Recommended: Law, Tech and Policy

> [Opinion: The Reasonable Expectation Fallacy](http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0617/Opinion-The-reasonable-expectation-fallacy) – Dan Geer writing at CSM’s Passcode

> The Intercept on XKEYSCORE: [XKEYSCORE: NSA’S Google for the World’s Private Communications](https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/) and [Behind the Curtain; a Look at the Inner Workings of NSA’s XKEYSCORE](https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/)

> [Hackers Installed Sophisticated Malware on U.S. Computers. Why Doesn’t Anyone Care?;
The Worm was Designed to Gather Intelligence on the Ongoing Iranian Nuclear Talks](http://reason.com/archives/2015/07/04/hackers-installed-duqu-2-malware) – Reason on the Duqu2 worm

> [Cyber-Espionage Nightmare; A Groundbreaking Online-spying Case Unearths Details that Companies Wish You Didn’t Know About How Vital Information Slips Away From Them](http://www.technologyreview.com/featuredstory/538201/cyber-espionage-nightmare/) – MIT Technology Review

> [Introducing the ‘Right to Eavesdrop on Your Things’; Data Privacy is a Big Enough Deal that Americans Need a New Right](http://www.politico.com/agenda/story/2015/06/internet-of-things-privacy-concerns-000107) – Stanford professor Keith Winstein at Politico

> [Presentation](http://ben-evans.com/benedictevans/2015/6/19/presentation-mobile-is-eating-the-world) by Benedict Evans of Andreessen Horowitz on how “Mobile is Eating the World”

> [As More Tech Start-Ups Stay Private, So Does the Money](http://www.nytimes.com/2015/07/02/technology/personaltech/as-more-tech-start-ups-stay-private-so-does-the-money.html?emc=edit_tu_20150702&nl=technology&nlid=34482325) – Farhad Manjoo in the New York Times

> [The Rabbit-Hole of ‘Relevant’](http://www.nytimes.com/2015/06/28/magazine/the-rabbit-hole-of-relevant.html?_r=5) – Mattathias Schwartz in the New York Times:
>> “When a law has a name like ‘Patriot’ or ‘Freedom,’ it’s a sign that you should read the fine print. Somewhere down there, in the terraced subclauses of some forgettable subsection, is a word with a special meaning, a word that offers shelter and concealment to whatever it is that the law actually does.”

> Three Pieces on the Open Web: Dave Winer – [Key Concept of the Open Web: Working Together](http://scripting.com/2015/06/24/keyConceptOfTheOpenWebWorkingTogether.html); David Weinberger – [The Internet That Was (and Still Could Be); As Corporations Like Facebook Gain Control Over More and More Online Activities, the Web’s Core Values are at Stake](http://www.theatlantic.com/technology/archive/2015/06/medium-is-the-message-paradise-paved-internet-architecture/396227/); and Dries Buyteart – [Winning back the Open Web](http://buytaert.net/winning-back-the-open-web).

> [The Wait-for-Google-to-Do-It Strategy; America’s Communications ­Infrastructure is Finally Getting Some Crucial Upgrades Because One Company is Forcing ­Competition When Regulators Won’t](http://www.technologyreview.com/review/538411/the-wait-for-google-to-do-it-strategy/) – MIT Technology Review

> [A New Wave of US Internet Companies is Succeeding in China—By Giving the Government What it Wants](http://qz.com/435764/a-new-wave-of-us-internet-companies-is-succeeding-in-china-by-giving-the-government-what-it-wants/) – Josh Horowitz at Quartz

> [The End of Advertising As We Know It](https://www.linkedin.com/pulse/end-advertising-we-know-michael-wolff) – Michael Wolff

07/6/2015: 

Impact of Trade Pacts on IP and the Internet (link roundup)

**Texts (TPP, TISA and TTIP):**

> TPP ([Trans Pacific Partnership](https://en.wikipedia.org/wiki/Trans-Pacific_Partnership)) [full text](https://ustr.gov/trade-agreements/free-trade-agreements/trans-pacific-partnership/tpp-full-text)

> TISA ([Trade in Services Agreement](https://en.wikipedia.org/wiki/Trade_in_Services_Agreement)) and TTIP ([Trans-Atlantic Trade and Investment Partnership](http://ec.europa.eu/trade/policy/in-focus/ttip/index_en.htm)) texts have not yet been made officially public, although at least portions of certain drafts have been leaked by Wikileaks ([Wikileaks July 2, 2015 press release](https://wikileaks.org/tisa/press.html?2=)).

**Trade Promotion Authority (2015):**

> [Wikipedia](https://en.wikipedia.org/wiki/Fast_track_(trade)) on trade fast track

> [On Trade, Here’s What the President Signed into Law](https://www.whitehouse.gov/blog/2015/06/29/trade-here-s-what-president-signed-law) – White House blog

> [Trade Promotion Authority (TPA) and the Role of Congress in Trade Policy](https://fas.org/sgp/crs/misc/RL33743.pdf) (pdf; 24 pages) – Congressional Research Service

**Analysis and Opinion:**

> [Privacy Is Not a Barrier to Trade; How a Secretive Trade agreement Could Change the Global Internet](http://www.slate.com/articles/technology/future_tense/2015/06/trade_in_services_agreement_could_change_the_global_internet.html) – law professor Margot Kaminski at Slate

> [TISA: Yet Another Leaked Treaty You’ve Never Heard Of Makes Secret Rules for the Internet](https://www.eff.org/deeplinks/2015/05/tisa-yet-another-leaked-treaty-youve-never-heard-makes-secret-rules-internet) – EFF

> [A Congressional Straightjacket: Fast-Tracking the TPP](http://www.huffingtonpost.com/michele-goodwin/a-congressional-straightj_b_7659646.html) – law professors Gregory Shaffer and Jack Lerner at The Huffington Post

> [Another Leaked Trade Agreement, Another Reason to Oppose Fast Track](http://www.huffingtonpost.com/david-singh-grewal/tisa-leak_b_7514314.html) – law professor David Singh Grewal at The Huffington Post

> [TISA: analysis of the leaked ‘core text’](https://www.wikileaks.org/tisa/core/analysis/Analysis-TiSA-Core-Text.pdf) (pdf; 7 pages) – law professor Jane Kelsey

> [Leaked: What’s in Obama’s Trade Deal](http://www.politico.com/agenda/story/2015/06/tpp-deal-leaked-pharma-000126) – Politico

07/5/2015: 

Quote of the Day

Dave Aitel on the OPM hack:

> “But there’s a little silver lining in the OPM hack, and it is this: (1) Covert identities are dead anyways, because databases full of biometrics are everywhere, and you can read someone’s fingerprints off any beer glass faster than you can say ‘Your Cover Is Blown, Ethan Hunt’. That’s not even counting the DNA revolution of being able to map the entire human family tree out that nobody is talking about yet. Regardless, you cannot hide WHO you are in the modern age if for no other reason than Facebook exists. Deal with it. (2) The entire clearance system as a whole has been obliterated by modern information sciences.”

From the Dailydave Digest; subscribe [here](https://lists.immunityinc.com/mailman/listinfo/dailydave).

07/5/2015: 

New Department of Defense Law of War Manual Chapter on Cyber Operations (updated)

The new DOD manual is the first since 1956 ([pdf](http://www.dod.mil/dodgc/images/law_war_manual15.pdf); 1,176 pages, with the Cyber Operations portion (Chapter XVI) spanning 15 pages in the pdf, from page 994 to 1009).

Professor Kristen Eichensehr (UCLA Law School) writing at JustSecurity [discusses](http://justsecurity.org/23960/opm-hack-dod-law-war-manual/) how the new manual’s provisions treat hacking incidents such as the OPM hack.

Just Security’s [“mini forum”](http://justsecurity.org/tag/law-of-war-manual-forum/) (series of related posts) on the new Law of War Manual.

07/4/2015: 

2014 Wiretap Report Released

**The Wiretap Report:**

> The 2014 Wiretap Report ([summary and links to several pdfs](http://www.uscourts.gov/statistics-reports/wiretap-report-2014)) released by the Administrative Office of the United States Courts.

**News Coverage:**

> [Federal Wiretaps Down Slightly, Encryption Impact Decreases; California and Arizona Lead Nation in Authorized Wiretaps](http://www.networkworld.com/article/2942611/security0/federal-wiretaps-down-slightly-encryption-impact-decreases.html) – NetworkWorld

> [Data Shows Little Evidence for FBI’s Concerns About Criminals ‘Going Dark’](http://motherboard.vice.com/read/data-shows-little-evidence-for-fbis-concerns-about-criminals-going-dark) – Motherboard/VICE

07/1/2015: 

Are APIs Copyrightable (link roundup – updated for Supreme Court denial of cert)

**Update:** [Supreme Court Declines to Hear Appeal in Google-Oracle Copyright Fight](http://bits.blogs.nytimes.com/2015/06/29/supreme-court-declines-to-hear-appeal-in-google-oracle-copyright-fight/?_r=5) – New York Times:

> “Monday’s Supreme Court decision, which was specific to this appeal, means the Oracle-Google saga will now move back to the lower courts to determine another aspect of the case: Even though Google was using copyrighted software, was it only making ‘fair use’ of it . . . ‘You shouldn’t let the owner of an A.P.I. end up owning the other person’s program,’ said Michael Barclay, special counsel to the Electronic Frontier Foundation, a tech nonprofit devoted to civil liberties. ‘I don’t think we’ll find out how bad a day this is for a long time.'”

**Previously – Solicitor General Brief Argued APIs are Copyrightable:**

Considering whether to grant certiorari in the Google v. Oracle America case, the Supreme Court earlier in 2015 asked the government to weigh in on the dispute. In response, the Solicitor General filed its brief, surprisingly taking the position that APIs **are** subject to copyright protection.

The Solicitor General’s Brief for the United States as Amicus Curiae ([pdf](https://www.eff.org/files/2015/06/05/14-410_google_v_oracle_us_cvsg_brief.pdf); 23 pages)

> **News Reaction to Solicitor General Brief**:

> [Let Oracle Own APIs, Justice Department Tells Top Court in Surprise Filing](http://fortune.com/2015/05/26/google-oracle-api-supremecourt-obama-appeal/) – Fortune

> [White House Sides with Oracle, tells Supreme Court APIs are Copyrightable;
Unlicensed Use of APIs Might be a Fair Use, US says](http://arstechnica.com/tech-policy/2015/05/white-house-sides-with-oracle-tells-supreme-court-apis-are-copyrightable/) – ArsTechnica

> [Marc Andreesen](https://twitter.com/pmarca) tweet: “Obama Administration to software programmers: Drop dead!”

> [The Solicitor General’s Peculiar Brief in Google v. Oracle](http://www.project-disco.org/intellectual-property/060115-the-solicitor-generals-peculiar-brief-in-google-v-oracle/) – Computer & Communications Industry Association (CCIA), Disruptive Competition Project

> [Google Versus Oracle Case Exposes Differences within Obama Administration](http://www.reuters.com/article/2015/05/15/us-google-oracle-lawsuit-insight-idUSKBN0O017Z20150515) – Reuters

> [How Oracle Versus Google Could Ruin Software Development](http://www.lifehacker.com.au/2015/06/how-oracle-versus-google-could-ruin-software-development/) – Lifehacker

**Background:**

> [Oracle America v. Google – Wikipedia](http://en.wikipedia.org/wiki/Oracle_America,_Inc._v._Google,_Inc.)

> [List and Links to Rulings and Related Filings](https://www.eff.org/cases/oracle-v-google) (under the Tab “Documents” following the brief article) – EFF

> See, in particular, the November 2014 “Brief of Amici Curiae Computer Scientists in Support of Petitioner” ([pdf](https://www.eff.org/files/2014/11/07/google_v_oracle_computer-scientists-certpetition-amicus-brief_14-410_final.pdf); 27 pages, excluding list of amici and tables of content and cited authorities)

**Appeals Court Ruling (May 2014)** – Court of Appeals for the Federal Circuit

> The Appeals Court [Decision](https://scholar.google.ca/scholar_case?q=google+oracle+may+9,+2014&hl=en&as_sdt=2003&case=15197092051369647665&scilh=0)

> Reaction (at that time): [Tech World Stunned as Court Rules Oracle Can Own APIs; Google Loses Copyright Appeal](https://gigaom.com/2014/05/09/tech-world-stunned-as-court-rules-oracle-can-own-apis-google-loses-copyright-appeal/) – GigaOm

**Original Trial and Decision (May 2012)** – U.S. District Court, Northern District of California

> The Original Copyright Related Rulings: “Order re: copyright ability of certain replicated elements of the JAVA application programming interface” [(pdf](http://www.groklaw.net/pdf3/OraGoogle-1202.pdf); 41 pages) and “Findings of Fact and Conclusions of Law on Equitable Defenses” [(pdf](http://www.groklaw.net/pdf3/OraGoogle-1203.pdf); 3 pages)

> News Article Summing Up the Patent Portion of the Case: [Jury Clears Google of Infringing on Oracle Patents](http://www.zdnet.com/article/jury-clears-google-of-infringing-on-oracle-patents/) – ZDNet

> Reaction (at that time): [Google Wins Crucial API Ruling, Oracle’s Case Decimated; Java API Packages ‘free for all to use under the Copyright Act’](http://arstechnica.com/tech-policy/2012/05/google-wins-crucial-api-ruling-oracles-case-decimated/) – ArsTechnica

07/1/2015: 

Recommended Movies, TV & Music from the 1st Half of 2015:

> **Movies:**

> [Slow West](http://www.rottentomatoes.com/m/slow_west_2015/) (Rotten Tomatoes Critics 88%), [Ex Machina](http://www.rottentomatoes.com/m/ex_machina/) (Rotten Tomatoes Critics 91%), [Ida](http://www.rottentomatoes.com/m/ida_2013/) (from 2014)(Rotten Tomatoes Critics 96%), [Locke](http://www.rottentomatoes.com/m/locke/) (from 2014)(Rotten Tomatoes Critics 91%), and [A Girl Walks Home Alone at Night](http://www.rottentomatoes.com/m/a_girl_walks_home_alone_at_night/) (from 2014)(Rotten Tomatoes Critics 96%).

> **TV (in addition to Game of Thrones, Mad Men, Walking Dead, and The Americans):**

> [Wolf Hall](http://www.rottentomatoes.com/tv/wolf-hall/s01/) (Rotten Tomatoes Critics 100%), [Fortitude](http://www.rottentomatoes.com/tv/fortitude/s01/) (Rotten Tomatoes Critics 88%), [The Missing](http://www.avclub.com/review/missing-blends-character-piece-introspection-thril-211630) (uk series; season one)(A.V. Club: B), [Happy Valley](http://www.rottentomatoes.com/tv/happy-valley/s01/) (uk series; season one)(Rotten Tomatoes Critics 100%), [Broadchurch](http://www.rottentomatoes.com/tv/broadchurch/s02/) (uk series; season two)(Rotten Tomatoes Critics 90% season one and 85% season two), [Utopia](http://www.imdb.com/title/tt2384811/) (uk series; seasons one and two; U.S. David Fincher/Gillian Flynn version currently in production), [Witnesses (Les Témoins)](https://en.wikipedia.org/wiki/Witnesses_(TV_series)) (french series; season one), [Justified](http://www.rottentomatoes.com/tv/justified/s06/) (Rotten Tomatoes Critics 100%), and [Better Call Saul](http://www.rottentomatoes.com/tv/better-call-saul/s01/) (Rotten Tomatoes Critics 100%).

> **Music:**

> [Sufjan Stevens](http://pitchfork.com/reviews/albums/20218-carrie-lowell/) “Carrie & Lowell” (Pitchfork 9.3, Metacritic 90, AV Club A); [Torres](http://pitchfork.com/reviews/albums/20290-sprinter/) “Sprinter” (Pitchfork 8.0, Metacritic 81); [Courtney Barnett](http://pitchfork.com/reviews/albums/20268-sometimes-i-sit-and-think-and-sometimes-i-just-sit/) “Sometimes I Sit . . . “ (Pitchfork 8.6, Metacritic 88, AV Club A-); [Donnie Trumpet & The Social Experiment](http://pitchfork.com/reviews/albums/20664-surf/) “Surf” (Pitchfork 8.3, Metacritic 87, AV Club A-); [Levon Vincent](http://pitchfork.com/reviews/albums/20276-levon-vincent/) [self titled] (Pitchfork 8.3, Metacritic 85); [Waxahatchee](http://pitchfork.com/reviews/albums/20437-ivy-tripp/) “Ivy Tripp” (Pitchfork 8.1, Metacritic 81, AV Club B+); [Twerps](http://pitchfork.com/reviews/albums/20140-range-anxiety/) “Range Anxiety” (Pitchfork 7.5, Metacritic 70); [Girlpool](http://pitchfork.com/reviews/albums/20465-before-the-world-was-big/) “Before the World Was Big” (Pitchfork 7.8, Metacritic 79); [The Bad Plus Joshua Redman](http://www.metacritic.com/music/the-bad-plus-joshua-redman/the-bad-plus) [self titled] (Metacritic 84); [Los Hijos De La Montana](http://www.tucsonweekly.com/TheRange/archives/2015/05/19/listen-to-sergio-mendozas-new-project-los-hijos-de-la-montana) [self titled]; [The Drink](http://drownedinsound.com/releases/18546/reviews/4148509) “Company” (from 2014); [Kamasi Washington](http://pitchfork.com/reviews/albums/20557-the-epic/) “The Epic” (Pitchfork 8.6); and [Screaming Females](http://pitchfork.com/reviews/albums/20197-rose-mountain/) “Rose Mountain” (Pitchfork 6.7, Metacritic 77, AV Club B+).

07/1/2015: 

Two Long-Reads on Net Security and Insecurity

> Washington Post’s “Net of Insecurity” series:   Part 1 – [The Long Life of a Quick ‘Fix’; Internet Protocol from 1989 Leaves Data Vulnerable to Hijackers](http://www.washingtonpost.com/sf/business/2015/05/31/net-of-insecurity-part-2/);   Part 2 – [A Flaw in the Design; The Internet’s Founders Saw its Promise But Didn’t Foresee Users Attacking One Another](http://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/)

> Should Companies Do Most of Their Computing in the Cloud? ([part 1](https://www.schneier.com/blog/archives/2015/06/should_companie.html), [part 2](https://www.schneier.com/blog/archives/2015/06/should_companie_1.html) and [part 3](https://www.schneier.com/blog/archives/2015/06/should_companie_2.html) – Bruce Schneier

06/20/2015: 

Recommended:

> #### Law, Tech and Policy

> [Got Your Number: Cyber-attacks Make Us Rethink the Idea of Social Security Numbers](http://alumni.berkeley.edu/california-magazine/just-in/2015-05-28/got-your-number-cyber-attacks-make-us-rethink-idea-social) – California Magazine

> Mary Meeker’s annual [Internet Trends presentation](http://kpcb.com/InternetTrends)

> [What is Code?](http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/) – an excellent long-read by Paul Ford in Bloomberg BusinessWeek

> [Tomorrow’s Advance Man – Marc Andreessen’s Plan to Win the Future](http://www.newyorker.com/magazine/2015/05/18/tomorrows-advance-man) – New Yorker

> [Why the Blockchain Matters](http://www.wired.co.uk/magazine/archive/2015/06/features/bitcoin-reid-hoffman/viewall) – Reid Hoffman at Wired UK

> [Quantum Computing is About to Overturn Cybersecurity’s Balance of Power](http://www.washingtonpost.com/blogs/innovations/wp/2015/05/11/quantum-computing-is-about-to-overturn-cybersecuritys-balance-of-power/) – Washington Post

> [What is ‘Cybersecurity Law’?](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/14/what-is-cybersecurity-law/) – Orin Kerr in The Washington Post

> [According To The Government, Clearing Your Browser History Is A Felony](https://www.techdirt.com/articles/20150606/16191831259/according-to-government-clearing-your-browser-history-is-felony.shtml) – TechDirt;   Also, [When It’s a Crime to Withdraw Money From Your Bank](http://www.nytimes.com/2015/06/06/upshot/when-its-a-crime-to-withdraw-money-from-your-bank.html?_r=5&abt=0002&abg=0) – New York Times

> #### General Interest

> [The Fallen of WWII](http://www.fallen.io/ww2/) – a captivating visualization (I watched the video (18 minutes); there is also an interactive version) of WWII casualties, including in relation to post-WWII conflicts. Highly recommended.

> The Rise and Fall of Silk Road ([part I](http://www.wired.com/2015/04/silk-road-1/) and [part II](http://www.wired.com/2015/05/silk-road-2/)) – Wired; and [Sunk: How Ross Ulbricht Ended up in Prison for Life – Inside the Trial that Brought Down a Darknet Pirate](http://arstechnica.com/tech-policy/2015/05/sunk-how-ross-ulbricht-ended-up-in-prison-for-life/) – ArsTechnica

> [26 years after Tiananmen, Chinese Millennials are Forgetting to Fear their Government](http://qz.com/420205/26-years-after-tiananmen-chinese-millennials-are-forgetting-to-fear-their-government/) – Gwynn Guilford at Quartz

> [Do You Fear an Elite Population of Enhanced Babies?](http://www.futurepundit.com/archives/009789.html) – FuturePundit

> [These Stunning Photos of New Zealand’s Largest Gang Will Give You Sleepless Nights](http://www.vice.com/en_ca/read/portraits-of-new-zealands-mighty-mongrel-mob) – Vice

> Recommended Video: Vinod Khosla @ The Stanford Graduate School of Business: “[Failure Does Not Matter – Success Matters.](https://www.youtube.com/watch?v=HZcXup7p5-8)” As is readily apparent from the video, Khosla has a very healthy ego, for the most part earned. There are various versions of this talk on the web, but this recent appearance at Stanford GSB is one of the better. The key portion is from the beginning to 35:30 (when the audience questions begin).

06/18/2015: 

Where is the Internet?


Image © 2010 j.r.mchale; all rights reserved

An interesting short piece (five paragraphs and an [eleven photo slide show](http://www.nytimes.com/2015/06/05/magazine/the-internet-irl.html#slideshow/100000003723283/100000003723289)) entitled [Internet I.R.L.](http://www.nytimes.com/2015/06/05/magazine/the-internet-irl.html#) in today’s New York Times magazine about photographer [Dave Greer](http://davegreer.cc)’s current project photographing where pieces of the internet backbone and related data centers are housed. Tidbit from the article about the One Wilshire building in the above photograph (taken by me from my former loft in downtown Los Angeles): “In 2013, One Wilshire sold for $437.5 million, the highest price per square foot (about $660) ever paid for a downtown Los Angeles office building. Why? Because the Internet. The building is one of the world’s largest data-transfer centers — tenants include network, cloud and information-technology providers — and serves as a major West Coast terminus for trans-Pacific fiber-optic cables.” An excellent reminder that the internet is not some amorphous thing ‘in the cloud’, but based on tangible, physical things, including circuits, switches, servers, cables and other equipment – in many cases, housed in buildings or buried under ground or sea.

06/6/2015: 

Law and Economics of Media Platforms: Coursera Course

Beginning July 13th, a Coursera on-demand course [Internet Giants: The Law and Economics of Media Platforms](https://www.coursera.org/course/internetgiants) taught by [Randy Picker](http://picker.uchicago.edu) of the University of Chicago Law School. The seven topics to be explored in the course (1) Microsoft: The Desktop vs. The Internet, (2) Google Emerges and the World Responds, (3) Smartphones, (4) Network Neutrality, (5) The Day the Music Died, (6) Control over Video, and (7) The Mediated Book.

06/6/2015: 

Algorithms: the Good, the Bad & the Ugly

> [From Smoke-Filled Rooms to Computer Algorithms – The Evolution of Collusion](http://clsbluesky.law.columbia.edu/2015/05/14/from-smoke-filled-rooms-to-computer-algorithms-the-evolution-of-collusion/) – Ariel Ezrachi and Maurice Stucke at The CLS Blue Sky Blog

> [When Bots Collude](http://www.newyorker.com/business/currency/when-bots-collude) – The New Yorker

> [The FTC is Worried about Algorithmic Transparency, and You Should be Too](http://www.pcworld.com/article/2908372/the-ftc-is-worried-about-algorithmic-transparency-and-you-should-be-too.html) – PCWorld

> **Academic Papers:**

> [Artificial Intelligence & Collusion: When Computers Inhibit Competition](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2591874) – Ariel Ezrachi and Maurice Stucke (pdf available at the link; 38 pages)

> [Antitrust and the Robo-Seller: Competition in the Time of Algorithms](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2576341) – Salil K. Mehra (pdf available at the link; 60 pages)

> **Recent DOJ Action:**

> [Former E-Commerce Executive Charged with Price Fixing in the Antitrust Division’s First Online Marketplace Prosecution](http://www.justice.gov/opa/pr/former-e-commerce-executive-charged-price-fixing-antitrust-divisions-first-online-marketplace) – Department of Justice Press Release. The Topkins DOJ charges: – [pdf](http://www.justice.gov/sites/default/files/opa/press-releases/attachments/2015/04/06/topkins_information.pdf) (5 pages)

05/15/2015: 

Quote of the Day:

> “Usability is critical. Lots of good crypto never got widely adopted as it was too hard to use; think of PGP. On the other hand, Tails is horrifically vulnerable to traditional endpoint attacks, but you can give it as a package to journalists to use so they won’t make so many mistakes. The source has to think ‘How can I protect myself?’ which makes it really hard, especially for a source without a crypto and security background. You just can’t trust random journalists to be clueful about everything from scripting to airgaps. Come to think of it, a naive source shouldn’t trust their life to securedrop; he should use gpg before he sends stuff to it but he won’t figure out that it’s a good idea to suppress key IDs. Engineers who design stuff for whistleblowers and journalists must be really thoughtful and careful if they want to ensure their users won’t die when they screw up. The goal should be that no single error should be fatal, and so long as their failures aren’t compounded the users will stay alive.”

— Ross Anderson at [Light Blue Touchpaper](https://www.lightbluetouchpaper.org/2015/05/02/meeting-snowden-in-princeton/)

05/12/2015: 

Recommended:

> #### Law, Tech and Policy

> [An Updated Readers’ Guide on Section 215 and the USA Freedom Act](http://justsecurity.org/22726/updated-215-readers-guide/) – Just Security

> [Concerns of an Artificial Intelligence Pioneer](https://www.quantamagazine.org/20150421-concerns-of-an-artificial-intelligence-pioneer/) – Quanta

> [All Job Increases Since 2001 are in Non-Routine Work](http://www.futurepundit.com/archives/009776.html) – FuturePundit, commenting on [Is Your Job ‘Routine’? If So, It’s Probably Disappearing](http://blogs.wsj.com/economics/2015/04/08/is-your-job-routine-if-so-its-probably-disappearing/) – Wall Street Journal. But with a bit of the contrary view – [Be Calm, Robots Aren’t About to Take Your Job, MIT Economist Says](http://blogs.wsj.com/economics/2015/02/25/be-calm-robots-arent-about-to-take-your-job-mit-economist-says/) – Wall Street Journal. Also: ProfessorDavid H. Autor’s (MIT) paper *Polanyi’s Paradox and the Shape of Employment Growth* ([pdf](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2496241); 47 pages), which is cited in the WSJ article. From the abstract: “A key observation of the paper is that journalists and expert commentators overstate the extent of machine substitution for human labor and ignore the strong complementarities. The challenges to substituting machines for workers in tasks requiring adaptability, common sense, and creativity remain immense.”

> [The Computers are Listening; How the NSA Converts Spoken Words Into Searchable Text (part 1)](https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/) and [(part 2)](https://firstlook.org/theintercept/2015/05/11/speech-recognition-nsa-best-kept-secret/) – The Intercept

> [With Lock Research, Another Battle Brews in the War Over Security Holes](http://www.wired.com/2015/05/lock-research-another-battle-brews-war-security-holes/) – Wired

> [Tor Browser 4.5 is Released](https://blog.torproject.org/blog/tor-browser-45-released) – The Tor Project; plus there’s a relatively recent new version of SecureDrop (0.3) – [Announcing the New Version of SecureDrop, with the Results from our Third Security Audit (March 23rd)](https://freedom.press/blog/2015/03/announcing-securedrop-0.3) – Freedom of the Press Foundation and related commentary at [BoingBoing](http://boingboing.net/2015/03/23/new-version-of-securedrop-ope.html). Also: [The People Who Risk Jail to Maintain the Tor Network](http://motherboard.vice.com/read/the-operators) – Motherboard/Vice

> [Smartphone Secrets May Be Better Than a Password](http://www.technologyreview.com/news/536921/smartphone-secrets-may-be-better-than-a-password/) – MIT Technology Review, and the related academic paper *ActivPass: Your Daily Activity is Your Password* ([pdf](http://synrg.csl.illinois.edu/papers/activpass.pdf); 10 pages)

> [Encrypting Your Laptop Like You Mean It](https://firstlook.org/theintercept/2015/04/27/encrypting-laptop-like-mean/) and [Passphrases that You Can Memorize, but that Even the NSA Can’t Guess](https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess/) – Micah Lee at The Intercept

> [SEC Adopts Rules to Facilitate Smaller Companies’ Access to Capital](http://www.sec.gov/news/pressrelease/2015-49.html#.VRRoI9YQHdT) – the SEC’s press sheet and fact sheet on its revisions to Regulation A. Also: [pdf](http://www.sec.gov/rules/final/2015/33-9741.pdf) of the Final Rules and supplementary information (454 pages).

> [The Mission to Save the Internet by Rewiring it from the Name Up](http://motherboard.vice.com/read/the-internet-of-names) – Motherboard/Vice

> [China Rates its Own Citizens, Including Online Behavior](http://www.volkskrant.nl/buitenland/china-rates-its-own-citizens-including-online-behaviour~a3979668/) – Volkskrant; and [Planning Outline for the Construction of a Social Credit System (2014-2020)](https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020/) – China Copyright and Media

> #### General Interest

> [Natural Police: Seen through Game Theory, Cancer and Police Corruption are Pretty much the Same Thing, and for One of Them, There’s a Cure](http://aeon.co/magazine/society/game-theorys-cure-for-corruption-make-us-all-cops/?utm_source=Aeon+newsletter&utm_campaign=34c7085ad6-Daily_newsletter_May_11_20155_11_2015&utm_medium=email&utm_term=0_411a82e59d-34c7085ad6-68671829) – Aeon

> [Where the Real Skyscrapers Are; Hint: North Dakota](http://www.archdaily.com/625418/where-the-real-skyscrapers-are-hint-north-dakota/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+ArchDaily+%28ArchDaily%29) – ArchDaily on TV masts as some of the tallest structures in the world

> [The Messy Business of Reinventing Happiness: Inside Disney’s Radical Plan to Modernize its Cherished Theme Parks](http://www.fastcompany.com/3044283/the-messy-business-of-reinventing-happiness#!) – FastCompany

> [ZPM Expresso and the Rage of the Jilted Crowdfunder](http://www.nytimes.com/2015/05/03/magazine/zpm-espresso-and-the-rage-of-the-jilted-crowdfunder.html) – New York Times; but see Professor James Grimmelmann [Riskstarter; Kickstarter is a Tool for Managing Risk](http://2d.laboratorium.net/post/118123399970/riskstarter). Also: [A Crowdfunded Startup Explains why Crowdfunding can be a Complete Disaster](http://www.theverge.com/2015/1/27/7920963/lockitron-bolt-door-lock) – Verge

> [New Study Shows that People Stop Listening to New Music at 33](http://www.avclub.com/article/new-study-shows-people-stop-listening-new-music-33-218752) – A.V.Club

05/11/2015: 

Second Circuit Bulk Collection Decision (link roundup)

The Opinion: [pdf](http://www.ca2.uscourts.gov/decisions/isysquery/5b758b27-c77d-44a2-b6e5-dbf456f5c142/1/doc/14-42_complete_opn.pdf#xml=http://www.ca2.uscourts.gov/decisions/isysquery/5b758b27-c77d-44a2-b6e5-dbf456f5c142/1/hilite/) (110 pages)

News Reports:

[NSA Program on Phone Records is Illegal, Court Rules](http://www.washingtonpost.com/world/national-security/appeals-court-rules-nsa-record-collection-violates-patriot-act/2015/05/07/c4fabfb8-f4bf-11e4-bcc4-e8141e5eb0c9_story.html) – Washington Post

[NSA Phone Program is Illegal, Appeals Court Rules](http://www.wsj.com/article_email/appeals-court-rules-nsa-phone-program-not-authorized-by-patriot-act-1431005482-lMyQjAxMTA1MDA2NzcwNTc0Wj) – Wall Street Journal

Audio Summary for Laypersons: Professor William McGeveran on [Wisconsin public radio](http://www.wpr.org/listen/755961) (approx. 10 minutes)

Analysis and Opinion:

[Second Circuit Rules that Section 215 Does Not Authorize Telephony Bulk Collection Program](http://justsecurity.org/22799/breaking-circuit-rules-section-215-authorize-telephony-bulk-collection-program/) – Marty Lederman at Just Security

[Second Circuit Rules, Mostly Symbolically, that Current Text of Section 215 Doesn’t Authorize Bulk Surveillance](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/07/second-circuit-rules-mostly-symbolically-that-current-text-of-section-215-doesnt-authorize-bulk-surveillance/) – Orin Kerr in the Washington Post

[Court Backs Snowden, Strikes Secret Laws](http://www.bloombergview.com/articles/2015-05-07/court-backs-snowden-strikes-secret-laws?cmpid=yhoo) – Noah Feldman at BloombergView

Background Legal Paper by an Attorney for one of the Amici Curiae: [Bulk Metadata Collection: Statutory and Constitutional Considerations](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2344774) by Laura Donohue (2013)(pdf download at the link)

Impact on Patriot Act Section 215 Status/Sunset:

[How the Second Circuit’s Decision Changes the Legislative Game](http://www.lawfareblog.com/2015/05/how-the-second-circuits-decision-changes-the-legislative-game/) – Liza Goiten at LawFare

[The Second Circuit and the Politics of Surveillance Reform](http://justsecurity.org/22839/circuit-politics-surveillance-reform/) – Steve Vladeck at Just Security

Related:

[If the Supreme Court Tackles the NSA in 2015, It’ll be One of these Five Cases](http://arstechnica.com/tech-policy/2015/01/if-the-supreme-court-tackles-the-nsa-in-2015-itll-be-one-of-these-five-cases/) – The Hill

05/8/2015: 

Recording the Police

[What to Say When the Police Tell You to Stop Filming Them](http://www.theatlantic.com/technology/archive/2015/04/what-to-say-when-the-police-tell-you-to-stop-filming-them/391610/) – The Atlantic

**Legal Background:**

[A Due Process Right to Record the Police](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2043907) – Glenn Reynolds and John Steakley (pdf download at the link)

[Citizen Recordings of Police in Public Places — First Amendment Protection?](http://concurringopinions.com/archives/2015/04/fan-58-first-amendment-news-citizen-recordings-of-police-in-public-places-first-amendment-protection.html) – A very good legal roundup at Concurring Opinion

**Helpful Apps:**

[It’s Your Right to Film the Police; These Apps Can Help](http://www.wired.com/2015/05/right-film-police-apps-can-help/) – Wired

[New ACLU Mobile Justice App Empowers Public to Safeguard Rights](https://www.aclunc.org/blog/new-aclu-mobile-justice-app-empowers-public-safeguard-rights) – ACLU of Northern California

Two Recent Podcasts of Note:

[Striking a Balance – Whistleblowing, Leaks and Security Secrets](http://www.lawfareblog.com/2015/05/the-lawfare-podcast-episode-121-striking-a-balance-whistleblowing-leaks-and-security-secrets/) (LawFare podcast)
> Key portion: 00:07:29 (after intro and panelist bios) to 01:32:30 (when audience Q&A starts)
A discussion amongst Bob Litt (General Counsel for the Office of the Director of National Security), Ken Dilanian (Associated Press), Gabriel Schoenfeld (Hudson Institute) and Steve Vladeck (LawFare), about leaks, whistleblowing, the Espionage Act and Snowden.

[Stewart Baker Discussion with Bruce Schneier](http://www.lawfareblog.com/2015/05/steptoe-cyberlaw-podcast-episode-65-an-interview-with-bruce-schneier/) (Steptoe CyberLaw podcast)
> Key portion: 24:18 to 58:30
Bruce Schneier and Stewart Baker tangle on a variety of topics, including the wisdom and legality of “hacking back”, Bruce’s book “Data and Goliath” and some general surveillance/privacy matters. Nothing particularly new here, but always interesting to hear these two – from opposite ends of the spectrum – tangle.

We Were Promised Jetpacks . . .


Jetpack demonstration at the Calgary Stampede circa 1966; image © 2015 Edward McHale, all rights reserved

###. . . And We Are Getting Amazing Things. Recent Tech Developments:

> **Quantum Computers:**

> [Scientists Achieve Critical Steps to Building First Practical Quantum Computer](http://phys.org/news/2015-04-scientists-critical-quantum.html) – Phys.Org

> [IBM Brings Quantum Computing a Step Closer](http://blogs.wsj.com/digits/2015/04/29/ibm-brings-quantum-computing-a-step-closer/) – Wall Street Journal

> [What Can We Do with a Quantum Computer?](https://www.ias.edu/ias-letter/ambainis-quantum-computing) – Institute for Advanced Study.

> [We’re Entering a Golden Era of Quantum Computing Research](http://asmarterplanet.com/blog/2015/04/golden-era-quantum-computing.html) – SmarterPlanet

> **Electromagnetic Space Drives:**

> [New Test Suggests NASA’s ‘Impossible’ EM Drive Will Work In Space](http://io9.com/new-test-suggests-nasas-impossible-em-drive-will-work1701188933utm_campaign=socialflow_io9_facebook&utm_source=io9_facebook&utm_medium=socialflow) – i09

> [Evaluating NASA’s Futuristic EM Drive](http://www.nasaspaceflight.com/2015/04/evaluating-nasas-futuristic-em-drive/) – NASASpaceflight.com

> **Medical Diagnostics:**

> [New Test Can Predict Cancer up to 13 Years Before Disease Develops; People Who Develop Cancer have Shorter Telomeres, the Caps at the End of Chromosomes which Protect the DNA](http://www.telegraph.co.uk/news/11574893/New-test-can-predict-cancer-up-to-13-years-before-disease-develops.html) – The Telegraph

> **Gene Modification:**

> [Chinese Scientists Genetically Modify Human Embryos; Rumours of Germline Modification Prove True and Look Set to Reignite an Ethical Debate](http://www.nature.com/news/chinese-scientists-genetically-modify-human-embryos-1.17378) – Nature

> [Full Text](http://link.springer.com/article/10.1007/s13238-015-0153-5/fulltext.html) of the Chinese Scientists’ Research Paper

> [Editing Human Embryos: So This Happened](http://phenomena.nationalgeographic.com/2015/04/22/editing-human-embryos-so-this-happened/) – National Geographic

> [These are the Countries Where it’s ‘Legal’ to Edit Human Embryos (hint: the U.S.A. is one)](http://www.businessinsider.com/china-edited-human-genome-laws-2015-4) – Business Insider

> **Military Tech:**

> [The US Military Is Getting Closer to Creating Self-Guided Bullets](http://www.vice.com/en_ca/read/what-we-know-about-the-us-militarys-self-guided-bullets-501) – Vice

05/6/2015: 

Department of Defense’s Updated Cyber Strategy

**The DoD Report:** Department of Defense’s April 2015 Cyber Strategy Report ([pdf](http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf); 42 pages)

**News Coverage:**

[What’s New in the U.S. Cyber Strategy](http://www.washingtonpost.com/blogs/monkey-cage/wp/2015/04/24/whats-new-in-the-u-s-cyber-strategy/) – Washington Post

[Pentagon Announces New Strategy for Cyberwarfare](http://www.nytimes.com/2015/04/24/us/politics/pentagon-announces-new-cyberwarfare-strategy.html)- New York Times

**Analysis:**

[Two Observations About The New DOD Cyber Strategy](http://www.lawfareblog.com/2015/04/two-observations-about-the-new-dod-cyber-strategy/) – LawFare

[Rebooting DOD’s Cyber Strategy](http://justsecurity.org/22444/rebooting-dods-cyber-strategy/) – Professor Kristen Eichensehr (UCLA) at Just Security

**Related:** [Transcript](http://www.defense.gov/Transcripts/Transcript.aspx?TranscriptID=5621) of Defense Secretary, Ashton Carter’s speech April 23rd at Stanford University

05/5/2015: 

Quote of the Day:

> “There is no argument whatsoever that the proliferation of devices and information are empowering. It is categorically true, not to mention obvious, that technology is today far more democratically available than it was yesterday and less than it will be tomorrow. 3D printing, the whole ‘maker’ community, DIY biology, micro-drones, search, home automation, constant contact with whomever you choose to be in constant contact with — these are all examples of democratizing technology. This is perhaps our last fundamental tradeoff before the Singularity occurs: Do we, as a society, want the comfort and convenience of increasingly technologic, invisible digital integration enough to pay for those benefits with the liberties that must be given up to be protected from the downsides of that integration? If, as Peter Bernstein said, risk is that more things can happen than will, then what is the ratio of things that can now happen that are good to things that can now happen that are bad? Is the good fraction growing faster than the bad fraction or the other way around? Is there a threshold of interdependence beyond which good or bad overwhelmingly dominate? Now that we need cybersecurity protections to the degree that we do, to whom does the responsibility devolve? If the worst laws are those that are unenforceable, what would we hope our lawmakers say about technologies that are not yet critical but soon will be?”

— Dan Geer on [Where the Science is Taking Us in Cybersecurity](http://geer.tinho.net/geer.georgetown.27iv15.txt); as they say, read the whole thing.

05/5/2015: