Posts Tagged ‘authentication’


September 19, 2011 1 comment

“… the Constitutions of Clarendon were duly set down in a chirograph on January 29, the text written out three times on the same parchment and then torn so as to validate all three copies when joined together.” – Sharon Kay Penman, Time and Chance 210 (2002) (describing an accord between King Henry II of England and Archbishop of Canterbury Thomas Becket, 1164).

The problem of determining the authenticity of legal documents is not a new one – it is in fact a very ancient one. Medieval lawyers and kings prevented forgeries of important agreements as described above: by writing the same text on a piece of parchment and cutting it jaggedly, so the two parts fit back together like puzzle pieces, verifying that neither has been substituted for the real one. An example of this technique is on the PCL’s first floor, near the stairwell.

English charter showing jagged edge

Note the jagged top edge, with writing

If you look carefully, you can see that there is a word – probably chirograph – written across the jagged edge. Obviously this method wasn’t foolproof: It would still be possible to create a controversy by neatly altering one of the texts. (I had a music teacher who taught me to scrape text off a printed page and buff the remaining surface; it’s also possible with parchment. Scraping is actually part of the process to prepare parchment for use.)

For much of the last century, this was less of an issue. Most legal documents we relied on were obtained through trusted sources – from a reputable publisher, from the court, or directly from the government – and alterations would have been obvious. In many cases, there were so many copies (of a court’s opinion, for instance) that altering one copy would be easily discovered. (This is one of the operating principles behind some online preservation efforts – Lots of Copies Keeps Stuff Safe.) But in an age where many researchers rely on online access, and hacking of institutional systems is not infrequent, there need to be additional safeguards in place.

Conceptually, authentication comes down to two questions:

1. Did you get the document from a source you trust, and
2. can you verify that it hasn’t changed since they gave it to you?

Acquiring a document from a trusted source is still important. One way of doing that is to go to reputable information sources, including commercial sources (like publishers), country or state governments, or non-governmental organization. When these sources are hacked, it makes news. Recently, the federal government has implemented technological systems that address the second question. The new online system to access federal documents, FDsys, incorporates an authentication process. While the details of the technology are – frankly – beyond my comprehension, authenticated documents display an eagle symbol and a notice that the document is certified by the Superintendent of Documents.

Authentication seal & certification for H.R. 36, 112th Cong. (1st Sess. 2011).

Authentication seal, certified by the Superintendent of Documents

While the federal government has taken the lead, efforts in states vary widely. Surveys of the states in 2007 and 2009 revealed that while some states are relying on online versions of their basic legal documents, almost none are authenticating those documents via any technological means. They are relying on the protections of state websites and .PDF formats, neither of which are impregnable to the dedicated hacker.

As students and practitioners of legal research and writing, you should know that the most recent citation guidelines refer to “Authenticated documents” as one type of online source that is permissible to cite (Rule 18.2.1(b)). Presumably the federal government’s initiative will spread to the various states, and perhaps by the 20th edition of The Bluebook (or maybe the 21st edition), authenticated online documents will be the norm!

FDsys: Government Information in the 21st Century – Today in Government Information

August 10, 2011 1 comment

The news this summer has been abuzz with Obama administration and Congressional efforts to cut back on duplicative government websites and wasteful printing practices (although these efforts may be misinformed). If you just listen to the headlines, you might think that the government doesn’t curate its web presence or update any resources, and is practically using chisels and tablets to keep the populace informed. There are actually some exciting developments in the realm of federal information on the internet, including a site known as FDsys, the Federal Digital System.

Way back in 1994, the federal Government Printing Office (or GPO) established, by order of Congress, a website that was positively spiffy for the time. GPO Access, as it was known, made federal information available directly from the government and easily accessible to everyone with an internet connection. Back in 1994, that was a huge deal. But so were OJ Simpson and his white Bronco.

Many things have changed over the years, and despite incremental improvements, GPO Access remained basically as it was in 1994.  In 2010, when GPO Access was old enough to get a drivers license, the GPO declared a new Federal Digital System (FDsys) the “electronic system of record.” On one level, it is merely a replacement for the now-dated GPO Access interface, but behind the scenes it is so much more. A video from the University of Colorado explains in brief the advantages of an authenticated system, and a future blog post will explain authentication in detail. For now, know that the content on FDsys is verified as being the actual information published by the federal government, and has not been altered in the meantime – it’s trustworthy. This system is designed to provide permanent public access to government information.

In addition to providing authenticated material, FDsys is a more direct pipeline from the content creators to the public, so information is released more quickly and in better shape. Government information is available for searching and browsing, as well as for download complete with what librarians call “metadata” – information about the information itself. Data is arranged in collections – titles that you might recognize from researching in print, like the Code of Federal Regulations or the Congressional Record. It’s also available for people who want to re-purpose the information for other applications – the file formats are very flexible for a wide range of uses. Sites like Thomas and are based on data drawn from FDsys.

GPO Access, as you can see, is still available as an historical archive, but it is slated to be deactivated by the end of this year.  So start using FDsys today!