computing on LPRB site
Cloud Computing and Legal Ethics
Ethical Pitfalls
• [T]he use of technologies such as cloud
storage will never lessen—and may, in fact,
increase and make more complicated—an
attorney’s obligations under the Rules of
Professional Conduct.
• As an initial matter, an attorney must have at
least a base-level comprehension of the
technology and the implications of [cloud
computing’s] use.
Head in the Clouds
• Cloud computing
– Software as a service
– Infrastructure & Bandwidth
• Client-Server Architecture
Computing Platforms
• Thick Clients
– PC with local Central Processing Unit (CPU)
• Thin Clients
– e.g. Smart Phones
– Push Everything Possible to the Cloud
Root
DNS DNS DNS DNS DNS DNS DNS
ISP
Servers Users/Clients
IXP
Root Root
ISP ISPISP
FBI Intercepts
• Communications Assistance for Law Enforcement Act, Pub.L.
103–414, 108 Stat. 4279 (1994) codified at
• 47 USC §§ 1001-10.
• FBI’s older Carnivore system
• DCSNet and DCS-3000
– Captures VOIP
– Mobile Cell Tower Vans
Combining Topics
• Search Incident to Arrest
• Seize iPhone
• Access iCloud
• Can law enforcement access contacts on a phone?
• Can law enforcement access everything on the defendant’s
iCloud?
Lawyering in the 21st
Century
• E-Discovery
– Costs impact litigation
– Smoking Gun
• Legal Blogging
– Lawyer Advertising?
– Blog Consultant
• Social Networking
– Due Diligence
– Discrimination?
• Social Networking Independent Reviewer
• False and Misleading Statements
• Unauthorized Practice
• Privacy implications of email
Geek Speak and Lawyering
“One of the primary reasons that electronic data is lost is
ineffective communication with information technology
personnel.
By taking possession of, or otherwise safeguarding, all
potentially relevant backup tapes, counsel eliminates the
possibility that such tapes will be inadvertently recycled…
Counsel failed to communicate the litigation hold order to all key
players. They also failed to ascertain each of the key players'
document management habits…
This case represents a failure of communication, and that failure
falls on counsel and client alike.”
Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)
History of Mass Media
• Typewriters
• Telegraph
• Teletype Machines
• Advertising
• Female Typists
– Context of AMC’s Mad Men Show
• Newspapers
• Postal Service
– Bribing Postmasters
– Transit Fees
– International Relations and Subservience
Theoretical Frameworks
• Social Contract Theory
• Rights Theory
– Rights Enforced by a Sovereign
• Ethics
– Intentionalism vs Consequentialism
• Privacy
– Secrecy
• Trade Secrets
– Transparency
• Data Practices Act
– Security
• Privacy
• Network Theory

Mais conteúdo relacionado

Mais procurados

Ethics for the paralegal
Ethics for the paralegalEthics for the paralegal
Ethics for the paralegal
Lauren Doucette
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
Shane Tilton
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالث
Bunayan ALdosari
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
FecomercioSP
 

Mais procurados (20)

Ethics for the paralegal
Ethics for the paralegalEthics for the paralegal
Ethics for the paralegal
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Conference - ITechLaw CyberSpaceCamp
Conference - ITechLaw CyberSpaceCampConference - ITechLaw CyberSpaceCamp
Conference - ITechLaw CyberSpaceCamp
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curse
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
اخلاقيات الثالث
اخلاقيات الثالثاخلاقيات الثالث
اخلاقيات الثالث
 
Media & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st CenturyMedia & Limits To Free Speech in the 21st Century
Media & Limits To Free Speech in the 21st Century
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 

Destaque

Sierra sur times
Sierra sur timesSierra sur times
Sierra sur times
yorogo74
 
Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)
yorogo74
 
St Patricks Words
St Patricks WordsSt Patricks Words
St Patricks Words
yorogo74
 

Destaque (20)

Percorso Sportivo 1
Percorso Sportivo 1Percorso Sportivo 1
Percorso Sportivo 1
 
Perils of Social Networking
Perils of Social NetworkingPerils of Social Networking
Perils of Social Networking
 
Sierra sur times
Sierra sur timesSierra sur times
Sierra sur times
 
Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001Vpn Plbp 04.14.20001
Vpn Plbp 04.14.20001
 
About Google Inc.
About Google Inc.About Google Inc.
About Google Inc.
 
Percorso Artistico 4
Percorso Artistico 4Percorso Artistico 4
Percorso Artistico 4
 
Cyberspace and Transportation
Cyberspace and TransportationCyberspace and Transportation
Cyberspace and Transportation
 
Marketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis ByrneMarketing Trends 2011 by Kerry Ellis Byrne
Marketing Trends 2011 by Kerry Ellis Byrne
 
Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)Christmas in Puerto Rico (Ricardo)
Christmas in Puerto Rico (Ricardo)
 
Agao0108 fic
Agao0108 ficAgao0108 fic
Agao0108 fic
 
Abecedario
AbecedarioAbecedario
Abecedario
 
Bragbook
BragbookBragbook
Bragbook
 
Administrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power SharingAdministrative Legal Research: Federalism & Power Sharing
Administrative Legal Research: Federalism & Power Sharing
 
Content Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale SummitContent Management in Social Media | Social@Scale Summit
Content Management in Social Media | Social@Scale Summit
 
Social Media
Social MediaSocial Media
Social Media
 
Blink about us
Blink about usBlink about us
Blink about us
 
St Patricks Words
St Patricks WordsSt Patricks Words
St Patricks Words
 
Social Networking at William Mitchell College of Law
Social Networking at William Mitchell College of LawSocial Networking at William Mitchell College of Law
Social Networking at William Mitchell College of Law
 
Hopelessly devoted to #
Hopelessly devoted to #Hopelessly devoted to #
Hopelessly devoted to #
 
חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011חידושים ושינויים בפייסבוק, ספטמבר 2011
חידושים ושינויים בפייסבוק, ספטמבר 2011
 

Semelhante a Legal Research in the Age of Cloud Computing

The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
jyothimuppasani1
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
satyabwati
 

Semelhante a Legal Research in the Age of Cloud Computing (20)

Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 

Mais de Neal Axton

Nursing home law_v4
Nursing home law_v4Nursing home law_v4
Nursing home law_v4
Neal Axton
 
Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4
Neal Axton
 

Mais de Neal Axton (11)

Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
Administrative Legal Research: Federalism & Power-Sharing with Entertainment ...
 
Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014Regulation, Law & Policy in the 21st Century from October, 2014
Regulation, Law & Policy in the 21st Century from October, 2014
 
2013 local state_law_drinks_v04
2013 local state_law_drinks_v042013 local state_law_drinks_v04
2013 local state_law_drinks_v04
 
Legal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsLegal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research Paradigms
 
Administrative Legal Research Introduction
Administrative Legal Research IntroductionAdministrative Legal Research Introduction
Administrative Legal Research Introduction
 
Nursing home law_v4
Nursing home law_v4Nursing home law_v4
Nursing home law_v4
 
Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4Oil Pollution Act Water Law Summer 2010 V4
Oil Pollution Act Water Law Summer 2010 V4
 
Thomas.Gov Introduction
Thomas.Gov IntroductionThomas.Gov Introduction
Thomas.Gov Introduction
 
Online Collaborative Tools
Online Collaborative ToolsOnline Collaborative Tools
Online Collaborative Tools
 
Introduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law LibrariesIntroduction to Minnesota Association of Law Libraries
Introduction to Minnesota Association of Law Libraries
 
Applied Administrative Law: Water Law
Applied Administrative Law: Water LawApplied Administrative Law: Water Law
Applied Administrative Law: Water Law
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Legal Research in the Age of Cloud Computing

  • 1. Advanced Legal Research Week One: Law in the Internet Age Neal R. Axton & Simon Canick, Information Resources
  • 2. Introductions & Expectations • Instructors • Students • Auditors • Technology – Gmail – Blackboard • Quizzes • Research Assignments
  • 4. Pew Internet & American Life Project (2010)
  • 6. Are you smarter than your phone?
  • 7.
  • 8. Internet Citation • Typewriters – 1714 & 1867 • Bluebook • Practitioner Style – Typewriters = Underlining • Law Review Style – Type Setting • Small Caps • Italics • Font? • Size?
  • 10. More formats • 18.2.2 Direct Citations to Internet Sources • 18.2.3 Parallel Cites – available at • 18.3 Commercial Databases • 18.3.1 Cases – Unreported • 18.3.2 Constitutions and Statutes • 18.3.3 Legislative, Administrative & Executive Materials • 18.3.4 Books, Periodicals, Other Secondary Sources • 18.4 CD-Rom • 18.5 Microform • 18.6 Film • 18.7 Audio – Podcasts
  • 13. Direct Citations • Hard copy “practically unavailable” – e.g. Rule 18.1’s Conference Report • Cite directly – Due Diligence Required? • Worldcat.org – Hard Copy Not Cataloged and/or not Published (e.g. Press Release) • Citing to Westlaw for current statues • Minn. Stat. Ann. 169
  • 14. Some Legal Innovations • WestlawNext – Federated Search • Fdsys – Federated Search • Electronic Court Filing System – PACER/ECF – Bloomberg’s Docket Search – Minnesota moving online too… • Save Money, Reduce Staff
  • 15.
  • 16. Terrorists or Freedom Fighters? We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
  • 17. The Online Menagerie • Hacktivists • Hackerspaces • Black Hats • White Hats • Cypherpunks • Cyberpunks • Wikileaks – Bradley Manning & Julian Assange • 4chan, anonymous, lulzboat & lulzsec • Edward Snowden & Glenn Greenwald • Pirate Bay & Pirate Party
  • 18. Attorney Job Security What’s new [to the music industry] is this amazingly efficient distribution system for stolen property called the Internet — and no one’s gonna shut down the Internet. — Steve Jobs, Rolling Stone, Dec. 3, 2003
  • 20. Julian Assange on Fear “Fear exists largely in the imagination. That’s what powerful people prey on. It simply isn’t possible to police the world’s citizens, so what they rely on is fear. Once you realise that fear exists largely in your own mind, then you are on the way to liberation. Also I have this righteous indignation. It spurs me on. Makes me feel invincible.” Daily Mail: http://bit.ly/qCpYSx
  • 21. Jurisdiction The geometrically-enhanced capabilities of the emerging web technology spotlights the long-ignored issues of who owns the worldwide web, who manages the worldwide web, and who has jurisdiction over the worldwide web? The answer now is: nobody! - Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police Futurists Int’l Working Group) http://bit.ly/pA51OV.
  • 23. Those leftists at the Economist…
  • 24. A Higher Moral Order?
  • 25. Ruminations 1. States passive and reactive 2. NGO's running the show 3. Media autonomous of nation-state 4. States no longer in control of "normative frameworks" 5. Concept of Spying obsolete 6. Polycentric Governance
  • 26. Implications • Global Citizens cf. United Nations • Information Wants to be Free! – What do We Want for Information? • Technology Changes Us – Information Technology – Mass Communication – Internet & Cell Phones – Firearms?
  • 28.
  • 31. More on Metadata • Metadata – Data about Data – Industrial Strength Organizational Data – Telephony Metadata • Originating Phone Number • Dialed Phone Number • Duration of Call • Call Waiting • Call Forwarding • Cell Phone Tower used during Call • Cell Phone Transfers During Call • Signal Strength During Call
  • 32. Scintilla of Knowledge • Black Boxes –Irreducible Complexity –Invisible Data • Metadata • Any sufficiently advanced technology is indistinguishable from magic. - Arthur C. Clarke
  • 33.
  • 35. Distinctions with a difference • Applying GPS device = 4th Amendment Violation – aka Bird-dogging • Using Cell Phone Tower Metadata = Okey-Dokey • Reasonable Expectation of Privacy – Katz v. U.S., 389 U.S. 347 (1967) – Fiat Declaration – One Size Fits All
  • 36. Social Network Analysis • Pivot People & Opinion Leaders
  • 39. Search for Cloud Computing on LPRB site
  • 40. Cloud Computing and Legal Ethics
  • 41. Ethical Pitfalls • [T]he use of technologies such as cloud storage will never lessen—and may, in fact, increase and make more complicated—an attorney’s obligations under the Rules of Professional Conduct. • As an initial matter, an attorney must have at least a base-level comprehension of the technology and the implications of [cloud computing’s] use.
  • 42. Head in the Clouds • Cloud computing – Software as a service – Infrastructure & Bandwidth • Client-Server Architecture Computing Platforms • Thick Clients – PC with local Central Processing Unit (CPU) • Thin Clients – e.g. Smart Phones – Push Everything Possible to the Cloud
  • 43. Root DNS DNS DNS DNS DNS DNS DNS ISP Servers Users/Clients IXP Root Root ISP ISPISP
  • 44. FBI Intercepts • Communications Assistance for Law Enforcement Act, Pub.L. 103–414, 108 Stat. 4279 (1994) codified at • 47 USC §§ 1001-10. • FBI’s older Carnivore system • DCSNet and DCS-3000 – Captures VOIP – Mobile Cell Tower Vans
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Combining Topics • Search Incident to Arrest • Seize iPhone • Access iCloud • Can law enforcement access contacts on a phone? • Can law enforcement access everything on the defendant’s iCloud?
  • 53. Lawyering in the 21st Century • E-Discovery – Costs impact litigation – Smoking Gun • Legal Blogging – Lawyer Advertising? – Blog Consultant • Social Networking – Due Diligence – Discrimination? • Social Networking Independent Reviewer • False and Misleading Statements • Unauthorized Practice • Privacy implications of email
  • 54. Geek Speak and Lawyering “One of the primary reasons that electronic data is lost is ineffective communication with information technology personnel. By taking possession of, or otherwise safeguarding, all potentially relevant backup tapes, counsel eliminates the possibility that such tapes will be inadvertently recycled… Counsel failed to communicate the litigation hold order to all key players. They also failed to ascertain each of the key players' document management habits… This case represents a failure of communication, and that failure falls on counsel and client alike.” Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)
  • 55. History of Mass Media • Typewriters • Telegraph • Teletype Machines • Advertising • Female Typists – Context of AMC’s Mad Men Show • Newspapers • Postal Service – Bribing Postmasters – Transit Fees – International Relations and Subservience
  • 56. Theoretical Frameworks • Social Contract Theory • Rights Theory – Rights Enforced by a Sovereign • Ethics – Intentionalism vs Consequentialism • Privacy – Secrecy • Trade Secrets – Transparency • Data Practices Act – Security • Privacy • Network Theory