Deeplinks
ከቴሌኮሙኒኬሽን እስከ ቴሌቪዥን እና ሬዲዮ ስርጭት ያሉ የሕዝብ መገናኛዎች በኢትዮጵያ መንግሥት ቁጥጥር ሥር ናቸው። ይህም መንግሥት በአጠቃላይ የመገናኛ የልማት አውታሮች ላይ ሙሉ የበላይነቱን መያዙ፤ ግላዊነት እና ሌሎች ግንኙነቶች በግልጽ ለስለላ ምቹ ኾነዋል ማለት ነው። በአንዳንድ አጋጣሚዎች የመንግሥትን የተጠናከረ እና ውስብስብ የስለላ መረብ አልፈው የሚደረጉ ግንኙነቶች ቢኖሩ እንኳ በየመንደሩ ያሉ ቁጥር ሥፍር የሌላቸው ጆሮ ጠቢዎች በኢትዮጵያን ላይ የሚዘሩት ፍርሃት ቀላል አይደለም። ለምሳሌ ያህል አጠቃላይ አገራዊ ስምምነት የተደረሰ በሚመስል መልኩ፤ በፖለቲካ ጉዳዮች ላይ የሚወያዩ ግለሰቦች ድምጻቸውን የሹክሹክታ ያህል አሳንሰው ሲያወሩ ማየት ያልተለመደ አይደለም። በተለይ በመዲናችን አዲስ አበባ የራስ ትከሻን እየተጠራጠሩ ማውራት ወይም በታክሲ እንዲሁም በሻይ ቤቶች ቁጭ ብለው የሚወያዩ ሰዎች አፋቸውን ከልለው ማውራታቸው የአደባባይ ምስጢር ነው። በዚህም አስፈሪ እና ዝግ በኾነ ምህዳር ምክንያት ዜጎች ዝምታን መርጠዋል። ዝምታውም ከቁጥጥራቸው በላይ የኾነውን ስለላ በተቃውሞ መግለጻቸውን ዋነኛ ማሳያ ነው። “ዝም ባለ አፍ ዝምብ አይገባም” መሠል አባባሎች አሁን የሚታየውን የፍርሃት ጥግ የሚገልጹ ናቸው።
From telecommunications infrastructure to TV and radio airwaves, the Ethiopian government’s controls over communications infrastructure in the country means that even the most private and personal conversations may be exposed to unwarranted surveillance. In some cases, where communications have escaped the government’s strict monitoring system, human informers have been planted, creating an extreme sense of fear among Ethiopians. There’s an implicit understanding in the country that when discussing politics publicly, one should do so in a low voice so that only those whom they trust can hear. In Addis Ababa, the capital city, it’s not uncommon to see people glancing over their shoulders or covering their mouths when having political conversations in coffee shops or taxis. Because of this fear-provoking atmosphere, many Ethiopians stay silent as a means of protecting themselves against surveillance.
A new front has opened in publishers' global war on the public domain. Lawmakers of Argentina's ruling party are proposing a vast extension of copyright terms on photography—from 20 years after publication to 70 years after the photographer's death. That means that the term of restriction of photographic works would be extended by an average 120 years.
EFF is pleased to welcome Shahid Buttar to the activism team, where he will direct EFF's work supporting grassroots and student advocacy. Shahid is a constitutional lawyer focused on the intersection of community organizing and policy reform as a lever to shift legal norms. He comes to EFF with deep roots in communities across the country organizing in various ways to combat mass surveillance.
Shahid’s skills and experience will enhance EFF’s outreach efforts, helping us inspire supporters in local communities across the country. He’ll also serve as a resource for grassroots organizations and student groups looking for ways to defend and assert their rights.
Artistic expression can take many forms, whether it’s comedic, dramatic, or even violent. According to a California Court of Appeals opinion, if you choose to artistically express yourself in a violent or threatening manner—let’s say in song lyrics—you could be criminally prosecuted by the State of California even if you never intended anyone to perceive your message as an actual threat.
EFF has signed onto an amicus letter by the ACLU of Southern California that asks the California Supreme Court to revisit the lower court’s decision in People v. Murillo. Legions of artists will risk prosecution under this ruling for artistic speech that they did not intend to be threatening. As a result, they might self-censor, and our artistic palette will be less richly colored because of it.
As we've noted before, online harassment is a pressing problem—and a problem that, thankfully and finally, many are currently working on together to mitigate and resolve. Part of the long road to creating effective tools and policies to help users combat harassment is drawing attention to just how bad it can be, and using that spotlight to propose fixes that might work for everyone affected.
But not all of the solutions now being considered will work. In fact, some of them will not only fail to fix harassment, but they will actually place drastic limitations on the abilities of ordinary users to work together, using the Net, to build and agitate real, collective solutions.
Today a wide range of organizations from across the political spectrum—including EFF—sent a letter to the Senate protesting Sen. Sheldon Whitehouse's proposed draconian Computer Fraud and Abuse Act amendment to the "cybersecurity" surveillance bill CISA.
Since the death of activist and Internet pioneer Aaron Swartz three years ago, people from across the political spectrum have urged Congress to reform the CFAA, given its harsh penalties for "crimes" that result in little or no economic harm as well as the Justice Department's interpretation of terms of use violations that leaves virtually every Internet user a criminal.
Facebook claims its practice of forcing users to go by their "real names" (or "authentic identities" as Facebook spins it) makes the social network a safer place. In fact, the company has often claimed that the policy protects women who use the social media platform, even when faced with community advocates pointing out that the policy facilitates harassment, silencing, and even physical violence towards its most vulnerable users.
Trade officials have announced today that they have reached a final deal on the Trans-Pacific Partnership (TPP). Their announcement came after a drawn out round of negotiation in Atlanta, Georgia, which was mainly held up around disagreements over medicine patent rules and tariffs over autos and dairy.
Trade negotiators from the U.S. and its 11 Pacific Rim partners announced their agreement on the Trans-Pacific Partnership Agreement (TPP) today, concluding the final round of closed negotiations in Atlanta and marking the culmination of seven years of secrecy. Throughout all that time, the U.S. Trade Representative (USTR) has acted as a de facto representative of the Hollywood big media lobbies in pushing other countries to adopt the most punitive aspects of U.S. copyright policies—such as our over-the-top civil and criminal penalties—while at best giving lip service to pro-user aspects such as fair use.
Alameda County residents, you have a little more than a week to tell your Board of Supervisors how you feel about Sheriff Ahern’s proposed upgrade to phone surveillance technology shared by several law enforcement agencies in the county. The Board will consider the proposal on October 13.
While some police departments and sheriff's offices are left to oversee themselves, many cities and counties around the country have adopted civilian oversight bodies. Often composed of everyday citizens, these boards and commissions are charged with investigating misconduct complaints against law enforcement, from intense police brutality to minor violations of departmental policies.
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law. It should come as no surprise, then, that the European Court of Justice (CJEU) has decided that United States companies can no longer be automatically trusted with the personal data of Europeans.
The court, by declaring invalid the safe harbor which currently permits a sizeable amount of the commercial movement of personal data between the EU and the U.S., has signaled that PRISM and other government surveillance undermine the privacy rights that regulates such movements under European law. In the word's of the court's press release:
Agradecimientos a Luis Gil Abinader, investigador de FLACSO Argentina, por la traducción al español. Artículo original en inglés.
Los funcionarios cercanos a las negociaciones anunciaron ayer que alcanzaron un entendimiento final sobre el Acuerdo Transpacífico de Cooperación Económica (TPP, por sus siglas en inglés). Ese anuncio se produjo después de una prolongada ronda de negociación en Atlanta, Georgia, que giró principalmente alrededor de desacuerdos sobre normas relativas a patentes farmacéuticas y aranceles sobre vehículos y productos lácteos.
Two weeks ago, I wrote of exchanging letters with Bassel Khartabil, the creator of Syria's first hackerspace, a Creative Commons contributor and Wikipedian. Bassel has been detained for three and a half years by the Syrian authorities.
EFF has joined with organizations around the world in calling for Syria to reveal the whereabouts of detained technologist Bassel Khartabil. Khartabil's arbitrary detention and treatment by the Syrian authorities have been cause for concern since his initial arrest three and a half years ago. Fears have grown for his safety after he was taken from civil prison to an unknown destination on Saturday. He is one of the five current cases that EFF tracks in our Offline campaign to protect unjustly imprisoned technologists and bloggers.
Here is the joint press release from our coalition:
Release Bassel Khartabil, held unfairly since 2012
Libérez Bassel Khartabil, détenu injustement depuis 2012, transféré à un endroit tenu secret.
إطلاق سراح باسل خرطبيل المعتقل جزافاً منذ 2015 إلى مكان سرّي
(7 تشرين الأول 2015) ناشدت31 منظمة اليوم، السلطات السورية مطالبة بالكشف فوراً عن مكان باسل خرطبيل، أحد أبرز النشطاء في سبيل حرية التعبير في. تشرين الأول / أوكتوبر، عملت الأجهزة إلى نقل خرطبيل المعتقل منذ 2012 وذلك من سجن عدرا المركزي إلى مكان مجهول.
مع ذلك، تمكن خرطبيل في اليوم ذاته، أي في 3 تشرين الأول / أوكتوبر 2015، من إبلاغ عائلته أن ضباطاً قد أمروه بحزم أمتعته ولكنهم امتنعوا عن كشف الموقع الذي سيساق إليه. هذا ولم تتلق عائلته أي معلومات أو إشعار رسمي ولكن على الأغلب وبحسب مصادر غير رسمية، فقد جرى إحالة باسل إلى محكمة ميدانية عسكرية في قاعدة الشرطة العسكرية في القابون.
هذا وأعرب متحدث باسم المجموعة عن قلق المنظمات الشديد وعن "مخاوف حقيقية إزاء الاحتمال الكبير أن يكون خرطبيل قد نقل الى سجون تنتهج التعذيب تابعة لقوى الأمن السورية". وقد نددت المجموعات "يجب إخلاء سبيل خرطبيل وإعادة الحرية إليه، عوضاً عن إخفائه قسراً مجدداً".
Liberen a Bassel Khartabil, detenido injustamente desde el 2012.
(7 de octubre, 2015).– 31 organizaciones han exigido hoy que las autoridades sirias revelen de inmediato el paradero de Bassel Khartabil, un desarrollador de software y defensor de la libertad de expresión. Las autoridades sirias transfirieron a Khartabil, detenido en el año 2012, de la prisión central de Adra a un lugar no revelado, el 3 de octubre de 2015.
El 3 de octubre pasado, Khartabil logró informar a su familia de que los agentes de seguridad le habían ordenado hacer las maletas, pero no revelaron su destino. La familia no ha recibido ninguna notificación oficial, pero según las informaciones no confirmadas que han recibido, creen que podría haber sido transferido al tribunal militar de campaña en la base de la Policía militar en Qaboun.
Much has changed in the nearly ten years since we launched our first lawsuit challenging the NSA’s illegal surveillance of millions of Americans’ Internet communications. Over time, the defendants in the cases have changed; the legal “authority” the government has invoked to justify the program has changed; and the public’s knowledge and understanding of the programs has increased remarkably.
But, nearly a decade in, one thing has stayed remarkably constant: the relevant facts. The NSA, with the help of the nation’s largest telecommunications firms, like AT&T, has tapped the nation’s Internet backbone, searching and sifting through vast amounts of innocent Americans’ Internet communications.
Yesterday, Twitter co-founder Jack Dorsey announced on the platform that he would be returning to the company as full-time CEO, a position from which he had been ousted back in 2008. In a series of tweets, Dorsey briefly outlined his strategy for the growing company, focusing on Twitter’s strengths and his desire to ensure the platform is “easy to understand” for its many global users. But one tweet in the series stood out to us:
Californians can rest assured that law enforcement can’t poke around in their digital records without first obtaining a warrant. Today, Gov. Jerry Brown has signed S.B. 178, the California Electronic Communications Privacy Act (CalECPA).
After months of pressure from public interest groups, media organizations, privacy advocates, tech companies, and thousands of members of the public, California’s elected leaders have updated the state’s privacy laws so that they are in line with how people actually use technology today.
CalECPA protects Californians by requiring a warrant for digital records, including emails and texts, as well as a user's geographical location. These protections apply not only to your devices, but to online services that store your data. Only two other states have so far offered these protections: Maine and Utah.
Here’s what the bill’s authors had to say about the victory:
Sen. Mark Leno (D-San Francisco)
Trade negotiators announced their agreement over the terms of the Trans-Pacific Partnership (TPP) on Monday, and yet the exact terms of the deal remain as secret as ever. For more than five years, we have been given a series of dubious justifications for keeping the text under close wraps. Now that it's done, there is absolutely no reason they should not release it immediately.
All we have are a series of official memos and statements that have begun to shed light on what's in the final draft of the trade agreement. From them, we've begun to be able to piece together just how terrible the TPP will be for the Internet and our digital rights internationally.
Copyright Terms
Obama’s position on encryption is now public, as reported by the Washington Post. According to Ellen Nakashima and Andrea Peterson of the Post, Obama “will not —for now—call for legislation requiring companies to decode messages for law enforcement.”
Instead, the Post reports, the “administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations.”
Comparing the Public Encryption Policies from 21 of the Biggest Tech Companies
There’s a major battle brewing over encryption right now.
Law enforcement agencies are trying to demand “backdoors” to our sensitive data and communications, while civil liberties groups are fighting back through a new campaign called SaveCrypto. And President Obama seems to be trying to find a middle ground, eschewing legal mandates but continuing to informally pressure companies to provide unencrypted access to data.
So where do the tech companies stand?
Yesterday, the U.S. Court of Appeals for the Ninth Circuit issued a significant decision rejecting an absurd copyright claim in yoga poses. The decision is pretty entertaining, but its implications are important for technologists as well as yogis.
Today's release by Wikileaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn't survive to the end of the negotiations.
A federal magistrate judge in Brooklyn took an admirable stand last week when he questioned the government’s authority to compel Apple to unlock a seized mobile device using the All Writs Act. That’s a general-purpose law passed in 1789 that allows a court to require third parties’ assistance to execute a prior order of the court. Apple cannot be automatically conscripted in government investigations, wrote Magistrate Judge James Orenstein of the US District Court for the Eastern District of New York, because it is “a private-sector company that is free to choose to promote its customers' interest in privacy over the competing interest of law enforcement.” Orenstein’s order isn’t the end of the story, but it’s encouraging to see a court recognize the limits of government power, even in the face of the not-so-absolute All Writs Act.
In January of 2015 we wrote about how healthcare.gov—the flagship site for the Affordable Care Act—was leaking personal data to third party services. The story gained a lot of attention in the press and in the government. Many privacy concerns were raised, and it appears that the administrators of healthcare.gov took notice.
Last week, officials with healthcare.gov announced plans to improve privacy across the service, including a new privacy policy, easy privacy controls for users, and a commitment to honoring the Do Not Track header.
As of this month, 567 relays from our 2014 Tor Challenge are still up and running—more than were established during the entire inaugural Tor Challenge back in 2011. To put that number in perspective, these nodes represent more than 8.5% of the roughly 6,500 public relays currently active on the entire Tor network, a system that supports more than 2-million directly connecting clients worldwide.
This is the year for patent reform. Let’s put an end to forum shopping.
There’s a bill on the U.S. Senate floor that would make it more difficult for patent trolls to pressure innovators with unfair infringement lawsuits. But there’s a key provision missing. Without that provision, we think that the bill’s reforms would not be as effective as they could be.
Happy Ada Lovelace Day! Please join us in commemorating the life of Ada Lovelace by celebrating the achievements – past and present – of women in science, technology, engineering, and mathematics.
If you have ever tried scanning or photocopying a banknote, you may have found that your software—such as Adobe Photoshop, or the embedded software in the photocopier—refused to let you do so. That's because your software is secretly looking for security features such as EURion dots in the documents that you scan, and is hard-coded to refuse to let you make a copy if it finds them, even if your copy would have been for a lawful purpose.
Meet Barak Weinstein, EFF’s new executive assistant. Barak will be assisting EFF Executive Director Cindy Cohn and EFF Deputy Executive Director and General Counsel Kurt Opsahl. This is Barak's second tour at EFF—he was EFF's first legal secretary a decade ago, and he's excited to be back with the organization.
Barak spent the last eight years as an audio engineer, most recently for theater and opera in Los Angeles. He's in the unique position of having worked within the music industry—he assisted with the recording of Grammy-nominated songs—and, while at EFF, for causes that opposed its practices.
EFF, along with the Center for Democracy and Technology and others, have created a "Myths v. Facts" sheet about one of the main laws used to spy on innocent, unrelated, users: Section 702 of the Foreign Intelligence Surveillance Act. The document is a response to the United States Intelligence Community's derision of the recent European Court of Justice (ECJ) decision.
In light of this year's 40th anniversary of the Church Committee—legendary for exposing illegal mass domestic government surveillance during the 1960s and 1970s—the Wayne State University School of Law brought former Church Committee members together in Washington, D.C. to discuss how Congress can effectively oversee classified programs. The all-day event saw numerous experts and two key former Church Committee staffers—Fritz Swartz and Loch Johnson—unanimously call on Congress to reassert its oversight authority over intelligence programs.
A shorter version of this post ran as an op-ed in the San Jose Mercury News on October 6, 2015.
There’s an adage that goes: “As goes California, so goes the nation.” In all fairness, that’s said about a lot of states, but we believe it is especially true for California, since not only is the Golden State bigger in population and GDP than most sovereign nations, but because so many technological companies are headquartered here. A new law in California can have nation-wide, and potentially global, ramifications.
This year, EFF beefed up its in advocacy in Sacramento with the aim of moving the needle forward on digital freedom in the California legislature. We assembled a team of internal activists and lawyers and hired an excellent lobbying duo—Samantha Corbin and Danielle Kando-Kaiser of Corbin and Kaiser. Now that we’re at the end of the legislative session, we can say with zero uncertainty that our mission was a success.
According to an award-winning paper presented at a security conference earlier this week by a group of prominent cryptographers, the NSA has likely used its access to vast computing power as well as weaknesses in the commonly used TLS security protocol in order to spy on encrypted communications, including VPNs, HTTPS and SSH. As two of the researchers, Alex Halderman and Nadia Heninger explained, it was previously known that the NSA had reached a “breakthrough” allowing these capabilities. The paper represents a major contribution to public understanding by drawing a link between the NSA’s computing resources and previously known cryptographic weaknesses.
Being Muslim can’t be the basis for law enforcement surveillance. That was the message from the Third Circuit on Tuesday when it told the plaintiffs in Hassan v. The City of New York that their lawsuit could go forward. The plaintiffs are suing over the New York Police Department’s suspicionless mass surveillance operation revealed by the Associated Press in 2011.
Major entertainment companies are asking the courts for more and more power over the basic operation of the Internet. On Tuesday, the major U.S. record labels filed suit against a Florida startup called Aurous, which is developing a music player application that uses BitTorrent. We’ve all seen this movie before—the labels’ complaint looks similar to the ones they once filed against Napster, Grokster, Aimster, Kazaa, and other music sharing applications. But there’s a new twist: the labels want the court to give them the power to force “all third-party distributors of applications”—yes, all of them—to design their software to block any domain name or website used by Aurous.
In a post on Wednesday, researchers Alex Halderman and Nadia Heninger presented compelling research suggesting that the NSA has developed the capability to decrypt a large number of HTTPS, SSH, and VPN connections using an attack on common implementations of the Diffie-Hellman key exchange algorithm with 1024-bit primes. Earlier in the year, they were part of a research group that published a study of the Logjam attack, which leveraged overlooked and outdated code to enforce "export-grade" (downgraded, 512-bit) parameters for Diffie-Hellman.
In a long-anticipated ruling, the Second Circuit Court of Appeals handed Google a clear victory today, soundly rejecting the Authors Guild’s claim that the Google Books Project infringes copyright. In the process, the Court also confirmed what we’ve always known: fair use promotes “copyright’s very purpose.” Even better, the Court reminds us what that purpose is:
The ultimate goal of copyright is to expand public knowledge and understanding, which copyright seeks to achieve by giving potential creators exclusive control over copying of their works, thus giving them a financial incentive to create informative, intellectually enriching works for public consumption . . . Thus, while authors are undoubtedly important intended beneficiaries of copyright, the ultimate, primary intended beneficiary is the public, whose access to knowledge copyright seeks to advance by providing rewards for authorship.
Today is the first day of Open Access Week. All week, we’ll be joining SPARC and numerous other organizations to celebrate the importance of open access.
Put simply, open access is the practice of making research and other materials freely available online, ideally under licenses that permit widespread dissemination. Open access publishing plays a huge role in the dissemination of knowledge, culture, and ideas.
Check back all week for new #OAWeek content from EFF. We'll be updating this blog post with links:
When You Work in the Open, Everyone Can Be a Collaborator
Open access opens the door to a type of collaboration that wouldn’t exist otherwise.
From scientific research to lawmaking, open access enables participation
Open access is the practice of making research available online, for free, ideally under licenses that permit widespread dissemination. This year’s theme for Open Access Week is “open for collaboration,” and that theme hits on what’s really exciting about open access. Open access—both in academia and beyond—enables a kind of collaboration that can scale very quickly.
When research is closed, no one can access it unless they (or, more often, the institutions where they work or study) can afford expensive journal subscriptions or online libraries. When research is open, anyone can access it, study it, and use it, regardless of their budget or institutional affiliation.
Far too often Congress proposes tech legislation that is either poorly researched or poorly drafted (or both). Fortunately, most of the bills don't advance. Unfortunately, this doesn’t seem to dissuade Congress from constantly writing these types of bills. The House Energy and Commerce Committee released such a bill last week. It's only a discussion draft and hasn't been introduced as a formal bill yet, but its provisions would not only effectively put the brakes on car security research, but also immunize auto manufactures from FTC privacy enforcement when (not if) they fail to secure our cars. It's a classic one-two punch from Congress: not understanding something and then deciding to draft a bill about it anyway.
What happens when ICANN's rules that require domain name registrars to publish domain owners' personal data in a public database, conflict with the data protection laws in countries where those registrars operate?
For years, EFF has been working to protect the Web from surveillance and censorship by making encryption ubiquitous. Fixing problems with the Internet's certificate infrastructure has been at the top of that list.
Last night, that campaign took a major step forward when the Let's Encrypt Certificate Authority, which we've been building in collaboration with teams at Mozilla and ISRG (and a lot of help from Akamai, Cisco, and others) received a cross-signature from IdentTrust. As a result, Let's Encrypt certificates are now valid and trusted by all modern Web browsers. You can see our very first cert in action at helloworld.letsencrypt.org.
Pages
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized