Cybersecurity Insurance For All?

In the past year, it seems like the rate of cybersecurity incidents has been increasing. It is irrelevant whether these breaches are old or new; the issue is that they are occurring. On October 16, 2017, Chubb Ltd. (“Chubb”) released the results of a survey it conducted on businesses cybersecurity preparedness. The survey found that

Can We Truly Make Ads Honest, Or Is This More Fake News?

A new bill introduced in the U.S. Senate by Senators Mark Warner, Amy Klobuchar and John McCain aims to put online political advertising on a level playing field with the traditional mediums of television, radio, and print. House Resolution 4077, also known as the “Honest Ads Act,” comes as a direct response to the investigation

Water Markets: Potential Solution To Shortage, New Infrastructure May Be Key

Market forces govern almost all commodities subject to shortage. Exceptions to this rule include public utilities (although this is slowly changing with the application of deregulated electric grids). This change developed as a response to shortage and inefficiencies of monopolized service providers. In the Southwest United States, a similar shortage and inefficient use governs water

FERC’s Response to DOE’s Proposed Grid Resiliency Pricing Rule: Will the Process Continue Moving So Rapidly?

September 28th, the Department of Energy (DOE) issued a Notice of Proposed Rulemaking (NOPR) for a “Grid Resiliency Pricing Rule.” This rule directs the Federal Energy Regulatory Commission (FERC) to attribute greater value to “baseload” resources like coal and nuclear by allowing them to recover full cost of plant service. These resources are touted to

Exploring the Meaning of a Facebook Like

In the quest for data on anti-administration activists, the Department of Justice requested the “names of an estimated 6,000 people who ‘liked’ a Facebook page about an Inauguration Day protest.” The DOJ has since dropped that specific request, but at a hearing, Assistant U.S. Attorney John Borchert revealed a persisting interest in “likes” of another

DOJ Contends You Don’t Have a Constitutional Right to Follow Donald Trump on Twitter

In a brief filed on October 13, 2017, the Department of Justice contends that users who have been blocked by President Trump on Twitter have no valid claim against the president. The brief was filed in response to a lawsuit brought by seven different Twitter users, as well as Columbia University’s Knight First Amendment Institute,

Cryptojacking: Abuse of JavaScript Cryptocurrency Mining and Challenges of Legitimate Use

In recent months, some websites have commandeered users’ computer processors to “mine” cryptocurrency. This new form of computer user abuse is called “Cryptojacking.” Cryptojacking is possible because of new “mining” technology that allows websites to run JavaScripts that use an individual’s computer processing power to mine cryptocurrency without the individual’s knowledge or permission. This allows

Airbnb Takes Their Service to the Next Level: Building and Branding Their Own Apartments

Airbnb has been subject to increasing regulations from municipalities across the country, with various requirements being imposed. For example, many of these cities are necessitating that the owners of the units that are being listed obtain a rental license, limiting how many properties can be listed by one owner, requiring that the listing is the

United States Diplomats Attacked In Cuba

U.S. intelligence operatives residing in Cuba have been reporting “sonic-like” attacks, affecting at least 21 American operatives so far. Despite attacks beginning roughly a year ago, the story initially failed to pick up significant momentum. Now, almost a year after first reports, continued attacks have prompted significant action from the United States. Despite the hazy

Kaspersky, Russia, and the Exposure of American National Security Secrets

Last week, news broke that hackers working for the Russian government acquired American intelligence programs by exploiting weaknesses in Kaspersky Lab, a software security program used by several agencies in the United States government. According to the Wall Street Journal, the hackers successfully acquired “details of how the U.S. penetrates foreign computer networks and defends