The internal documents show that through its Vigilant Solutions contract, which began in 2018 and runs to September 2020, ICE has access not only to five billion records gathered by private businesses, but also to 1.5 billion data points contributed by over 80 local law enforcement agencies from more than a dozen states.
Wu, a law professor at Columbia best known for coining the term "net neutrality," details how presidents of both parties used the Sherman Antitrust Act of 1890, which outlawed monopolistic business practices, to split up the likes of Standard Oil and AT&T, and to block anticompetitive mergers.
But in its place has come something shadowier and far older: an underground white supremacist movement operating on society’s fringes, and a culture that disavows the racists while quietly mainstreaming their ideas.
Nationwide Bomb Threats Look Like a New Spin on an Old Bitcoin ScamEduardo Munoz Alvarez/Getty ImagesIn offices and universities all across the country Thursday, the same threat appeared in email inboxes: Pay $20,000 worth of bitcoin, or a bomb will detonate in your building.
Rosenstein did, though, repeat past assertions that unyielding encryption blocks crucial investigative avenues, and potentially endangers public safety."There is nothing virtuous about refusing to help develop responsible encryption, or in shaming people who understand the dangers of creating any spaces—whether real-world or virtual—where people are free to victimize others without fear of getting caught or punished," Rosenstein said.It is not so certain, though, that encryption meaningfully hinders law enforcement to the degree that the government alleges.
One drone had the owner's credit card information stored in a database that law enforcement officials were then able to access.Watson and NIST aren’t the only digital experts tapping into this cache of personal information that's flying around on drones.