Vote Trump 2016 !

Vote Trump 2016 !
Trump 2016

Friday, September 16, 2016

#OBAMA WAR ON #INTERNET 'WILL WEAKEN AMERICA' !

Rep. Ted Yoho, R-Fla., says U.S. must not relinquish control over Internet
The Obama administration is moving forward with plans to relinquish U.S. control over Internet domains, but many conservatives are demanding the president not change what is working fine by ceding control to other countries, which could then limit the content their own citizens can see.
The old contract by which the United States controlled Internet domain aspects since 1987 actually expired at the end of September 2015. Since then, the Obama administration has been trying to build a framework to transition the Internet Corporation for Assigned Names and Numbers, or ICANN, to a “multi-stakeholder” system. As more of those details get ironed out, the end of American control draws near. Extended U.S. control is slated to end later this month.
Rep. Ted Yoho, R-Fla., is among those who believe this is a big mistake.
“Is this move going to strengthen America, or is this move going to weaken it? I think it’s very clear that if we do what President Obama wants to do, it’ll weaken America’s stance again,” said Yoho, who is a strong supporter of the DOTCOM Act.
That bill passed the House of Representatives overwhelmingly last year, but the Senate has yet to take it up. It would give Congress oversight of any transfer of Internet domain control and give lawmakers the power to kill or modify the plan.
Sen. Ted Cruz, R-Texas, is spearheading the effort in the Senate to keep the Internet in U.S. hands.
Yoho told WND and Radio America his approach is simple. The current system isn’t broken, so why radically change it?
“The U.S. has been in control of the domain names of the Internet since its inception. If we relinquish this control, it goes possibly to the U.N. Then you have countries like Russia, China and Iran and any other country that wants to play, and [they get to] determine how to regulate those domain names within their countries,” Yoho explained.
He said giving authoritarian leaders control over what their people can access only means bad results.
“I think you’re going to see a decrease in access to the Internet, a decrease of freedom over the Internet to an extent we have never experienced before,” he said.
Yoho said those nations would not be in position to block what Americans can see online, but they could restrict anything they wanted for their own populations.
“They can block any country’s intellectual property or content from being accessed by somebody in Russia or China or Iran. You’re starting to limit people,” he said.
“If you look at one of the basic underlying tenets of liberty, it’s freedom of speech, freedom of expression, freedom to access of information. If we start sequestering that and blocking it off, you’re going to have pockets around the world that are going to become more and more isolated,” Yoho said.
He said the past 29 years prove the U.S. is best at guaranteeing people around the world have access to all available information to learn and better their lives.
“One of the things that made the Internet so explosive and such an economic and intellectual force is because of the free-market enterprise in a country like the U.S. controlling access to it,” Yoho said.
Yoho sees two other dangers of relinquishing total control of Internet domains. First is the additional risks to our already vulnerable cyber defenses.
“If they take over the domain names and things like that, who knows what they’ll plan as far as malware or some type of cyber bug that’ll get into everybody’s computer? So this is a misstep by this administration,” Yoho said.
He said the Obama administration is also breaking the law by pushing this plan forward without congressional authorization.
“It’s a violation of federal law for an officer or an employee of the United States government to make or authorize an expenditure or obligation exceeding the amount we’ve appropriated,” Yoho said. “By doing what they want to do, it’s against the law. That doesn’t seem to be a concern for this administration, and we aim to stop it.”
Copyright 2016 WND

Read more at http://www.wnd.com/2016/09/obama-war-on-internet-will-weaken-america/#GHBzRSuuHjOOV160.99

#Chicago Cubs clinch NL Central title !

After Cardinals’ loss

CHICAGO – A potential dream division clinching scenario didn’t quite pan out the way that Cubs fans might have wanted on Thursday evening.
At the end of the night, however, the goal was still accomplished.
With their Magic Number at 1 the team lost to the Milwaukee Brewers 5-4 in front of a crowd at Wrigley Field ready to celebrate a National League Central Division Championship. But those fans got what they wanted a little later in the evening when the Giants beat the Cardinals 6-2 in San Francisco, mathematically eliminating St. Louis and giving the Cubs a division crown.
That gave Joe Maddon’s team their first NL Central title since the 2008 season. It is the sixth time the Cubs have won a division since it was introduced during the 1969 season. It’s also the earliest the Cubs have ever clinched a division championship, besting 2008 when they won on September 20th.
The 2016 season marks the third time in the modern era of the franchise  that the Cubs have qualified for the postseason in back-to-back years, also doing so from 1906-1908 and 2007-2008. The Chicago White Stockings made it to the World Series in 1885 and 1886 in the franchise’s infancy.
Oddly enough it marks the second-straight season that the Cubs have clinched a spot in the playoffs with the loss of another team. Ironically it was the Giants that lost to the Athletics last season on September 25th that locked up a Wild Card berth for the Cubs in the 2015 playoffs.
Maddon said that the Cubs would celebrate the division championship following their afternoon game against the Brewers on Friday.
Now the Cubs focus turns to the best record in the National League so the team can have home field advantage should they make the League Championship Series.
Chicago Cubs clinch NL Central title

Monday, September 12, 2016

#Social #Media a Different #E-DISCOVERY #LegalTechnology #Law




Brett Burney reviews X1 Social Discovery, which tackles the nuances social media collection in a logical fashion.
, Legaltech News
    | 0 Comments


Over the last couple of decades, we've become skilled at collecting, preserving and producing email. But email doesn't hold a flicker of a candle to what people post, state, admit and display in social media. So why aren't there more products that comprehensively collect, preserve and authenticate the snowballing mounds of social media data?
The ideal method is to utilize the application programming interface (API) offered by social media publishers so that all the public-facing information and accompanying metadata can be collected. Bonus if the product can preserve information for searching, reporting and exporting.
And there, I've described X1 Social Discovery—a desktop software for Windows that every litigator should include in their technical tool belt. The application itself only requires 200MB, but you'll need a minimum of 100GB to collect all the metadata and visual content you'll be pulling down. The company actually recommends using a 1TB external hard drive for your storage repository.
Released in July 2016, Version 5 of X1 Social Discovery added collection tools for YouTube, Instagram and Tumblr. The software already collected from Facebook and Twitter as well as webpages and email from Gmail, Yahoo Mail, AOL Mail, and IMAP accounts.
Once you provide "Investigator Details," you can set up a "Case." You can have as many Cases as you like, but only one can be actively collecting data at a time. Under each Case are the "Collections" for each social media source.
Aside from logging into private or client accounts, for the majority of matters, you'll use an "Examiner Account" to only collect publicly available information. This is a dummy account set up in Facebook and Twitter that doesn't have any friends or followers—you don't want any connections that could interfere with the information being collected.
To start a Facebook Collection, supply a user ID (usually the name at the end of a URL) and set up an "oldest post limit" if needed. For Twitter, furnish a Twitter username and select whether you only want tweets going forward, or past history. X1 Social Discovery then starts collecting and indexing. Each Collection takes a few minutes to several hours, depending on how much you're grabbing. You can set a schedule for how often collections check for new posts or information.
The interface of X1 Social Discovery is impressive and logical. Collections are listed on the far left—click a name and their feed appears in the middle panel. When you select a post or tweet, the content pops up in the Preview Pane on the right. I found myself simply scrolling through feeds in chronological order, but there are multiple sort options and filters available. Since Facebook and Twitter can track an individual's physical location, those geo-pinpoints can also be viewed on a map.
Most importantly, X1 Social Discovery collects an extensive amount of metadata for every item that can gets presented in a pop-up box. All this corroborates the origin of a post or tweet, along with an MD5 hash for verification. When you find specific posts, tweets, and items that are relevant to your investigation, you can tag those digital needles in the social media haystack.
A "Case Report" supplies a comprehensive summary of all items indexed in a Case along with any tags. There's also an "Export Record" option when you need a copy of a single tweet or post. Lastly, a "Deliverable" can be generated in HTML or PDF format that assembles all the metadata and linked content into a producible package. You can customize how much metadata is included for each source.
A single license of X1 Social Discovery is affordable and necessary for the smallest domestic issue all the way up to the largest civil litigation matter.

#LegalResearch with a 21st Century Twist #Law

Legal research: it’s the bane of every lawyer’s existence. While it used to be that there were relatively few choices when it came to online legal research, times have changed. The Internet age has ushered in a new era in legal research.
One of the first online legal research databases was the Cornell Legal Information Institute , which made legal information free and easily accessible to lawyers and legal consumers alike. It was the first step toward leveling the playing field and providing solos and small firm attorneys with access to an incredible depth of materials that were once only available in academic or government law libraries or in the law libraries of large law firms. Now, solo and small firm lawyers have more options than ever and can choose from wide range of affordable, intuitive, and powerful legal research tools. The trick is sorting through all of the available tools available and finding the right fit for your firm’s needs at the best price.
One example of a unique 21st century legal research platform is Casetext. Casetext is a web-based legal research platform that provides cutting-edge search technology with a twist. It combines their database with the collective knowledge and expertise of the legal community in the form of annotations and insights from other attorneys. A  new feature that was recently released that further enhances the platform is Case Analysis Research Assistant (CARA), which allows lawyers to drag-and-drop a brief or memo into a secure webpage in order to obtain a list of suggestions for cases that are relevant to the issues addressed in the document. , and within seconds CARA will suggest a list of cases that may be relevant to the issues in the brief, but that are not yet cited in the brief.
Then, there’s Google Scholar. Scholar’s fully searchable legal case database was first launched in November of 2009 and revolutionized legal research. While  it doesn’t  provide the in-depth analysis and community annotations that Casetext does, it offers basic, free access to a wide range of legal materials, all of which are accessible and searchable using Scholar’s user-friendly interface. Because of Scholar, lawyers everyone can now search vast case law databases for free. In recent years, its research capabilities have greatly improved, making it easier than ever for solo and small firm lawyers to conduct online legal research. Scholar also includes built-in features that make it easy for lawyers to check the citations of relevant cases.
For even more tips on searching for information online, check out the latest edition of “The Cybersleuth’s Guide to the Internet,” written by Carole Levitt and Mark E. Rosch. This book is perfect for lawyers who are seeking to conduct research a dime and take advantage of all the information that the Internet has to offer. It provides a vast array of information and guidance for lawyers seeking to use the Internet for both investigative and legal research.
For many lawyers, web-based computing has truly been the great leveler for legal research, making it easier than ever to obtain affordable access to vast amounts of legal information and analysis. If you’ve been stuck in a legal research rut and are looking for affordable and powerful alternatives to your current legal research arsenal, the tools and resources listed above are a great place to start.

How To Prevent A Security Breach #LegalTechnology #Law

 July 27, 2016 Security 0 Comments

Clients trust you with personal, financial, and legal information that needs to be kept confidential. A security breach may let out secrets and proprietary information that can damage your clients’ reputation, business, or finances. Worse, such an issue may not only lead to a termination of your relationship with the affected client but others who learn about it as well.
With so much data stored digitally today, most firms tend to focus their security efforts on stopping hackers and others from getting in. Unfortunately, your biggest security risk may not come from the outside, but the inside, in the form of current and former partners and employees.
How so? A 2014 survey by Intermedia and Osterman Research found that 89% of workers were able to access sensitive information through Dropbox, email, SharePoint, or other information-sharing applications. And 45% said that the information they access was “confidential” or “highly confidential.”
Now imagine what happens when those employees move on from your law firm. How do you police sensitive data that may be on numerous devices–home computers, laptops, smartphones, tablets–some that are not even your firm’s property? The best way to prevent a security breach crisis is to be proactive in following best practices and policies.

Control Your Employees’ Access To Data From The Beginning

One of the best ways to prevent data leaks after people leave is simply not to give them access in the first place. Everyone who works for you should only have access to the files and data that are necessary to do their jobs. Sure, you’ll still have worries if a partner or someone else higher up leaves, but it’s easier to retrieve data from just a few people than from everyone at the firm.

Use Only Firm-Based Devices and Systems

As mentioned above, this can be a tough one with the various ways we access information in this day and age–but it can be done. How?
Do not let your employees use their own personal email. This may be obvious, but it is extremely important. By insisting that everyone only use work email, your firm can control an employee’s access to what they receive and send throughout the workday. It also makes removing your employee from your firm’s information database easy.
If you have the budget to provide your employees with a firm-owned mobile device, this can alleviate issues with them putting sensitive data on their personal phone. Then, when they leave, you simply take back the phone, and all of the data contained on it. It’s also easier to install security measures on firm-owned devices that can help you locate them or wipe the data if necessary.

Use the Cloud

This is another great way to gain a huge amount of control over your firm’s data. Keep all firm and client data on the cloud, and constantly update passwords to make sure only the right people have access. Cloud servers are offsite and tend to have an extremely high level of security that the vast majority of law firms would not be able to afford on their own. Moreover, cloud services are encrypted and monitored by a team of experts who can inspect and identify any malicious traffic. And finally, there are software solutions available that make it easy for you to specify who has access to what and to remove permissions after employees leave.

Require Wiping Technology To Be Added To Personal Devices

Want your employees to have the flexibility of using their own devices? Talk to security experts about your options incorporating “wiping” technology that can erase firm data from personal devices without removing the individual’s personal information. With the right solution, this can be done remotely–and only target the data related to your law firm. This means you can take action fast after an employee leaves, because you don’t have to wait for them to turn in the device to IT for the data to be removed.

Put a Plan in Place

If your firm consistently keeps security as a top priority, it will be easier to identify a breach of information and address it quickly.
According to a 2013 American Bar Association study, 70% of law firms said they were not sure if their firm’s security had ever been breached. Knowing when your information is in the wrong hands will help you get that information back and identify the culprits.
  • Educate your employees on how to keep their information safe and know when they have been the victims of stolen information. This can be done through workshops, educational videos, or phishing drills.
  • Review your security policies with each client, and constantly communicate if or when you may need to share certain pieces of personal information.
  • Keep track of who has and has shared confidential information about your clients or your firm and for what purpose. If that information is later shared with an unauthorized individual, you will have a better idea of where the breach happened.
Having these measures in place is not just a good way to protect and store data, it also proves to clients and partners that your firm is serious, forward thinking, and committed to the safety and security of everyone you work with.