Welcome to Law Unpacked, where we break down the law and unpack real-life legal situations. Our team of experienced lawyers tackles a wide range of legal topics, from everyday rights to complex case law, helping you understand how the law impacts your life. Whether we’re analyzing current legal events, exploring new legislation, or discussing real-world cases, we’re here to make the law more accessible and relevant. Subscribe for insightful legal commentary, practical advice, and a deeper un ...
…
  continue reading
Case Law Analysis Podcasts
The Law School of America podcast is designed for listeners who what to expand and enhance their understanding of the American legal system. It provides you with legal principles in small digestible bites to make learning easy. If you're willing to put in the time, The Law School of America podcasts can take you from novice to knowledgeable in a reasonable amount of time.
…
  continue reading
Badge Cam Daily: America's Premier Police Body Camera Analysis Podcast The only daily podcast dedicated to professional analysis of police body camera footage from across the United States. Badge Cam Daily delivers authoritative briefings on the most compelling law enforcement encounters, investigative techniques, and public safety incidents captured on body-worn cameras. What You'll Get: Daily 5-minute professional briefings on breaking body cam cases Expert analysis of police procedures, s ...
…
  continue reading
Best’s Insurance Law Podcast series examines key topics in the insurance industry from an attorney’s point of view. Featured panelists are top lawyers from firms profiled in Best's Insurance Professional Resources, a highly selective online service showcasing only firms recommended by their clients for outstanding service to the insurance industry. Published by AM Best, Best's Insurance Professional Resources is a claims industry resource that features qualified legal counsel, independent in ...
…
  continue reading
Criminal Defence Lawyer Joseph Neuberger and YouTube personality, legal researcher and host of the UnTrue Crime podcast Diana Davison, sit down and discuss the aftermath of their case loads and what really goes on behind the scenes. A behind the scenes inside look into the real court room drama.
…
  continue reading
Listen weekdays to The Dershow with Alan Dershowitz. Dershowitz hits the hot political and legal topics of the day with non partisan analysis, guests interviews, viewer questions, case of the week and so much more.
…
  continue reading
Pro Say is a weekly podcast from Law360, bringing you a quick recap of both the biggest stories and the hidden gems from the world of law. Each episode, hosts Amber McKinney, Alex Lawson and Hailey Konnath are joined by expert guests to bring you inside the newsroom and break down the stories that had us talking.
…
  continue reading
A weekly podcast of immigration case summaries and practice insights from your host, Kevin A. Gregg, a partner at the law firm Kurzban Kurzban Tetzeli & Pratt P.A. Each Monday, the Immigration Review podcast reviews the latest published opinions from the U.S. Supreme Court, the Board of Immigration Appeals, and all U.S. Circuit Courts of Appeals—discussing some in depth, providing holdings for others, and always giving practical insights, rummaging through the week’s decisions so you don’t h ...
…
  continue reading
Life and Law with Siphosihle Nkosazana Mbuli, a podcast where we explore legal principles and have the conversations we all want to have. Every Episode, we'll dive into the latest legal issues and cases in law and discuss how they impact our daily lives.
…
  continue reading
The BC Safety Briefing is an AI-generated podcast exploring the world of occupational health and safety in British Columbia. Each episode dives into real case studies, WCAT decisions, new regulations, standards, and legislative updates that impact employers, workers, and safety professionals across the province. This show is designed as an educational resource to spark discussion, raise awareness, and keep listeners up to date with the evolving OHS landscape in BC. Because it is AI-generated ...
…
  continue reading
Criminal Behaviorology is the synthesis of criminology and behavior analysis. This podcast reviews areas of importance to both fields and explores new possibilities. Criminal Behaviorology is a podcast for all those interested in crime, psychology, history, and improving the world we live in. Contact: [email protected] Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@emotionspicture
…
  continue reading
Analyzing EB-1A/O-1 extraordinary ability, EB-2C National Interest Waiver USCIS denials and decisions from the DHS/Administrative Appeals Office. Note that AI is used as a speaker in some of the analyses. It is not intended as legal guidance. Info is subject to error. Immigration Law is complicated. Consult with a private attorney.
…
  continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
  continue reading
A podcast by Bloomsbury Professional Ireland
…
  continue reading
The IAAI and CFITrainer.Net present these podcasts with a focus on issues relating to fire investigation. With expertise from around the world, the International Association of Arson Investigators produces these podcasts to bring more information and electronic media to fire investigators looking for training, education and general information about fire investigation. Topics include recent technologies, issues in the news, training opportunities, changes in laws and standards and any other  ...
…
  continue reading
We break down everything about the ABA therapy landscape to help you understand how to provide high-quality behavioral health services. Get the lowdown on what's in the news, receive updates on legislation, and listen to industry commentary. Many clinicians start their own Applied Behavior Analysis (ABA) therapy organizations. ABA therapy is widely considered the gold-standard treatment for children with autism spectrum disorder. Despite making this admirable move, many practitioners find th ...
…
  continue reading

1
Legal Research, Writing, and Analysis Episode Three: From Research to Rule – Synthesizing Case Law into Rules
38:35
38:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:35Citations law.georgetown.edu Creating Effective Rule Statements law.georgetown.edu Creating Effective Rule Statements alg.manifoldapp.org Chapter 12 - Rule Synthesis | Legal Writing Manual 3rd Edition | OpenALG alg.manifoldapp.org"Teaching Rule Synthesis with Real Cases" by Paul Figley law.georgetown.edu Creating Effective Rule Statements law.georg…
…
  continue reading
Criminal Behaviorology Episode # 64 Title: The Vampire Killer of Sacramento The entire presentation can be found on our YouTube channel: @criminalbehaviorology - https://youtu.be/KXLS6l_M-PQ?si=h2GFPkruN2R01K5x - https://youtu.be/KXLS6l_M-PQ The views of our guests, should we have any, do not necessarily reflect those of Criminal Behaviorology, nor…
…
  continue reading

1
Legal Research, Writing, and Analysis Episode Five: Organizing the Legal Argument
28:18
28:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
28:18Advanced Legal Writing and Analysis Resources(Active Hyperlinks) https://law.columbia.edu IRAC / CRAC / CREAC Writing Frameworks – Columbia Law: Explains structures for legal analysis including IRAC, CRAC, and CREAC models. https://alg.manifoldapp.org Chapter 10 – CREAC Legal Writing Paradigm (OpenALG): Describes the CREAC organizational paradigm e…
…
  continue reading

1
The Crypto24 Playbook: An Analysis of the Banco Hipotecario del Uruguay Ransomware Campaign
47:39
47:39
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
47:39The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and …
…
  continue reading

1
Combatting Nuclear Verdicts in Plaintiff-Friendly Jurisdictions
29:00
29:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:00Attorneys John “Jack” Delany, Gary Samms and John Hare, from Qualified Member law firm Marshall Dennehey discuss the best approaches for attorneys to prevent nuclear verdicts in the courtroom.By Best's Recommended Insurance Attorneys & Adjusters
…
  continue reading

1
Legal Research, Writing, and Analysis Episode Four: Mastering the Application in IRAC/CREAC
42:56
42:56
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:56Legal Writing and Research Resources (ActiveHyperlinks) https://tortmuseum.org Vosburg v. Putney – The American Museum of Tort Law: Summarizes the landmark tort case establishing liability for minor but harmful contact. https://tourolaw.edu Working with IRAC – Touro Law Center: Explains the IRAC structure for effective legal analysis and writing. h…
…
  continue reading

1
Uruguay’s Digital Sovereignty Battle Combating Corporate Censorship with Labor Law and Algorithmic Transparency
5:33
5:33
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:33A Regulatory Crossroads for Uruguay’s Digital Future Uruguay stands at a critical juncture in the formation of its digital policy, navigating a landscape defined by a stark “policy bifurcation.” This division is evident in the contrast between two distinct regulatory efforts: the swift, consensus-driven passage of a law governing the economic and l…
…
  continue reading

1
John McAfee's Final Interview: On the Run, Crypto, and Psychedelics.
5:30
5:30
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:30The source provides excerpts from a transcript of a video interview with John McAfee, the British-American computer programmer and founder of the McAfee software company. McAfee, who notes he and his wife Janice are on the run from US authorities, discusses his rejection of traditional finance and investment, favoring cryptocurrencies like Monero a…
…
  continue reading

201
Briefing de Políticas: La Intersección de Vulnerabilidades Cibernéticas, Corrupción Sistémica y Poder del Crimen Organizado en México
59:07
59:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
59:07Un Nuevo Paradigma de Amenaza Híbrida Este briefing tiene como propósito analizar la convergencia de tres fuerzas que están redefiniendo el panorama de la seguridad en México: la creciente sofisticación tecnológica del crimen organizado, la existencia de vulnerabilidades digitales críticas en la infraestructura nacional y una corrupción institucion…
…
  continue reading

201
El Secuestro Digital del Banco Hipotecario: Crónica de un Ciberataque Anunciado
57:50
57:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
57:50Cuando se Apagaron las Luces El 30 de septiembre de 2025, una sombra digital se cernió sobre Uruguay. El Banco Hipotecario (BHU), una entidad estatal clave para la vivienda y la economía del país, sufrió un apagón total en su red. Este evento no fue un “incidente informático” aislado, como insistieron las voces oficiales. Fue la materialización pre…
…
  continue reading

1
The Sky is Leaking: A Case Study on Unencrypted Satellite Data
7:07
7:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:07The source, a transcript from a YouTube video titled "HACKEAN A LA GUARDIA NACIONAL," discusses a critical cybersecurity vulnerability involving geo-stationary satellites where sensitive data is transmitted unencrypted. Researchers from the University of California San Diego and the University of Maryland demonstrated that with readily available eq…
…
  continue reading

1
El Cielo Espía: Cómo una Antena Satelital Reveló Secretos a Plena Vista
6:32
6:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:32En la azotea de una universidad, un grupo de “cerebritos”, como los llama su fuente, apuntó una antena hacia el cielo. No buscaban estrellas ni señales extraterrestres. Buscaban secretos. Y con un equipo de apenas 14,000 pesos mexicanos, encontraron más de los que jamás imaginaron, desvelando las comunicaciones internas de la Guardia Nacional de Mé…
…
  continue reading

51
Huawei: La Historia del Gigante Tecnológico y la Operación Secreta que lo Acechó
7:32
7:32
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:321. Introducción: Un Router Comprometido en Irán En 2010, un router Huawei recién instalado en la oficina de un político iraní se convirtió en la herramienta de vigilancia perfecta. Sin que nadie lo supiera, una falla de diseño permitía a un atacante eludir la contraseña con un simple comando, una “llave maestra” digital que abría la puerta a todos …
…
  continue reading

51
The Dragon's Network: Huawei, the NSA, and the Secret War for Global Tech Supremacy
7:44
7:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:44The source provides an overview of Operation Shotgiant, a sophisticated cyber-espionage effort by the National Security Agency (NSA) of the United States targeting the Chinese telecommunications giant, Huawei. The operation began with an effort to determine if Huawei was spying on behalf of the Chinese government, as well as to map the company's in…
…
  continue reading

51
La Historia de Shady Rat: El Ciberataque que Redefinió el Espionaje Digital
7:17
7:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:17Introducción: Un Cebo en la RedEn diciembre de 2012, el investigador de ciberseguridad Kyle Wilhoit lanzó un experimento fascinante. Creó una planta de tratamiento de agua completamente virtual, con sistemas de control industrial, documentación detallada y hasta un sitio web. Aunque supuestamente estaba ubicada en Missouri, en realidad funcionaba d…
…
  continue reading

1
Operation Shady Rat: China's Cyber Espionage Engine
7:44
7:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:44The source provides an overview of Operation Shady Rat, a long-running, extensive campaign of cyber-espionage attributed to a unit of the Chinese military (Unit 61398) starting around 2006. This operation involved Advanced Persistent Threats (APTs) utilizing simple but effective spear-phishing emails to install malware (often referred to as a "rat"…
…
  continue reading

51
De lo Falsificado a lo Digital: La Sorprendente Evolución del Imperio Criminal de Corea del Norte
8:08
8:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:08Introducción: El Asalto de los $600 Millones En marzo de 2022, millones de jugadores del popular videojuego Axie Infinity comenzaron a experimentar algo extraño. Lo que al principio parecía una simple falla técnica —algunas funciones dejaron de responder— pronto se reveló como algo mucho más siniestro. El sistema no se podía arreglar porque no esta…
…
  continue reading

51
From Super Dollars to Super Hackers: The Secret History of North Korea's Criminal Empire
7:34
7:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:34The video transcript explores the phenomenon of highly effective North Korean state-sponsored hacking, contrasting this technological prowess with the nation's overall economic poverty and technological isolation enforced by its Juche ideology. It details how the government identifies and trains gifted math and science students to become hackers, o…
…
  continue reading

51
La Guerra por la PS3: La Historia del Hackeo a PlayStation Network
7:10
7:10
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:10Introducción: El Apagón que Conmocionó al Mundo de los Videojuegos El 20 de abril de 2011, el universo de los videojuegos se detuvo. Sin previo aviso, una fuerza misteriosa desconectó la PlayStation Network (PSN) de Sony, sumiendo a millones de jugadores en un silencio digital. Lo que comenzó como una simple interrupción del servicio se convirtió r…
…
  continue reading
The source, an excerpt from a YouTube video transcript, offers a detailed account of the events surrounding the 2011 PlayStation Network (PSN) hack. It begins by introducing George "GeoHot" Hotz, a renowned hacker who first gained fame by jailbreaking the iPhone and later successfully hacked the PS3 console, challenging Sony's proprietary control o…
…
  continue reading

1
Ep. 287 - Precedential Decisions from 10/20/2025 - 10/26/2025 (crime of violence; wantonly; persecutor bar; duress; termination of withholding-only proceedings; stay of removal; non-LPR cancellation of ...
41:14
41:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
41:14United States v. Tooley, No. 24-5286 (6th Cir. Oct. 23, 2025) Borden; recklessness; crime of violence; wantonly; manslaughter; murder Matter of Negusie, 29 I&N Dec. 285 (A.G. 2025) persecutor bar; asylum and withholding of removal; duress and voluntariness; history of asylum; 1967 protocol; evidentiary burden Matter of J-A-N-M-, 29 I&N Dec. 287 (BI…
…
  continue reading

1
Legal Research, Writing, and Analysis Episode Two: Finding the Law
54:18
54:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
54:18Citations : Legal Research References with Active Hyperlinks https://legal.thomsonreuters.com Explains primary and secondary legal sources and the role of AI in research. https://www.onelegal.com A guide for paralegals detailing research sources and validation methods. https://www.leg.state.fl.us Florida’s official statutes and constitution site fo…
…
  continue reading

1
Legal Research, Writing, and Analysis (LRW) Episode One: Thinking Like a Lawyer
36:24
36:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:24Legal Research, Writing, and Analysis — An Audio Workshop in Legal ReasoningCitations Episode One Drafting a Law Office Memorandum | CUNY School of Law https://www.law.cuny.edu/academics/academic-resources-support/legal-writing-center/student-resources/drafting-a-law-office-memorandum/ Drafting a Law Office Memorandum | CUNY School of Law https://w…
…
  continue reading
Can police use text messages that a complainant voluntarily hands over without a warrant? Joseph, Michael and Alper walk through the fresh R v Dhaliwal (Oct 8, 2025) decision, recap the Supreme Court’s R v Marakah (2017) framework on privacy in digital messages, and contrast R v Reeves (2018) and Lampert (2023 ONCA) on third-party devices and share…
…
  continue reading

1
Criminal Law Chapter Seven (Part 7 of 7): Criminal Procedure Foundations
35:04
35:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:04The conversation delves into the complexities of legal rules, particularly focusing on the balance between individual privacy and government investigation needs. It emphasizes the importance of understanding the nuances of legal interactions, especially in police questioning and the implications of testimonial evidence. In the realm of law, underst…
…
  continue reading

1
Criminal Law Chapter Six (Part 6 of 7): Punishment and Sentencing
37:26
37:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
37:26The conversation delves into the concept of deterrence in crime prevention, emphasizing that the likelihood of being caught and punished is a more significant factor than the severity of the punishment itself. It highlights that longer sentences do not effectively deter crime if offenders believe they can evade capture. In the intricate world of cr…
…
  continue reading

1
Criminal Law Chapter Five (Part 5 of 7): Defenses
38:48
38:48
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
38:48This conversation delves into the complexities of justified actions within the legal framework, exploring how certain actions, while criminal, may not lead to punishment due to diminished culpability. It highlights the distinction between legal justification and moral wrongness, emphasizing the implications for individuals who may face alternative …
…
  continue reading
The sources comprise a transcript of a YouTube video titled "Saving Samantha on Twitter Spaces" and a Spotify podcast listing for the same event, hosted by the "Cybermidnight Club – Hackers, Cyber Security and Cyber Crime." The primary source, the transcript, documents a live, often chaotic discussion among several individuals—Alberto, Sapit, Nana,…
…
  continue reading
The provided texts offer two distinct perspectives on modern forms of influence and security, with the Darknet Diaries podcast excerpts exploring the history and function of PSYOP (Psychological Operations), or Military Information Support Operations (MISO). These audio transcripts explain how the US military uses non-lethal methods—including leafl…
…
  continue reading

1
Criminal Law (Part 4 of 7): Other Major Crimes
26:12
26:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:12This conversation delves into the complexities of criminal law, focusing on major offenses beyond homicide, including assault, battery, sexual offenses, theft, robbery, arson, burglary, and kidnapping. The discussion emphasizes the evolution of legal definitions and standards, particularly in relation to consent and the mens rea required for variou…
…
  continue reading
This conversation delves into the complexities of homicide law, focusing on the definitions, mental states, and causation involved in criminal liability. It explores the historical context of malice aforethought, the nuances of causation, and the distinctions between murder and voluntary manslaughter, including mitigating factors like provocation a…
…
  continue reading

1
Ep. 286 - Precedential Decisions from 10/13/2025 - 10/19/2025 (circuit granting asylum; unable or unwilling; police failures; single mothers; nexus; relocation; gangs; motion to reopen to apply for voluntary ...
33:00
33:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:00Ramos-Ramos v. Bondi, Nos. 23-9567, 24-9524 (10th Cir. Oct. 15, 2025) clear error standard of review; no need for BIA remand; circuit court granting asylum; unable or unwilling to protect; police failure to solve crime; police ignoring reporting; single mothers; nexus; relocation; fear of gangs; family based particular social group; Honduras Pastor…
…
  continue reading

1
Criminal Law (Part 2 of 7): Parties and Inchoate Offenses
30:15
30:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
30:15This conversation delves into the complexities of criminal law, focusing on derivative liability, complicity, solicitation, conspiracy, and attempt. The discussion highlights the importance of understanding the nuances of mens rea and actus reus, as well as the implications of legal standards and human psychology in the application of these laws. T…
…
  continue reading

1
Criminal Law (Part 1 of 7): Principles of Criminal Liability
43:25
43:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
43:25This conversation delves into the foundational elements of criminal liability in American law, focusing on actus reus, mens rea, concurrence, causation, and the unique concept of strict liability. The discussion emphasizes the importance of understanding these elements for law students, particularly in the context of exam preparation. Through vario…
…
  continue reading

1
The Soul of the Machine: A Beginner’s Guide to “The Hacker’s Manifesto”
6:05
6:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:051. Introduction: The Voice from the Wires It’s 1986. The headlines are stark and sensational: “Teenager arrested in computer crime scandal”, “Hacker arrested after bank tampering”. To the public, these are simple stories of digital delinquency. But from behind the keyboard, a different voice emerges—a passionate, defiant defense of an entire cultur…
…
  continue reading

1
The Unsafe Space: A Story of a Conversation Gone Wrong. Social media, social audio, twitter, x
14:04
14:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
14:04Introduction: The Promise of a Safe Place Online On the internet, a “safe space” is a powerful idea. It’s meant to be a community where people can share difficult, painful experiences—especially when they feel wronged by powerful systems like governments, corporations, or universities—and be met with support and understanding. It’s a place built on…
…
  continue reading

1
Evidence Law (Part 7 of 7): Hearsay Exceptions – Declarant Unavailable, Privileges, Judicial Notice, and Burdens of Proof
42:03
42:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
42:03This conversation delves into the core doctrines of evidence law, focusing on burdens of proof, judicial notice, privileges, and hearsay exceptions. The discussion emphasizes the importance of understanding the underlying principles and policies that govern these legal concepts, providing listeners with a comprehensive framework for navigating evid…
…
  continue reading

1
The Uruguayan Cyber-Dilemma: A Deep Dive into National Strategy, Legal Enforcement, and the Transparency Deficit (2024–2025)
5:41
5:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:41The Uruguayan Cyber-Dilemma—A Critical AnalysisPresenter: Alberto Daniel Hill (Ethical Hacker, Forensic Expert, and Defender of Knowledge)Part 1 of 4: The Personal Cost of Transparency and the True Ethos of HackingI stand before you today not just as an expert in forensic science and ethical hacking, but as someone who has experienced firsthand the…
…
  continue reading

1
Analysis of Twitter Space: “Ecos del Pasado en la Era Digital”
34:40
34:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:40The source text is comprised of excerpts from a long-form, multi-topic audio discussion, which covers a wide array of subjects including personal relationships and intimacy, as indicated by early commentary on communication and sexual expression. A significant portion of the conversation focuses on geo-political and social issues, such as the perce…
…
  continue reading

1
The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization
6:44
6:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:44The takedown of the ‘Dictadores’ syndicate was not the story of a lone hacker in a basement. It was the dismantling of a structured, professional criminal organization Introduction: Two Hackers, Two Different Worlds In Argentina, law enforcement dismantles a sophisticated syndicate with direct ties to narco-traffickers, a group that built custom so…
…
  continue reading

1
Evidence Law (Part 6 of 7): Hearsay Exceptions – Declarant Availability Immaterial (FRE 803)
33:48
33:48
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:48This conversation delves into the complexities of hearsay in legal evidence, focusing on Federal Rule of Evidence 803 and its exceptions. The discussion provides a systematic approach to understanding hearsay, emphasizing the importance of context, spontaneity, and the reliability of statements. Key exceptions such as present sense impression, exci…
…
  continue reading

1
Análisis de la Regulación de Plataformas Digitales en Uruguay
20:58
20:58
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
20:58Análisis de la Regulación de Plataformas Digitales en UruguayResumen EjecutivoEl panorama regulatorio de las grandes plataformas digitales en Uruguay se caracteriza por una marcada bifurcación de políticas, avanzando en dos vías paralelas y distintas. La primera vía, la Regulación Laboral (Ley 20.396), ya ha sido promulgada y reglamentada. Esta ley…
…
  continue reading

1
Análisis de la Regulación de Plataformas Digitales en Uruguay
6:08
6:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:08La regulación de las plataformas digitales en Uruguay se desarrolla a través de dos trayectorias legislativas distintas y paralelas. Este camino legislativo, impulsado por el Poder Ejecutivo, se centra en establecer protecciones mínimas para los trabajadores de la economía gig, específicamente en los servicios de transporte urbano y entrega. Estado…
…
  continue reading

1
Uruguay's Dual Digital Platform Regulation: Labor and Democratic Governance
5:33
5:33
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
5:33The source provides an extensive analysis of Uruguay's efforts to regulate large digital platforms, identifying two distinct legislative tracks that characterize the nation's digital governance landscape. The first track successfully established Law 20.396, which focuses on labor regulation by setting minimum protections for gig economy workers and…
…
  continue reading

1
Hactivism, Detention, and Digital Justice: Unpacking a Latin American Cybercrime Saga
35:42
35:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
35:42These sources consist of transcripts from YouTube videos by the channel “CYBERMIDNIGHT CLUB,” primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob’s 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
  continue reading

1
Evidence Law (Part 5 of 7): Hearsay – Definition and Non-Hearsay
34:42
34:42
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:42This conversation delves into the complexities of hearsay in evidence law, particularly focusing on Federal Rule of Evidence 801. The discussion covers the definition of hearsay, the policy reasons behind its exclusions, and the distinctions between hearsay exclusions and exceptions. Key concepts such as the TOMA framework, non-TOMA purposes, and t…
…
  continue reading

1
Red Flag Forensics: How to Spot Stalkers, Scammers, and Cannibals on Dating Apps
33:45
33:45
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
33:45A Beginner's Guide to Spotting Red Flags in Online DatingIntroduction: Trusting Your Gut in the Digital Dating World Online dating offers exciting possibilities, but your safety must be your first priority. This guide is not meant to scare you; it is meant to equip you. It will teach you to recognize the warning signs and manipulative tactics used …
…
  continue reading

1
The Parmaster: Underground: Hacking, Madness, and Obsession on the Electronic Frontier
6:51
6:51
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:51The provided excerpts, primarily sourced from Suelette Dreyfus and Julian Assange's work "Underground," examine the early culture, motives, and legal challenges faced by the international computer underground, particularly focusing on Australian hackers. They illustrate that early hacking communities formed on BBSes (Bulletin Board Systems), where …
…
  continue reading

1201
Putin’s Bears: World’s Most Dangerous Hackers
44:25
44:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:25Case Study: Russian State-Sponsored Cyber Operations and their Geopolitical ImpactIntroduction: The Threat Doctrine of the "Bears" Russian state-sponsored cyber units, colloquially known as the "Bears," operate as direct instruments of national policy. Their actions extend far beyond traditional espionage, representing a strategic capability for de…
…
  continue reading
De la Crisis al Ciberdelito: La Historia del Hacking en Argentina1. Introducción: El Nacimiento de una Cultura Única La cultura hacker en Argentina no surgió en un laboratorio tecnológico ni en un próspero entorno corporativo. Fue forjada en el crisol de una de las peores crisis socioeconómicas de su historia. La debacle de 2001 dio origen a una me…
…
  continue reading
 
 
 
