In May and June 2013, when New Orleans’ murder rate was the sixth-highest in the United States, the Orleans Parish district attorney handed down two landmark racketeering indictments against dozens of men accused of membership in two violent Central City drug trafficking gangs, 3NG and the 110ers. Members of both gangs stood accused of committing 25 murders as well as several attempted killings and armed robberies. Subsequent investigations by the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, and local agencies produced further RICO indictments, including that of a 22-year-old man named Evans “Easy” Lewis, a member of a gang called the 39ers who was accused of participating in a drug distribution ring and several murders. According to Ronal Serpas, the department’s chief at the time, one of the tools used by the New Orleans Police Department to identify members of gangs like 3NG and the 39ers came from the Silicon … [Read more...] about Palantir has secretly been using New Orleans to test its predictive policing technology
Michigan state university college of law
Advertising Feature By Charlotte SchubertJan. 25, 2018 , 2:00 PM This Advertising Feature has been commissioned, edited, and produced by the Science/AAAS Custom Publishing Office Media savviness previously consisted of on-the-job training. Now, more universities and organizations are offering programs to help scientists get their message across to the public. Ryan Kelly’s office reflects his eclectic interests. A poster of chitons, the marine invertebrates he once studied, leans against the wall. On his shelves, books on marine ecology are intermingled with law, policy, and science communications texts. Kelly, an assistant professor at the University of Washington’s (UW) School of Marine and Environmental Affairs, pulls down one book, Escape from the Ivory Tower: A Guide to Making Your Science Matter, by Nancy Baron, the director of science outreach at COMPASS, a public engagement organization for scientists. Kelly thumbs through the book, … [Read more...] about Do I make myself clear? Media training for scientists
17 March 2004--In all the excitement about moving telephony to the Internet, it turns out there's a downside: a loss of one's privacy rights. According to a paper to be published in the Michigan Law Review this summer, the traditional U.S. legal standard for conducting wiretaps does not apply to what is called stored communications. Normally consisting of such things as e-mail, credit card receipts, and telephone records of who was called and when, the category of stored communications might well include voice over Internet protocol (VoIP) calls, if they are archived in the same way e-mails are. If VoIP calls are considered stored communications, law enforcement officials would not be held to the stringent burden of evidence required to conduct wiretaps, which is stricter even than the requirements to search a home. In stark contrast, the standard for examining stored communications is much lower. In the Michigan Law Review paper, Peter P. Swire, a professor at Ohio State University's … [Read more...] about Voice over IP’s Threat to Privacy
Killian Court is abuzz in mid-May. Workers and groundskeepers mill about, perfecting the lawn, trimming limbs from trees, and assembling a long, white stage that soon will catapult thousands of MIT graduates into a life beyond college. Its a scene Charles M. Vest HM has savored many times. Commencement is among his favorite events of the academic year: the smiling pride of parents and the ready-for-the-world eagerness of students are contagions that have bound him to a career in higher education for nearly four decades. But this year is different. His anticipation of the days activities is bittersweet, tempered by the knowledge that this will be the last time he will greet graduates and guests as president of MIT.In early December, Vest made public a decision hed made privately some time before: after 14 years at the helmthe third-longest presidential run in MIT historyhe would step down in the fall. The news made national headlines; indeed, many on campus first learned of Vests … [Read more...] about The Long Farewell
After blanketing 25 American universities with pre-litigation letters in February, the Recording Industry Association of America announced late last week that it was launching a second round of letters. A total of 408 notices will be sent to a new batch of 23 separate schools, including: State University of New York at Morrisville (34) Georgia Institute of Technology (31) Pennsylvania State University (31) University of Central Arkansas (27) University of Delaware (23) Northern Michigan University (20) Rensselaer Polytechnic Institute (20) George Washington University (19) Ohio State University (19) New Mexico State University (17) Eckerd College (16) University of Minnesota (16) California State University – Monterey Bay (14) University of Kansas (14) University of Missouri – Rolla (14) University of San Francisco (13) Case Western Reserve University (12) Northern Arizona University (12) San Francisco State … [Read more...] about RIAA College Student Settlements: Round 2
In today’s world partly governed by fantastic technological advances designed to make life easier and more manageable, it’s very easy to claim that anything is possible – even conducting the sacrament of matrimony over the World Wide Web.Long distance relationships are no longer a pain to deal with because of services like Skype, FaceTime, and Google+ Hangout, which allow couples to pretend they are within arm’s reach, and abandonment at the altar is an even lesser problem because overseas couples can now opt for a proxy marriage, a legal procedure that lets couples get married even when the other party is not present at the moment.Apparently, this has been a longstanding practice, dating back to the early 1700s when Marie Antoinette was wed to Louis XVI despite his absence. According to the New York Times, the option of a proxy wedding is rarely used in the country and is usually afforded by members of the military that are assigned to hostile … [Read more...] about Sick of having an ocean between you and your beloved? Get married on the internet!
Once again, AT&T's actions have sparked a national debate over customer privacy. The company deliberately kicked off a new round of debate with its announcement last week that it was changing -- or as it said, "modifying" -- its privacy polices for Internet and video customers.This comes on the heels of the recent revelation by news media that AT&T and other telcos had participated in the National Security Agency's warrentless wiretapping program -- a disclosure they, not to mention the government, could have done without. Now, AT&T is faced with a lawsuit filed by the Electronic Frontier Foundation claiming that it violated customers' rights by participating in that program.To be sure, companies issue and reissue densely worded privacy policies all the time. That AT&T chose to do so while a privacy-related lawsuit was pending is only slightly unusual.What is quite unusual, though, is the wording of the policy: In essence, it requires several million users of its … [Read more...] about Who Owns Customer Data?
As consumers turn to ad blockers to avoid advertising on their mobile and computer screens, marketers and content providers who depend on pitches to pay the bills are searching frantically for ways to counter the pesky programs.BlockIQ offers them one.BlockIQ, owned by AdSupply, which recently merged withAdaptive Medias, has launched BlockBypass. The software can detect users of the popular ad blocker AdBlock and perform a number of countermeasures, including circumventing the ad blocker.Websites can configure BlockBypass as aggressively as they wish. They can just educate a visitor about the harm of ad blockers to websites that depend on advertising to stay alive. They can refuse to serve content to a visitor until an ad blocker is disabled for the website. They also can choose a nuclear option and bypass the ad blocker altogether."The incredible growth of ad blocking has reached the tipping point where sites will no longer be able to operate," BlockIQ CEO Justin Bunnell said.In the … [Read more...] about SPOTLIGHT ON SECURITY BlockIQ Escalates War on Ad Blockers
As online shopping rapidly gains acceptance in U.S. society, the auction houses of cyberspace have begun to sell some of the most cherished items of American culture to the highest bidder.Talk about the ultimate in Americana. The most valuable baseball card in the world is for sale at Web auction house eBay. The T206 Honus Wagner card, dating from the early 1900s, went on the block with a minimum bid price of $500,000. The bid soon reached the $600,000 mark and is expected to sell for more than double that price, at least.Another piece of America on paper was also for sale at an online auction. Television producer Norman Lear and Critical Path chairman David Hayden bid $8.1 million (US$) for a rare original copy of the Declaration of Independence.Lear and Hayden's winning bid included a $740,000 buyer's fee to Sotheby's, the venerable auction house that jumped on the Net after over more than two hundred and fifty years in business.Estimated at $4-6 million, the historical document sold … [Read more...] about Red, White and Blue… Sold!
Ransomware has become a gold mine for digital criminals. In the first three months of this year, electronic extortionists squeezed US$209 million from victims desperate to recover their data after it was scrambled by the malicious software, based on FBI estimates. At that rate, ransomware could funnel as much as $1 billion into criminal coffers this year.Ransomware typically will encrypt most of the files on a computer, but some pernicious programs are selective about what they encrypt on a machine. One such form of ransomware attacks the boot sequence of a computer.Petya ransomware overwrites the contents of a system's Master Boot Record, forces a system reboot, and encrypts the operating system's Master File Table.With ransomware that's limited to encrypting data, it's still possible to use an infected machine. That only makes sense, since an extortionist expects the victim to use the computer to pay the ransom and receive the key unscrambling the data on the afflicted machine.With … [Read more...] about SPOTLIGHT ON SECURITY Ransomware Fighters Get New Free Tool