this-week-in-techdirt-history:-august-10th-–-16th

Five Years Ago This week in 2020, we wrote about how the idea that banning TikTok thwarts Chinese intelligence was ridiculous, and how any real threat probably comes from America’s feebly secured infrastructure. As for failed security, we looked at the incredible waste of Baltimore’s aerial surveillance program, and asContinue Reading

this-week-in-techdirt-history:-august-3rd-–-9th

Five Years Ago This week in 2020, we looked at how the DHS was surveilling journalists who published leaked documents and how they obtained the encrypted messages of protestors. The FCC was trying to pretend The Traitor’s executive order about social media wasn’t ridiculous, and one commissioner who suggested it wasContinue Reading

funniest/most-insightful-comments-of-the-week-at-techdirt

This week, our first place winner on the insightful side is MrWilson with a comment about the failure to get indictments in supposed ICE assaults: And the fact that prosecutors and grand juries didn’t find evidence of actual assault in so many cases proves ICE’s assault statistics are bullshit. IfContinue Reading

this-week-in-techdirt-history:-july-20th-–-26th

Five Years Ago This week in 2020, the DHS was going full gestapo in response to protests in Portland, then quickly expanding the tactics to other cities, starting with Chicago, and was also engaging in domestic surveillance to protect statues and monuments. We asked why the US was trying toContinue Reading

this-week-in-techdirt-history:-july-13th-–-19th

Five Years Ago This week in 2020, we saw a new breed of scammers start abusing the DMCA on YouTube, and a new evolution of copyright trolls abusing the DMCA to take down social media accounts and demanding money to reinstate them. We also saw the debate following the Harper’sContinue Reading

this-week-in-techdirt-history:-july-6th-–-12th

Five Years Ago This week in 2020, we looked at the encryption dilemma created by the EARN IT Act, while a federal case showed that cops already had plenty of options when dealing with device encryption. There was pushback against the The Traitor administration’s attempt to corrupt the Open TechnologyContinue Reading