Category Archives: Security

Links of Note – April 22 2016

Here are this week’s links from Twitter (@Cyberlaw):

News and @cyberlaw Links

For those of you who are interested, I’ll be presenting on “Common Trademark Application Problems” on November 2, 2011 as part of my firm’s IP Webinar series. For more information and links to the free registration, click here.

Some recent links I found particularly interesting on Twitter include:

Net Neutrality Case Heads to D.C. Circuit

A challenge to the FCC’s new Network Neutrality rules will be heard by the D.C. Circuit, which in the past has been tough on the FCC.


Computer Virus Hits U.S. Drone Fleet

It’s a pretty sad state of affairs when higher up military leaders learn that their drones have been infected with a computer virus from reading this article in WIRED.


Tracking the Trackers: When Everyone Knows Your Username

Jonathan Mayer’s article describing his research into web usage tracking is an excellent read.



If you’ve ever had your email hacked, you can sympathize with this great article from the Atlantic.

Securing Your Wireless Network

As I’ve discussed previously on the blog, there are many cases currently pending involving the filesharing of copyright-protected videos involving BitTorrent. Many of the potential defendants in these cases first receive notice of the lawsuit when they receive a letter from their ISP that their identity will be disclosed to the Plaintiff by a certain… Continue Reading

ACLU challenges Suspicionless Laptop Border Searches

Today, the ACLU and related parties filed a class-action lawsuit challenging the U.S. Government’s policy of allowing suspicionless searches and seizures of laptops and other electronic devices at the border. The allegations include violations of the First and Fourth amendments. It is seeking a declaration that the Department of Homeland Security policies, which are restatements… Continue Reading

What does “search incident to arrest” mean today?

A good article over at the Wall Street Journal on the recent controversy over warrantless searches of laptops was pointed out to me by Venkat Balasubramani. Thanks, Venkat! The article is worth reading as it discusses the recent cases involving searches of electronic items at the border (based upon a “reasonable suspicion” test), and contrasts… Continue Reading

So why is it difficult to properly legislate for Cyberspace?

Ryan Blitstein asks this question in a great article at the Mercury News, here is the link. To summarize, the difficulties include legislators who don’t understand the technology, as well as companies that fight good laws because the proposed law hurts their bottom line. Special interests, as usual, appear to have more sway than implementing… Continue Reading

Detecting government spyware

Here’s an interesting article, written by Declan McCullagh and Anne Broache, entitled “Will security firms detect policy spyware?” There are currently no rules that specifically require companies to comply with requests for government spyware to be installed on users’ machines. There similarly is no current requirement for anti-spyware vendors to write software that doesn’t detect… Continue Reading

Be Proactive: Know Your Systems and People Before Facing a Lawsuit

The following is an article I wrote about the recent changes to the Federal Rules of Civil Procedure and its impact on record keeping responsibilities and issues. —- As of December 1, 2006, the Federal Courts have adopted new Federal Rules of Civil Procedure that explicitly acknowledge the fact that information that may be relevant… Continue Reading