legal research in the age of cloud computing

56
Research Week One: Law in the Internet Age Neal R. Axton & Simon Canick, Information Resources

Upload: neal-axton

Post on 13-Dec-2014

99 views

Category:

Education


2 download

DESCRIPTION

This presentation discusses the impact of the mass communication technologies including the Internet and Cloud Computing on the practice of law and legal research. This presentation was given the Advanced Legal Research class at William Mitchell College of Law in St. Paul, Minnesota of August 23, 2013 by Neal R. Axton, JD, MLIS.

TRANSCRIPT

Page 1: Legal Research in the Age of Cloud Computing

Advanced Legal Research

Week One:Law in the Internet Age

Neal R. Axton & Simon Canick,Information Resources

Page 2: Legal Research in the Age of Cloud Computing

Introductions & Expectations• Instructors• Students• Auditors

• Technology– Gmail– Blackboard

• Quizzes• Research Assignments

Page 3: Legal Research in the Age of Cloud Computing

• http://www.pewinternet.org/

Page 4: Legal Research in the Age of Cloud Computing

Pew Internet & American Life Project (2010)

Page 5: Legal Research in the Age of Cloud Computing

Tablet Ownership Exploding

Page 6: Legal Research in the Age of Cloud Computing

Are you smarter than your phone?

Page 7: Legal Research in the Age of Cloud Computing
Page 8: Legal Research in the Age of Cloud Computing

Internet Citation• Typewriters – 1714 & 1867

• Bluebook

• Practitioner Style – Typewriters = Underlining

• Law Review Style– Type Setting

• Small Caps• Italics

• Font?• Size?

Page 9: Legal Research in the Age of Cloud Computing

Online Resources

Page 10: Legal Research in the Age of Cloud Computing

More formats• 18.2.2 Direct Citations to Internet Sources• 18.2.3 Parallel Cites – available at

• 18.3 Commercial Databases• 18.3.1 Cases

– Unreported• 18.3.2 Constitutions and Statutes• 18.3.3 Legislative, Administrative & Executive Materials• 18.3.4 Books, Periodicals, Other Secondary Sources

• 18.4 CD-Rom• 18.5 Microform• 18.6 Film• 18.7 Audio

– Podcasts

Page 11: Legal Research in the Age of Cloud Computing

Websites

Page 12: Legal Research in the Age of Cloud Computing

Other Sources

Page 13: Legal Research in the Age of Cloud Computing

Direct Citations• Hard copy “practically unavailable”– e.g. Rule 18.1’s Conference Report

• Cite directly– Due Diligence Required? •Worldcat.org

– Hard Copy Not Cataloged and/or not Published (e.g. Press Release)

• Citing to Westlaw for current statues• Minn. Stat. Ann. 169

• Bluebook – Rules or Best Practices?

Page 14: Legal Research in the Age of Cloud Computing

Some Legal Innovations• WestlawNext

– Federated Search

• Fdsys– Federated Search

• Electronic Court Filing System– PACER/ECF– Bloomberg’s Docket Search

– Minnesota moving online too…

• Save Money, Reduce Staff

Page 15: Legal Research in the Age of Cloud Computing
Page 16: Legal Research in the Age of Cloud Computing

Terrorists or Freedom Fighters?

We are Anonymous.We are Legion.We do not forgive.We do not forget.Expect us.

Page 17: Legal Research in the Age of Cloud Computing

The Online Menagerie• Hacktivists• Hackerspaces• Black Hats• White Hats• Cypherpunks• Cyberpunks

• Wikileaks– Bradley Manning & Julian Assange

• 4chan, anonymous, lulzboat & lulzsec

• Edward Snowden & Glenn Greenwald

• Pirate Bay & Pirate Party

Page 18: Legal Research in the Age of Cloud Computing

Attorney Job Security

What’s new [to the music industry] is this amazingly efficient distribution system for stolen property called the Internet — and no one’s gonna shut down the Internet.

— Steve Jobs, Rolling Stone, Dec. 3, 2003

Page 19: Legal Research in the Age of Cloud Computing

http://wikileaks.org/

Page 20: Legal Research in the Age of Cloud Computing

Julian Assange on Fear

“Fear exists largely in the imagination. That’s what powerful people prey on. It simply isn’t possible to police the world’s citizens, so what they rely on is fear.

Once you realise that fear exists largely in your own mind, then you are on the way to liberation. Also I have this righteous indignation. It spurs me on. Makes me feel invincible.”

Daily Mail: http://bit.ly/qCpYSx

Page 21: Legal Research in the Age of Cloud Computing

Jurisdiction

The geometrically-enhanced capabilities of the emerging web technology spotlights the long-ignored issues of who owns the worldwide web, who manages the worldwide web, and who has jurisdiction over the worldwide web? The answer now is: nobody!- Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police Futurists Int’l Working Group) http://bit.ly/pA51OV.

Page 22: Legal Research in the Age of Cloud Computing

•htt

p://bit.ly/12vQ4k1

Page 23: Legal Research in the Age of Cloud Computing

Those leftists at the Economist…

Page 24: Legal Research in the Age of Cloud Computing

A Higher Moral Order?

Page 25: Legal Research in the Age of Cloud Computing

Ruminations1. States passive and reactive

2. NGO's running the show

3. Media autonomous of nation-state

4. States no longer in control of "normative frameworks"

5. Concept of Spying obsolete

6. Polycentric Governance

Page 26: Legal Research in the Age of Cloud Computing

Implications• Global Citizens

cf. United Nations

• Information Wants to be Free!– What do We Want for Information?

• Technology Changes Us

– Information Technology

– Mass Communication

– Internet & Cell Phones

– Firearms?

Page 27: Legal Research in the Age of Cloud Computing

Ethical Compliance

http://lprb.mncourts.gov/Pages/Default.aspx

Page 28: Legal Research in the Age of Cloud Computing
Page 29: Legal Research in the Age of Cloud Computing

MN LPRB Opinion 22

Page 30: Legal Research in the Age of Cloud Computing

Tracked Changes Metadata

Page 31: Legal Research in the Age of Cloud Computing

More on Metadata• Metadata

– Data about Data

– Industrial Strength Organizational Data

– Telephony Metadata• Originating Phone Number• Dialed Phone Number• Duration of Call• Call Waiting• Call Forwarding• Cell Phone Tower used during Call• Cell Phone Transfers During Call• Signal Strength During Call

Page 32: Legal Research in the Age of Cloud Computing

Scintilla of Knowledge• Black Boxes– Irreducible Complexity– Invisible Data•Metadata

• Any sufficiently advanced technology is indistinguishable from magic.

- Arthur C. Clarke

Page 33: Legal Research in the Age of Cloud Computing
Page 34: Legal Research in the Age of Cloud Computing

Location Data

Page 35: Legal Research in the Age of Cloud Computing

Distinctions with a difference

• Applying GPS device = 4th Amendment Violation– aka Bird-dogging

• Using Cell Phone Tower Metadata = Okey-Dokey

• Reasonable Expectation of Privacy

– Katz v. U.S., 389 U.S. 347 (1967)

– Fiat Declaration– One Size Fits All

Page 36: Legal Research in the Age of Cloud Computing

Social Network Analysis• Pivot People & Opinion Leaders

Page 37: Legal Research in the Age of Cloud Computing

Complex Social Networks

Page 38: Legal Research in the Age of Cloud Computing

Cloud Computing

Page 39: Legal Research in the Age of Cloud Computing

Search for Cloud Computing on LPRB site

Page 40: Legal Research in the Age of Cloud Computing

Cloud Computing and Legal Ethics

Page 41: Legal Research in the Age of Cloud Computing

Ethical Pitfalls

• [T]he use of technologies such as cloud storage will never lessen—and may, in fact, increase and make more complicated—an attorney’s obligations under the Rules of Professional Conduct.

• As an initial matter, an attorney must have at least a base-level comprehension of the technology and the implications of [cloud computing’s] use.

Page 42: Legal Research in the Age of Cloud Computing

Head in the Clouds

• Cloud computing– Software as a service– Infrastructure & Bandwidth

• Client-Server Architecture

Computing Platforms• Thick Clients

– PC with local Central Processing Unit (CPU)

• Thin Clients – e.g. Smart Phones– Push Everything Possible to the Cloud

Page 43: Legal Research in the Age of Cloud Computing

Root

DNS DNS DNS DNS DNS DNS DNS

ISP

Servers Users/Clients

IXP

Root Root

ISP ISPISP

Page 44: Legal Research in the Age of Cloud Computing

FBI Intercepts• Communications Assistance for Law Enforcement Act, Pub.L.

103–414, 108 Stat. 4279 (1994) codified at • 47 USC §§ 1001-10.

• FBI’s older Carnivore system

• DCSNet and DCS-3000

– Captures VOIP– Mobile Cell Tower Vans

Page 45: Legal Research in the Age of Cloud Computing
Page 46: Legal Research in the Age of Cloud Computing
Page 47: Legal Research in the Age of Cloud Computing
Page 48: Legal Research in the Age of Cloud Computing
Page 49: Legal Research in the Age of Cloud Computing
Page 50: Legal Research in the Age of Cloud Computing
Page 51: Legal Research in the Age of Cloud Computing
Page 52: Legal Research in the Age of Cloud Computing

Combining Topics• Search Incident to Arrest

• Seize iPhone• Access iCloud

• Can law enforcement access contacts on a phone?

• Can law enforcement access everything on the defendant’s iCloud?

Page 53: Legal Research in the Age of Cloud Computing

Lawyering in the 21st Century• E-Discovery

– Costs impact litigation– Smoking Gun

• Legal Blogging– Lawyer Advertising?– Blog Consultant

• Social Networking– Due Diligence– Discrimination?

• Social Networking Independent Reviewer• False and Misleading Statements• Unauthorized Practice• Privacy implications of email

Page 54: Legal Research in the Age of Cloud Computing

Geek Speak and Lawyering“One of the primary reasons that electronic data is lost is ineffective communication with information technology personnel.

By taking possession of, or otherwise safeguarding, all potentially relevant backup tapes, counsel eliminates the possibility that such tapes will be inadvertently recycled…

Counsel failed to communicate the litigation hold order to all key players. They also failed to ascertain each of the key players' document management habits…

This case represents a failure of communication, and that failure falls on counsel and client alike.”

Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)

Page 55: Legal Research in the Age of Cloud Computing

History of Mass Media• Typewriters• Telegraph• Teletype Machines

• Advertising• Female Typists

– Context of AMC’s Mad Men Show

• Newspapers• Postal Service

– Bribing Postmasters– Transit Fees– International Relations and Subservience

Page 56: Legal Research in the Age of Cloud Computing

Theoretical Frameworks• Social Contract Theory• Rights Theory

– Rights Enforced by a Sovereign

• Ethics– Intentionalism vs Consequentialism

• Privacy– Secrecy

• Trade Secrets– Transparency

• Data Practices Act– Security

• Privacy

• Network Theory