Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Monthly Archives: June 2016

Whole Genome Sequencing: Cracking the Genetic Code for Foodborne Illness

“A person commits a crime, and the detective uses DNA evidence collected from the crime scene to track the criminal down. An outbreak of foodborne illness makes people sick, and the U.S. Food and Drug Administration (FDA) uses DNA evidence to track down the bacteria that caused it. Sound far-fetched? It’s not. The FDA has… Continue Reading

Supreme Court Justice uses link shortener in decision

Via Fortune after Josh Blackman’s blog posting on this subject: “A Supreme Court decision got huge attention this week for a stinging dissent by Justice Sotomayor that some have called the court’s “Black Lives Matter” moment. But the decision is also significant because it contains a strange short phrase — http://goo.gl/3Yq3Nd No, that’s not a… Continue Reading

Income inequality in the U.S. by state, metropolitan area, and county

Income inequality in the U.S. by state, metropolitan area, and county – Report By Estelle Sommeiller, Mark Price, and Ellis Wazeter, June 16, 2016. Economic Policy Institute. “What this report finds: Income inequality has risen in every state since the 1970s and in many states is up in the post–Great Recession era. In 24 states,… Continue Reading

Federal Court: The Fourth Amendment Does Not Protect Your Home Computer

Via EFF, Mark Rumold: “In a dangerously flawed decision unsealed today, a federal district court in Virginia ruled that a criminal defendant has no “reasonable expectation of privacy” in his personal computer, located inside his home. According to the court, the federal government does not need a warrant to hack into an individual’s computer. This… Continue Reading

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to… Continue Reading

Paper – A More Timely House Price Index

Anenberg, Elliot and Laufer, Steven, A More Timely House Price Index (June 15, 2016). Available for download at SSRN: http://ssrn.com/abstract=2555765 “Using listings data, we construct a new repeat-sales house price index that describes house values at the contract date when the price is determined rather than the closing date when the property is transferred. We… Continue Reading

Paper – Southern Europe’s Institutional Decline

Challe, Edouard and Lopez, Jose Ignacio and Mengus, Eric, Southern Europe’s Institutional Decline (June 9, 2016). HEC Paris Research Paper No. ECO/SCD-2016-1148. Available for dowload at SSRN: http://ssrn.com/abstract=2792621 “The run up to the euro currency initiated a period of capital inflows into southern European countries, i.e., Spain, Portugal, Italy and Greece. We document that those… Continue Reading

GAO – IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program

Identity Theft and Tax Fraud: IRS Needs to Update Its Risk Assessment for the Taxpayer Protection Program, GAO-16-508: Published: May 24, 2016. Publicly Released: Jun 23, 2016. “Taxpayer Protection Program (TPP). While the Internal Revenue Service (IRS) has made efforts to strengthen TPP—a program to authenticate the identities of suspicious tax return filers and prevent… Continue Reading