Blogs

Oct
14

In 2007, a former Google executive, Brian Reid, was discharged from Google. Shortly afterwards, Reid filed a lawsuit claiming that he was discriminated based on his age. Reid cited being called an “old man,” an “old-fuddy duddy,” and being told that his ideas were “too old to matter.” Ultimately, the case was settled outside of

Oct
14

How the NSA Has Failed to Implement Secure Procedures Post-Snowden, and the Most Recent Case of Stolen Confidential Material from The U.S. Government Following the close of an investigation conducted by the Federal Bureau of Investigation (“FBI”) and the United States Department of Justice into the potential leak of classified national security information by Presidential

Oct
13

A new trend in the seemingly lawless land of the internet are controls that regulate how we use the internet.  These shadow regulations, as the Electronic Frontier Foundation has dubbed them, are now increasingly being established through private industry agreements.  They are typically voluntary agreements between companies, unknown to the public, and affect activities conducted

Oct
13

On Saturday, 1 October 2016, House Bill 972 went into effect across North Carolina.  Just the night prior, the Charlotte Mecklenberg Police Department announced it would release the entire dash camera and body camera footage capturing the events of the 20 September police-shooting death of Keith Lamont Scott.  That announcement looks to be the last

Oct
08

The Obama Administration made it a top priority to prevent Medicare and Medicaid fraud, and its efforts have yielded great results. This past summer, the Administration announced that with sophisticated detection methods like “big data” and predictive analytics, the Center for Medicare and Medicaid Services (CMS) was able to prevent $42 billion of improper payments

Oct
07

With the heavy-hitting protections of the First Amendment, the freedom of speech, and the Second Amendment, the right to bear arms, it would seem that 3D printed firearms and the sharing of associated blueprints would be doubly protected. However, the “Liberator” handgun (shown in the video above) may be protected by neither, in the name

Oct
07

Ever since the iCloud hack of August 2014 we have known that our “cloud” based system of data storage is imperfect. What was commonly referred to as “Celebgate” showcased the probable fallacies of the cloud system when 500 celebrities had their personal pictures hacked and displayed for the whole world see. The scare left cloud

Oct
06

If you own an Apple device, you, along with more than 55 million Americans, are probably oblivious to the fact that Apple may be compelled to share your iMessage contact information with law enforcement. Apple, in their privacy policy, promotes that they protect the content of iMessages through encryption on both users’ end of communication

Oct
06

Immigrations and Customs Officials (ICE) increasingly use GPS tracking devices to locate and track illegal immigrants in the U.S. Immigrants who arrive in the U.S. illegally are likely to be eventually identified by ICE officials.  They are then located, arrested, and hauled before a judge.  The judge may, among other things, order hearings to be

Categories