A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Internet’ Category

Comcast as a Media Powerhouse: A Threat to Consumers?
By Insue Kim – Edited by Suzanne Van Arsdale

Comcast has proposed to acquire Time Warner Cable for $45.2 billion in stock, in a merger that could have far-reaching implications for the media and communications industry. Comcast hopes the merger will further its longstanding strategy of growing into a broadband and media powerhouse. Critics voice concerns about consolidation of power, and analysts highlight Comcast’s powerful lobbying operation in Washington.

Read More...

Posted On Feb - 23 - 2014 Add Comments READ FULL POST

Hacktivist Jeremy Hammond Sentenced to Ten Years in Prison
By Mark Verstraete – Edited by Thuy Nguyen

On Friday, November 15, 2013, Anonymous affiliated hacktivist Jeremy Hammond was sentenced to ten years in prison and three years of supervised release. Hammon was sentenced under the Computer Fraud and Abuse Act for hacking Texas-based private intelligence firm, Strategic Forecasting. During his supervised release period, Hammond is proscribed from using computer anonymity devices, such as Tor.

Read More...

Posted On Nov - 26 - 2013 Comments Off READ FULL POST

Flash Digest: News In Brief
By Rita Resende Soares

Federal Circuit Renews Apple’s Hope For Injunction Against Samsung

Google And Microsoft Strengthen Their Commitment Against Child Abuse

Supreme Court Rejects Petition To Halt NSA Surveillance Of Domestic Telephone Calls

Read More...

Posted On Nov - 21 - 2013 Comments Off READ FULL POST

Google Encrypts Its Network to Counteract NSA Surveillance
By Jennifer Garnett – Edited by Abhilasha Nautiyal

Earlier this month, Mike Hearn of Google’s Security Department posted online that Google has successfully encrypted the data traffic between its servers. This undoes the National Security Agency’s (“NSA”) work in creating the surveillance program “MUSCULAR,” which taps into the connections between Google and Yahoo’s private data centers.

Read More...

Posted On Nov - 18 - 2013 1 Comment READ FULL POST

NIST to Formally Reexamine Cryptography Standards Development Process
By Sheri Pan – Edited by Elise Young

The National Institute of Standards and Technology (“NIST”) recently announced that it has begun formal review of its standards development process for approving cryptographic algorithms. The notice appears to be a reaction to recent reports in the New York Times regarding the National Security Agency’s back door access to encrypted data through an NIST-approved cryptographic algorithm. That is used by many companies to encrypt data sent over the Web.

Read More...

Posted On Nov - 7 - 2013 1 Comment READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Photo By: archie4oz - CC BY 2.0

European Court of Ju

By Paul Klein – Edited by Alex Shank [caption id="attachment_4363" align="alignleft" ...

Photo By: Kyle Nishioka - CC BY 2.0

Google to Supreme Co

By Michael Shammas – Edited by Mary Schnoor [caption id="attachment_4353" align="alignleft" ...

Photo By: Mozilla in Europe - CC BY 2.0

Mozilla Announces Re

By Sheri Pan – Edited by Corey Omer [caption id="attachment_4341" align="alignleft" ...

Icon-news

Flash Digest: News I

By Emma Winer Third Circuit Vacates Hacker Conviction for Improper Venue The ...

Photo By: Yuri Samoilov - CC BY 2.0

Supreme Court Weighs

By Mary Schnoor — Edited by Elise Young [caption id="attachment_4322" align="alignleft" ...