Recommended:

Law, Tech and Policy

U.S. Supreme Court Upholds Fair Use in Google-Oracle Software Battle (April 8, 2021) – Santa Clara law professor Tyler Ochoa with a lengthy blog post (8,000 words) explaining the decision.

Why It’s Easier to Move Country than Switch Social Media (April 12, 2021) – Activist and author, Cory Doctorow, on the importance of dealing with switching costs, in addition to a renewed emphasis on antitrust and interoperability.

Token Safe Harbor Proposal 2.0 (April 13, 2021) – SEC Commissioner Hester Pierce, with an update to her earlier proposal for a token safe harbor that would provide network developers with a three-year grace period within which, under certain conditions, they could facilitate participation in and development of a functional or decentralized network, exempted from federal securities registration requirements.

Final Report on Facial Recognition Technology (FRT) – (96-page pdf at the link: “New Surveillance Technologies in Public Spaces – Challenges and Perspectives for European Law at the Example of Facial Recognition” (April 2021)).

President Biden’s Executive Order on Improving the Nation’s Cybersecurity – (May 12, 2021), along with accompanying White House Fact Sheet and Politico’s press coverage

Recommended:

> #### Law, Tech and Policy

> [How to Protect the Future Web From Its Founders’ Own Frailty](http://boingboing.net/2016/06/24/how-to-protect-the-future-web.html) (June 24, 2016) – Cory Doctorow. See also: [The Web’s Creator Looks to Reinvent It](http://www.nytimes.com/2016/06/08/technology/the-webs-creator-looks-to-reinvent-it.html?_r=1) (June 7, 2016) – New York Times, and [The Fathers of the Internet Revolution Urge Today’s Software Engineers to Reinvent the Web](http://spectrum.ieee.org/view-from-the-valley/telecom/internet/the-fathers-of-the-internet-revolution-urge-todays-pioneers-to-reinvent-the-web) (June 13, 2016) – IEEE Spectrum

> [Open Access: All Human Knowledge is There—So Why Can’t Everybody Access It?](http://arstechnica.co.uk/science/2016/06/what-is-open-access-free-sharing-of-all-human-knowledge/) (July 6, 2016) – Glyn Moody at ArsTechnica

> [Researchers Sue the Government Over Computer Hacking Law (CFAA)](https://www.wired.com/2016/06/researchers-sue-government-computer-hacking-law/) (June 29, 2016) – Kim Zetter in Wired; See the ACLU’s [complaint](https://www.aclu.org/legal-document/sandvig-v-lynch-complaint) (pdf available at the link; 47 pages) and the ACLU [release](https://www.aclu.org/blog/free-future/aclu-challenges-computer-crimes-law-thwarting-research-discrimination-online)

> [Section 1201 of the DMCA Cannot Pass Constitutional Scrutiny](https://www.eff.org/deeplinks/2016/07/section-1201-dmca-cannot-pass-constitutional-scrutiny) and [Research and Remixes the Law Won’t Allow](https://www.eff.org/deeplinks/2016/07/research-and-remixes-law-wont-allow) (July 21, 2016) – EFF; See also [Statement on DMCA lawsuit](http://blog.cryptographyengineering.com/2016/07/statement-on-dmca-lawsuit.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+AFewThoughtsOnCryptographicEngineering+%28A+Few+Thoughts+on+Cryptographic+Engineering%29) by cryptographer and Johns Hopkins professor Matthew Green, who is one of the plaintiffs in the lawsuit, and the [complaint](https://www.eff.org/document/1201-complaint) (pdf; 32 pages) in the lawsuit. Related: [A Dozen Bad Ideas That Were Raised At The Copyright Office’s DMCA Roundtables](https://www.techdirt.com/articles/20160517/17541834469/dozen-bad-ideas-that-were-raised-copyright-offices-dmca-roundtables.shtml) (May 18, 2016) – TechDirt

> [Tech Companies Fight Back After Years of Being Deluged With Secret FBI Requests](https://theintercept.com/2016/06/21/tech-companies-fight-back-after-years-of-being-deluged-with-secret-fbi-requests/) (June 21, 2016) – Jenna McLaughlin at The Intercept

> [Why Notice-and-Takedown is a Bit of Copyright Law Worth Saving](http://www.latimes.com/opinion/op-ed/la-oe-sprigman-lemley-notice-and-takedown-dmca-20160621-snap-story.html) (June 21, 2016) – Los Angeles Times Op-Ed by law professors Chris Sprigman and Mark Lemley

> At JustSecurity, a series of July posts on “secret law”: [It’s Time to Come to Terms With Secret Law: Part I](https://www.justsecurity.org/32120/time-terms-secret-law-part/) and [Part II](https://www.justsecurity.org/32142/time-terms-secret-law-part-ii/) by Dakota S. Rudesill, and [Secret Law, Targeting, and the Problem of Standards: A Response to Dakota Rudesill](https://www.justsecurity.org/32179/secret-law-targeting-problem-standards-response-dakota-rudesill/) – Jonathan Hafetz

> [The Intriguing Legal Ramifications of Pokémon GO](http://brettterpstra.com/2016/07/25/the-intriguing-legal-ramifications-of-pokemon-go/?utm_source=loopinsight.com&utm_medium=referral&utm_campaign=Feed%3A+loopinsight%2FKqJb+(The+Loop)&utm_content=FeedBurner) (July 25, 2016) – Bretterpstra.com; Also see The University of Washington Tech Policy Lab’s white paper – [Augmented Reality, a Technology and Policy Primer](http://techpolicylab.org/augmented-reality-technology-policy-primer/) (pdf at the link; 12 pages)

> Mary Meeker’s [2016 Internet Trends Report](http://www.kpcb.com/internet-trends)

> [Reweaving the Web; A Slew of Startups is Trying to Decentralize the Online World](http://www.economist.com/news/business/21700642-slew-startups-trying-decentralise-online-world-reweaving-web?fsrc=scn/tw/te/pe/ed/reweavingtheweb) (June 18, 2016) – The Economist

> EU-related developments (other than Privacy Shield): [Apple Joins Wide Array of Tech Companies in Fight to Kill EU’s ‘Cookie Law’](http://appleinsider.com/articles/16/07/06/apple-joins-wide-array-of-tech-companies-in-fight-to-kill-eus-cookie-law) (July 6, 2016) – AppleInsider; [European Union’s First Cybersecurity Law Gets Green Light](http://www.bloomberg.com/news/articles/2016-07-06/european-union-s-first-cybersecurity-law-gets-green-light) (July 6, 2016) – Bloomberg; and [The European Union is Updating its Electronic Signature Laws](http://www.theverge.com/2016/6/30/12066886/eu-european-union-electronic-signature-laws-eidas) (June 30, 2016) – The Verge. See also the [EU release](https://ec.europa.eu/digital-single-market/en/news/building-online-trust-and-confidence-electronic-signatures-seals-and-trust-services-now-valid) on the new electronic signature laws.

> [MIT Researchers Unveil New Anonymity Scheme That Could Rival Tor](https://www.grahamcluley.com/2016/07/mit-researchers-unveil-new-anonymity-scheme-rival-tor/) – David Bisson at GrahamCluley.com

> #### General Interest

> [Groundbreaking ‘Atomic Memory’ Could Cram Unimaginable Amounts of Data Into Your iPhone](http://appleinsider.com/articles/16/07/19/groundbreaking-atomic-memory-could-cram-unimaginable-amounts-of-data-into-your-iphone) (July 19, 2016) – AppleInsider, and [Atom Wranglers Create Rewritable Memory](http://www.nature.com/news/atom-wranglers-create-rewritable-memory-1.20269) (July 18, 2016) – Nature; See the related academic paper: [A Kilobyte Rewritable Atomic Memory](http://www.nature.com/nnano/journal/vaop/ncurrent/full/nnano.2016.131.html) (pay $ download at the link)

> [Quantum Computing: A Primer](http://a16z.com/2016/06/26/quantum-computing-explained/) – Andreessen Horowitz video (28 minutes) at the link, plus a good list of further reading on quantum computing

> [Why Computer Vision Has Become a Major Investment Theme for Me](https://bothsidesofthetable.com/why-computer-vision-has-become-a-major-investment-theme-for-me-3cbeebf206ba#.ktcb10gaq) (June 16, 2016) – VC Mark Suster, and [The Voice UI has Gone Mainstream](https://techpinions.com/the-voice-ui-has-gone-mainstream/46148) (June 6, 2016) – Ben Bajarin

> [My Time with Richard Feynman](https://backchannel.com/my-time-with-richard-feynman-8e15ef968e75#.thzp7fo9h) (July 11, 2016) – Stephen Wolfram

> The Millions’ [2nd Half of 2016 Book Preview (fiction)](http://www.themillions.com/2016/07/most-anticipated-the-great-second-half-2016-book-preview.html)

07/26/2016: 

Recommended:

> #### Law, Tech and Policy

> [Are US Courts Going Dark?](https://www.justsecurity.org/30920/courts-going-dark/) (May 6, 2016) – US Magistrate Judge, Stephen Wm. Smith at JustSecurity

> [The Second Amendment Case for the Right to Bear Crypto](http://motherboard.vice.com/read/the-second-amendment-case-for-the-right-to-bear-encryption) (May 11, 2016) – Susan McGregor at MotherBoard

> [Facebook Gets Bad Ruling In Face-Scanning Privacy Case](http://blog.ericgoldman.org/archives/2016/05/facebook-gets-bad-ruling-in-face-scanning-privacy-case-in-re-facebook-biometric-information-privacy-litigation.htm) (May 6, 2016) – Venkat Balasubramani at Technology and Marketing Law Blog

> [Introducing the ‘Right to Eavesdrop on Your Things’](http://www.politico.com/agenda/story/2015/06/internet-of-things-privacy-concerns-000107#ixzz47TZdR3zn) – computer science professor Keith Winstein at Politico

> [Preparing for the Future of Artificial Intelligence](https://www.whitehouse.gov/blog/2016/05/03/preparing-future-artificial-intelligence) (May 3, 2016) – Ed Felten, Deputy U.S. Chief Technology Officer, announces an AI workshop series and interagency working group

> [Artificially Intelligent Lawyer, IBM’s AI ‘Ross,’ Has Been Hired By Its First Official Law Firm](http://futurism.com/artificially-intelligent-lawyer-ross-hired-first-official-law-firm/) (May 11, 2016) – Futurism

> [Hail and Farewell to The Google Books Case](http://www.publishersweekly.com/pw/by-topic/digital/copyright/article/70326-hail-and-farewell-to-the-google-books-case.html) (May 11, 2016) – law professor James Grimmelmann at PublishersWeekly

> [The Shape of Things](https://blog.thington.com/the-shape-of-things-66c1a8e9d606#.67jn7qt8x) (April 26, 2016) – Tom Coates at Medium

> [The Proper Channels For Whistleblowers Are Still A Joke](https://www.techdirt.com/articles/20160312/14052833886/proper-channels-whistleblowers-are-still-joke.shtml) (May 3, 2016) – TechDirt

> [Tech Titans are Busy Privatizing Our Data](http://www.theguardian.com/commentisfree/2016/apr/24/the-new-feudalism-silicon-valley-overlords-advertising-necessary-evil?CMP=share_btn_tw) (April 24, 2016) and [The State has Lost Control: Tech Firms Now Run Western Politics](http://www.theguardian.com/commentisfree/2016/mar/27/tech-firms-run-western-politics-evgeny-morozov) (March 27, 2016) – Evgeny Morozov; Also [Digital Pioneer, Jaron Lanier, on the Dangers of ‘Free’ Online Culture](http://www.wipo.int/wipo_magazine/en/2016/02/article_0001.html) (April 2016) – WIPO Magazine

> #### General Interest

> [Historic Computers Look Super Sexy in this New Photo Series by Docubyte and Ink](https://www.creativereview.co.uk/cr-blog/2016/may/historic-computers-look-super-sexy-in-this-new-photo-series-by-docubyte-and-ink/) (May 11, 2016) – Creative Review

> [Inside Palantir, Silicon Valley’s Most Secretive Company](https://www.buzzfeed.com/williamalden/inside-palantir-silicon-valleys-most-secretive-company?utm_term=.ldQ5LwMaw7#.jwAKyOdlO8) (May 6, 2016) – BuzzFeed

> [Life is Short](http://paulgraham.com/vb.html) (January 2016) – Paul Graham

05/12/2016: 

Recommended:

> #### Law, Tech and Policy

> [Broadband Consumer Privacy Proposal Fact Sheet](https://www.fcc.gov/document/broadband-consumer-privacy-proposal-fact-sheet) (March 10, 2016) – FCC release (3 page pdf at the link)

>> [It’s Your Data: Empowering Consumers to Protect Online Privacy](http://www.huffingtonpost.com/tom-wheeler/its-your-data-protect-online-privacy_b_9428484.html) (March 10, 2016) – FCC Chairman Tom Wheeler at the Huffington Post;

>> [5 Things You Should Know About the FCC’s Proposed Privacy Rules](https://www.propublica.org/article/5-things-you-should-know-about-the-fccs-proposed-privacy-rules) (March 14, 2016) – ProPublica;

>> [The Feds Are Prepping Strict Rules to Protect Your Online Privacy](http://www.wired.com/2016/03/fcc-preparing-strongest-privacy-rules-ever/) (March 14, 2016) – Wired

>> [What ISPs Can See; Clarifying the Technical Landscape of the Broadband Privacy Debate](https://www.teamupturn.com/reports/2016/what-isps-can-see) (March 2016) – Upturn report

>> [The Dragonslayer – a Year Ago, FCC Chairman Tom Wheeler Saved the Internet; in this Exclusive Interview, He Tells Us What’s Next](http://www.theverge.com/2016/3/9/11181450/fcc-chairman-tom-wheeler-interview-5g-internet-net-neutrality) – Nilay Patel at Verge

> [Obama Administration Set to Expand Sharing of Data That N.S.A. Intercepts](http://www.nytimes.com/2016/02/26/us/politics/obama-administration-set-to-expand-sharing-of-data-that-nsa-intercepts.html?_r=1) (February 25, 2016) – New York Times; and [Surprise! NSA Data Will Soon Routinely Be Used For Domestic Policing That Has Nothing To Do With Terrorism]() (March 10, 2016) – Radley Balko in the Washington Post; and [FBI Quietly Changes its Privacy Rules for Accessing NSA Data on Americans](http://www.theguardian.com/us-news/2016/mar/08/fbi-changes-privacy-rules-accessing-nsa-prism-data) (March 8, 2016) – Guardian

> [Why the OPM Hack Is Far Worse Than You Imagine](https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine) (March 11, 2016) – Michael Adams at LawFare

> [It Took a FOIA Lawsuit to Uncover How the Obama Administration Killed FOIA Reform](https://news.vice.com/article/it-took-a-foia-lawsuit-to-uncover-how-the-obama-administration-killed-foia-reform) (March 9, 2016) – Vice; and [More Transparent Than Thou](https://www.justsecurity.org/29972/transparent-thou/) (March 15, 2016) – Brett Max Kaufman of the ACLU at JustSecurity

> [Time to Rethink Mandatory Password Changes](https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes) (March 2, 2016) – Lorrie Cranor (FTC Chief Technologist) at FTC blog; also [Two-Factor Authentication (2FA) versus Two-Step Verification (2SV); What’s the Difference and Which is Better?](https://www.grahamcluley.com/2016/03/factor-authentication-2fa-versus-step-verification-2sv/) (March 14, 2016) – David Bisson at grahamcluley.com

> [The Beginning of the End for Encryption Schemes? New Quantum Computer, Based on Five Atoms, Factors Numbers in a Scalable Way](http://news.mit.edu/2016/quantum-computer-end-encryption-schemes-0303) (March 3, 2016) – MIT

> Academic Paper: [Policing Hoover’s Ghost: The Privilege for Law Enforcement Techniques](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2740075) (download pdf at the link; 34 pages) (March 1, 2016) – professor Stephen W. Smith

> [Intel Whistle-Blowers Fear Government Won’t Protect Them](http://www.bloombergview.com/articles/2016-03-08/intel-whistle-blowers-fear-government-won-t-protect-them?utm_campaign=trueAnthem:+Trending+Content&utm_content=56e0569204d301434ed20967&utm_medium=trueAnthem&utm_source=twitter) (March 8, 2016) – Eli Lake at BloombergView

> [Taking Baby Steps Toward Software That Reasons Like Humans](http://www.nytimes.com/2016/03/07/technology/taking-baby-steps-toward-software-that-reasons-like-humans.html) (March 6, 2016) – New York Times

> [Biometrics are Coming, Along with Serious Security Concerns](http://www.wired.com/2016/03/biometrics-coming-along-serious-security-concerns/) (March 9, 2016) – Wired

> [Hunting What’s Next in High Tech](http://a16z.com/2016/03/11/ideas-trends/) (March 11, 2016) – Saku Panditharatne at a16z

> #### General Interest

> [Mathematicians Discover Prime Conspiracy](https://www.quantamagazine.org/20160313-mathematicians-discover-prime-conspiracy/) (March 13, 2016) – Quanta; and [Mathematicians Are Geeking Out About a Bizarre Discovery in Prime Numbers](http://qz.com/639452/mathematicians-are-geeking-out-about-a-bizarre-discovery-in-prime-numbers/?utm_content=buffer428da&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer) (March 15, 2016) – Quartz

> [Can You Keep a Secret? Former C.I.A. Chief Michael Hayden on Torture and Transparency](http://www.newyorker.com/magazine/2016/03/07/michael-hayden-comes-out-of-the-shadows) (March 7, 2016) – New Yorker

03/16/2016: 

Recommended:

> #### Law, Tech and Policy

> **Snooper’s Charter:** Revised [‘Investigatory Powers Bill’](https://www.gov.uk/government/collections/investigatory-powers-bill) introduced by the British government: [text of bill](http://services.parliament.uk/bills/2015-16/investigatorypowers.html), [codes of practice](https://www.gov.uk/government/publications/investigatory-powers-bill-codes-of-practice), and [additional documents](https://www.gov.uk/government/publications/investigatory-powers-bill-overarching-documents)

> **Privacy Shield:** [Restoring Trust in Transatlantic Data Flows Through Strong Safeguards: European Commission Presents EU-U.S. Privacy Shield](http://europa.eu/rapid/press-release_IP-16-433_en.htm) – European Commission press release with links to the various related documents; see also [E.U. and U.S. Release Details on Trans-Atlantic Data Transfer Deal](http://www.nytimes.com/2016/03/01/technology/eu-us-trans-atlantic-data-transfer-deal.html?partner=rss&emc=rss&_r=1) – New York Times

> **Fight Against Terrorism:** [Inside The Obama Administration’s Attempt To Bring Tech Companies Into The Fight Against ISIS](http://www.buzzfeed.com/sheerafrenkel/inside-the-obama-administrations-attempt-to-bring-tech-compa#.vdXbBXYB4) – BuzzFeed

> **Encryption:** [A Worldwide Survey of Encryption Products](https://cyber.law.harvard.edu/publications/2016/encryption_survey) – Berkman Center Research Publication (Bruce Schneier, Kathleen Seidel, and Saranya Vijayakumar) (pdf at this [link](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2731160); 24 pages)

> **CyberWarfare and Hacking:**

>> [These Are the Cyberweapons Used to Hack Sony](http://motherboard.vice.com/blog/sony-hack-cyberweapons-report) – MotherBoard

>> [U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict](http://www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html) – New York Times

> **New Chinese Media Restrictions:** [Beijing is Banning all Foreign Media from Publishing Online in China](http://qz.com/620076/beijing-is-banning-all-foreign-media-from-publishing-online-in-china/) – Quartz

> **Facebook Free Basics:** [Nothing Is Free, Not Even Facebook Free Basics](http://om.co/2016/02/08/nothing-is-free-not-even-facebook-free-basics/) – Om Malik; see also [India Just Banned Facebook’s Controversial Free Internet Plan](http://www.buzzfeed.com/nitashatiku/india-ruling-trai-free-basics#.vmPLyRVyW) – BuzzFeed

> **FISA Amendments Act:** [Trends and Predictions in Foreign Intelligence Surveillance: The FISA Amendments Act and Beyond](https://www.lawfareblog.com/trends-and-predictions-foreign-intelligence-surveillance-faa-and-beyond) – David Kris at LawFare

> **NSA Reorganization:** [National Security Agency Plans Major Reorganization](https://www.washingtonpost.com/world/national-security/national-security-agency-plans-major-reorganization/2016/02/02/2a66555e-c960-11e5-a7b2-5a2f824b02c9_story.html) – Washington Post; related: [Opinion: How NSA Reorganization Could Squander Remaining Trust](http://m.csmonitor.com/World/Passcode/Passcode-Voices/2016/0204/Opinion-How-NSA-reorganization-could-squander-remaining-trust) – Jason Healey at CSM’s Passcode; and [NSA Reorganizing](https://www.schneier.com/blog/archives/2016/02/nsa_reorganizin.html) – Bruce Schneier; and [Good Defense is Good Offense: NSA Myths and the Merger](https://www.lawfareblog.com/good-defense-good-offense-nsa-myths-and-merger) – Susan Hennessey at LawFare

> **Internet Law:** [Surveying Ten Years Of Top Internet Law Developments ](http://blog.ericgoldman.org/archives/2016/02/surveying-ten-years-of-top-internet-law-developments-forbes-cross-post.htm) – law professor Eric Goldman at his Technology & Marketing Law Blog

> **Future Computing and Emerging Technologies:**

>> [What’s Next in Computing?](https://medium.com/@cdixon/what-s-next-in-computing-e54b870b80cc#.z6hscijjq) (February 21, 2016) – venture capitalist Chris Dixon

>> [Ten Breakthrough Technologies: 2016](https://www.technologyreview.com/lists/technologies/2016/) – MIT Technology Review

> **Copyright Reform:** [White Paper on Remixes, First Sale, and Statutory Damages](http://www.uspto.gov/sites/default/files/documents/copyrightwhitepaper.pdf) (pdf; 117 pages) – Commerce Department’s internet policy task force; see also: [Repairing Damages: The Commerce Department’s Copyright White Paper](https://cdt.org/blog/repairing-damages-the-commerce-departments-copyright-white-paper/) – CDT

> **Startups:**

>> [Tech Policy for Startups](https://cdt.org/campaign/tech-policy-for-startups/) – CDT’s suite of resources on tech policy for start-ups and entrepreneurs

>> [Fixing the Inequity of Startup Equity](https://data.triplebyte.com/fixing-the-inequity-of-startup-equity-469793baad1e#.xlbjz7kh0) – TripleByte

> #### General Interest

> [Stop Paying Executives for Performance](https://hbr.org/2016/02/stop-paying-executives-for-performance) – Dan Cable and Freek Vermeulen in the Harvard Business Review

> [This Former Ad Agency CEO Says the Ad Industry Has Three Major Delusions Holding It Back](http://www.businessinsider.com/bob-hoffmans-three-ad-delusions-2016-3?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+typepad%2Falleyinsider%2Fsilicon_alley_insider+%28Silicon+Alley+Insider%29) – Business Insider

> [The Law of Banksy: Who Owns Street Art?](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711789) (pdf; 36 pages) – Peter Salib in the University of Chicago Law Review (Vol. 83, No. 4, 2016)

03/1/2016: 

Recommended:

> #### Law, Tech and Policy

> **Cybersecurity**: [How Does the Cybersecurity Act of 2015 change the Internet Surveillance Laws?](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/12/24/how-does-the-cybersecurity-act-of-2015-change-the-internet-surveillance-laws/) – Orin Kerr in the Washington Post

> **TPP**:

>> [The Trouble with the TPP](http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-1-u-s-blocks-balancing-objectives/) – Canadian law professor, Michael Geist, is blogging every weekday until February 4th on what he believes are the significant problems with the Trans Pacific Partnership (TPP). The link is to his first daily post in the series

>> Human Rights Watch’s [TPP Q&A](https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership)

>> [Trans-Pacific Partnership is a Wonderful Idea . . . for China](http://www.theglobeandmail.com/report-on-business/rob-commentary/trans-pacific-partnership-is-a-wonderful-idea-for-china/article27939142/) – Dan Breznitz (University of Toronto) in the Globe and Mail

>> See also: my earlier posts on the TPP – [here](https://www.jrmchale.org/2015/10/quote-of-the-day-on-the-tpp/) and [here](https://www.jrmchale.org/2015/07/impact-of-trade-pacts-on-ip-and-the-internet-link-roundup/)

> **EU vs. US on Data + Privacy**:

>> [The Transatlantic Data War – Europe Fights Back Against the NSA](https://www.foreignaffairs.com/articles/united-states/2015-12-14/transatlantic-data-war) – Henry Farrell and Abraham Newman in Foreign Affairs

>> [Time to Get Serious About Europe’s Sabotage of US Terror Intelligence Programs](http://www.skatingonstilts.com/skating-on-stilts/2016/01/time-to-get-serious-about-europes-sabotage-of-us-terror-intelligence-programs-.html) – Stewart Baker at his “Skating on Stilts” book-related website; “Skating on Stilts” has been released as a free creative commons book available [here](http://www.skatingonstilts.com/skating-on-stilts/tired-of-reading-chapters-backwards.html)

> **More on Privacy**: [Lawrence Lessig: Technology Will Create New Models for Privacy Regulation](http://blogs.wsj.com/cio/2015/12/30/lawrence-lessig-how-technology-policy-will-evolve/) – Wall Street Journal, and [A Few Keystrokes Could Solve the Crime. Would You Press Enter?](https://www.justsecurity.org/28752/keystrokes-solve-crime-press-enter/) – Jonathan Zittrain at JustSecurity

> **Internet Access**: [How Facebook Stumbled On Its Quest to Give Internet Away For Free](http://www.buzzfeed.com/alexkantrowitz/how-facebooks-plan-to-give-the-world-free-mobile-internet-we#.ed86zwVoK) – BuzzFeed; See Also: [Tech’s ‘Frightful 5’ Will Dominate Digital Life for Foreseeable Future](http://www.nytimes.com/2016/01/21/technology/techs-frightful-5-will-dominate-digital-life-for-foreseeable-future.html?utm_source=loopinsight.com&utm_medium=referral&utm_campaign=Feed%3A+loopinsight%2FKqJb+(The+Loop)&utm_content=FeedBurner&_r=0) – New York Times

> **Whistleblower Protections**: [Protect Intelligence Whistleblowers](http://democracyjournal.org/magazine/39/protect-intelligence-whistleblowers/) – Mieke Eoyang in Democracy Journal, and PEN America’s report [Secret Sources: Whistleblowers, National Security and Free Expression](http://www.pen.org/sites/default/files/Secret%20Sources%20report.pdf) (pdf; 40 pages)

> **Freedom of Information Act Reform**: [Here’s How the Senate Should Fix the FOIA Reform Bill](https://www.eff.org/deeplinks/2016/01/heres-how-senate-should-fix-foia-reform-bill) – EFF

> **Cybercrime**: [Judges Struggle with Cyber Crime Punishment](http://thehill.com/policy/cybersecurity/265285-judges-struggle-with-cyber-crime-punishment) – The Hill

> **TOR**:

>> How Tor Works: [Part One](http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/); [Part Two](http://jordan-wright.com/blog/2015/05/09/how-tor-works-part-two-relays-vs-bridges/) – Jordan Wright

>> [How Tor’s Privacy was (Momentarily) Broken, and the Questions it Raises](http://theconversation.com/how-tors-privacy-was-momentarily-broken-and-the-questions-it-raises-52048) – The Conversation

>> [Shari Steele on Online Anonymity: Tor Staff are ‘Freedom Fighters’](http://www.theguardian.com/technology/2016/jan/11/shari-steele-tor-encryption-online-anonymity-censorship) – Guardian

> **IoT**: [DMCA and the Internet of Things](https://www.schneier.com/blog/archives/2015/12/dmca_and_the_in.html?utm_source=twitterfeed&utm_medium=twitter) and [The Internet of Things that Talk About You Behind Your Back](https://www.schneier.com/blog/archives/2016/01/the_internet_of.html) – Bruce Schneier at his Schneier on Security. See also: [The problem with self-driving cars: who controls the code?](http://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code) – Cory Doctorow in The Guardian

> **Robots**: [Robots in War: the Next Weapons of Mass Destruction?](http://www.weforum.org/agenda/2016/01/robots-in-war-the-next-weapons-of-mass-destruction) – UCBerkeley professor, Stuart Russell; Related: [What If: Robots Go to War?](http://www.weforum.org/events/world-economic-forum-annual-meeting-2016/sessions/what-if-robots-go-to-war) Davos World Economic Forum (video; substance begins at 3:40)

> **The Mobile Internet**: [16 Mobile Theses](http://ben-evans.com/benedictevans/2015/12/15/16-mobile-theses) – Benedict Evans

> **IP and Startups**: [Oculus Faces Messy Ownership Claims Over Its Head Mounted Display: Total Recall v. Luckey](http://blog.ericgoldman.org/archives/2016/01/oculus-faces-messy-ownership-claims-over-its-head-mounted-display-total-recall-v-luckey.htm) – Technology & Marketing Law Blog

> **Tech and Age Discrimination**: [Is Ageism in Tech an Under-the-Radar Diversity Issue?](http://www.fastcompany.com/3054204/the-future-of-work/is-ageism-in-tech-an-under-the-radar-diversity-issue) – FastCompany, and [Here’s How to Start Closing Silicon Valley’s Age Gap](https://medium.com/backchannel/here-s-how-to-start-closing-silicon-valley-s-age-gap-f127a6646de8#.srt6kej26) – Steven Levy

> #### General Interest

> The Millions’ [Great 2016 Book Preview](http://www.themillions.com/2016/01/most-anticipated-the-great-2016-book-preview.html) and The Morning News [2016 Tournament of Books](http://www.themorningnews.org/article/the-2016-tournament-of-books-shortlist-and-judges)

> [What Sean Penn Teaches Us About How Not to Chat with a Fugitive](https://theintercept.com/2016/01/12/sean-penn-el-chapo-opsec/) – The Intercept; See also: [How DEA Agents Took Down Mexico’s Most Vicious Drug Cartel](http://www.theatlantic.com/magazine/archive/2016/01/drug-enforcement-agency-mexico-drug-cartel/419100/) – The Atlantic, and [Censor or Die: The Death of Mexican News in the Age of Drug Cartels](https://www.washingtonpost.com/investigations/censor-or-die-the-death-of-mexican-news-in-the-age-of-drug-cartels/2015/12/09/23acf3ae-8a26-11e5-9a07-453018f9a0ec_story.html) – Washington Post

01/31/2016: 

Recommended:

> #### Law, Tech and Policy

> **CISA update**: [Lawmakers Have Snuck CISA Into a Bill That Is Guaranteed to Become a Law](http://motherboard.vice.com/read/lawmakers-have-snuck-cisa-into-a-bill-that-is-guaranteed-to-become-a-law) – MotherBoard. See also: [OmniCISA Pits DHS Against the FCC and FTC on User Privacy](https://www.justsecurity.org/28386/omnicisa-pits-government-against-self-privacy/) – Jennifer Granick at JustSecurity. And previously: [Cyberlaw Professors Oppose CISA](http://www.elon.edu/e-net/Article/122816)

> **Do Not Track**: [FCC Says It Will Not Require Websites to Honor ‘Do Not Track’](http://www.insideprivacy.com/united-states/federal-communications-commission/fcc-says-it-will-not-require-websites-to-honor-do-not-track/) – Covington’s InsidePrivacy. Reaction: [The FCC’s DNT Decision: The Right Call, For Now](https://www.eff.org/deeplinks/2015/11/fccs-dnt-decision-right-call-now) – EFF. See also: [How ‘Do Not Track’ Ended Up Going Nowhere](http://recode.net/2016/01/04/how-do-not-track-ended-up-going-nowhere/) – Re/Code; [Understanding ‘Do Not Track’: Truth and Consequences](http://recode.net/2016/01/12/understanding-do-not-track-truth-and-consequences/) – Jason Kint at Re/Code; and [Court Says Tracking Web Histories Can Violate Wiretap Act](http://www.wired.com/2015/11/court-says-tracking-web-histories-can-violate-wiretap-act/) – Wired

> **CFAA**: [Court (2nd Circuit): Breaking Your Employer’s Computer Policy Isn’t a Crime](https://www.eff.org/deeplinks/2015/12/federal-court-appeals-rejects-notion-violating-your-employers-computer-use) – EFF; See also [The CFAA Meets the ‘Cannibal Cop’ in the Second Circuit and Maybe Beyond](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/13/the-cfaa-meets-the-cannibal-cop-in-the-second-circuit-and-maybe-beyond/) – Orin Kerr at the Washington Post

> **European Developments**: [European Court of Human Rights says Blanket Surveillance is a Violation](http://arstechnica.co.uk/tech-policy/2015/12/european-court-of-human-rights-says-blanket-surveillance-is-a-violation/) – ArsTechnica, and [Did the European Court of Human Rights Just Outlaw ‘Massive Monitoring of Communications’ in Europe?](https://cdt.org/blog/did-the-european-court-of-human-rights-just-outlaw-massive-monitoring-of-communications-in-europe/) – CDT. Also: [European Parliament Rejects Amendments Protecting Net Neutrality](http://www.theverge.com/2015/10/27/9619962/eu-net-neturality-vote) – Verge, and [The European Parliament Just Dealt a Major Blow to Net Neutrality](http://www.businessinsider.com/european-parliament-net-neutrality-vote-2015-10) – Business Insider

> **National Security Letters**: [See for Yourself for the First Time What User Data the FBI Demanded in a National Security Letter](https://reason.com/blog/2015/11/30/see-for-yourself-what-user-data-the-fbi) – Reason; and [Scope of National Security Inquiry is Revealed](http://www.nytimes.com/2015/12/01/us/politics/scope-of-national-security-inquiry-is-revealed.html?_r=0) – New York Times

> **Privacy**:

>> [The Growing Problems with the Sectoral Approach to Privacy Law](https://www.teachprivacy.com/problems-sectoral-approach-privacy-law/) – Daniel Solve at the Privacy+Security Blog

>> [Key 2015 Privacy Papers Selected as ‘Must Reads’ for Policymakers](http://www.techpolicy.com/Blog/Featured-Blog-Post/Key-Privacy-Papers-Selected-as-Must-Reads”-for-Po.aspx) – TAP

> **Predictive Policing**: [Microsoft is Building an App that can Predict Criminal Behavior](http://www.businessinsider.com/microsofts-crime-fighting-app-2015-12) – Business Insider. See also: [The Constitution Can’t Defend You From Predictive Policing and Here’s Why](http://mic.com/articles/127823/how-pre-crime-law-works#.zptzmL72z) – .Mic

> **Consumer Reviews**: [Senate Commerce Committee Approves Consumer Review Freedom Act](http://blog.ericgoldman.org/archives/2015/11/senate-commerce-committee-approves-consumer-review-freedom-act-forbes-cross-post.htm) – Technology & Marketing Law Blog. The [Act](https://www.govtrack.us/congress/bills/114/s2044) was subsequently approved by the Senate.

> **Cybersecurity**:

>> [Your Unhashable Fingerprints Secure Nothing](http://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/) – Hackaday

>> [Let’s Encrypt](https://letsencrypt.org) has begun issuing free HTTPS certificates in [its public beta](https://letsencrypt.org/2015/12/03/entering-public-beta.html)

> #### General Interest

> [Her Code Got Humans on the Moon and Invented Software Itself](http://www.wired.com/2015/10/margaret-hamilton-nasa-apollo/) – Wired profile of Margaret Hamilton

> [26 Charts and Maps that Show the World is Getting Much, Much Better](http://www.vox.com/2014/11/24/7272929/charts-thankful) – Vox

> [Write Like You Talk](http://paulgraham.com/talk.html) – Paul Graham

> [The Interactive, Annotated Edition of ‘Bartleby, the Scrivener’ You Always Wanted](http://www.slate.com/articles/arts/culturebox/2015/10/herman_melville_s_bartleby_the_scrivener_an_interactive_annotated_text.html) – Slate

> [The Entire Season: An Elegy for Charlie Trotter](http://electricliterature.com/the-entire-season-an-elegy-for-charlie-trotter/) – Matthew Gavin Frank writing at Electric Literature

> [](https://twitter.com/sneakdotberlin/status/658730359232819200)   “At least twice in human history, individual people decided to avoid global nuclear war: [[one]](https://en.wikipedia.org/wiki/Stanislav_Petrov), [[two]](http://thebulletin.org/okinawa-missiles-october8826)” – Jeffrey Paul [(@sneakdotberlin)](https://twitter.com/sneakdotberlin): October 26, 2015. See also: [Newly Declassified Documents Reveal How America Missed a Major Nuclear War Scare](http://theweek.com/articles/584746/newly-declassified-documents-reveal-how-america-missed-major-nuclear-war-scare) – The Week

12/17/2015: 

Recommended:

> #### Law, Tech and Policy

> Summary of the “Happy Birthday” decision: [Chain of Title Proves Fatal to “Happy Birthday” Copyright Claim](http://blog.ericgoldman.org/archives/2015/10/chain-of-title-proves-fatal-to-happy-birthday-copyright-claim-guest-blog-post.htm) – Tyler Ochoa at The Technology & Marketing Law Blog; See also, the court’s decision ([pdf](http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=2056&context=historical))

> Another notable copyright decision: [Appeals Court Strikes a Blow for Fair Use in Long-awaited Copyright Ruling](http://arstechnica.com/tech-policy/2015/09/eff-scores-a-win-in-long-running-dancing-baby-copyright-case/) – ArsTechnica; See also: [9th Circuit Sides With Fair Use in Dancing Baby Takedown Case](http://blog.ericgoldman.org/archives/2015/09/9th-circuit-sides-with-fair-use-in-dancing-baby-takedown-case.htm) – The Technology & Marketing Law Blog; and the court’s opinion ([pdf](https://www.eff.org/document/9th-circuit-opinion-lenz))

> Microsoft Email Case ([wikipedia](https://en.wikipedia.org/wiki/Microsoft_Corporation_v._United_States_of_America)): [The $98.6 Billion E-Mail – Microsoft is Fighting a Case in Federal Appeals Court that may Decide the Future of U.S. Cloud Computing](http://www.bloomberg.com/news/articles/2015-10-08/the-98-6-billion-e-mail) – Bloomberg BusinessWeek

> Administrative Subpoenas: [Here’s a Way the Government Can Easily Get Your Phone Records Without Even Asking a Judge](https://www.washingtonpost.com/blogs/federal-eye/wp/2015/10/05/heres-a-way-the-government-can-easily-get-your-phone-records-without-even-asking-a-judge-and-few-people-know-about-it/) – Washington Post

> The Fifth Amendment and Passcodes: [Fifth Amendment Protects Passcode on Smartphones, Court Holds](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/09/24/fifth-amendment-protects-passcode-on-smartphones-court-holds/) and [A Revised Approach to the Fifth Amendment and Obtaining Passcodes](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/09/25/a-revised-approach-to-the-fifth-amendment-and-obtaining-passcodes/) – Orin Kerr at the Washington Post

> OPM Hack Update: [OPM Says 5.6 million Fingerprints Stolen in Cyberattack, Five Times as Many as Previously Thought](https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/) – Washington Post

> On the Internet of Things: [Why The Internet of Things Is Going Nowhere
The Next Phase of the IoT is Stuck Unless We Replace Crummy Outdated Technology](https://medium.com/@patburns/why-the-internet-of-things-is-going-nowhere-112540e79ae) – Pat Burns. See also, [The Price of the Internet of Things will be a Vague Dread of a Malicious World](http://ieet.org/index.php/IEET/more/rinesi20150925) – Marcelo Renesi, and [Internet of Things That Lie: the Future of Regulation is Demonology](http://boingboing.net/2015/10/02/internet-of-things-that-lie-t.html) – Cory Doctorow

> Moore’s Law: [Smaller, Faster, Cheaper, Over: The Future of Computer Chips](http://www.nytimes.com/2015/09/27/technology/smaller-faster-cheaper-over-the-future-of-computer-chips.html) – New York Times; Also at the New York Times: [IBM Scientists Find New Way to Shrink Transistors](http://www.nytimes.com/2015/10/02/science/ibm-scientists-find-new-way-to-shrink-transistors.html?ref=technology&_r=0)

> Apple: [On Apple’s Incredible Platform Advantage](http://stevecheney.com/on-apples-incredible-platform-advantage/) – Steve Cheney on Apple’s computer chip advantage

> #### General Interest

> [Scouring the Web to Make New Words ‘Lookupable’](http://www.nytimes.com/2015/10/04/technology/scouring-the-web-to-make-new-words-lookupable.html) – New York Times

> Angus Deaton Wins the Nobel Prize in Economics:

>> The Nobel Committee’s explainers (pdf): for [general readers](http://www.nobelprize.org/nobel_prizes/economic-sciences/laureates/2015/popular-economicsciences2015.pdf) and for [technical readers](http://www.nobelprize.org/nobel_prizes/economic-sciences/laureates/2015/advanced-economicsciences2015.pdf)

>> [Angus Deaton: A Skeptical Optimist Wins the Economics Nobel](http://www.newyorker.com/news/john-cassidy/angus-deaton-a-skeptical-optimist-wins-the-economics-nobel) – New Yorker

>> [Five Minutes with Angus Deaton: ‘If the rich can write the rules then we have a real problem’](http://blogs.lse.ac.uk/europpblog/2013/12/07/five-minutes-with-angus-deaton-if-the-rich-can-write-the-rules-then-we-have-a-real-problem/) – London School of Economics

>> [A Cockeyed Optimist – Angus Deaton’s ‘Great Escape’](http://www.nytimes.com/2013/12/22/books/review/angus-deatons-great-escape.html?nytmobile=0&_r=0) – New York Times

> Svetlana Alexievich Wins the Nobel Prize in Literature:

>> [Everything You Need to Know About Svetlana Alexievich](http://www.theguardian.com/books/booksblog/2015/oct/08/everything-you-need-to-know-about-svetlana-alexievich-winner-of-the-nobel-prize-in-literature) – The Guardian

>> [Svetlana Alexievich’s Chorus of Fire](http://www.nytimes.com/2015/10/09/magazine/svetlana-alexievichs-chorus-of-fire.html?_r=0) – New York Times

>> [Voices from Chernobyl](http://www.theparisreview.org/letters-essays/5447/voices-from-chernobyl-svetlana-alexievich)(book excerpt) – Paris Review

> Meanwhile: [2010 Peace Laureate Languishes in Chinese Jail in Face of International Indifference](http://en.rsf.org/china-2010-peace-laureate-languishes-in-12-10-2015,48430.html) – Reporters without Borders

> On David Carr: [Press Rewind – What One Journalist Learned by Vicariously Sitting in on David Carr’s Master Class](http://www.themorningnews.org/article/press-rewind) – Brendan Fitzgerald at The Morning News; See also, previously: [We Need a David Carr Portable Companion; Here’s the first Draft](https://medium.com/backchannel/we-need-a-david-carr-portable-companion-89f54fda0b33) – Karen Wickre at BackChannel/Medium

10/13/2015: 

Recommended:

> #### Law, Tech and Policy

> [Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You](http://www.wired.com/2015/08/hard-sue-nsa-prove-spied/) – Wired

> [Tech Companies May be our Best Hope for Resisting Government Surveillance](http://fusion.net/story/193583/tech-companies-may-be-our-best-hope-for-resisting-government-surveillance/) – Ryan Calo at Fusion; and his related academic paper: [Can Americans Resist Surveillance?](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2635181)

> [A New Design (Indistinguishability Obfuscation or IO) for Cryptography’s Black Box](https://www.quantamagazine.org/20150902-indistinguishability-obfuscation-cryptographys-black-box/) – Quanta

> [Don’t Worry, Smart Machines Will Take Us With Them; Why Human Intelligence and AI will Co-Evolve](http://nautil.us/issue/28/2050/dont-worry-smart-machines-will-take-us-with-them?utm_source=RSS_Feed&utm_medium=RSS&utm_campaign=RSS_Syndication) – Stephen Hsu at Nautilus

> [Why Are There Any Jobs Still Left? Technology Eliminates Jobs, Not Work](https://reason.com/blog/2015/08/28/why-are-there-any-jobs-still-left) – Reason

> [Securing Today’s Data Against Tomorrow’s Quantum Computers](http://www.technologyreview.com/news/539441/securing-todays-data-against-tomorrows-quantum-computers/) – MIT Technology Review; Related: [NSA Plans for a Post-Quantum World](https://www.schneier.com/blog/archives/2015/08/nsa_plans_for_a.html) – Schneier on Security

> [A Bit of Internet History, or How Two Members of Congress Helped Create a Trillion or So Dollars of Value](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/08/27/a-bit-of-internet-history-or-how-two-members-of-congress-helped-create-a-trillion-or-so-dollars-of-value/) – David Post in The Washington Post

> [The Web We Have to Save: The Rich, Diverse, Free Web that I Loved — and Spent Years in an Iranian Jail For — is Dying; Why is Nobody Stopping It?](https://medium.com/matter/the-web-we-have-to-save-2eb1fe15a426) – Medium

> [What Ever Happened to Google Books?](http://www.newyorker.com/business/currency/what-ever-happened-to-google-books) – Tim Wu at The New Yorker

> [DIY Tractor Repair Runs Afoul Of Copyright Law](http://www.npr.org/sections/alltechconsidered/2015/08/17/432601480/diy-tractor-repair-runs-afoul-of-copyright-law) – NPR

> #### General Interest

> [We Need a David Carr Portable Companion; Here’s the first Draft](https://medium.com/backchannel/we-need-a-david-carr-portable-companion-89f54fda0b33) – Karen Wickre at BackChannel/Medium

> [Harvard Linguist Points out the 58 Most Commonly Misused Words and Phrases](http://www.metrowestdailynews.com/article/ZZ/20150908/BUSINESS/309089909/?Start=1) – MetroWest Daily News on [Steven Pinker](http://stevenpinker.com/publications/sense-style-thinking-persons-guide-writing-21st-century)’s book, [The Sense of Style](http://www.amazon.com/gp/product/0670025852/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=0670025852&linkCode=as2&tag=thebusiinsi-20&linkId=XTLTCO2LLUJIO43B)

> How to Fix Twitter: [Twitter’s 140-character Limit Doesn’t Get You Better Writing](http://scripting.com/2015/09/10/the140charLimitDoesntGetYouBetterWriting.html) – Dave Winer; [Why Twitter Must Blow Past 140](http://scripting.com/2015/09/03/whyTwitterMustBlowBy140.html) – Dave Winer; [Should Twitter Lose the 140-character Limit or Would that be Suicide?](http://fortune.com/2015/09/03/twitter-140-characters/) – Mathew Ingram at Fortune; [The Network’s the Thing](http://www.eugenewei.com/blog/2015/9/1/when-the-network-is-mature) – Eugene Wei

> [Richard Stallman: How I Do My Computing](https://stallman.org/stallman-computing.html) – Stallman.org

> Two from BuzzFeed: [Scientists Are Hoarding Data And It’s Ruining Medical Research](http://www.buzzfeed.com/bengoldacre/deworming-trials) – Ben Goldacre; [Here’s What Actually Gets Terrorists To Tell The Truth — And It’s Not Torture](http://www.buzzfeed.com/peteraldhous/torture-doesnt-work) – Peter Aldhous

09/14/2015: 

Recommended: Law, Tech and Policy

> [Opinion: The Reasonable Expectation Fallacy](http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0617/Opinion-The-reasonable-expectation-fallacy) – Dan Geer writing at CSM’s Passcode

> The Intercept on XKEYSCORE: [XKEYSCORE: NSA’S Google for the World’s Private Communications](https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/) and [Behind the Curtain; a Look at the Inner Workings of NSA’s XKEYSCORE](https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/)

> [Hackers Installed Sophisticated Malware on U.S. Computers. Why Doesn’t Anyone Care?;
The Worm was Designed to Gather Intelligence on the Ongoing Iranian Nuclear Talks](http://reason.com/archives/2015/07/04/hackers-installed-duqu-2-malware) – Reason on the Duqu2 worm

> [Cyber-Espionage Nightmare; A Groundbreaking Online-spying Case Unearths Details that Companies Wish You Didn’t Know About How Vital Information Slips Away From Them](http://www.technologyreview.com/featuredstory/538201/cyber-espionage-nightmare/) – MIT Technology Review

> [Introducing the ‘Right to Eavesdrop on Your Things’; Data Privacy is a Big Enough Deal that Americans Need a New Right](http://www.politico.com/agenda/story/2015/06/internet-of-things-privacy-concerns-000107) – Stanford professor Keith Winstein at Politico

> [Presentation](http://ben-evans.com/benedictevans/2015/6/19/presentation-mobile-is-eating-the-world) by Benedict Evans of Andreessen Horowitz on how “Mobile is Eating the World”

> [As More Tech Start-Ups Stay Private, So Does the Money](http://www.nytimes.com/2015/07/02/technology/personaltech/as-more-tech-start-ups-stay-private-so-does-the-money.html?emc=edit_tu_20150702&nl=technology&nlid=34482325) – Farhad Manjoo in the New York Times

> [The Rabbit-Hole of ‘Relevant’](http://www.nytimes.com/2015/06/28/magazine/the-rabbit-hole-of-relevant.html?_r=5) – Mattathias Schwartz in the New York Times:
>> “When a law has a name like ‘Patriot’ or ‘Freedom,’ it’s a sign that you should read the fine print. Somewhere down there, in the terraced subclauses of some forgettable subsection, is a word with a special meaning, a word that offers shelter and concealment to whatever it is that the law actually does.”

> Three Pieces on the Open Web: Dave Winer – [Key Concept of the Open Web: Working Together](http://scripting.com/2015/06/24/keyConceptOfTheOpenWebWorkingTogether.html); David Weinberger – [The Internet That Was (and Still Could Be); As Corporations Like Facebook Gain Control Over More and More Online Activities, the Web’s Core Values are at Stake](http://www.theatlantic.com/technology/archive/2015/06/medium-is-the-message-paradise-paved-internet-architecture/396227/); and Dries Buyteart – [Winning back the Open Web](http://buytaert.net/winning-back-the-open-web).

> [The Wait-for-Google-to-Do-It Strategy; America’s Communications ­Infrastructure is Finally Getting Some Crucial Upgrades Because One Company is Forcing ­Competition When Regulators Won’t](http://www.technologyreview.com/review/538411/the-wait-for-google-to-do-it-strategy/) – MIT Technology Review

> [A New Wave of US Internet Companies is Succeeding in China—By Giving the Government What it Wants](http://qz.com/435764/a-new-wave-of-us-internet-companies-is-succeeding-in-china-by-giving-the-government-what-it-wants/) – Josh Horowitz at Quartz

> [The End of Advertising As We Know It](https://www.linkedin.com/pulse/end-advertising-we-know-michael-wolff) – Michael Wolff

07/6/2015: 

Recommended:

> #### Law, Tech and Policy

> [Got Your Number: Cyber-attacks Make Us Rethink the Idea of Social Security Numbers](http://alumni.berkeley.edu/california-magazine/just-in/2015-05-28/got-your-number-cyber-attacks-make-us-rethink-idea-social) – California Magazine

> Mary Meeker’s annual [Internet Trends presentation](http://kpcb.com/InternetTrends)

> [What is Code?](http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/) – an excellent long-read by Paul Ford in Bloomberg BusinessWeek

> [Tomorrow’s Advance Man – Marc Andreessen’s Plan to Win the Future](http://www.newyorker.com/magazine/2015/05/18/tomorrows-advance-man) – New Yorker

> [Why the Blockchain Matters](http://www.wired.co.uk/magazine/archive/2015/06/features/bitcoin-reid-hoffman/viewall) – Reid Hoffman at Wired UK

> [Quantum Computing is About to Overturn Cybersecurity’s Balance of Power](http://www.washingtonpost.com/blogs/innovations/wp/2015/05/11/quantum-computing-is-about-to-overturn-cybersecuritys-balance-of-power/) – Washington Post

> [What is ‘Cybersecurity Law’?](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/14/what-is-cybersecurity-law/) – Orin Kerr in The Washington Post

> [According To The Government, Clearing Your Browser History Is A Felony](https://www.techdirt.com/articles/20150606/16191831259/according-to-government-clearing-your-browser-history-is-felony.shtml) – TechDirt;   Also, [When It’s a Crime to Withdraw Money From Your Bank](http://www.nytimes.com/2015/06/06/upshot/when-its-a-crime-to-withdraw-money-from-your-bank.html?_r=5&abt=0002&abg=0) – New York Times

> #### General Interest

> [The Fallen of WWII](http://www.fallen.io/ww2/) – a captivating visualization (I watched the video (18 minutes); there is also an interactive version) of WWII casualties, including in relation to post-WWII conflicts. Highly recommended.

> The Rise and Fall of Silk Road ([part I](http://www.wired.com/2015/04/silk-road-1/) and [part II](http://www.wired.com/2015/05/silk-road-2/)) – Wired; and [Sunk: How Ross Ulbricht Ended up in Prison for Life – Inside the Trial that Brought Down a Darknet Pirate](http://arstechnica.com/tech-policy/2015/05/sunk-how-ross-ulbricht-ended-up-in-prison-for-life/) – ArsTechnica

> [26 years after Tiananmen, Chinese Millennials are Forgetting to Fear their Government](http://qz.com/420205/26-years-after-tiananmen-chinese-millennials-are-forgetting-to-fear-their-government/) – Gwynn Guilford at Quartz

> [Do You Fear an Elite Population of Enhanced Babies?](http://www.futurepundit.com/archives/009789.html) – FuturePundit

> [These Stunning Photos of New Zealand’s Largest Gang Will Give You Sleepless Nights](http://www.vice.com/en_ca/read/portraits-of-new-zealands-mighty-mongrel-mob) – Vice

> Recommended Video: Vinod Khosla @ The Stanford Graduate School of Business: “[Failure Does Not Matter – Success Matters.](https://www.youtube.com/watch?v=HZcXup7p5-8)” As is readily apparent from the video, Khosla has a very healthy ego, for the most part earned. There are various versions of this talk on the web, but this recent appearance at Stanford GSB is one of the better. The key portion is from the beginning to 35:30 (when the audience questions begin).

06/18/2015: 

Recommended:

> #### Law, Tech and Policy

> [An Updated Readers’ Guide on Section 215 and the USA Freedom Act](http://justsecurity.org/22726/updated-215-readers-guide/) – Just Security

> [Concerns of an Artificial Intelligence Pioneer](https://www.quantamagazine.org/20150421-concerns-of-an-artificial-intelligence-pioneer/) – Quanta

> [All Job Increases Since 2001 are in Non-Routine Work](http://www.futurepundit.com/archives/009776.html) – FuturePundit, commenting on [Is Your Job ‘Routine’? If So, It’s Probably Disappearing](http://blogs.wsj.com/economics/2015/04/08/is-your-job-routine-if-so-its-probably-disappearing/) – Wall Street Journal. But with a bit of the contrary view – [Be Calm, Robots Aren’t About to Take Your Job, MIT Economist Says](http://blogs.wsj.com/economics/2015/02/25/be-calm-robots-arent-about-to-take-your-job-mit-economist-says/) – Wall Street Journal. Also: ProfessorDavid H. Autor’s (MIT) paper *Polanyi’s Paradox and the Shape of Employment Growth* ([pdf](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2496241); 47 pages), which is cited in the WSJ article. From the abstract: “A key observation of the paper is that journalists and expert commentators overstate the extent of machine substitution for human labor and ignore the strong complementarities. The challenges to substituting machines for workers in tasks requiring adaptability, common sense, and creativity remain immense.”

> [The Computers are Listening; How the NSA Converts Spoken Words Into Searchable Text (part 1)](https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/) and [(part 2)](https://firstlook.org/theintercept/2015/05/11/speech-recognition-nsa-best-kept-secret/) – The Intercept

> [With Lock Research, Another Battle Brews in the War Over Security Holes](http://www.wired.com/2015/05/lock-research-another-battle-brews-war-security-holes/) – Wired

> [Tor Browser 4.5 is Released](https://blog.torproject.org/blog/tor-browser-45-released) – The Tor Project; plus there’s a relatively recent new version of SecureDrop (0.3) – [Announcing the New Version of SecureDrop, with the Results from our Third Security Audit (March 23rd)](https://freedom.press/blog/2015/03/announcing-securedrop-0.3) – Freedom of the Press Foundation and related commentary at [BoingBoing](http://boingboing.net/2015/03/23/new-version-of-securedrop-ope.html). Also: [The People Who Risk Jail to Maintain the Tor Network](http://motherboard.vice.com/read/the-operators) – Motherboard/Vice

> [Smartphone Secrets May Be Better Than a Password](http://www.technologyreview.com/news/536921/smartphone-secrets-may-be-better-than-a-password/) – MIT Technology Review, and the related academic paper *ActivPass: Your Daily Activity is Your Password* ([pdf](http://synrg.csl.illinois.edu/papers/activpass.pdf); 10 pages)

> [Encrypting Your Laptop Like You Mean It](https://firstlook.org/theintercept/2015/04/27/encrypting-laptop-like-mean/) and [Passphrases that You Can Memorize, but that Even the NSA Can’t Guess](https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) – Micah Lee at The Intercept

> [SEC Adopts Rules to Facilitate Smaller Companies’ Access to Capital](http://www.sec.gov/news/pressrelease/2015-49.html#.VRRoI9YQHdT) – the SEC’s press sheet and fact sheet on its revisions to Regulation A. Also: [pdf](http://www.sec.gov/rules/final/2015/33-9741.pdf) of the Final Rules and supplementary information (454 pages).

> [The Mission to Save the Internet by Rewiring it from the Name Up](http://motherboard.vice.com/read/the-internet-of-names) – Motherboard/Vice

> [China Rates its Own Citizens, Including Online Behavior](http://www.volkskrant.nl/buitenland/china-rates-its-own-citizens-including-online-behaviour~a3979668/) – Volkskrant; and [Planning Outline for the Construction of a Social Credit System (2014-2020)](https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020/) – China Copyright and Media

> #### General Interest

> [Natural Police: Seen through Game Theory, Cancer and Police Corruption are Pretty much the Same Thing, and for One of Them, There’s a Cure](http://aeon.co/magazine/society/game-theorys-cure-for-corruption-make-us-all-cops/?utm_source=Aeon+newsletter&utm_campaign=34c7085ad6-Daily_newsletter_May_11_20155_11_2015&utm_medium=email&utm_term=0_411a82e59d-34c7085ad6-68671829) – Aeon

> [Where the Real Skyscrapers Are; Hint: North Dakota](http://www.archdaily.com/625418/where-the-real-skyscrapers-are-hint-north-dakota/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ArchDaily+%28ArchDaily%29) – ArchDaily on TV masts as some of the tallest structures in the world

> [The Messy Business of Reinventing Happiness: Inside Disney’s Radical Plan to Modernize its Cherished Theme Parks](http://www.fastcompany.com/3044283/the-messy-business-of-reinventing-happiness#!) – FastCompany

> [ZPM Expresso and the Rage of the Jilted Crowdfunder](http://www.nytimes.com/2015/05/03/magazine/zpm-espresso-and-the-rage-of-the-jilted-crowdfunder.html) – New York Times; but see Professor James Grimmelmann [Riskstarter; Kickstarter is a Tool for Managing Risk](http://2d.laboratorium.net/post/118123399970/riskstarter). Also: [A Crowdfunded Startup Explains why Crowdfunding can be a Complete Disaster](http://www.theverge.com/2015/1/27/7920963/lockitron-bolt-door-lock) – Verge

> [New Study Shows that People Stop Listening to New Music at 33](http://www.avclub.com/article/new-study-shows-people-stop-listening-new-music-33-218752) – A.V.Club

05/11/2015: 

Recommended:

> #### Law, Tech and Policy

> [We Can’t Let John Deere Destroy the Very Idea of Ownership](http://www.wired.com/2015/04/dmca-ownership-john-deere/) – Wired

> [Poor Internet for Poor People: Why Facebook’s Internet.org Amounts to Economic Racism](http://qz.com/385821/poor-internet-for-poor-people-why-facebooks-internet-org-amounts-to-economic-racism/) – Mahesh Murthy in Quartz India

> [Facebook ‘tracks all visitors, breaching EU law’; People without Facebook Accounts, Logged Out Users, and EU Users Who have Explicitly Opted Out of Tracking are All Being Tracked, Report Says](http://www.theguardian.com/technology/2015/mar/31/facebook-tracks-all-visitors-breaching-eu-law-report) – The Guardian

> [Privacy Law: From a National Dish to a Global Stew](http://www.techpolicy.com/Solove-Richards_PrivacyLaw-FromNationalDishToGlobalStew.aspx) – Daniel J. Solove and Neil Richards at TAP

> [Why You have the Right to Obscurity](http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0415/Why-you-have-the-right-to-obscurity) – CSMonitor

> [Is that Really a Spider? Or, are You Being Monitored?](http://pjmedia.com/instapundit/205381/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+pjmedia%2Finstapundit+%28Instapundit%29) – Instapundit

> [For Hardware Makers, Sharing Their Secrets Is Now Part of the Business Plan](http://bits.blogs.nytimes.com/2015/03/29/open-sourcing-cars-and-computers/) – New York Times

> #### General Interest

> [Harvard Professor Reveals why America’s Infrastructure is so Awful, Who is to Blame, and How We can Finally Fix It](http://www.businessinsider.com/harvard-rosabeth-moss-kanter-infrastructure-2015-4) – Business Insider

> [More Older Adults Are Becoming Inventors](http://www.nytimes.com/2015/04/18/your-money/more-older-adults-are-becoming-inventors.html?partner=rss&emc=rss) – New York Times; and [Picking Up Art Later in Life Could Help the Brain](http://hyperallergic.com/199488/picking-up-art-later-in-life-could-help-the-brain/) – Hyperallergic. Remember: [You Are Not Late](http://kk.org/thetechnium/2014/08/you-are-not-late/)

> [Cow Milk Without the Cow Is Coming to Change Food Forever](http://www.wired.com/2015/04/diy-biotech-vegan-cheese/) – Wired

> [Has Visual Design Fallen Flat? Countless Pixels were Spilled during The Great UI Flattening of 2013–2014](https://medium.com/@intercom/has-visual-design-fallen-flat-a155cb6a5cda) – Emmet Connelly

> [Fall of the Designer Part I: Fashionable Nonsense](http://www.elischiff.com/blog/2015/4/7/fall-of-the-designer-part-i-fashionable-nonsense) – Eli Schiff ([Part II – Pixel Pushers](http://www.elischiff.com/blog/2015/4/14/fall-of-the-designer-part-ii-pixel-pushers))

04/22/2015: 

Recommended:

> #### Law, Tech and Policy

> [Why Security Pros Don’t Like Obama’s Proposal for Antihacking Law](http://www.csmonitor.com/World/Passcode/2015/0406/Why-security-pros-don-t-like-Obama-s-proposal-for-antihacking-law-video) – Christian Science Monitor’s Passcode

> [Edward Snowden’s Impact](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/04/09/edward-snowdens-impact/) – an assessment by law professor Orin Kerr in The Washington Post

> [U.S. Secretly Tracked Billions of Calls for Decades](http://www.usatoday.com/story/news/2015/04/07/dea-bulk-telephone-surveillance-operation/70808616/) – USA Today

> [How the Computer Got Its Revenge on the Soviet Union; Condemned as a Capitalist Tool, the Computer Would Help Expose the USSR’s Weakness](http://nautil.us/issue/23/dominoes/how-the-computer-got-its-revenge-on-the-soviet-union) – Nautilus

> [Internet Privacy, Funded by Spooks: A Brief History of the Broadcasting Board of Governors (BBG)](http://pando.com/2015/03/01/internet-privacy-funded-by-spooks-a-brief-history-of-the-bbg/) – Pando Daily

> [The Anti-Information Age; How Governments are Reinventing Censorship in the 21st Century](http://www.theatlantic.com/international/archive/2015/02/government-censorship-21st-century-internet/385528/) – The Atlantic

> [Will Deep Links Ever Truly Be Deep? – The Buzz over Linking Mobile Apps Obscures Links’ True Potential to Create Profound Networks of Knowledge and Share Power More Widely](https://medium.com/backchannel/the-failed-promise-of-deep-links-aa307b3abaa5) – Scott Rosenberg at Medium’s Backchannel

> [The GNU Manifesto Turns Thirty](http://www.newyorker.com/business/currency/the-gnu-manifesto-turns-thirty) – The New Yorker; the [text of the GNU Manifesto](https://www.gnu.org/gnu/manifesto.html) written by Richard Stallman at the beginning of the GNU Project in March 1985 (including subsequent clarifying footnotes)

> [No, Entrepreneurs, Most of You Don’t Need Angel Investors or Venture Capitalists](http://www.washingtonpost.com/news/on-small-business/wp/2015/03/16/no-entrepreneurs-most-of-you-dont-need-angel-investors-or-venture-capitalists/) – Washington Post

> [16 ideas from Marc Andreessen for a More Dynamic US Economy](http://www.aei.org/publication/16-ideas-marc-andreessen-dynamic-us-economy/) – Marc Andreessen’s twitter stream [@pmarca](https://twitter.com/pmarca) (excerpted at the American Enterprise Institute’s public policy blog)

> [4chan’s Overlord Christopher Poole Reveals Why He Walked Away](http://www.rollingstone.com/culture/features/4chans-overlord-christopher-poole-reveals-why-he-walked-away-20150313) – Rolling Stone

> #### General Interest

> [Fifty Great Genre-Bending Books Everyone Should Read](http://flavorwire.com/512998/50-great-genre-bending-books-everyone-should-read/view-all) – Flavorwire

> [The 100 Best Books of the Decade So Far](https://review.oysterbooks.com/p/CsJZWweDo3pnr3cFHXfu9k/100-best-books-of-the-decade-so-far) – The Oyster Review

> [The 100 Best Films of the Decade So Far](http://www.avclub.com/article/100-best-films-decade-so-far-1-20-217530) – A.V. Club

04/8/2015: 

Recommended:

> #### Law, Tech and Policy

> [How the NSA’s Firmware Hacking Works and Why It’s So Unsettling](http://www.wired.com/2015/02/nsa-firmware-hacking/) – Kim Zetter in Wired

> [We Know How You Feel – Computers are Learning to Read Emotion and the Business World Can’t Wait](http://www.newyorker.com/magazine/2015/01/19/know-feel) – Raffi Khatchadourian in The New Yorker

> [The Believers: the Hidden Story behind the Code that Runs Our Lives](https://chronicle.com/article/article-content/190147/) – The Chronicle of Higher Education

> [Google’s Vint Cerf Warns of ‘Digital Dark Age’](http://www.bbc.com/news/science-environment-31450389) – BBC

> [How the Internet May be Shifting Innovation Away From Big Cities](http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/18/how-the-internet-may-be-shifting-innovation-away-from-big-cities/) – The Washington Post

> [Crowd-sourced List of European Investors, Angels and Accelerators](https://docs.google.com/spreadsheets/d/10S7_jBpRoWuNMnOYpkjFJArt76dPhFw0tIR7E_ndgnk/edit?pli=1#gid=0) – via Hacker News, and [The Periodic Table of Venture Capital Blogs](https://www.cbinsights.com/blog/venture-capital-blogs-periodic-table/) – CBInsights

> #### General Interest

> [Internet of DNA – A Global Network of Millions of Genomes could be Medicine’s Next Great Advance](http://www.technologyreview.com/featuredstory/535016/internet-of-dna/) – MIT Technology Review

> [Burn After Reading – in 1971, William Powell published ‘The Anarchist Cookbook’, a guide to making bombs and drugs at home, and he spent the next four decades fighting to take it out of print](http://harpers.org/blog/2015/02/burn-after-reading/) – Harper’s

> [Interview with Ai Weiwei on Working with Hollywood, Remotely](http://news.artnet.com/people/exclusive-interview-with-ai-weiwei-on-working-with-hollywood-remotely-265807) – ArtNet News

03/1/2015: 

Recommended:

> #### Law, Tech and Policy

> [How The FAA’s Proposed Drone Rules Will Affect What You Care About](
http://www.forbes.com/sites/ryancalo/2015/02/15/how-the-faas-proposed-drone-rules-will-affect-what-you-care-about/) – Professor Ryan Calo in Forbes

> [U.S. Wireless Carriers Now Required to Unlock Phones (subject to certain conditions)](http://www.csmonitor.com/Innovation/2015/0213/US-wireless-carriers-now-required-to-unlock-phones) – CSMonitor; [Here’s How to Unlock Your Phone Under the New Rules](https://gigaom.com/2015/02/11/phone-tablet-unlocking-rules-ctia-verizon-tmobile-sprint-att/) – GigaOm; and [Cell Phone Unlocking FAQs](http://www.fcc.gov/device-unlocking-faq) – FCC

> [The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle](https://firstlook.org/theintercept/2015/02/19/great-sim-heist/) – The Intercept

> [Stephen Kim Spoke to a Reporter. Now He’s in Jail. This Is His Story](https://firstlook.org/theintercept/2015/02/18/destroyed-by-the-espionage-act/) –  The Intercept

> [If the NSA has been Hacking Everything, How has Nobody Seen Them Coming?](http://blog.thinkst.com/p/if-nsa-has-been-hacking-everything-how.html) – Thinkst   

> #### General Interest

> [How the New York Times Works: This is How the Gray Lady Gets Made in 2015](http://www.popularmechanics.com/technology/a14030/how-the-new-york-times-works/) – Popular Mechanics   

> [Meet the Tweet-Deleters: People Who are Making their Twitter Histories Self-Destruct](http://fusion.net/story/50322/meet-the-tweet-deleters-people-who-are-making-their-twitter-histories-self-destruct/) – Fusion

> [How Japan’s Line App Became A Culture-Changing, Revenue-Generating Phenomenon](http://www.fastcompany.com/3041578/most-innovative-companies-2015/how-japans-line-app-became-a-culture-changing-revenue-generat) – Fast Company

02/20/2015: 

Recommended:

> #### Law, Tech and Policy

> [FTC Report on Internet of Things Urges Companies to Adopt Best Practices to Address Consumer Privacy and Security Risks](http://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices) ([pdf](http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf) of the Report) – FTC

> [Will the Internet of Things Finally Kill Privacy; Why the FTC’s New Report Doesn’t Go Far Enough](http://www.theverge.com/2015/2/11/8016585/will-the-internet-of-things-finally-kill-privacy) – The Verge

> [Will the FCC’s New Net Neutrality Rules Hold Up in Court?](http://www.theverge.com/2015/2/11/8019261/fcc-net-neutrality-title-ii-possible-trial-comcast-verizon) – Jacob Kastrenakes in The Verge

> The College Art Association (CAA) has released its [Code of Best Practices in Fair Use for the Visual Arts](http://www.collegeart.org/fair-use/) ([pdf](http://www.collegeart.org/pdf/fair-use/best-practices-fair-use-visual-arts.pdf))

> [Facebook’s March to Global Domination is Trampling over Net Neutrality](http://www.theverge.com/2015/2/13/8024993/facebook-internet-org-net-neutrality) – Vlad Savov at The Verge; and [Millions of Facebook Users Have No Idea They’re Using the Internet](http://qz.com/333313/milliions-of-facebook-users-have-no-idea-theyre-using-the-internet/) – Leo Mirani in Quartz

> [All-Seeing, All-Knowing; Since Imperial Times Chinese Governments Have Yearned for a Perfect Surveillance State – Will Big Data Now Deliver It?](http://aeon.co/magazine/technology/will-china-use-big-data-as-a-tool-of-the-state/?utm_source=Aeon+newsletter&utm_campaign=72803ab0f2-Daily_newsletter_Monday_February_16_20152_16_2015&utm_medium=email&utm_term=0_411a82e59d-72803ab0f2-68671829) – James Palmer in Aeon

> [Suite of Sophisticated Nation-State Attack Tools Found with Connection to Student](http://www.wired.com/2015/02/kapersky-discovers-equation-group/) – Kim Zetter in Wired

> #### General Interest

> [The Shape of Things to Come; How an Industrial Designer (Jony Ive) Became Apple’s Greatest Product](http://www.newyorker.com/magazine/2015/02/23/shape-things-come) – Ian Parker in The New Yorker

> [The Stanford Undergraduate and the Mentor](http://www.nytimes.com/2015/02/15/magazine/the-stanford-undergraduate-and-the-mentor.html) – Emily Bazelon in The New York Times Magazine

02/17/2015: 

Recommended:

> #### Law, Tech and Policy

> [Obama’s Proposed Changes to the Computer Hacking Statute: A Deep Dive](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/01/14/obamas-proposed-changes-to-the-computer-hacking-statute-a-deep-dive/) – Orin Kerr at The Washington Post’s Volokh Conspiracy.

> Also by Orin Kerr: [Would a New Crime of ‘Willful Refusal to Comply with a Decryption Order’ be the Best Answer to the Device Decryption Puzzle?
]( http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/10/17/would-a-new-crime-of-willful-refusal-to-comply-with-a-decryption-order-be-the-best-answer-to-the-device-decryption-puzzle/) – Washington Post’s Volokh Conspiracy.

> [The Internet of Things is Going to be a Legal Nightmare](http://www.theverge.com/2015/1/27/7921025/will-self-regulation-be-a-huge-problem-for-privacy-in-the-internet-of) – The Verge.

> [Want to Reform the NSA? Give Edward Snowden Immunity – Any Effort that Tries to Rebuild the Well-Behaved Aspects of the System but Ignores the Critical Role of Whistleblowers is Sure to Fail.
]( http://www.theatlantic.com/politics/archive/2014/09/want-to-reform-the-nsa-give-edward-snowden-immunity/379612/?single_page=true) – Yochai Benkler at The Atlantic.

> [Are Takedowns in 48 Hours ‘Expeditious’ Enough? The Case of Square Ring v. UStream
]( http://blog.ericgoldman.org/archives/2015/01/are-takedowns-in-48-hours-expeditious-enough-square-ring-v-ustream.htm) – Professor Eric Goldman at the Technology & Marketing Law Blog.

> [Robots are Starting to Break the Law and Nobody Knows What to Do About It]( http://fusion.net/story/35883/robots-are-starting-to-break-the-law-and-nobody-knows-what-to-do-about-it/) – Daniel Rivero at Fusion.

> [Can Sony Sue Media Outlets Who Publish the Stolen Sony documents?
](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/12/15/can-sony-sue-media-outlets-who-publish-the-stolen-sony-documents/) – Eugene Volokh at the Washington Post’s Volokh Conspiracy.

> #### General Interest

> [Most Anticipated – the Great 2015 Book Preview]( http://www.themillions.com/2015/01/most-anticipated-the-great-2015-book-preview.html) – The Millions.

> Fifty Best Films of the Decade (2010-2014) So Far ([Part I]( https://thedissolve.com/features/the-dissolve-canon/908-the-50-best-films-of-the-decade-so-far-part-1/) and [Part II]( https://thedissolve.com/features/the-dissolve-canon/909-the-50-best-films-of-the-decade-so-far-part-2/)) – The Dissolve.

> [Why is Everyone So Busy? Time Poverty is a Problem Partly of Perception and Partly of Distribution
]( http://www.economist.com/news/christmas-specials/21636612-time-poverty-problem-partly-perception-and-partly-distribution-why?fsrc=scn/tw/te/pe/ed/whyiseveryonesobusy)– The Economist.

> [Reading – This Warren Buffet Guy is on to Something](https://medium.com/five-hundred-words/reading-4038ac4e6e43) and [How I Find Things to Read](https://medium.com/five-hundred-words/how-i-find-things-to-read-b591c2fb0fde) – M.G. Siegler.

02/4/2015: 

Recommended:

> #### Law, Tech and Policy

> [Reddit, Kickstarter, and Others Plan Net Neutrality ‘Day of Action’ on September 10th](http://www.theverge.com/2014/9/4/6104505/reddit-kickstarter-and-others-plan-net-neutrality-day-of-action) – The Verge. At Battle for the Net, [suggestions](https://www.battleforthenet.com/sept10th/) for participating on September 10th, including adding a code snippet to one’s website to display a symbolic “loading” icon.

> [Twitter CFO says a Facebook-style Filtered Feed is Coming, Whether You Like It or Not](http://gigaom.com/2014/09/04/twitter-cfo-says-a-facebook-style-filtered-feed-is-coming-whether-you-like-it-or-not/?utm_source=feed&utm_medium=feed&utm_campaign=feed) – GigaOm. Key question: will there be an opt out?

> [The Masked Avengers – How Anonymous Incited Online Vigilantism from Tunisia to Ferguson](http://www.newyorker.com/magazine/2014/09/08/masked-avengers) – The New Yorker.

> [Chattanooga’s Gig: How One City’s Super-Fast Internet is Driving a Tech Boom](http://www.theguardian.com/world/2014/aug/30/chattanooga-gig-high-speed-internet-tech-boom) – The Guardian.

> [Notes on the Celebrity Data Theft](https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/) – Nik Cubrilovic at New Web Order. One of the best pieces so far about the recent leak of confidential celebrity photos.

> [Can I Use that Picture? The Terms, Laws, and Ethics for Using Copyrighted Images](http://thevisualcommunicationguy.com/2014/07/14/can-i-use-that-picture/) – The Visual Communication Guy.

> #### General Interest

> [Meet the Father of Digital Life – This Maverick Forerunner of Artificial Life and Animation Remains Largely Unknown](http://nautil.us/issue/14/mutation/meet-the-father-of-digital-life?utm_source=tss&utm_medium=desktop&utm_campaign=linkfrom) – Robert Hackett writing at Nautilus on Nils Aall Barricelli.

> [The Ice Bucket Challenge Isn’t Going Away, But Giving Money to Disease-Specific Charities is Still a Bad Idea](http://www.slate.com/articles/business/moneybox/2014/08/als_ice_bucket_challenge_giving_money_to_disease_specific_charities_is_a.html) – a contrarian position by Felix Salmon at Slate.

> [Made for China: As US audiences Tire of Big Budget Spectacle, Hollywood Designs its Blockbuster Product for the Ever-Expanding Chinese Market](http://thenewinquiry.com/essays/made-for-china/) – Shawn Wen at The New Inquiry.
>> Related: [I’ll Skip ‘Star Wars: Episode 13,’ Thanks](http://www.bloombergview.com/articles/2014-09-04/i-ll-skip-star-wars-episode-13-thanks) – Megan McArdle at BloombergView, and

>> [‘Memphis’ and the Beauty of Plotless Movies
Should You Watch a Dreamy, Gorgeous, Intensely Slow-Moving R&B Odyssey? Here’s Why Movies Like this Still Matter](http://www.salon.com/2014/09/04/memphis_and_the_beauty_of_plotless_movies/) – Andrew O’Hehir (the best movie critic working today) at Salon.

> [Seventeen Brilliant Short Novels You Can Read in a Sitting](http://electricliterature.com/17-brilliant-short-novels-you-can-read-in-a-sitting/) – Electric Lit.

09/4/2014: 

Recommended:

> #### Law, Tech and Policy

> [A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying](http://www.wired.com/2014/07/dark-mail-hides-metadata-from-nsa/) – Wired. Related: [Inside Citizen Lab, the ‘Hacker Hothouse’ Protecting You from Big Brother](http://arstechnica.com/security/2014/07/inside-citizen-lab-the-hacker-hothouse-protecting-you-from-big-brother/) — ArsTechnica.

> [Singapore is Testing Whether Mass Surveillance and Big Data can not only Protect National Security, but Actually Engineer a More Harmonious Society](http://www.foreignpolicy.com/articles/2014/07/29/the_social_laboratory_singapore_surveillance_state) — Foreign Policy.

> On the 35th anniversary of the case which introduced the 3rd party doctrine (i.e., people have no expectation of privacy in information they expose to others (e.g., telcos and other businesses)): [Smith v. Maryland Turns 35, But Its Health Is Declining](https://www.eff.org/deeplinks/2014/06/smith-v-maryland-turns-35-its-healths-declining) — Electronic Frontier Foundation.

> #### General Interest

> At Medium, Rex Sorgatz’s four part series on art and authenticity: **Part I**: [This is Not a Vermeer](https://medium.com/message/this-is-not-a-vermeer-67b752b150c0); **Part II**: [Uber for Art Forgeries](https://medium.com/message/uber-for-art-forgeries-2c9c8bf41608); **Part III**: [Forgeries Gone Wild](https://medium.com/message/d9b4c195da5); and **Part IV**: [The End of Authentication](https://medium.com/message/cbbfbcb0c49e).

> [The Scope of Ai Weiwei’s Imagination](http://hyperallergic.com/137367/the-scope-of-ai-weiweis-imagination/) – photo essay in Hyperallergic on the recent “Ai Weiwei: Evidence” exhibition at the Martin-Gropius-Bau Museum in Berlin. Also: [The Long Game: On the Repression of Ai Weiwei and Jafar Panahi](http://www.full-stop.net/2014/07/30/features/essays/tomashachard/the-long-game-on-the-repression-of-ai-weiwei-and-jafar-panahi/) — Full Stop.

> [David Foster Wallace on Writing, Self-Improvement, and How We Become Who We Are](http://www.brainpickings.org/index.php/2014/08/11/david-foster-wallace-quack-this-way/) – Maria Popova at Brain Pickings. Related: [mp3](http://theconnection.wbur.org/2001/03/30/english-language-usage) of WBUR/The Connection radio program featuring David Foster Wallace and “Modern American Usage” editor/author, Bryan Garner, discussing English language usage.

08/14/2014: