Legal and Criminal

Cyberterrorism

Sarah Cortes, Cyberterrorism. In The SAGE Encyclopedia of War: Social Science Perspectives, Ed. Paul Joseph (2016) DOI: http://dx.doi.org/10.4135/9781483359878.n174.

Cyberstalking

 - Founder, IPV Tech Working Group- Intimate Partner Violence and Technology Working Group in 2012 with the Tor Project, Transition House DV Shelter and Services, and Emerge Abuser Education (a Batterer Intervention Program (BIP) for court-mandated violent offenders).

- Clean Communications Protocols for working with Targets and Victims
[Twitter and Cyberstalking Law](/CyberStalking5.docx) - whitepaper [download]

DNA and Forensics

Robin W. Cotton, Catherine Grgicak, Sarah Cortes, et al., DNA Mixtures, www.DNAmixtures.com. Boston University School of Medicine, Biomedical Forensic Sciences. This project was supported by Award No. 2008-DN-BX-K158 awarded by the National Institute of Justice, Office of Justice Programs, U. S. Department of Justice.  

Note: This application was highlighted in Executive Office of the President, President’s Council of Advisors on Science and Technology (PCAST), Report to the President: Forensic Science in Criminal Courts: Ensuring Scientific Validity of Feature-Comparison Methods, September 20, 2016. https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_forensic_science_report_final.pdf.

Smart Grid

Smart Meters can leak personally identifiable information (PII) about you.

Chapter 3: Legal Frameworks for Smart Grid Privacy, (with Rebecca Herold, Gal Shpantzer, Chris Veltsos and The Smart Grid Interoperability Panel Cyber Security Working Group (CSWG)) NIST: NISTIR 7628 2014 Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid , 2014, pp. 8-21 (pp. 304-317).

Chapter 3: Legal Frameworks for Smart Grid Privacy, (with Rebecca Herold, Gal Shpantzer, Chris Veltsos and The Smart Grid Interoperability Panel Cyber Security Working Group (CSWG)) NIST: NISTIR 7628 2010 Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, 2010, pp. 7-15 (pp. 323-331).

Data Breaches