top of page

It's well known that you can search for specific file types in Google by structuring a search in this form:

filetype: pdf

This search will only return pages to which PDF images have been post.ed A search for:

filetype:mbox -site:facebook.com

. . . will exlcude hits for .mbox files on the Facebook site. A search for: "filetype:mbox site:facebook.com", will only find.mbox files on the Facebook site.

A search for:

ext: ppt

. . . will also only find files with the extension for PowerPoint, ppt. .ext is a simple variation on the filetype search.



If you're looking for help responding to a cease and desist notice requesting the removal of information posted to the internet, consider consulting the Berkman Klein Center's Lumen site. The Berkman Klein Center for Internet & Society is a project of Harvard Law School. The Center collaborates with the Electronic Frontier Foundation, and the law schools of the University of San Francisco and UC Berkeley on the Lumen archive of cease and desist notices. Lumen includes millions of notices.

Many of the notices archived on the site are Digital Millennium Copyright Act complaints. The DMCA criminalizes the use of technical services to circumvent copyrighted material. Lumen also archives notices related to trademarks; patents; trade secrets; the EU Right to Be Forgotten; and requests from courts and law enforcement.

The database indicates the date of each notice; the sender; the recipient; a description of the content; the urls for the protected content; and the urls of the offending content.

Lumen can assist with the creation of DMCA counter notifications. After an ISP takes down alleged infringing content, a counter notification may lead to the information being made available again after 14 days.

Google voluntarily submits notices it receives to Lumen.



wigle.net, the Wireless Geographic Logging Engine, collects data on wifi networks around the world. One of the most interesting resources on this site, is a chart tracking the use of encryption for wifi networks. The chart tracks different types of wifi encryption. The red line on the chart tracks unencrypted wifi networks; the yellow networks for which the encryption status is unknown, and the green for which there is some kind of encryption. As we can see from the chart it was only around November 2006 that the number of encrypted networks exceeded the number of encrypted networks. The WEP, Wired Equivalent Privacy, protocol continued to be more widely used than the WPA protocol until July 2012 despite the fact that the Institute of Electrical and Electronics Engineers (IEEE) stated in 2004 that this protocol no longer met its security goals. The WPA2 continues to be the most widely used encryption protocol.


Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page