Not so hard to explain
even without statistics...
App
releases Azerbaijani election results a day early
… Dear governments
of perhaps-slightly-less-democratic-than-it-appears regimes: the
appearance of democracy is quite important. Just for, you know,
appearances sake.
… This is something
that the oil-rich Azerbaijani government might have overlooked. Or,
rather, whoever is in charge of its Central Election Commission
election mobile app.
For,
as
The Washington Post reports, the app dutifully pumped out
marvelously accurate election results, heralding a stunning victory
for current president Ilham Aliyev.
For my nay-saying
lawyers friends. Are there any circumstances where he could
successfully refuse? (How would you advise me to set up my “secure
email service?”
Orin Kerr analyzes the
filing by Lavabit:
Today
Lavabit
filed
a brief before the Fourth Circuit challenging a civil contempt
order for its refusal to turn over its encryption key that the
government wants to enable the government to conduct surveillance of
Edward Snowden. I think Lavabit faces a very uphill battle, and in
this post I’ll explain why.
First,
a bit of context. The government obtained several different court
orders requiring Lavabit to disclose the key. First, they obtained a
pen register order; next, they issued a subpoena for the key; and
third, they obtained a search warrant for the key. Lavabit refused
to comply with any of them, and the court imposed a fine of $5,000 a
day until Lavabit agreed to hand over the key in digital form. (In a
bit of a middle finger to the government and the court, Lavabit did
turn over a paper copy of the key — which was 11 pages long in
4-point type — but refused to turn over an electronic copy.
Understandably, the court didn’t consider that compliance.)
Lavabit then shut down its service and handed over the key. In this
appeal, Lavabit is appealing the lawfulness of the judge’s orders
requiring it to hand over its key by arguing that none of the court
orders were valid.
In
order to to win on appeal, Lavabit needs to show that all three
methods are improper. I don’t think they can do this. I’ll
take each argument in turn.
It's better than a
multi-billion dollar trading loss! Could analytics become mandatory?
Banks
Use Analytics to Detect Suspect Employee Behavior
Penny
Crosman, BankThink/American Banker: “Ten large U.S. and
European banks are using natural language processing technology from
Digital Reasoning — one of
Bank Technology News’ ‘Top
Ten Tech Companies to Watch for 2012′ —
to uncover such
revealing documents before lawyers and examiners do. The company
launched six Proactive Compliance analytics products six months ago.
The software is meant to find emails that reflect unethical behavior
and violations of Dodd-Frank, anti-money laundering, Know Your
Customer
and other rules. Some European banks use the
software to analyze suspicious activity reports for signs of bribery.
Other banks use it to find control room violations, to make sure
their advisory services are clean, to keep insider information from
leaking out of their organization, and to maintain the Chinese wall
between trading and research. Banks’ current compliance solutions
tend to focus on monitoring transactions and trade orders, Digital
Reasoning executives say. But much valuable information is buried
not in transactions, but in emails, instant messages, Word documents,
PowerPoint presentations and other forms of “unstructured data”
(which basically means, any data not stored in a database). Three
large banks are using Proactive Compliance to catch employees who
report that everything is fine but admit behind the scenes that
disaster looms, in the manner of JPMorgan Chase’s London Whale.”
No small matter.
Google
Wins Dismissal of Suit Over Web Browser Cookies
Google
Inc. (GOOG) won dismissal of a lawsuit alleging
it violated computer users’ rights by slipping electronic “cookies”
into their Web browsers to facilitate placement of advertising.
Cookies are used to
track browsing activity and can help advertisers target potential
customers. The users claimed that Mountain View, California-based
Google, owner of the world’s largest search engine, “tricked”
their
Apple
Inc. (AAPL) and
Microsoft
Corp. (MSFT) browsers into accepting cookies,
according to court filings.
The consumers sued in
federal court last year saying Google impinged on their privacy in
violation of federal and state laws. The court rejected those
claims.
“
Google did not
intercept contents as provided for by the Wiretap Act,” U.S.
District Judge Sue L. Robinson in Wilmington,
Delaware,
said in her opinion. The users also
didn’t “demonstrate that
Google intercepted any ‘contents or meaning’” under
California’s Invasion of Privacy Act, she said. Nor did the users
identify “any impairment of the performance or functioning of their
computers,” the judge wrote
[All of
this seems to be a polite way of saying “Why are you idiots suing
this poor innocent company?” Bob]
(Related) On the other
hand, there must be a formula that calculates the number of lawsuits
vs. the market value of the firm.
William Dotinga
reports:
Google
asked a federal judge Wednesday for permission to take questions
about federal wiretapping laws to the 9th Circuit before a Gmail
class action advances any further.
[...]
[Judge
Lucy] Koh [had]
declined
to dismiss the majority of the sprawling class action, finding that
Gmail’s interceptions fall outside the narrow “ordinary course of
business” exception carved out of the Electronic Communications
Privacy Act, known as ECPA. She also noted that Google’s policies
do not extract explicit consent from users, another exception to ECPA
on which the company relied.
In
a filing late Wednesday, Google said it wants questions about those
ECPA exceptions sent to the 9th Circuit for review before litigation
goes forward.
“The
court’s ruling on its construction of the ‘ordinary course of
business’ exception involves a controlling question of law on which
there is substantial ground for difference of opinion, and as to
which an immediate appeal may materially advance the ultimate
termination of the litigation,” Google said in its filing.
(Related) But it's
okay to collect information manually?
Julian Perlman writes:
In
a victory for Wal-Mart Stores, Inc., a federal district court judge
has refused to certify a Rule 23(b)(3) class in a lawsuit for
violation of California’s Song-Beverly Credit Card Act (Cal. Civ.
Code § 1747 et seq., available
here.
Plaintiff
Joel Leebove brought suit on behalf of himself and others similarly
situated against Wal-Mart over the big box retailer’s practice of
requesting telephone numbers and addresses [and there's the
difference: “requesting” Bob] in connection with certain
credit card purchases. Wal-Mart successfully argued that this
information was necessary and its collection legal, as the putative
class consisted of Wal-Mart customers whose purchases were to be
subsequently picked-up or delivered.
Privacy issues my
students might find interesting.
From the good folks at
EPIC:
In
a
letter
to the Senate and House Committees on Education, EPIC has asked
Congress to restore privacy protections for student data. EPIC’s
letter follows a
court
opinion concerning recent
changes
to the Family Educational Rights and Privacy Act. EPIC has warned
that the changes in the student privacy law
allow the
release of student records for non-academic purposes and
undercut parental and student consent provisions. EPIC has urged
Congress to investigate the impact of the revised regulations.
“Students and families are losing control over sensitive
information,” EPIC wrote, “and private companies are becoming the
repositories of student data and even the data maintained by the
schools is far more extensive than ever before.” For more
information, see
EPIC:
Student Privacy.
For my Ethical Hackers:
Anything we haven't thought of?
FBI
Files Reveal New Info on Clandestine Phone Surveillance Unit
Ryan
Gallagher, via
Slate’s
Future Tense blog: “As part of an ongoing Freedom of
Information Act suit launched by civil liberties group the
Electronic
Privacy Information Center, the FBI is turning over information
on its use of cellphone surveillance technology variously known as
“Stingrays,” “Cell Site Simulators,” “IMSI Catchers,” or
“Digital Analyzers.” These devices function as
portable
surveillance transceivers that are designed to trick phones over
a targeted area into hopping onto a fake network. The FBI says it
uses the tools to track the locations of individual suspects. But
the technology is controversial because, by design, it collects data
on innocent bystanders’ phones, and it also interferes with
cellphone signals in a way that may be prohibited under a section of
the federal
Communications
Act. Over the past year, the FBI has been
drip-releasing
redacted portions of a trove of documents that it holds related to
the use of the Stingray technology. And late last week, the bureau
turned over a batch of 500 pages featuring newly declassified
portions that offer fresh insight into its spy tools, as well as
shining a light on a little-known internal surveillance unit that has
built up within the bureau over the past decade.”
Perspective
What
the Government Does with Americans’ Data
“After the attacks of
September 11, 2001, the government’s authority to collect, keep,
and share information about Americans with little or no basis to
suspect wrongdoing dramatically expanded. While the risks and
benefits of this approach are the subject of intense debate, one
thing is certain: it results in the accumulation of large amounts of
innocuous information about law-abiding citizens. But what happens
to this data? In the search to find the needle, what happens to the
rest of the haystack? For the first time in one report, the Brennan
Center takes a comprehensive look at the multiple ways U.S.
intelligence agencies collect, share, and store data on average
Americans. The report, which surveys across five intelligence
agencies, finds that non-terrorism related data can
be kept for up to 75 years or more, clogging national
security databases and creating opportunities for abuse, and
recommends multiple reforms that seek to tighten control over the
government’s handling of Americans’ information.”
The B School is
interested in Big Data
Can Your C-Suite Handle Big
Data?
… Today, as the
power of data and analytics profoundly alters the business landscape,
companies once again may need more top-management muscle. Capturing
data-related opportunities to improve revenues, boost productivity,
and create entirely new businesses
puts
new demands on companies — requiring not only new talent and
investments in information infrastructure, but also significant
changes in mind-sets and frontline training. It’s becoming
apparent that it will take extra executive horsepower to navigate new
organizational hazards, make tough trade-offs, and muster authority
when decision rights conflict in the new environment.
Because the new data
analytics horizons typically span a range of functions, including
marketing, risk, and operations, the C-suite evolution may take a
variety of paths. In some cases, the way forward will be to enhance
the mandate of (and provide new forms of support for) the chief
information, marketing, strategy, or risk officer. Other companies
may need to add new roles, such as a chief data officer, chief
technical officer, or chief analytics officer, to head up centers of
analytics excellence.
Six top-team
tasks
The transformative
nature of these changes involves much more than just serving up data
to an external provider to mine for hidden trends. Rather, it
requires concerted action that falls into six categories.
Isn't this what allows
US companies to move European data to the US? If it is revoked, it
could be expensive...
Sarah Taieb and Bret
Cohen write:
On
Monday, a European Parliament Inquiry established to investigate the
recent U.S. National Security Agency (NSA) surveillance revelations
indicated that its final report would recommend suspension of the
popular EU-U.S. Safe Harbor Framework.
Ezra Steinhardt of
Covington & Burling offers some comments on this latest
development on
Inside
Privacy.
Will the eraser law
actually work? Stay tuned!
Gov.
Brown Signs New California Privacy Laws
Perspective
Pew
– Online Video 2013
“Over the past four
years, the percent of American adult internet users who upload or
post videos online has doubled from 14% in 2009 to 31% today. That
includes 18% of adult internet users who post videos they have
created or recorded themselves—many of whom hope their creations go
viral. The share of online adults who watch or download videos has
also grown from 69% of internet users in 2009 to 78% today, and
mobile phones have become a key part of the video viewing and
creating experience.”
Perspective Can Amazon
ever fall into the Anti-Trust legal pit?
BusinessWeek
– How Amazon Became the Everything Store
“Amazon.com
rivals Wal-Mart as a store, Apple as a device maker, and IBM as a
data services provider. It will rake in about $75 billion this year.
For his book, Bloomberg Businessweek’s Brad Stone spoke
to hundreds of current and former friends of founder Jeff Bezos. In
the process, he discovered the poignant story of how Amazon became
the Everything Store.
Within Amazon.com
there’s a certain type of e-mail that elicits waves of panic. It
usually originates with an annoyed customer who complains to the
company’s founder and chief executive officer. Jeff Bezos has a
public e-mail address,
jeff@amazon.com.
Not only does he read many customer complaints, he forwards them to
the relevant Amazon employees, with a one-character addition: a
question mark… It’s easy to forget that until recently, people
thought of Amazon primarily as an online bookseller. Today, as it
nears its 20th anniversary, it’s the Everything Store, a company
with around $75 billion in annual revenue, a $140 billion market
value, and few if any discernible limits to its growth. In the past
few months alone, it launched a marketplace in India, opened a
website to sell high-end art, introduced another Kindle reading
device and three tablet computers, made plans to announce a set-top
box for televisions, and funded the pilot episodes of more than a
dozen TV shows. Amazon’s marketplace hosts the storefronts of
countless smaller retailers; Amazon Web Services handles the computer
infrastructure of thousands of technology companies, universities,
and government agencies.”
Perspective.
Infographics
What
the World Would Look Like If Countries Were As Big As Their Online
Populations
Perspective. I don't
suppose any of them would like to buy a non-functioning government?
(Might be enlightening to see what parts they'd spin off.)
All
of these companies have more cash right now than the US government
The US government is
running out of money to pay its bills. It is so close to reaching
the statutory limit on debt at this point that US Treasury secretary
Jack Lew has taken “extraordinary measures” to delay becoming
delinquent on payments owed.
Republicans
offered
a deal today to temporarily raise the debt limit, but the saga
has left the Treasury with just $32 billion in its operating
accounts, less than is held by nine Standard & Poor’s 500
companies in cash and short-term investments. General Electric has
nearly three times as much readily accessible cash as the US
government right now.
For my starving
students? (But you might want to use the ID of a certain law school
professor I know. See me for all the details.)
How
to Get Free Money – These 17 Companies Will Give You $1,815.25
For my students. Is
this the first full Terabyte storage offer?
Yahoo
Redesigns Mail For Web, Mobile And Windows, Offers 1TB Storage &
Conversations View
For all my students.
You first programming tool?
FREE
MANUAL: The Ultimate IFTTT Guide, Use The Web’s Most Powerful Tool
Like A Pro
If you want to automate
your online life somewhat, look no further than IFTTT. IFTTT is an
automation tool that will enable you to connect two services so that,
when something happens with one service, a trigger goes off and an
action takes place automatically on the other.
Albert Martinez has
written this guide to cover everything you need to know about IFTTT,
including what it is, how it works, and some of the most useful
things you can do with it. It’s everything you could possibly need
to know in order to get started with IFTTT.
No passwords
required. Read online, download free PDF or EPUB files or buy for
Amazon Kindle.
For my website
students. See what a little HTML5 can do?
Super
Mario fully playable online using HTML5
You could plug in your
old Nintendo Entertainment System, load up a vintage Super Mario
Brothers cartridge, and play one of the greatest games of all time.
Or you could just pop over to
Full
Screen Mario and get your fix online.
Josh
Goldberg is behind this perfectly reproduced Super Mario remake
done entirely with HTML5. If you're looking to switch things up and
you like surprises, then you can play through randomly generated
levels. Purists can stick with recreations of the levels from the
original game.
There must be money in
Math education. Are iPads and Kindles the razor and the Apps razor
blades? If so, the price must be zero.
Amazon
buys math education company TenMarks
Amazon has purchased
TenMarks, an online math tutoring service, the companies
announced
Thursday.
Dave Limp, Amazon's
vice president of
Kindle,
said in a press release that
TenMarks
is a good match for Amazon. With this acquisition, Amazon will focus
on developing education content and applications.
"Amazon and
TenMarks share the same passion for student learning. TenMarks's
award-winning math programs have been used by tens of thousands of
schools and Amazon engages with millions of students around the world
through our Kindle ecosystem," he said in the release.
TenMarks offers
personalized online math instruction and practice, including video
lessons, for K-12 students.
Education is an area
other tech giants, like Apple, are trying to break into.
Amazon's
efforts include Whispercast, a free online tool that lets schools
and businesses manage a fleet of Kindle
tablets
and wirelessly distribute Kindle books, documents, and apps.