Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

CDC investigation: Blood lead levels higher after switch to Flint River water

“The Centers for Disease Control and Prevention (CDC) today released the results of its investigation into the potential health impact that lead contamination in the Flint, Michigan water supply had on the blood lead levels of local children.  The findings indicate that when the source of the water supply was switched to the Flint River,… Continue Reading

The New World Atlas of Artificial Sky Brightness

Cooperative Institute for Research in Environmental Sciences – “Light pollution in urban centers creates a sky glow that can blot out the stars. The brighter the area in this zoomable map, the harder it is to see stars and constellations in the night sky. In the United States, national parks are often a refuge for… Continue Reading

How does land-based pollution threaten coral reefs?

NOAA infographic – “Many serious coral reef ecosystem stressors originate from land-based sources, most notably toxicants, sediments, and nutrients. Impacts from land-based sources of pollution—including coastal development, deforestation, agricultural runoff, and oil and chemical spills—can impede coral growth and reproduction, disrupt overall ecological function, and cause disease and mortality in sensitive species. It is now… Continue Reading

FTC Guidance – Online Tracking

FTC – Online Tracking: “Have you ever wondered why some online ads you see are targeted to your tastes and interests? Or how websites remember your preferences from visit-to-visit or device-to-device? The answer may be in the “cookies” – or in other online tracking methods like device fingerprinting and cross-device tracking. Here are answers to… Continue Reading

Whole Genome Sequencing: Cracking the Genetic Code for Foodborne Illness

“A person commits a crime, and the detective uses DNA evidence collected from the crime scene to track the criminal down. An outbreak of foodborne illness makes people sick, and the U.S. Food and Drug Administration (FDA) uses DNA evidence to track down the bacteria that caused it. Sound far-fetched? It’s not. The FDA has… Continue Reading

Supreme Court Justice uses link shortener in decision

Via Fortune after Josh Blackman’s blog posting on this subject: “A Supreme Court decision got huge attention this week for a stinging dissent by Justice Sotomayor that some have called the court’s “Black Lives Matter” moment. But the decision is also significant because it contains a strange short phrase — http://goo.gl/3Yq3Nd No, that’s not a… Continue Reading

Income inequality in the U.S. by state, metropolitan area, and county

Income inequality in the U.S. by state, metropolitan area, and county – Report By Estelle Sommeiller, Mark Price, and Ellis Wazeter, June 16, 2016. Economic Policy Institute. “What this report finds: Income inequality has risen in every state since the 1970s and in many states is up in the post–Great Recession era. In 24 states,… Continue Reading

Federal Court: The Fourth Amendment Does Not Protect Your Home Computer

Via EFF, Mark Rumold: “In a dangerously flawed decision unsealed today, a federal district court in Virginia ruled that a criminal defendant has no “reasonable expectation of privacy” in his personal computer, located inside his home. According to the court, the federal government does not need a warrant to hack into an individual’s computer. This… Continue Reading

memhole2 expands resources page

The Memory Hole 2 Resources – “The Memory Hole 2 – run by Russ Kick – saves important documents from oblivion. Its predecessor, The Memory Hole (2002-2009), posted hundreds of documents, many of which will be reposted on the new site.” Continue Reading

KSN Report: Ransomware in 2014-2016 The evolution of the threat and its future

Kaspersky Lab, June 22, 2016: “Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely… Continue Reading

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to… Continue Reading

Paper – A More Timely House Price Index

Anenberg, Elliot and Laufer, Steven, A More Timely House Price Index (June 15, 2016). Available for download at SSRN: http://ssrn.com/abstract=2555765 “Using listings data, we construct a new repeat-sales house price index that describes house values at the contract date when the price is determined rather than the closing date when the property is transferred. We… Continue Reading