Videogame Doesn’t Infringe Tattoo Copyright By Depicting Basketball Players
> This case deals with a venerable and vexing copyright law problem: if a person doesn’t own the copyright to his/her tattoos, do other people infringe by accurately depicting the person? The answer surely has to be “no.” Otherwise, ordinary daily activities, such as photos and videos in public, become an unnavigable thicket of potential liability. Fortunately, this case decisively reaches the right result. However, it’s unclear how much it predicts future cases.
> In an effort to avoid the biannual clock switch in spring and fall, some well-intended critics of DST have made the mistake of suggesting that the abolition of DST—and a return to permanent standard time—would benefit society. In other words, the U.S. would never “spring forward” or “fall back.”
> They are wrong. DST saves lives and energy and prevents crime. Not surprisingly, then, politicians in Washington and Florida have now passed laws aimed at moving their states to DST year-round.
This is interesting. There are definitely costs to shifting clocks, but that still leaves the question of what the ideal daylight hours are.
How Explaining Copyright Broke the YouTube Copyright System
> This is a story about how the most sophisticated copyright filter in the world prevented us from explaining copyright law. It doesn’t involve TikTok dance moves or nuanced 90s remixes featuring AOC. No, it involves a debate at a law school conference over how and when one song can infringe the copyright of another and how exactly one proves in a courtroom if the accused song is “substantially similar” enough to be deemed illegal. In the end, because it was blocked by one of the music companies who owns the song, it also became a textbook study in how fair use still suffers online and what it takes to pushback when a video is flagged. A copyright riddle wrapped up in an algorithmic enigma, symbolic of the many current content moderation dilemmas faced by online platforms today.
How the CIA used Crypto AG encryption devices to spy on countries for decades
Little Bay Islands relocation
> The strains on Little Bay Islands — emigration, resource collapse, aging populations — are familiar to small towns around the world. Local leaders have tried to revive dying villages with offers of $1 homes or promises to pay would-be residents to move in. Newfoundland and Labrador takes a different approach: It pays you to leave.
> Some commenters have recently brought up the perennial question of when speech becomes constitutionally unprotected blackmail. As I’ve mentioned before, this is one of the thorniest conceptual questions in all of jurisprudence.
> What’s the explanation? Legal scholars have debated this for decades, and to my knowledge have not come up with a perfectly satisfactory answer.
Imagine Being on Trial. With Exonerating Evidence Trapped on Your Phone.
> Public defenders lack access to gadgets and software that could keep their clients out of jail.
> This tech gap has two basic forms. First, law enforcement agencies can use warrants and court orders to compel companies to turn over emails, photos and other communications, but defense lawyers have no such power. And second, the government has access to forensic technology that makes digital investigations easier. Over the last two decades, the machines and software designed to extract data from computers and smartphones were primarily made for and sold to law enforcement.
> To successfully defend its clients, the Legal Aid Society, New York City’s largest public defender office, realized in 2013 that it needed to buy the same tools the police had: forensic devices and software from companies including Cellebrite, Magnet Forensics and Guidance Software. Not only does the expensive technology unearth digital evidence that is otherwise hard or impossible to find, it captures it in a format that can hold up in court, as opposed to evidence that could have been tampered with or forged.
‘Grand inquisitors of the realm’: How Congress got its power to investigate and subpoena
> Back in his day, Robert Morris was a pretty big deal. He was just one of two men to sign all three of our nation’s founding documents: the Declaration of Independence, the Articles of Confederation and the Constitution.
> “Wherefore, and encouraged by a consciousness of the Integrity of his Administration, your Memorialist is desirous that a Strict Examination should be had into his Conduct,” Morris wrote, “in order that if he has been guilty of Maladministration it may be detected and Punished, if otherwise, that his Innocence may be manifested, and acknowledged.”
> Morris’s mouthful of a demand was taken up in the House of Representatives, where members referred it to a select committee, ultimately helping lay the foundation for the wide-ranging subpoena power Congress uses to investigate/torment the executive branch, including the president.
You Can’t Just Call Loans Options
> Also tech companies as banks, the bank of crypto and index funds.
> A weird feature of U.S. tax law is that, if you do a thing purely to get around tax rules, then that is bad and a sham and the IRS can look through it and make you pay your taxes. But if you do the thing not only to get around tax rules but also to get around other rules (like margin requirements), then from the IRS’s perspective you have a valid business purpose and you might be able to keep your good tax treatment. “We’re not just gaming your rules, we’re gaming other regulators’ rules too” is, surprisingly, an argument that might persuade the IRS.
> The advertising for the Apple card calls it “A new kind of credit card. Created by Apple, not a bank.” That appears to be true of the appearance of the physical card. But the credit algorithms were created by a bank, to Apple’s eventual embarrassment. It is just a little odd that Apple seems to have been so incurious about the algorithms. It’s a tech company!
A sport of their own
> A high school wrestler from Kansas spent four years fighting to give girls the opportunity to compete in an official state sport.
Unexpected Norms Setters
> I wanted to do a line by line review of Ilina Georgieva’s recent piece on cyber norms because on a brief read-through, I liked a lot of it. That said, the difficulty with reviewing policy pieces is you tend to think the ones that AGREE with you are naturally genius, which is not always the case. So after a more thorough review, there are a lot of serious issues with the piece and these are painfully listed below (if you happen to be Iliana).
Cars Were Banned on 14th Street. The Apocalypse Did Not Come.
More Teenagers Mistakenly Think “Private” Chat Conversations Will Remain Private
> As you can see, the chat participants–especially 7Up and Lady Gaga–seemingly discuss killing S, his goldfish, and his dog. But in the context of nonsense teen chatter, I don’t think anyone could read this transcript and believe that any of participants actually planned to harm S or any animals.
> An unidentified person tipped off S to the thread’s existence. S asked “Me” about it. Me revealed the thread’s name to S. This got back to S’s mom, who told the principal, who brought the girls into his office, seized their phones, and turned them over to law enforcement. Prosecutors brought charges against 7Up/JP for misdemeanor online threats. A jury convicted 7Up. The appellate court reversed.
This is mostly nonsense, although it’s somewhat interesting to see court opinions wrestle with the conundrum of quoting screenshots.
The pain of tracking down changes in U.S. law
> But this didn’t tell me when the coffee exception was introduced or in what legislation. Most of Title 23 dates from 1958, but the coffee sign exception was added later. When Congress amends a law, they do it by specifying a patch to the existing code. My use of the programmer jargon term “patch” here is not an analogy. The portion of the Federal-Aid Highway Act of 1978 that enacted the “free coffee” exception reads as follows:
> To track this down, I had no choice but to grovel over each of the links to the Statutes at Large, download each scan, and search over each one looking for the coffee provision. I kept written notes so that I wouldn’t mix up the congressional term numbers with the Statutes volume numbers.
California Governor Signs Bill Allowing College Athletes to Earn Money
Final Report on the August 14, 2003 Blackout
> We are pleased to submit the Final Report of the U.S.-Canada Power System Outage Task Force. As directed by you, the Task Force has completed a thorough investigation of the causes of the August 14, 2003 blackout and has recommended actions to minimize the likelihood and scope of similar events in the future.
> The report makes clear that this blackout could have been prevented and that immediate actions must be taken in both the United States and Canada to ensure that our electric system is more reliable. First and foremost, compliance with reliability rules must be made mandatory with substantial penalties for non-compliance.
The Legitimate Vulnerability Market
> Trading of 0-day computer exploits between hackers has been taking place for as long as computer exploits have existed. A black market for these exploits has developed around their illegal use. Recently, a trend has developed toward buying and selling these exploits as a source of legitimate income for security researchers. However, this emerging “0-day market” has some unique aspects that make this particularly difficult to accomplish in a fair manner. These problems, along with possible solutions will be discussed. These issues will be illustrated by following two case studies of attempted sales of 0-day exploits.
> May 6, 2007
Terrible Ninth Circuit 230(c)(2) Ruling Will Make the Internet More Dangerous–Enigma v. Malwarebytes
> The Ninth Circuit has issued a Section 230(c)(2) opinion that creates significant problems for anti-spyware/spam/virus vendors (I’ll call them “anti-threat vendors”). The ruling will paralyze their decision-making, expose them to greater legal threats, and reduce their ability to protect consumers from unwanted software. This ruling makes the Internet less safe. I hope the Ninth Circuit will fix it via further proceedings.
> Nevertheless, the majority’s legal standard creates two obvious and significant problems. First, many spammers, virusmakers, and adware/spyware makers will claim–legitimately or not–to be direct or partial competitors with anti-threat vendors. In those situations, the threat purveyors will naturally claim that the blocking was motivated by anticompetitive animus. In fact, I would expect such anticompetitive animus claims to be routine for blocked entities, not an exception. Indeed, as the dissent noted, Zango claimed (not credibly) its adware was competitive with Kaspersky’s anti-threat software.
I would say it will be the AV companies facing bogus lawsuits who will lose the most, and probably not users, but it’s a bit of a pickle.
Scraping A Public Website Doesn't Violate the CFAA, Ninth Circuit (Mostly) Holds
> This is a major case that will be of interest to a lot of people and a lot of companies. But it’s also pretty complicated and easy to misunderstand. This post will go through it carefully, trying to explain what it says and what it doesn’t say.
How Tax Policy Gave Us White Claw
> Because of this tax quirk, beverage companies have long sought ways to make flavored cocktail-like beverages for the U.S. market by brewing instead of distilling. Zima, Smirnoff Ice, and Mike’s Hard Lemonade are all “malternative” beverages, brewed from grain, like beer. A problem with malternatives has been the need to find ways to mask the beer-like flavor that results from brewing. To that end, these drinks have added sugar and strong citrus flavors, which a lot of consumers like. But they don’t serve as a replacement for a vodka soda.
> The key advancement with White Claw and its competitors in the “spiked seltzer” market is the use of sugar base for fermentation, which leads to a more neutral flavor than you can get by fermenting barley or other grains.