(By Max Brennan, Colorado Law 2L)
This week’s blog post examines the concept of algorithm bias. It begins with a definition of algorithm bias, turning to its interactions with the law, some real-world examples of bias, and ends with considerations for future legal treatment of algorithm bias.
Continue reading “Last Week in Tech Law & Policy, Vol. 34: Algorithm Bias, Discrimination, and the Law”
In 2007 China tested an anti-satellite missile against one of its decommissioned weather satellites 800km above the earth in an explosion, creating 100,000 new pieces of orbital debris in a single instant. In 2009 a commercial Iridium communications satellite and a defunct Russian satellite collided over Siberia creating over 2,000 of pieces of debris capable of being tracked and even more that we cannot yet see. In 2015 the ISS performed a Red Conjunction where the crew evacuated to the Soyuz escape craft while a piece of debris passed close to the station without enough warning for a debris avoidance maneuver.
Even higher in orbit, there are many more defunct spacecraft posing risks to geostationary satellites. Since Sputnik first blasted its way into space in 1957, thousands of satellites have been sent into orbit around the Earth. But what happens to these satellites once they are no longer used?
Continue reading “Last Week In Tech Law & Policy, Vol. 33: Space Junk, A Growing Threat to the Future of Space Access”
(by Kiki Council, Colorado Law 3L)
Last week’s blog post concerned the ramifications of sponsored and compelled government hacking with the use of backdoor encryption. This week’s post concerns how government hacks of computers using the Tor browser, and whether those hacks are considered a “search” under the Fourth Amendment.
Continue reading “Last Week in Tech Law & Policy, Vol. 32: Is government hacking a “search” under the Fourth Amendment?”
(by Colter Donahue, Colorado Law 3L)
Should government agencies possess, compel, or sponsor hacking and backdoors? A backdoor is a method of bypassing the normal authentication system of a website, messaging service, or other means of electronic communications.
Privacy and encryption advocates point out that the tools created or vulnerabilities exploited by backdoors pose a privacy risk. The vulnerabilities are not not limited to exploit by U.S. agencies like the FBI and NSA; bad actors and other nations can use them too. Hacking tools don’t always stay secret; once exposed, potential damage may be measured on a global scale. But what happens when law enforcement needs access for investigatory purposes? The following post will look at a recent example and the balance of competing interests.
Continue reading “Last Week in Tech Law & Policy, Vol. 31: Sponsored and Compelled Hacking, Government Edition”
(By Andrew Manley, Colorado Law 2L)
This week’s post considers the FCC’s hotly debated set top box proposal. It begins with the origins of the proposal, turning to competing arguments, next steps, and what the future holds for pay TV.
Continue reading “Last Week in Tech Law & Policy, Vol. 30: #UnlockTheBox vs. #DitchTheBox”