- Journal Archives
- Volume 20
- Volume 19
- Volume 18
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
- 2017-2018 Symposium
- 2016-2017 Symposium
- 2015-2016 Symposium
- 2014-2015 Symposium
- 2013-2014 Symposium
- 2012-2013 Symposium
- 2011-2012 Symposium
- 2010-2011 Symposium
- 2009-2010 Symposium
- 2008-2009 Symposium
- 2007-2008 Symposium
Currently viewing the tag: "FBI"
“To others choosing to conduct business this way in the world of college athletics, we have your playbook.” With that quote, U.S. Attorney Joon H. Kim changed the game for college basketball.
Before Tuesday, NCAA sanctions had failed to deter potential cheaters. The stature and financial impact that comes with making a Final Four [...]Continue Reading →
Should you care about protecting the data on your cellphone? What about the data on the phone of a terrorist? One technology powerhouse cares strongly about this issue and is even willing to go to (metaphorical) blows with the United States Government over the result.
On December 14th, 2015, two shooters carried out an [...]Continue Reading →
Hillary Clinton apologized last week for using a private email address and server during her time as secretary of state. In an interview with David Muir of ABC News, Clinton stated, “That was a mistake. I’m sorry about that. I take responsibility.” Clinton’s apology came after months of denying any wrongdoing.
As [...]Continue Reading →
On May 27, 2015, the U.S Department of Justice unsealed a massive indictment of fourteen officials for soccer from across the world, including top officials in FIFA. The indictment alleges widespread corruption has been going on for over the last two decades including wire fraud, money laundering, obstruction of justice charges, and bribery in regards to [...]Continue Reading →
Earlier this week, ACLU analyst Christopher Soghoian discovered that in 2007, the FBI impersonated the Seattle Times while investigating bomb threats made to a school in Lacey, Washington. The bureau was using a technique commonly referred to as “phishing” to monitor a juvenile after receiving tips that he was behind the threats. The FBI obtained [...]Continue Reading →
A clash two decades in the making appears to finally be coming to a head. In response to public backlash over the National Security Agency’s (NSA) espionage tactics, tech companies are taking steps to rebuild trust with their customers by encrypting their networks end-to-end. On October 16, FBI [...]Continue Reading →
On September 12, 2014 By Ryan Dewey September 14, 2014
US Magazine and People are no longer the only sources revealing intimate details about the private lives of celebrities. Over the holiday weekend, hundreds of nude celebrity photos were made available to a few million more than their intended audience. Among the stars hacked were Kate Upton, Kirsten Dunst, and most notably, Jennifer Lawrence.
The [...]Continue Reading →
Bitcoin has taken the spotlight in the world of cryptocurrencies. Whether it’s Bitcoin’s name or a little beginner’s luck, this first attempt at cryptocurrency appears to be working and its first-mover advantage is paying off.
It’s acceptance as a viable digital currency seems to be growing every day. Beginning with Overstock.com in January, [...]Continue Reading →
Patent Eligibility Symposium Wrap-Up
On Friday, Jan. 24, 2014, JETLaw hosted its 2013-2014 symposium, Patents 101: From Computer Code to Genetic Codes, focusing on what, exactly, is eligible for patent protection. Chief Judge Randall Rader of the Federal Circuit delivered the keynote address, and panels addressed software patents, gene patents, and principles of patent [...]Continue Reading →
Bank not liable to cyber-heist victim company that had expressly declined to use the additional security controls it offered A federal district court hears arguments about whether the FBI’s use of a “stingray” device, which pretends to be a cell phone tower so that it can collect information from phones and [...]Continue Reading →
Recent Blog Posts
- Uber Settles IP Dispute after Embattled Former CEO Takes the Stand at Trial
- The Role of the Statute of Limitations in the Harvey Weinstein Saga
- Misusing Mickey Mouse: The Fight Over Movie Download Codes
- Songwriter’s Revocation: How Writers Gain Freedom After 35 Years
- Recapping JETLaw’s 2018 Symposium!
- Taking a Gamble: New Jersey Sports Betting and the Supreme Court
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution