(by Zach Goldberg and Eilif Vanderkolk, TLPC Student Attorneys)
Over the past several months, the TLPC, in collaboration with the National 911 Program, has researched problems burdening 911 call centers, with the aim of discovering solutions to improve the efficiency of emergency response throughout the country. Specifically, we have examined the negative impact of calls made from non-service-initialized devices (“NSIDs”) and high non-emergency 911 call volume upon the efficacy of public safety answering points (PSAPs). We aimed to gain deeper understanding of how 911 systems work, the difficulties they face, and how changes in law and policy, technology, and consumer awareness and behaviors might help. However, crafting effective solutions to these problems is difficult because the factors contributing to high non-emergency 911 call volume figures are complex, and reliable, precise studies and data is scarce. We explore these problems in the attached white paper.
(by Zach Goldberg, TLPC Student Attorney)
Over the past month, the TLPC has researched autonomous vehicle technology and its susceptibility to physical layer cyber attacks, with the aim of encouraging research and development efforts to counteract such threats. We sought to gain deeper understanding of the communication systems that enable autonomous vehicle technology, the vulnerabilities of these systems to jamming and spoofing attacks, and possible defenses against such attacks. We explore these issues in the attached comment, filed in the National Highway Traffic Safety Administration’s latest proceedings relating to autonomous vehicle safety and vehicular cyber security.
• Autonomous Vehicle Jamming and Spoofing Comment
On today’s episode, 2L Andrew Manley talks to Bryan Tramont of Wilkinson Barker Knauer. Topics include the role of media and agencies in an increasingly political climate, writing statutes for constantly evolving industries, and the FCC’s incentive auction.
Music of the show is provided by Gino and the Goons:
Opening Theme: Troubles
Sign off music: On My Way
Licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International license.
(by Andi Wilt, Colorado Law 3L)
When is the last time you Googled someone’s name? There are many reasons why you might have done that. You could have been trying to learn more about someone who was about to interview you for a position, or maybe you were about to interview them, or even deciding whom you were going to interview in the first place. An applicant’s online presence is important to many employers, as one source indicates that 90% of executive recruiters say they do online research on applicants; up to 70% of employers who have used LinkedIn say they have decided not to hire someone based on something they learn about the applicant online.
So what’s the problem with a little online research about a person? Professor Latanya Sweeney found that a Google search for a black identifying name is 25 percent more likely to be accompanied by an arrest-related ad. Professor Sweeney explored the connection between “[b]lack-identifying” and “[w]hite-identifying” first names, which are “those for which a significant number of people have the name and the frequency is sufficiently higher in one race than another.” Continue reading “Last Week in Tech Law & Policy, Vol. 39: First Amendment Protection For Discriminatory Ads?”
(by Jodi Wallace, Colorado Law 2L)
On July 20, 1969, Neil Armstrong proclaimed, “That’s one small step for a man, one giant leap for mankind.” Buzz Aldrin followed, describing the moon’s surface with the words “magnificent desolation.” For a few short hours, the two men explored the lunar surface, gathered samples, and then climbed back aboard the lunar modular to come back to Earth.
47 years after Apollo 11 was launched to take the first astronauts to the moon, Elon Musk (chief executive of SpaceX) has announced his plans to create a permanent human settlement on the surface of Mars. But Elon Musk is not alone in this ambition—his announcement is only the most recent, and perhaps the broadest in scope.
Continue reading “Last Week in Tech Law & Policy, Vol. 38: Colonizing Mars—Fact or Fantasy?”
(By Eilif Vanderkolk, Colorado Law 2L)
A Speedy Manhunt
In mid-September, Ahmad Khan Rahami allegedly committed terrorist bombings in Manhattan and the Jersey Shore . Rahami was arrested on the Monday following the bombings, shortly after New York officials had issued a Wireless Emergency Alert (WEA) naming Rahami as the primary suspect. The alert, received by all smartphones located in the five Boroughs that had not opted out, looked like this:
WANTED: Ahmad Khan Rahami, 28-yr-old male. See media for pic. Call 9-1-1 if seen.
Continue reading “Last Week in Tech Law & Policy, Vol. 37: Wireless Emergency Alerts Improved by Federal Communications Commission”
(by Zachary Goldberg, Colorado Law 2L)
Apparently Yahoo waited two full months to disclose to its customers the largest consumer data breach in history, which Yahoo officials claim went undetected for two full years
On September 22, 2016, Yahoo officials announced that 500 million of its customers’ email accounts were hacked in 2014. The Yahoo security team believes that “state-sponsored hackers” somehow managed to penetrate Yahoo’s system to target its email users’ identifying information, passwords, and security question responses. At this stage in their investigation, Yahoo officials have not indicated precisely when they discovered the breach, and they know neither specific details as to who orchestrated it, nor how they gained access to Yahoo’s email system.
Continue reading “Last Week in Tech Law & Policy, Vol. 36: Another Yahoo! Data Breach? Personal Consumer Information and the U.S. Government’s Intelligence Collection Practices”
(By Sean Doran, Colorado Law 3L)
Both major political parties in the United States currently gather and aggregate massive amounts of data on American voters. Over the last several election cycles, with the advent of advanced data analytics and advances in data storage and processing, campaigns have gained the ability to learn and track a surprising amount of data about voters. This creates a level of precision that allows campaigns to build advanced models for identifying and targeting individual voters to receive (or not receive) individual messages (microtargeting). Parties are building “political dossiers” on American voters which are some of the largest, unregulated aggregations of personal data that currently exist.
Continue reading “Last Week in Tech Law & Policy, Vol. 35: Microtargeting and the Use of Voter Data to Win Elections”
(by Caroline Jones and Max Brennan, TLPC Student Attorneys)
Last week, the Federal Communications Commission released a public notice seeking comment on a petition by the Boulder Valley School District (BVSD) and the TLPC to help bridge the homework gap. BVSD seeks to connect the students in Boulder’s low-income housing communities to its high-speed fiber network so they can access the internet after school hours to do their homework.
The petition asks for a waiver certain provisions of the Federal Communications Commission’s (FCC) E-Rate Program, a federal program that provides subsidies for schools and libraries to obtain telecommunications services. The public notice also invites comment on a petition filed by Microsoft that asks the FCC to permit the use of TV White Spaces technology to extend a school’s internet access service to students’ homes for educational purposes.
The FCC has designated the period for public comment until November 3rd, 2016, with reply comments due December 5th, 2016. Interested parties may file comments on the FCC’s website.
(By Max Brennan, Colorado Law 2L)
This week’s blog post examines the concept of algorithm bias. It begins with a definition of algorithm bias, turning to its interactions with the law, some real-world examples of bias, and ends with considerations for future legal treatment of algorithm bias.
Continue reading “Last Week in Tech Law & Policy, Vol. 34: Algorithm Bias, Discrimination, and the Law”