Balance the Public Interest and Privacy of Location

private sign 1140x445

One of the tools that law enforcement uses to locate individuals is a fake cell-tower that makes cellphones to announce their presence. One popular model of these cell tower simulators is called the Stingray. From a Stingray’s roster of cellphone’s telephone number and their associated International Mobile Equipment Identification (IMEI) numbers, police can determine whether […]

Choose Quality of Results for Consumers, Not Equality of Outcomes for Competitors


From the outside, antitrust prosecutions appear to seek competitive behaviors that are scrupulously “fair” among competitors. But no two competing companies have identical assets, experience, intellectual property, employee and leader skills, customers, or even identical goals. Their path forward depends on how well their strategy anticipates the live marketplace and on their skill in adapting […]

The European Advantage from Hiding The Past

computer spy

The “Right to be Forgotten” (RTBF) is a newly minted “human right” within the European Union. It allows individuals to demand the suppression of Internet search results that mentions them in earlier events, such as court proceedings, speeches, and news coverage. This selective editing of history would be of peculiar value to those obligated to […]

FORBES: Government Broadband Bad for Consumers


On September 21st, President Barack Obama’s Broadband Opportunity Council released its first report. The council outlined four main recommendations for promoting broadband, but the council’s report was also notable for what it left out – any specific mention of municipally-run broadband services. The omission was particularly stunning considering the Federal Communications Commission (FCC), led by […]

Cybersecurity–Our Worst People Can Defeat Best People

computer theft

Most of us presume that official intelligence agencies run with deep paranoia, rarified sophistication, and beyond the control of laws that apply to the public at large.  Their target is to harvest warnings of enemy penetrations of our security and to discover our enemies’ capabilities and activities.  We cannot be sure how well they perform […]

Forbes: FCC–Partisan Or Expert Agency?


The Federal Communications Commission (FCC) has long been regarded as being the expert agency for communications issues. However, its recent conclusion that imposing public utility-style regulations on Internet Service Providers (ISPs) would work to increase broadband investment casts serious doubt on its expertise and independence. Last February, the FCC issued its Open Internet Order, which […]

FCC Gleefully Embroidering Last Century’s Regulations


The transition from a copper telephone network to an all IP fiber network has been noteworthy. Already 30% of consumers use voice-over-Internet (VoIP) services instead of traditional copper-based telephone services, and another 44% are wireless-only. Only 25% of consumers still use old copper telephone services and that’s because their carriers have yet to transition to […]

Censored Intranets Replace Our Common Internet

computer spy

A year ago, Russia adopted a “blogger law” that requires a person with more than 3,000 daily readers to register, disclose personal information and submit to the same regulations as Russian mass media. This will have a chilling effect on the candor of online opinion writers. During 2015, further restrictions will require the data of […]

Laws to Hide Behind

Man Walking Steps

Personal information in internet sites comes from many sources. People voluntarily put their own information in many places such as Facebook and chat rooms. News sites and blogs publish information about the actions of others. Government property tax and court clerks put information about individuals and corporations on the internet. Those posters usually intend the […]