(by Connor Boe, TLPC alum)
Data collection, analysis, and storage is cheaper and more reliable than ever before. This advancement in technology is constantly improving public services specifically in services dedicated to emergency response. The adoption of new technologies to increase the amount and diversity of information that public safety entities have access to during an emergency response is called Next Generation 911 (NG911). In a NG911 world, the proliferation of data when responding to emergencies will inevitably increase in size and scope. Though the receipt, processing, analysis, and storage of more data in emergency responses will be beneficial for public safety, it may also create complexities for existing statutory and regulatory obligations these entities have. Specifically, these systems have the potential to complicate state open records law compliance, privacy and data protection obligations, and chain-of-custody rules of evidence. Policy makers, emergency services, and vendors of these services need to consider the legal implications before deploying NG911 systems and not after the fact.
The benefits and drawbacks when choosing to adopt NG911 systems are far reaching. The architecture choices local governments make have the potential to rewrite the public safety answering points relationship with the general public and public safety entities. Advocates and practitioners need to understand that after data is collected by the government in response to an emergency, the information that they collect will be highly scrutinized by the communities in which they serve. These NG911 data management systems need to strike a balance between public safety, personal privacy, the rule of law, and government transparency that is acceptable to all the stakeholders in the community.
Working with several 911 stakeholders, the TLPC drafted and is pleased to release the attached white paper, which discusses attempts to discuss how the architecture of NG911 systems will impact existing legal obligations and discuss the opportunities that local governments will have when adopting these systems.
(by Justin Manusov, Colorado Law 3L)
Hacking. Tapping. Cracking. Medjacking.
In the TV show Homeland episode Broken Hearts, a CIA informant is forced to retrieve a serial number that corresponds to the American Vice President’s pacemaker. A terrorist gains access to the VP’s pacemaker, accelerates his heartbeat and induces a heart attack.
Former Vice President Dick Cheney revealed that when he had a device implanted to regulate his heartbeat in 2007, he had his doctors disable its wireless capabilities to prevent a possible assassination attempt.
The health IT community is beginning to take medjacking seriously.
Continue reading “Last Week in Tech Policy #57: Medjacking”
(by Kristine Roach, Colorado Law 2L)
After the Unite the Right rally and associated violence in Charlottesville, NC on the weekend of Aug 11th, internet platforms and domain name providers responded by taking down content from The Daily Stormer, a neo-Nazi website that had encouraged some of the weekend’s events, raising a complicated debate over the responsibility that online platforms bear for hate speech, harassment, and violence, the concentration of power online, and free speech.
Continue reading “Last Week in Tech Policy #51: Internet Platforms and Violent Content”
After the release of the Federal Communications Commission’s public notice seeking comment on 911 applications, student attorney Eilif Vanderkolk filed a reply comment addressing the issues of locational data, interface design, and cybersecurity in 911 smartphone applications. These issues were previously raised by TLPC in the whitepaper published by the Clinic last fall, and remain important during the NG911 transition .
(by Zach Goldberg, Colorado Law 2L)
Norway has begun phasing out analog FM radio by shutting down broadcasts in certain parts of the country. The switch began at 11:11 am on January 11 Nordland, a county in northern Norway, and within a year, the Norwegian government plans to transition the entire country to Digital Audio Broadcasting (“DAB”). Under this new regulatory scheme, only 200 or so small local stations will be permitted to broadcast on FM frequencies.
This post explores the past, present, and future of the transition.
Continue reading “Last Week in Tech Policy #41: FMExit—Norway’s Transition from FM Radio to Digital Audio Broadcasting”
(by Zach Goldberg and Eilif Vanderkolk, TLPC Student Attorneys)
Over the past several months, the TLPC, in collaboration with the National 911 Program, has researched problems burdening 911 call centers, with the aim of discovering solutions to improve the efficiency of emergency response throughout the country. Specifically, we have examined the negative impact of calls made from non-service-initialized devices (“NSIDs”) and high non-emergency 911 call volume upon the efficacy of public safety answering points (PSAPs). We aimed to gain deeper understanding of how 911 systems work, the difficulties they face, and how changes in law and policy, technology, and consumer awareness and behaviors might help. However, crafting effective solutions to these problems is difficult because the factors contributing to high non-emergency 911 call volume figures are complex, and reliable, precise studies and data is scarce. We explore these problems in the attached white paper.
(by Zach Goldberg, TLPC Student Attorney)
Over the past month, the TLPC has researched autonomous vehicle technology and its susceptibility to physical layer cyber attacks, with the aim of encouraging research and development efforts to counteract such threats. We sought to gain deeper understanding of the communication systems that enable autonomous vehicle technology, the vulnerabilities of these systems to jamming and spoofing attacks, and possible defenses against such attacks. We explore these issues in the attached comment, filed in the National Highway Traffic Safety Administration’s latest proceedings relating to autonomous vehicle safety and vehicular cyber security.
• Autonomous Vehicle Jamming and Spoofing Comment
(By Eilif Vanderkolk, Colorado Law 2L)
A Speedy Manhunt
In mid-September, Ahmad Khan Rahami allegedly committed terrorist bombings in Manhattan and the Jersey Shore . Rahami was arrested on the Monday following the bombings, shortly after New York officials had issued a Wireless Emergency Alert (WEA) naming Rahami as the primary suspect. The alert, received by all smartphones located in the five Boroughs that had not opted out, looked like this:
WANTED: Ahmad Khan Rahami, 28-yr-old male. See media for pic. Call 9-1-1 if seen.
Continue reading “Last Week in Tech Law & Policy, Vol. 37: Wireless Emergency Alerts Improved by Federal Communications Commission”
(by Ellis Dobkin, Colorado Law 2L)
Many of our discussions deal with the struggles of government regulation in the Internet age. This week’s blog post focuses on the issues that 3D-printed firearms pose and the problems with potential regulation.
Continue reading “Last Week in Tech Law and Policy, Vol. 20: Regulating 3D-Printed Firearms”
This semester, TLPC student attorneys Victoria Naifeh, Allison Daley, and Elizabeth Chance and student technologist Jeff Ward-Bailey worked with the Colorado Public Utilities Commission’s 911 task force to research the legal landscape surrounding 911 accessibility for the deaf, deaf-blind, hard of hearing, and speech disabled communities in Colorado. The final project, a white paper summarizing the research, is now available here and on the the Social Sciences Research Network: