A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Anonymity’ Category

Snowden Documents Reveal NSA Attempts to Track Tor Users
By Travis West – Edited by Ashish Bakshi

The National Security Agency (“NSA”) has developed techniques to circumvent Internet anonymity offered by the Tor network. The Tor service anonymizes users’ Internet traffic by routing requests to websites through multiple servers, making it extremely difficult to track. While the NSA can track some Tor users, the agency has been unable to crack the underlying technology, relying instead on browser exploits and its direct access to the Internet backbone to intercept website requests.

Read More...

Posted On Oct - 12 - 2013 Comments Off READ FULL POST

Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation

Written by: Natalie Kim
Edited by: Alex Shank

The EU is currently drafting a General Data Protection Regulation, thought to be among the toughest data protection laws in existence. This comment address the growing interoperability problem between U.S. and EU data protection law and ways of mitigating it, like reducing third-party liability loopholes, strengthened de-identification techniques and enhanced data tracking measures.

Read More...

Posted On Aug - 11 - 2013 Comments Off READ FULL POST

Twitter Releases Users’ Identities to French Authorities After Tough Legal Battles
By Michelle Sohn – Edited by Katie Mullen

Twitter, traditionally a stalwart opponent of government surveillance requests, released to French prosecutors the identities of users who had tweeted anti-Semitic comments in violation of France’s hate speech laws. The social media giant’s capitulation follows a series of legal battles over the issue, including a $50 million lawsuit for failing to provide the information.

Read More...

Posted On Jul - 21 - 2013 1 Comment READ FULL POST

Leaked NSA Memos Reveal More on Data Collection Procedures
By Katie Mullen – Edited by Michelle Sohn

Last weekend, the Guardian leaked two more National Security Agency (“NSA”) documents regarding the NSA’s recently uncovered surveillance program. The first document details procedures used to target “non-U.S. persons” believed to be located outside the United States. The second document describes minimization procedures the NSA uses in collecting data under Section 702 of the amended Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. 1881 (2012).

Read More...

Posted On Jun - 28 - 2013 Comments Off READ FULL POST

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Icon-news

Federal Circuit Flas

By Steven Wilfong Multimedia car system patents ruled as unenforceable based ...

Icon-news

Flash Digest: News i

By Viviana Ruiz Converse attempts to protect iconic Chuck Taylor All ...

silkroad_fbi_110813

Silk Road Founder Lo

By Travis West — Edited by Mengyi Wang Order, United States ...

free-speech

Trademark Infringeme

By Yunnan Jiang – Edited by Paulius Jurcys Brief for the ...

Twitter.png?t=20130219104123

Twitter goes to cour

By Jens Frankenreiter – Edited by Michael Shammas Twitter, Inc. vs. ...