
Ed. Note: A weekly roundup of just a few items from Howard Bashman’s How Appealing blog, the Web’s first blog devoted to appellate litigation. Check out these stories and more at How Appealing.
“Montana ‘Trafficking’ Bill Shows Endgame for Abortion Rights Foes”: Law professor Mary Ziegler has this Jurisprudence essay online at Slate.

The Next Chapter In Legal Tech Innovation: Introducing Protégé™
Meet LexisNexis Protégé™, the new AI assistant that leverages personalization choices controlled by the user or their organization to optimize the individual’s AI experience.
“Elon Musk’s Attacks On Judges Are Getting More Racist and More Dangerous; Of the many federal judges who have blocked the unelected billionaire’s efforts to take over the government, you can probably guess which ones he is angriest about”: Jay Willis has this essay online at Balls and Strikes.
“Trump’s biggest power grab just reached the Supreme Court; Trump’s lawyers just revealed their plan to place him in charge of federal spending”: Ian Millhiser has this essay online at Vox.
“Justice Dept. hires for court battles as Trump slashes other agencies; The Justice Department is recruiting and hiring lawyers to the civil division to defend Trump administration policies against an onslaught of legal challenges”: Perry Stein of The Washington Post has this report.
“Indicted SCOTUSblog Publisher Tom Goldstein Appeals Jail Release Conditions”: Sulaiman Abdur-Rahman of The National Law Journal has this report.

The Hidden Threat: How Fake Identities used by Remote Employees Put Your Business at Risk—and How to Defend Against This
Based on our experience in recent client matters, we have seen an escalating threat posed by the Democratic People’s Republic of Korea (DPRK) information technology (IT) workers engaging in sophisticated schemes to evade US and UN sanctions, steal intellectual property from US companies, and/or inject ransomware into company IT environments, in support of enhancing North Korea’s illicit weapons program.
“‘You don’t snitch’: Donna Adelson alleges jail abuse as she seeks release ahead of trial.” Jeff Burlew of The Tallahassee Democrat has this report.