A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Cyberlaw’ Category

Snowden Documents Reveal NSA Attempts to Track Tor Users
By Travis West – Edited by Ashish Bakshi

The National Security Agency (“NSA”) has developed techniques to circumvent Internet anonymity offered by the Tor network. The Tor service anonymizes users’ Internet traffic by routing requests to websites through multiple servers, making it extremely difficult to track. While the NSA can track some Tor users, the agency has been unable to crack the underlying technology, relying instead on browser exploits and its direct access to the Internet backbone to intercept website requests.

Read More...

Posted On Oct - 12 - 2013 Comments Off READ FULL POST

Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation

Written by: Natalie Kim
Edited by: Alex Shank

The EU is currently drafting a General Data Protection Regulation, thought to be among the toughest data protection laws in existence. This comment address the growing interoperability problem between U.S. and EU data protection law and ways of mitigating it, like reducing third-party liability loopholes, strengthened de-identification techniques and enhanced data tracking measures.

Read More...

Posted On Aug - 11 - 2013 Comments Off READ FULL POST

Injunction Imposed in Volkswagen Car Hacking Case: Public Safety Favored Over Transparency
By Jonathan Sapp – Edited by Alex Shank

A British high court enjoined Flavio Garcia from publishing an academic paper that sought to expose weaknesses in Volkswagen’s automobile security systems. In the paper, Garcia revealed secret codes used to activate the ignition systems of several luxury vehicles. The court’s ruling is the latest in the battle against researchers using hacking to expose security systems’ flaws.

Read More...

Posted On Aug - 10 - 2013 Comments Off READ FULL POST

Leaked NSA Memos Reveal More on Data Collection Procedures
By Katie Mullen – Edited by Michelle Sohn

Last weekend, the Guardian leaked two more National Security Agency (“NSA”) documents regarding the NSA’s recently uncovered surveillance program. The first document details procedures used to target “non-U.S. persons” believed to be located outside the United States. The second document describes minimization procedures the NSA uses in collecting data under Section 702 of the amended Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. 1881 (2012).

Read More...

Posted On Jun - 28 - 2013 Comments Off READ FULL POST

Leaked Surveillance Programs Reveal Large-Scale Data Collection
By Michelle Sohn – Edited by Katie Mullen

Last week, the Guardian revealed two top-secret U.S. programs—Verizon metadata collection and PRISM—that allow the National Security Agency (“NSA”) to conduct domestic surveillance on a massive and unprecedented scale. The U.S. Foreign Intelligence Surveillance Court ordered Verizon to provide the NSA with “telephony metadata.” The PRISM program allows the government direct access to participating companies’ servers.

Read More...

Posted On Jun - 15 - 2013 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Photo By: archie4oz - CC BY 2.0

European Court of Ju

By Paul Klein – Edited by Alex Shank [caption id="attachment_4363" align="alignleft" ...

Photo By: Kyle Nishioka - CC BY 2.0

Google to Supreme Co

By Michael Shammas – Edited by Mary Schnoor [caption id="attachment_4353" align="alignleft" ...

Photo By: Mozilla in Europe - CC BY 2.0

Mozilla Announces Re

By Sheri Pan – Edited by Corey Omer [caption id="attachment_4341" align="alignleft" ...

Icon-news

Flash Digest: News I

By Emma Winer Third Circuit Vacates Hacker Conviction for Improper Venue The ...

Photo By: Yuri Samoilov - CC BY 2.0

Supreme Court Weighs

By Mary Schnoor — Edited by Elise Young [caption id="attachment_4322" align="alignleft" ...