A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Cyberlaw’ Category

Massachusetts High Court Requires Warrants for Cell Phone Location Data
By Zoe Bedell – Edited by Corey Omer

On February 18, 2014, the Massachusetts Supreme Judicial Court (“SJC”) agreed with a Superior Court ruling that the Commonwealth must seek a warrant in most cases before obtaining cell phone records that track an individual’s location. The SJC nevertheless vacated the lower court’s order granting the defendant’s motion to suppress the records and remanded the case for a hearing on whether the Commonwealth had met the higher ‘probable cause’ standard required for the issuance of a warrant.

Read More...

Posted On Mar - 10 - 2014 Comments Off READ FULL POST

Hacktivist Jeremy Hammond Sentenced to Ten Years in Prison
By Mark Verstraete – Edited by Thuy Nguyen

On Friday, November 15, 2013, Anonymous affiliated hacktivist Jeremy Hammond was sentenced to ten years in prison and three years of supervised release. Hammon was sentenced under the Computer Fraud and Abuse Act for hacking Texas-based private intelligence firm, Strategic Forecasting. During his supervised release period, Hammond is proscribed from using computer anonymity devices, such as Tor.

Read More...

Posted On Nov - 26 - 2013 Comments Off READ FULL POST

Ex Parte TROs — Exceptional, Unless You’re A “Hacker”
By Corey Omer — Edited by Abhilasha Nautiyal

Battelle Energy Alliance LLC v. Southfork Sec. Inc.

Last month, the District of Idaho issued a rare ex parte temporary restraining order against software developer Corey Thuen and his company, enjoining them from releasing software code as open source and ordering that Thuen’s computer be seized and its contents copied. Judge Winmill reasoned that because Thuen was a “hacker,” the ex parte seizure order was justified.

Read More...

Posted On Nov - 4 - 2013 Comments Off READ FULL POST

Snowden Documents Reveal NSA Attempts to Track Tor Users
By Travis West – Edited by Ashish Bakshi

The National Security Agency (“NSA”) has developed techniques to circumvent Internet anonymity offered by the Tor network. The Tor service anonymizes users’ Internet traffic by routing requests to websites through multiple servers, making it extremely difficult to track. While the NSA can track some Tor users, the agency has been unable to crack the underlying technology, relying instead on browser exploits and its direct access to the Internet backbone to intercept website requests.

Read More...

Posted On Oct - 12 - 2013 Comments Off READ FULL POST

Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation

Written by: Natalie Kim
Edited by: Alex Shank

The EU is currently drafting a General Data Protection Regulation, thought to be among the toughest data protection laws in existence. This comment address the growing interoperability problem between U.S. and EU data protection law and ways of mitigating it, like reducing third-party liability loopholes, strengthened de-identification techniques and enhanced data tracking measures.

Read More...

Posted On Aug - 11 - 2013 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
91ea09a6535666e18ca3c56f731f67ef_400x400

Privacy Concerns in

By Sabreena Khalid – Edited by Insue Kim Following scandals earlier ...

free-speech

San Francisco Court

By Jens Frankenreiter – Edited by Henry Thomas S. Louis Martin ...

European union concept, digital illustration.

EU Unitary Patent Sy

By Saukshmya Trichi – Edited by Ashish Bakshi Advocate General’s Opinion ...

computer-typing1

California Sex Offen

By Jesse Goodwin – Edited by Michael Shammas Doe v. Harris, ...

nsa-tracking-phone-records-325x337

Congress Fails to Pa

By Henry Thomas – Edited by Paulius Jurcys USA FREEDOM Act ...