Intellectual property law
fromElectronic Frontier Foundation
18 hours agoComparison Shopping Is Not a (Computer) Crime
AI tools can help consumers find better prices, but Amazon is attempting to block them using legal claims.
"Transportation costs are a big factor there. Every company that is involved and has logistics and they have to pay for gas, either they have to absorb this cost, or they will charge the third party that will provide this service. I'm not surprised this is happening, because at some point, Amazon will say we cannot absorb all this cost."
Supermicro claims it is not a suspect in the case. However, the company did take action against the individuals involved. Two of them have been placed on leave, while a third person has been fired.
The new checks, part of the EU's new Entry/Exit System (EES), collect digital personal records of third country nationals travelling to the Schengen area and replace the manual stamping of passports.
The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
CBP told the court that its current setup is 'not well suited to a task of this scale.' The filing points specifically to the agency's Automated Commercial Environment, or ACE, the central platform used to process trade data, importer records, and duty transactions. In Brandon Lord's declaration, CBP said using the existing workflow would require more than 4.4 million labor hours to process more than 53.2 million entries tied to IEEPA duties.
What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
The document acknowledges that a program by the agency to use "commercially available marketing location data" for surveillance drew from the process used to select the targeted ads shown to you on nearly every website and app you visit.
Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
Cell-site simulators ICE has a technology known as cell-site simulators to snoop on cellphones. These surveillance devices, as the name suggests, are designed to appear as a cellphone tower, tricking nearby phones to connect to them. Once that happens, the law enforcement authorities who are using the cell-site simulators can locate and identify the phones in their vicinity, and potentially intercept calls, text messages, and internet traffic.
The technology underpinning retail operations is under scrutiny in 2026 as fashion executives look to streamline systems with the aim to unlock efficiency, cut costs and meet consumer expectations for speed and personalisation in the shopping journey. At the retail event Lightspeed Edge on 12 January, Lightspeed - the unified point-of-sale (POS) and payments platform for SMEs such as Apricot Lane Boutique and Neal's Yard Remedies - convened industry leaders to explore the strategic imperative for integrated technology ecosystems over siloed systems.
For the past year, security researchers have been urging the global shipping industry to shore up their cyber defenses after a spate of cargo thefts were linked to hackers. The researchers say they have seen elaborate hacks targeting logistics companies to hijack and redirect large amounts of their customers' products into the hands of criminals, in what has become an alarming collusion between hackers and real-life organized crime gangs.