This week, Meta claimed (in a filing to support its motion to dismiss the copyright claims over using the torrented files to train their AI) that its not copyright infringement if the torrented files are not further seeded. Good luck with that claim, Meta. There has also been more discussion of whether the new DOGE…
Category: Computer Fraud & Abuse Act
Links for Week of February 14, 2025
This week, I liked Professor Guadamuz’s recap of the current state of AI and copyright ownership. There have been more developments in the new DOGE department’s access to data, including three lawsuits. Finally, there has been some good commentary on the Thomson Reuters v Ross copyright case over the copyrightability of the Westlaw Headnotes system….
Links for Week of February 7, 2025
Here’s a scary one – certain apps that had been approved to be on the Apple and Google Play app stores were found to have malware that used OCR on the device’s photo library to look for stored crypto passwords. New allegations were made that Meta torrented 81.7 terrabytes of pirated content to train its…
Links for Week of July 21, 2023
So what has your AI been trained upon? A group of authors requests that their copyrighted works not be used for that purpose. Further, for many years American military emails (.MIL) have been mis-sent to Mali (.ML) due to typos. Now, that domain is being transferred back to that country’s control. Finally, I was very…
Interesting presentation on Cybercrime
Here’s a link to Jonathan Frieden’s post entitled “Defending a Criminal Case in a Cyber World” where he posts the outline of his recent talk on the subject. If you follow my blog regularly I’m sure this will be of interest to you.
Butera & Andrews v. IBM – Employer not liable for intentional hacking by unknown IBM employee
Butera & Andrews v. International Business Machines Corporation, 456 F.Supp.2d. 104, (1:06-CV-647, D. of Columbia, Order granting Motion to Dismiss, October 18, 2006.) Plaintiff Butera & Andrews is a law firm that specializes in federal government relations and litigation. It detected unauthorized intrusions into its computer systems in November of 2005. Security consultants tracked the…