Tumgik
#LegalScholar
instructionsonback · 6 months
Text
Tumblr media
LIFE LOGS VOL 5: Lessons from Apr 2018- Sept 2018 - eBook edition
$9.99
The fifth installment of LIFE LOGS serves as the first release since Jaevonn has become a licensed attorney. The lessons in this book occurs before he gained his esteemed title but they’re all the things that led up to such a monumental moment. But being lawyer as many know isn’t end all to Jaevonn’s life, the creative arts takes a bigger precedent in his mental wheelhouse, which is explored through the various articles in the book. Please use these as writings as an entertaining tool as much as an educating tool. but don’t take him too serious these are just his thoughts ladies and gentleman.
19 notes · View notes
priyarajasthali1 · 1 month
Text
Tumblr media
Are you passionate about justice and ready to pursue a career in law? Dive into the world of legal education with our top-tier judiciary coaching in Jaipur! At RAJASTHALI LAW INSTITUTE, we're committed to guiding aspiring legal minds towards success in their journey towards becoming esteemed members of the judicial
1 note · View note
professorjaykesan · 5 years
Photo
Tumblr media
https://www.jaykesanpublications.com/
https://www.jaykesanpublications.com/jaykesan/
https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
https://www.jaykesanpublications.com/2019/06/17/law-enforcement-needs-a-warrant-to-obtain-cell-site-location-data/
0 notes
danielviza · 2 years
Photo
Tumblr media
This Thursday!! @xholguitano_el_real_latiniti @thomasallisonforjudge #vizarecords #holguitanoandflamencosouls #thomasallisonforjudge #vote #GOTV #livemusic #latinband #musicians #losangeles #liveperformance #legalscholars #community #gettoknowme #awareness #poltics #campaign #getinvolved (at Border X Brewing - Bell) https://www.instagram.com/p/CeMqQyrviBr/?igshid=NGJjMDIxMWI=
0 notes
encouragechange · 4 years
Text
Tweet from SLS Annual Conference (@SLSConference)
SLS Annual Conference (@SLSConference) Tweeted:
Many congratulations to the winner of the prestigious 2020 @legalscholars Peter Birks Book Prize - Yu Mou for ‘The Construction of Guilt in China’. https://twitter.com/SLSConference/status/1301213175547912193?s=20
0 notes
professorjaykesan · 5 years
Text
LAW ENFORCEMENT NEEDS A WARRANT TO OBTAIN CELL-SITE LOCATION DATA https://www.jaykesanpublications.com/
Cellular service providers store information about which cell towers transmit signals to a customer’s phone, thus revealing the geographic area where you are located when the transmission occurs.When cell phones were first getting popular, this information would be limited to when a phone call or text message was initiated or received by an individual, and the information only provided a general vicinity of where the cell phone was located. Modern apps often give users the option to receive “push” notifications that allow services to send updates directly to your phone instead of waiting for you to manually check for updates. The frequent “checking in” from apps makes cell site location data increasingly detailed, and service providers might store this information for years.Because people carry their phones with them, historical cell site location data creates the new possibility of retroactive surveillance as a boon to law enforcement.
 On June 22, the Supreme Court issued its opinion in the case of Carpenter v. United States. Carpenter concerned this type of cell site location information and involved a string of robberies in Michigan and Ohio. The defendant’s physical nearness to the robberies, as shown by historical cell site data, was used as circumstantial evidence to support convicting him. To obtain this information, the investigators had used an order under the Stored Communications Act. This order is an enhanced subpoena process to allow investigators to compel certain categories of data from cellular service providers without having to show the full “probable cause” that is required for a warrant under the Fourth Amendment.In Timothy Carpenter’s case, investigators used this enhanced subpoena to obtain 127 days of information about Carpenter’s physical movements, consisting of 12,898 individual data points. The question before the Supreme Court was whether investigators needed to show “probable cause” to obtain a court order to conduct this kind of retroactive surveillance.
 A 5-4 majority on the Supreme Court noted that the Carpenter case exists at a crossroad in Fourth Amendment law. On one hand, in the recent GPS-related case of United States v. Jones, the Supreme Court recognized an expectation of privacy in physical location and movements. But there is also the third-party doctrine, which says there is not an expectation of privacy in information that you voluntarily give to third parties. The third party doctrine is often discussed in the context of business records, like financial records held by a bank.
 In the Carpenter decision, the Supreme Court ruled that the third party doctrine does not apply to historical cell site location data.The Court reasoned that even in third party doctrine cases, Fourth Amendment protection may still exist for information of a particular nature.Writing for the majority, Chief Justice Roberts noted that “[t]here is a world of difference between the limited types of personal information addressed in [third party doctrine cases] and the exhaustive chronicle of location information casually collected by wireless carriers today.”
 The Carpenter decision, while potentially ground breaking for privacy rights, is fairly narrow and is very much tied to the presence of physical objects.Under Carpenter, there is Fourth Amendment protection for this kind of automatically generated information that tracks locations for a particular communications device.Previous cases about location privacy under the Fourth Amendment have concerned beepers in barrels and GPS devices in cars. Cell site data is more far-reaching because cell phones are practically an extension of the body.
 This action by the Supreme Court recognizes the societal developments that come with living in a highly connected technological age. If you want a device to be able to connect to services wirelessly, some form of location tracking will occur. Carpenter clarifies that that kind of information is to be afforded Fourth Amendment protections.
 I’m Jay Kesan.
Tumblr media
https://www.jaykesanpublications.com/jaykesan/
https://www.jaykesanpublications.com/2019/06/17/law-enforcement-needs-a-warrant-to-obtain-cell-site-location-data/
0 notes
professorjaykesan · 5 years
Photo
Tumblr media
https://www.jaykesanpublications.com/2019/06/17/taking-a-deep-dive-into-the-russian-indictment-based-on-their-cyber-attacks/
https://www.jaykesanpublications.com/jaykesan/
https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
0 notes
professorjaykesan · 5 years
Text
TAKING A DEEP DIVE INTO THE RUSSIAN INDICTMENT BASED ON THEIR CYBER ATTACKS
https://www.jaykesanpublications.com/
https://www.jaykesanpublications.com/jaykesan/
https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
https://www.jaykesanpublications.com/2019/06/17/taking-a-deep-dive-into-the-russian-indictment-based-on-their-cyber-attacks/
On Friday, July 13th, Robert Mueller’s special prosecution team announced an indictment of twelve Russian agents in connection with cyber attacks against us.
The indictment discusses two computer intrusion units in the Russian military. One of these units is associated with actions to publicize private data, and the other unit is associated with attempts to disrupt our election infrastructure. Both of these sets of crimes include violations of federal law – the Computer Fraud and Abuse Act—the CFAA. The defendants in the indictment are charged with two violations of the CFAA: accessing a computer without authorization and obtaining information, and transmitting something that causes damage to a computer.
Information gathering was one focus of the Russian cyber intrusions.According to the indictment, Russian intelligence agencies have been deploying hackers against a variety of systems in the U.S.Arguably the most visible victim is the DNC, which experienced multiple intrusions resulting in the theft of emails and other digital information.Then, posting under names like DCLeaks and Guccifer 2.0, they staged releases of these documents.An unnamed organization – generally assumed to be Wikileaks – is described as working directly with Guccifer 2.0 to release the documents.
When someone wants to break into a computer system, they must find a security vulnerability.In many cases, that security vulnerability is situated right between the chair and the computer keyboard.The indictment alleges that units of the Russian military used spear phishing tactics to obtain passwords or other methods of access. Spear phishing involves sending emails by personalizing them so they appear to be from a trusted source thereby inducing the targeted individuals to reveal confidential information. Once they had access, they installed malware on the computers, including key loggers. That way, the hackers were able to record every keystroke that the user made.
When there is evidence that someone committed a crime, you want to know everyone who interacts with that evidence in the so-called chain of custody.You want the evidence to be in the same shape in court as it was when the crime was committed.An unknown hacker is hardly a reliable link in any chain of custody.When the documents were posted to Wikileaks, journalists immediately started reading them and identifying significant things.But there is no way of ensuring that the hacker didn’t plant dozens or hundreds of little lies throughout the stolen documents.
Another part of the indictment concerns interference with election infrastructure.The indictment refers to an unnamed state board of elections that was the target of a cyber attack by the defendants resulting in the theft of the personal information of about 500,000 voters.In the months following that data breach, some of the defendants also hacked into an American company that makes software to help state and local election boards verify voter registration information.The company is referred to as “Vendor 1.”Some journalists have suggested that this company might be VR Systems.
The indictment also alleges that the defendants used email addresses that resembled Vendor 1 as part of spear phishing campaigns against election officials across the country in November 2016.They used the company’s logo to make the emails seem more legitimate as coming from a company that election officials trust, but the attached Word documents contained malware.It is unknown how many of these spear phishing attempts were successful or what the hackers did when they got access.It’s possible that some of those problems were part of a hacking operation aimed at causing confusion and long lines and lowering voter turnout on election day.
But perhaps the strongest effect that we are experiencing is psychological, as the entire country is concerned about the legitimacy of our political system.
I’m Jay Kesan.
Tumblr media
0 notes
professorjaykesan · 5 years
Text
GOOGLE AND CENSORING OF SEARCH RESULTS
16-Oct-2018
In recent news, President Trump has accused Google of rigging search results. The President claims that the search engine giant has purposefully suppressed positive stories about his administration, and could be opened to prosecution as a result.
While the President’s specific claims of political censoring are unsubstantiated, the President has touched on an underlying issue; how do we know what we search and what we see on the internet represents the objective truth? How do websites rank and show information in a fairway?
In the case of Google, Google searches make up 92 percent of all internet searches. Despite their popularity, the search engine has never published how its search algorithm works. What is the “it” the factor that pushes a Wikipedia page or a New York Times article near the top of a search, while keeping a quote “untrustworthy” source near the bottom? These “secret algorithms” are prevalent throughout search engines and social media; popular sites like Facebook, Instagram, and Twitter all rely on these algorithms to determine what content to show users.
For example, in July of this year, Twitter algorithms limited the visibility of some Republicans in profile searches. Testifying before Congress, Twitter’s CEO, Jack Dorsey said the site tried to enforce policies against “threats, hate, harassment or other forms of abusive speech”, and that the tweaking of their algorithm unintentionally excluded republican profiles. Twitter has since fixed its search algorithm.
What we know about these secret algorithms isn’t much. For sure the algorithm looks for sites that use the same kind of words that people are searching for. But they also try and ensure that the pages writing those words are legitimate, by looking at information such as whether the site is trustworthy and if it is using the latest and most secure technology. There’s also an element of personalization affecting site rankings, where users will see more stories from publishers that they’ve visited frequently in the past,.
For Google, their decision to keep the algorithm secret is partly an attempt to ensure that it still works. If the nuts and bolts behind Google’s rankings were revealed, companies would try to alter their content in order to maximize their rank.
Regardless, because of the entire industry’s lack of transparency, it is easy to think that the search results we receive every day could be inherently biased. If Google or Facebook ever went rogue and decided to throw an election to a favored candidate, it would only have to alter a small fraction of search results to do so. And that is a very scary proposition.
So how do we fix such an issue?
Frank Pasquale, a professor at the University of Maryland Law School, has suggested that the Federal Trade Commission and the Federal Communications Commission should gain access to search data and investigate claims of manipulation. His hope is that a nonpartisan body could investigate accusations of bias and put the issue to rest.
Conversely, Facebook has sketched out a plan that involves giving academic researchers access to its search data and allowing these academic researchers to study whether bias exists. Under Facebook’s proposed solution, the tech company would keep a tighter lid on its a secret algorithm, while still allowing some review to come out to the public.
However, recently it was revealed that the Trump administration is considering instructing federal antitrust and law enforcement agencies to open investigations into the practices of sites like Google and Facebook. While the preliminary document is still in the early stages of drafting, and could change significantly in the coming months, the threat of federal antitrust enforcement from the Trump administration could spur tech companies to introduce more transparent policies regarding their search algorithms.
 It’s still an open question how these tech companies will deal with these developments. It will take months for the Trump Administration’s proposal to take shape if it does at all and other proposals are only still preliminary thoughts. Stay tuned for more developments on this front, and let’s hope that these developments aren’t blocked.
I’m Jay Kesan
- https://www.jaykesanpublications.com/
- https://www.jaykesanpublications.com/jaykesan/
- https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
Tumblr media
0 notes
professorjaykesan · 5 years
Text
10-May-2018 Facebook privacy violation
https://www.jaykesanpublications.com/In April, the CEO of Facebook, Mark Zuckerberg, testified in Congress about the alleged user privacy violations that occurred at Facebook. Several weeks later, Cambridge Analytical, the political consulting firm that misused the personal information of millions of Facebook users, is shutting down due to the loss of customers. The Federal Trade Commission is progressing with its investigation of Facebook, and we will find out whether and how Facebook will be held responsible for these privacy violations.
That said, these privacy concerns are not going to end anytime soon. It is not just Facebook. Companies in multiple industries are becoming heavily dependent on customers’ personal data so that they can provide tailored products and services to their customers at a lower cost. Ideally, both the companies and their customers should benefit from this data collector-data contributor relationship. In reality, all of us who are data contributors often feel uncomfortable about it. From Zuckerberg’s testimony in Congress, we may find answers to why we feel this way, and how meaningful regulation can improve this situation.
One reason why data contributors may not trust data collectors is that there is an informational asymmetry between the two. Many users have little knowledge about how companies like Facebook are collecting their personal information and what kinds of information are being collected. People get suspicious about whether their voices are being recorded secretly through the microphones on their laptops or through smart home devices like Amazon Echo.
It is often unclear to users who have access to their personal information. For example, people unfamiliar with Facebook’s business model may think that it sells users’ information to advertisers. During his Congressional testimony, Zuckerberg explained that Facebook acted as an intermediary that connected users with relevant ads. In order to provide greater clarity to users, regulation is needed to require that data collectors disclose, in an understandable and comprehensive manner, the sources being used to collect information, the types of information being collected, and the parties who have the access to that information.
Sometimes the collected information may be such that we are hesitant to share it. For example, many car insurance companies have been promoting telematics devices, which track drivers’ driving habits, and good drivers will be rewarded with lower premiums. But even for a good driver, the chance of her getting into an accident varies depending on many other factors, for example, the road conditions. Imagine if insurance companies start to gather information about the routes that a driver takes and change premium rates accordingly, in real-time. Drivers will spend less on car insurance if safer routes are taken, and insurers will be able to monitor their risk exposures more closely. But even in such a mutually beneficial scenario, not everyone is willing to share his every footprint with others.
In short, people balance different considerations when it comes to the sensitivity of personal information. Some may be happy about giving up personal information in exchange for lower price or convenience, while others may not. Therefore, data contributors– meaning you and me — should be given the right to not share the information they consider sensitive unless they want to do so.
In the EU, the General Data Protection Regulation – GDPR – goes into effect on May 25, 2018, and it provides data protection and privacy for all individuals within the European Union. It also deals with the export of personal data outside the EU, and hence, it will have a global impact.
Given the increased focus on cyber privacy, it is likely that some Congressional legislation regulation emerges. Will this regulation be adequate and will there be adequate enforcement of those regulations?
https://www.jaykesanpublications.com/
https://www.jaykesanpublications.com/jaykesan/
I’m Jay Kesan.
Tumblr media
0 notes
professorjaykesan · 5 years
Text
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)
UTILIZATION OF BIO-ONTOLOGIES FOR ENHANCING PATENT INFORMATION RETRIEVAL
The ability to access existing patents and patent-related information can have significant impacts on technology development and commercial markets. While such information is now available online, requesting the information about a specific technology remains a nontrivial task. The reason is that the online information often resides in different storage sources, is based on different modeling paradigms, and is managed by different independent entities. Ontology is one modeling paradigm that can capture semantically rich knowledge about a specific domain and its existing patents. That knowledge can be used to facilitate information sharing and information interoperability.
Tumblr media
https://www.jaykesanpublications.com/jaykesan/
https://www.jaykesanpublications.com/
0 notes
professorjaykesan · 5 years
Text
THE NEW “CONSUMER REVIEW FAIRNESS ACT OF 2016”
https://www.jaykesanpublications.com/
Dec-5-2016
Click here to accept these terms.  That sentence, or a variation of it, is something that we routinely encounter. It shows up in-app updates, on website registration pages, and during the installation of software and computer games. Most people don’t read the terms that they’re accepting, which can be a problem if they have a dispute with the company that provided the product because these unknown terms are now part of a binding contract. In the law, such a contract is often referred to as a contract of adhesion. Contracts are usually about a “meeting of the minds” – in other words, the people signing the contract know what’s in the contract and mutually agree to it.  But form contracts, like clickwrap agreements, don’t give customers the opportunity to negotiate for more favorable terms.
Read more articles at- https://www.jaykesanpublications.com/
0 notes
professorjaykesan · 5 years
Text
THE NEWLY ENACTED CYBERSECURITY INFORMATION SHARING ACT (CISA)—GOOD OR BAD POLICY? https://www.jaykesanpublications.com/
THE NEWLY ENACTED CYBERSECURITY INFORMATION SHARING ACT
Mar-7-2016
ISIS uses encrypted communication methods to reach sympathizers over the Internet.  Drugs are sold in decentralized markets in the hidden corners of the Web.  People who want to exploit children have anonymous forums where posts are very difficult to trace.  Terrorism and crime have gone digital creating new challenges for law enforcement.
Thousands of software and hardware security flaws are floating in the ether, waiting to be discovered and exploited.  When a computer security flaw enables unauthorized remote access, tech-savvy criminals can steal data, add a compromised system to a botnet, and sometimes even cause physical damage to a machine.  But unlike terrorist recruitment or trafficking in illegal goods, there is often little physical evidence left by cyberattacks.
Read more at - https://www.jaykesanpublications.com/2019/09/20/the-newly-enacted-cybersecurity-information-sharing-act-cisa-good-or-bad-policy/
kindly visit the website to read more about security information
- https://www.jaykesanpublications.com/
- https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
- https://www.jaykesanpublications.com/jaykesan/
- https://www.jaykesanpublications.com/2019/09/20/the-newly-enacted-cybersecurity-information-sharing-act-cisa-good-or-bad-policy/
0 notes
professorjaykesan · 5 years
Quote
THE NEWLY ENACTED CYBERSECURITY INFORMATION SHARING ACT (CISA)—GOOD OR BAD POLICY?
 https://www.jaykesanpublications.com/
THE NEWLY ENACTED CYBERSECURITY INFORMATION SHARING ACT (CISA)
ISIS uses encrypted communication methods to reach sympathizers over the Internet.  Drugs are sold in decentralized markets in the hidden corners of the Web.  People who want to exploit children have anonymous forums where posts are very difficult to trace.  Terrorism and crime have gone digital creating new challenges for law enforcement.
Thousands of software and hardware security flaws are floating in the ether, waiting to be discovered and exploited.  When a computer security flaw enables unauthorized remote access, tech-savvy criminals can steal data, add a compromised system to a botnet, and sometimes even cause physical damage to a machine.  But unlike terrorist recruitment or trafficking in illegal goods, there is often little physical evidence left by cyberattacks.
I’m Jay Kesan.
kindly visit the website to read more about CYBERSECURITY INFORMATION
visit at - https://www.jaykesanpublications.com/
- https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/
- https://www.jaykesanpublications.com/jaykesan/
0 notes
professorjaykesan · 5 years
Quote
https://www.jaykesanpublications.com/2019/09/20/is-stronger-encryption-the-answer/
https://www.jaykesanpublications.com/  IS STRONGER ENCRYPTION THE ANSWER?
Kindly visit the website to read more articles about Data Encryption and other factors.
visit at - https://www.jaykesanpublications.com/
- https://www.jaykesanpublications.com/category/commentary-on-law-and-technology/ 
- https://www.jaykesanpublications.com/2019/09/20/is-stronger-encryption-the-answer/
0 notes
professorjaykesan · 5 years
Quote
Top Publications and Patents
https://www.jaykesanpublications.com/  
LIABILITY FOR DATA INJURIES
UNPACKING PATENT ASSERTION ENTITIES
MITIGATIVE COUNTERSTRIKING: SELF-DEFENSE AND DETERRENCE IN CYBERSPACE
0 notes