Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Legal Research

Cryptologic Library Catalogue Published

“The National Cryptologic Museum, located adjacent to the National Security Agency at Ft. George G. Meade, Maryland, has a reference library containing a collection of unclassified and declassified books and documents relating to every aspect of cryptology. The Museum Library has helpfully published its catalogue online upon request: CryptoLibraryCatalogue The home page for the National… Continue Reading

GAO Reports – Highway Trust Fund, Army Working Capital Fund, Defense Facility Condition, Defense Health Care, Federal Prison System, Commercial Space

Highway Trust Fund Administrative Expenses of the Federal Highway Administration, GAO-16-631R :Published: Jun 24, 2016. Publicly Released: Jun 24, 2016 Army Working Capital Fund: Army Industrial Operations Could Improve Budgeting and Management of Carryover, GAO-16-543: Published: Jun 23, 2016. Publicly Released: Jun 23, 2016 Defense Facility Condition: Revised Guidance Needed to Improve Oversight of Assessments… Continue Reading

Agreement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies

“The Wassenaar Arrangement has been established in order to contribute to regional and international security and stability, by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilising accumulations. The aim is also to prevent the acquisition of these items by terrorists. Participating States seek, through their… Continue Reading

MSU McLellan Free Expression Online Library

“MSU Law’s First Amendment Law Clinic is the only clinical program in the country solely dedicated to the protection of student speech and press rights. Now, a $500,000 donation from leading Michigan attorney and MSU Law Trustee Richard D. McLellan will expand the clinic’s impact nationwide by creating a Free Expression Online Library and Resource… Continue Reading

USNews article – Google as global censor across all its brands

Robert Epstein, June 22, 2016: Google, Inc., isn’t just the world’s biggest purveyor of information; it is also the world’s biggest censor. “…But as the golden gateway to all knowledge, Google has rapidly become an essential in people’s lives – nearly as essential as air or water. We don’t let public utilities make arbitrary and… Continue Reading

CDC investigation: Blood lead levels higher after switch to Flint River water

“The Centers for Disease Control and Prevention (CDC) today released the results of its investigation into the potential health impact that lead contamination in the Flint, Michigan water supply had on the blood lead levels of local children.  The findings indicate that when the source of the water supply was switched to the Flint River,… Continue Reading

FTC Guidance – Online Tracking

FTC – Online Tracking: “Have you ever wondered why some online ads you see are targeted to your tastes and interests? Or how websites remember your preferences from visit-to-visit or device-to-device? The answer may be in the “cookies” – or in other online tracking methods like device fingerprinting and cross-device tracking. Here are answers to… Continue Reading

Supreme Court Justice uses link shortener in decision

Via Fortune after Josh Blackman’s blog posting on this subject: “A Supreme Court decision got huge attention this week for a stinging dissent by Justice Sotomayor that some have called the court’s “Black Lives Matter” moment. But the decision is also significant because it contains a strange short phrase — http://goo.gl/3Yq3Nd No, that’s not a… Continue Reading

Federal Court: The Fourth Amendment Does Not Protect Your Home Computer

Via EFF, Mark Rumold: “In a dangerously flawed decision unsealed today, a federal district court in Virginia ruled that a criminal defendant has no “reasonable expectation of privacy” in his personal computer, located inside his home. According to the court, the federal government does not need a warrant to hack into an individual’s computer. This… Continue Reading

memhole2 expands resources page

The Memory Hole 2 Resources – “The Memory Hole 2 – run by Russ Kick – saves important documents from oblivion. Its predecessor, The Memory Hole (2002-2009), posted hundreds of documents, many of which will be reposted on the new site.” Continue Reading

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to… Continue Reading

Continued Decline in Patent Lawsuits

“The latest available data from the federal courts show that during the first eight months of fiscal year 2016 the government reported the filing of 3,478 patent-related lawsuits. If this pace continues through the remaining four months, there will be a total of 5,217 new filings of this type. This represents a decrease of 6.2… Continue Reading