Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

How to opt out of unwanted communications

Vox – How to opt out of everything from credit card offers to group texts – 9 useful tips and resources, with the last not actually achievable – reclaiming your online privacy from government surveillance.

Constitution Annotated

Via Congress.gov – “The Constitution of the United States of America: Analysis and Interpretation (popularly known as the Constitution Annotated) contains legal analysis and interpretation of the United States Constitution, based primarily on Supreme Court case law. This regularly updated resource is especially useful when researching the constitutional implications of a specific issue or topic.Continue Reading

RAND – A Database of U.S. Security Treaties and Agreements

RAND – “Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including itsContinue Reading

White House Office of Administration Not Subject to FOIA Regulations

Removal of Published Rules To Align Published Policy with Current Sources of Law – A Rule by the Administration Office, Executive Office of the President on 03/17/2015. Final rule. “The Executive Office of the President, Office of Administration, is removing regulations from the Code of Federal Regulations related to the status of records created andContinue Reading

The Intercept – TSA’s Secret Behavior Checklist to Spot Terrorists

Jana Winter and Cora Currier – The Intercept: “Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, accordingContinue Reading

The Productivity of Working Hours

The Productivity of Working Hours, John Pencavel, April 2014. Stanford University and Institute for the Study of Labor, Bonn – Germany. “Observations on munition workers, most of them women, are organized to examine the relationship between their output and their working hours. The relationship is nonlinear: below an hours threshold, output is proportional to hours;Continue Reading

Assigning More Students to Their Top Choices: A Tiebreaking Rule Comparison

Ashlagi, Itai and Nikzad, Afshin and Romm, Assaf I, Assigning More Students to Their Top Choices: A Tiebreaking Rule Comparison (March 2015). Available for download at SSRN: http://ssrn.com/abstract=2585367 “School choice districts that implement stable matchings face various design issues that impact students’ assignments to schools. We study properties of the rank distribution of students withContinue Reading

How the Volcker Rules Became an 8 Billion Annual Business

Via AmericanBanker.com, John Heltman (free to non-subscribers): “The Office of the Comptroller of the Currency — one of the five regulatory agencies that had to write and implement the Volcker Rule — estimated the cost of compliance at just under $1 billion when it conducted a cost-benefit analysis of the proposal back in 2011. AContinue Reading

Even more unwanted software protection via the Safe Browsing API

Google Online Security Blog: ” Deceptive software disguised as a useful download harms your web experience by making undesired changes to your computer. Safe Browsing offers protection from such unwanted software by showing a warning in Chrome before you download these programs. In February we started showing additional warnings in Chrome before you visit aContinue Reading

Detekt – free tool that scans your Windows computer for traces of commercial surveillance spyware

Via FastCoExit: “Spyware like FinFisher contributes to a multi-billion dollar business. But until last week, activists had few ways to defend themselves, aside from the well-placed bit of duct tape over the computer camera and rigorous digital hygiene practices. That’s why Amnesty International, Privacy International, Digitale Gesellschaft, and the Electronic Frontier Foundation rolled out aContinue Reading

FCC Releases Redacted Manual for Mobile Surveillance

Follow up to previous posting – StingRay surveillance device intercepts a cellphone signals, capture texts, calls, emails and other data – via Slate, via TheBlot: A heavily redacted copy of the 2010 manual for StingRay and KingFish mobile data surveillance equipment was released by the FCC in response to a FOIA request by TheBlot overContinue Reading

United Nations To Create Special Rapporteur on Right to Privacy

EPIC: “The UN Human Rights Council has adopted a resolution on The Right to Privacy in the Digital Age that will lead to the selection of an independent expert on privacy. According to the resolution, the special rapporteur will have a broad mandate to assess developments, make recommendations, and promote the right to privacy. EPICContinue Reading