Technological Redlining
As the phenomenon known as Pokémon Go has rapidly established itself as the latest distraction (or obsession) for the growing numbers of people with GPS-enabled smart phones, we have begun to see some...
View ArticleInternational Justice Day Round-Up III: Salvadoran Amnesty Law, Germany...
Author(s): Beth Van SchaackPublication Date: July 20, 2016Publication Type: Other WritingThis is Part III of an international criminal justice round-up covering ten of the top developments in the field...
View ArticleTesla's data collection may help it deflect Autopilot liability
Date published: July 20, 2016"The courtroom, however, is different from the court of public opinion, said Bryant Walker Smith, an assistant professor of law and engineering at the University of South...
View ArticleTwitter stirs debate as 'troll' banned over racist abuse
Date published: July 20, 2016"Danielle Citron, a University of Maryland law professor and author of a book "Hate Crimes in Cyberspace," called the incident "a learning moment.""I applaud Twitter for...
View ArticleGoogle recieved record number of data requests: 4,677 in latest transparency...
Date published: July 20, 2016"Omer Tene, vice president of research and education at the International Association of Privacy Professionals (IAPP) noted that European countries such as Germany and...
View Article126 Leading Academics to Europe’s Telecom Regulators: Protect the Open...
Today, 126 academics from Europe and around the world published an open letter to European telecom regulators urging them to protect the open Internet in Europe. Regulators are currently working on...
View ArticleNetwork Neutrality in Brazil: the recently enacted Presidential Decree...
Amidst an economic and political turmoil, Brazil gave a significant step towards protection of network neutrality – the principle that keeps the Internet an open space, free from undue control by...
View ArticleESPECIAL: o que dizem especialistas em criptografia sobre o bloqueio do WhatsApp
Date published: July 21, 20163 perguntas para Riana Pfefferkorn, pesquisadora na área de criptografia no Center for Internet and Society da Stanford Law School (EUA).“O debate sobre a criptografia...
View ArticleWhose Copyright Office?
In 2013, in a lecture at Columbia University, Register of Copyrights Maria Pallante announced an ambitious vision for the “Next Great Copyright Act.” That vision appropriately included a...
View ArticleFacebook Has Difficult Road to Make Ads Unblockable
Date published: August 15, 2016"“Facebook engineers could try harder to obfuscate the differences. For example, they could use non-human-readable element IDs to make it harder to figure out what’s...
View ArticleDonald Trump wants ‘extreme vetting’ to stop terrorists at border
Date published: August 15, 2016"“The policies and ‘pillars’ that were offered as solutions were often vague, and it is not clear they’d actually solve the serious challenges that exist in the region,”...
View ArticleIndiana businesses targeted as ransomware viruses spread across U.S.
Date published: August 15, 2016"Hackers’ favorite targets include health systems and local governments, said Scott Shackelford, a professor of business law and ethics in the Kelley School of Business...
View ArticleAn Internet Freedom Fighter
Date published: August 15, 2016"Even the most fervent internet user has to log off sometimes. That’s what Barbara van Schewick had in mind for her family vacation at a farmhouse near Cologne. But it’s...
View Article“Tool Without a Handle” – Tools For Art and Politics, Part 1
This blog has, to date, primarily focused on the qualities of networked information technologies and regulatory responses to them – in particular qualities that raise issues of privacy and free...
View ArticleUS wiretap figures don't match what the phone giants are saying — and that's...
Date published: August 16, 2016"Albert Gidari, a former leading privacy lawyer who now serves as director of privacy at Stanford Law School's Center for Internet and Society, was first to notice a...
View ArticleWikiLeaks postings of Turkish emails included active links to malware
Date published: August 17, 2016"“Wikileaks does not appear to operate within any particular principles with regard to information dumps. The ad hoc nature of their leaks means that they are often...
View ArticleWhen the Cops Come A-Knocking: Handling Technical Assistance Demands from Law...
What kind of surveillance assistance can the U.S. government force companies to provide? This issue has entered the public consciousness due to the FBI's demand in February that Apple write software to...
View ArticleWhen the Cops Come A-Knocking: Handling Technical Assistance Demands from Law...
What kind of surveillance assistance can the U.S. government force companies to provide? This issue has entered the public consciousness due to the FBI's demand in February that Apple write software to...
View ArticleUber to introduce self-driving cars to its fleet in coming weeks
Date published: August 18, 2016"Uber's move to carry people with autonomous vehicles is not surprising, given the company's history of pushing into gray areas where there is little or no regulation,...
View ArticleTurkey's Erdogan used social media he despises to stay in power
Date published: July 19, 2016""They're unwilling to shut down services and take a hit to their own ability to communicate," said Andrew McLaughlin, the former U.S. Deputy Chief Technology Officer....
View Article