Blogs

Feb
17

Technology companies including Facebook, Microsoft, Google, and Yahoo have recently given the first look at secret data requests made by the government in regards to national security issues.  These new details were published this past week and revealed both the scope and volume of requests that were made. The data requests by the government were

Feb
11

It is easy to be idealistic about the cultural effects of the internet—opening communication between different cultures, comparatively free and open information—until one gets to the comments section of any given interactive content-based website.  One of the negative things the internet is good at is stirring self-righteous indignation in even the best of us.  Recently,

Feb
11

The details of government surveillance programs brought to light in the wake of Edward Snowden’s NSA leaks have already spawned multiple lawsuits.  Klayman v. NSA was filed literally the day after the first revelations came out in The Guardian.  US District Judge Richard Leon called the government’s spying technology “almost Orwellian” in his widely cited

Feb
11

It’s almost impossible to talk about the Computer Fraud and Abuse Act (the “CFAA”) without first mentioning Aaron Swartz. Aaron Swartz was a computer programmer and Internet activist who ran afoul of the Justice Department just a few years ago. Police arrested Swartz in 2011, after he allegedly accessed the computer network at the Massachusetts

Feb
07

The current broadband Internet marketplace is, unfortunately, limited to a few competitors. Typically, the average household has access to options for high speed Internet from their cable company, telephone service provider, and possibly a fiber optic high-speed Internet provider (depending on their location). Many areas, especially rural areas, do not have access to these high-speed

Feb
07

For Target Corporation, December 2013 was an utter disaster. Just before Christmas, the company revealed that hackers had stolen personal information for as many as 110 million of its customers. From November 27th until December 15th, hackers accessed customers’ credit and debit card numbers, names, phone numbers, mailing addresses, and email addresses. The breach was

Feb
04

Automatic license plate readers are rapidly being adopted across the country for use by law enforcement agencies and private businesses. While license plate readers can quickly identify wanted vehicles and enhance public safety, many are questioning the lack of regulations behind the use of this technology. License plate scanners work with the use of cameras

Jan
30

Two weeks ago, Ohio executed Dennis McGuire using an untested drug combination. The state switched to the combination of midazolam, a sedative, and hydromorphine, a painkiller, after manufacturers of the previous drug, pentobarbital, refused to sell it for executions. The combination was originally expected to be used in the execution of Ronald Phillips in November

Categories