Download the Corresponding Apps That Allow Them to Conduct These Transactions, Individuals Will Have No Reasonable Expectation of Privacy in This Data

Total Page:16

File Type:pdf, Size:1020Kb

Download the Corresponding Apps That Allow Them to Conduct These Transactions, Individuals Will Have No Reasonable Expectation of Privacy in This Data GEORGETOWN LAW TECHNOLOGY REVIEW VOLUME 1, ISSUE 2 SPRING 2017 VOLUME I 2016-2017 ISSUE II FOUNDERS Sara Ainsworth, Co–Editor-in-Chief Andrew Schreiber, Co–Editor-in-Chief Lindsey Barrett, Managing Editor Stephan S. Dalal, Technology Editor Edward George, Articles Editor Spencer Williams, Notes Editor CASE COMMENTS EDITOR DIRECTOR OF OUTREACH Tariq Javed Jack O’Gorman EDITOR OF LEGAL NEWS & DEVELOPMENTS LITERATURE REVIEW EDITOR Anne Giomi Taryn Smith ASSISTANT ARTICLES EDITOR ASSISTANT NOTES EDITOR ASSISTANT TECHNOLOGY EDITOR John Douglass Camille LoPresti Alex Dunn ASSISTANT CASE COMMENTS EDITOR ASSISTANT LITERATURE REVIEW EDITOR Jeffery Gary Charles Bell ASSISTANT EDITOR OF LEGAL NEWS & DEVELOPMENTS ASSISTANT DIRECTOR OF TECHNOLOGY Kelsey Meany Michael L. Daniels STAFF Shelly Berry Jody Karol Dina Moussa Thomas Staccio Tyler Bridegan Melissa Keech Jenadee Nanini Kyle Swan Jessica Burke Sang Ah Kim Michelle Ovanesian Samuel Swoyer Elaine Cheng Ashley King Lisa Passarella Mohammad Tashakor Julianna Coppage Hannah Koban Gina Pickerrell Seth Teleky R. Harrison Dilday Elliot Kudisch Sydney Reade Jordan Thompson Deena Dulgerian Samuel Lewis Amanda Rodriguez Gabrielle Whitehall Damon Ferrara Perry Li David Rodriguez Garrett Windle Jeremy Greenberg Boris Lubarsky Elizabeth Rogers Jacob Wittman Saurabh Gupta Michael Mazzella Philip Ruppert Johnny Wong Kathleen Hyer Spencer McManus Christopher Sakauye Caroline Zitin David Houck Octavian Mitu Ruth Siboni Vetone Ivezaj Melina Montellanos Kevin Spinella FACULTY ADVISORS Tanina Rostain Paul Ohm ADVISORY BOARD Julie Cohen Hon. John M. Facciola Jonathan Frankle TABLE OF CONTENTS ARTICLES ............................................................................................................................... 273 Smart After All: Blockchain, Smart Contracts, Parametric Insurance, and Smart Energy Grids .................................................................................................................... 273 The Law and Legality of Smart Contracts ..................................................................... 305 STUDENT NOTE ................................................................................................................... 342 Protecting Privacy in our Financial Transactions: An Alternative Method to Thinking about our Privacy in the Digital Era .............................................................................. 342 CASE COMMENTS ................................................................................................................. 371 Bitcoin: Reacting to Money with Non-Money Attributes............................................ 371 Back and Forth: An Analysis of the Business Method Exception to Patentability ... 388 U.S. v. Sarao: The Flash Crash and a new effort to prosecute market manipulation and deceptive trading practices .............................................................................................. 396 LITERATURE REVIEW .......................................................................................................... 401 Privacy, Tax Evasion, and the Development of Cryptocurrencies ............................. 401 TECHNOLOGY EXPLAINERS ............................................................................................... 417 Smart Contracts: A Smart Way to Automate Performance ......................................... 417 Machine Learning and Fintech ....................................................................................... 428 LEGAL NEWS & DEVELOPMENTS ...................................................................................... 436 Fintech Meets the Telephone Consumer Protection Act ............................................ 446 This Little Piggy Went to Wall Street: Privacy Law When a Toy Becomes Your Child’s Banker .................................................................................................................. 458 Fintech and Trump Tech: How the New Administration is Shaping the Technology World Demands ............................................................................................................... 477 Breaking the Law by Using Venmo? Trends in P2P Payments and U.S. Foreign Policy ........................................................................................................................................... 486 Insurtech: An Industry Ripe for Disruption ................................................................. 491 Tribal Sovereignty and FinTech Regulations: The Future of Co-Regulating in Indian Country ............................................................................................................................. 503 ARTICLES SMART AFTER ALL: BLOCKCHAIN, SMART CONTRACTS, PARAMETRIC INSURANCE, AND SMART ENERGY GRIDS Alan Cohn, Travis West, & Chelsea Parker* CITE AS: 1 GEO. L. TECH. REV. 273 (2017) https://perma.cc/65YT-PRTC ABSTRACT Blockchain technology—the technology behind Bitcoin—is a secure and resilient mechanism for conducting peer-to-peer electronic transfer of anything of value, with a resulting immutable transaction record. While blockchain is best known for payments and digital currency, one of the blockchain’s “killer apps” will be blockchain-based smart contracts. Blockchain-based smart contracts can be used to automate and execute “if- then” contractual relationships by coding these relationships onto the blockchain in order to automatically trigger their secure execution. The potential use cases are limitless; blockchain-based smart contracts can be used for everything from automobile leases, to voting, to recording of land titles. A threshold question for the wide-scale use of blockchain-based smart contracts is whether such smart contracts are legally enforceable. This Article argues that existing laws, specifically the federal Electronic Signatures in Global and National Commerce Act (“ESIGN”) and state laws modeled on the Uniform Electronic Transaction Act (“UETA”), render blockchain-based smart contracts enforceable and therefore immediately usable. With the enforceability of blockchain-based smart contracts established, this Article examines potential applications in the insurance and energy industries, in order to demonstrate the utility of such contracts. In the insurance industry, blockchain-based smart contracts can enable the automation of simple life insurance policies, thus reducing costs of administration, and provide a platform for new insurance products such as *Alan Cohn is Of Counsel at Steptoe & Johnson LLP and Adjunct Professor, Georgetown University Law Center; he is also an advisor to several blockchain technology companies. Travis West is an Associate at Steptoe & Johnson LLP, Harvard Law, J.D. 2016, and Chelsea Parker is a Project Assistant at Steptoe & Johnson LLP, Princeton University, B.A., 2014. Cohn is co-chair, and West and Parker are members, of Steptoe’s Blockchain and Digital Currency Practice. © 2017, Alan Cohn, Travis West, & Chelsea Parker. 274 GEORGETOWN LAW TECHNOLOGY REVIEW Vol 1:2 blockchain-based parametric insurance contracts. Within the energy industry, blockchain-based smart contracts can further enable the adoption of microgrids and technology such as smart meters, which can expand accessibility to different models of electric power distribution and provide resilience against accidental or deliberate disruption. In this way, blockchain- based smart contracts have the potential to both streamline and increase the efficiency of existing processes and open new models of service delivery. ABSTRACT .............................................................................................................................. 273 INTRODUCTION .................................................................................................................... 274 PART I: WHAT IS A BLOCKCHAIN AND WHAT IS A SMART CONTRACT? ....................... 277 Blockchain Defined ......................................................................................................... 277 Blockchain-Based Smart Contracts ................................................................................ 280 PART II: SMART CONTRACTS, UETA, AND ESIGN ......................................................... 284 UETA and ESIGN .......................................................................................................... 286 How Do UETA and ESIGN Apply to Blockchain-Based Smart Contracts ............. 288 PART III: SMART CONTRACTS, PARAMETRIC INSURANCE, AND THE SMART GRID ..... 290 Insurance .......................................................................................................................... 290 Smart Contracts and the Energy Industry ..................................................................... 297 CONCLUSION ........................................................................................................................ 303 INTRODUCTION Before 2016, blockchain technology was known, if at all, as the technical underpinnings of virtual currency. However, in the past year, blockchain technology has come into its own. It is now seen as a groundbreaking advance that can both reduce frictional costs in existing transactional systems and enable new, previously-unworkable models of social and commercial engagement.1 A “blockchain,” as the name implies, is in its simplest terms a “chain” of previously-validated “blocks” of transactions that constitutes an immutable digital ledger and the distributed, resilient foundation
Recommended publications
  • Prospectus, Which Is in the Swedish-Language, and Which Was Approved by the Swedish Financial Supervisory Authority on 17 May 2019
    NB: This English-language document is an unofficial translation of XBT Provider AB's base prospectus, which is in the Swedish-language, and which was approved by the Swedish Financial Supervisory Authority on 17 May 2019. In the case of any discrepancies between the base prospectus and this English translation, the Swedish-language base prospectus shall prevail. BASE PROSPECTUS Dated 17 May 2019 for the issuance of BITCOIN TRACKER CERTIFICATES, BITCOIN CASH TRACKER CERTIFICATES, ETHEREUM TRACKER CERTIFICATES, ETHEREUM CLASSIC TRACKER CERTIFICATES, LITECOIN TRACKER CERTIFICATES, XRP TRACKER CERTIFICATES, NEO TRACKER CERTIFICATES & BASKET CERTIFICATES under the Issuance programme of XBT Provider AB (publ) (a limited liability company incorporated under the laws of Sweden) The Certificates are guaranteed by CoinShares (Jersey) Limited ______________________________________ IMPORTANT INFORMATION This base prospectus (the "Base Prospectus") contains information relating to Certificates (as defined below) to be issued under the programme (the "Programme"). Under the Base Prospectus, XBT Provider AB (publ) (the "Issuer" or "XBT Provider") may, from time to time, issue Certificates and apply for such Certificates to be admitted to trading on one or more regulated markets or multilateral trading facilities ("MTF’s") in Finland, Germany, the Netherlands, Norway, Sweden, the United Kingdom or, subject to completion of relevant notification measures, any other Member State within the European Economic Area ("EEA"). The correct performance of the Issuer's payment obligations regarding the Certificates under the Programme are guaranteed by CoinShares (Jersey) Limited (the "Guarantor"). The Certificates are not principal-protected and do not bear interest. Consequently, the value of, and any amounts payable under, the Certificates will be strongly influenced by the performance of the Tracked Digital Currencies (as defined herein) and, unless the certificates are denominated in USD, the USD-SEK exchange rate or, as the case may be, the USD-EUR exchange rate.
    [Show full text]
  • UNIVERSAL BROADBAND ADOPTION: How to Get There, and Why America Needs It
    UNIVERSAL BROADBAND ADOPTION: How To Get There, And Why America Needs It Universal Broadband Adoption: How to Get There, And Why America Needs It TABLE OF CONTENTS INTRODUCTION...........................................................................................................................................9 PART ONE – THE DIGITAL IMPERATIVE: CLOSING THE DIGITAL DIVIDE.....................................................11 Chapter 1 – The Importance of Broadband to Minorities............................................................12 Why Connecting the Unconnected to Broadband Helps Everyone on the Network.............................12 How People of Color Use Broadband.............................................................................................13 8 Reasons to Adopt Broadband Now..............................................................................................14 Minorities Embrace Internet Access in the Palm of their Hands.....................................................16 How to Sustain Innovation in the Wireless Sector...........................................................................17 Further Evidence of a Looming Spectrum Crisis.............................................................................18 Chapter 2 – Minorities and The Digital Divide.............................................................................19 Why Broadband is the Top Civil Rights Issue of the 21st Century...................................................19 Why the Unconnected are Second-Class
    [Show full text]
  • The Rise of Talk Radio and Its Impact on Politics and Public Policy
    Mount Rushmore: The Rise of Talk Radio and Its Impact on Politics and Public Policy Brian Asher Rosenwald Wynnewood, PA Master of Arts, University of Virginia, 2009 Bachelor of Arts, University of Pennsylvania, 2006 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of History University of Virginia August, 2015 !1 © Copyright 2015 by Brian Asher Rosenwald All Rights Reserved August 2015 !2 Acknowledgements I am deeply indebted to the many people without whom this project would not have been possible. First, a huge thank you to the more than two hundred and twenty five people from the radio and political worlds who graciously took time from their busy schedules to answer my questions. Some of them put up with repeated follow ups and nagging emails as I tried to develop an understanding of the business and its political implications. They allowed me to keep most things on the record, and provided me with an understanding that simply would not have been possible without their participation. When I began this project, I never imagined that I would interview anywhere near this many people, but now, almost five years later, I cannot imagine the project without the information gleaned from these invaluable interviews. I have been fortunate enough to receive fellowships from the Fox Leadership Program at the University of Pennsylvania and the Corcoran Department of History at the University of Virginia, which made it far easier to complete this dissertation. I am grateful to be a part of the Fox family, both because of the great work that the program does, but also because of the terrific people who work at Fox.
    [Show full text]
  • Segwit2x –
    SegWit2x – A New Statement The Overwhelming power of SegWit2x In order to safeguard the community from an undesired chain split, the upgrade should be overwhelming, but it’s not enough. It should also ‘appear’ as overwhelming. People, businesses and services needs to be certain about what is going to happen and the risks if they won’t follow. My impression is that still too many speaking english people in the western world think the upgrade will be abandoned before or immediately after block 494784 is mined, thus they are going to simply ignore it. That could lead to unprepared patch up and confusion, while naïve users risk to harm themselves. For this reason and for the sake of the Bitcoin community as a whole, we need to show again, clearly and publicly the extent of the support to SegWit2x. We also need to commit ourselves in a widespread communication campaign. I know this is not a strict technical matter, but it could help a lot avoiding technical issues in the future. What we have to do First, we need a new statement from the original NYA signers and all the business, firms and individuals who joined the cause later. That statement should be slightly different from the original NYA though, and I am explaining why. We all know that what Bitcoin is will be ultimately determined by market forces, comprehensive of all the stakeholders involved: businesses, miners, users, developers, traders, investors, holders etc. Each category has its own weight in the process, and everybody has incentives in following the market.
    [Show full text]
  • Viacoin Whitepaper
    Viacoin Whitepaper Viacoin Dev Team September 12, 2017 Last updated on September 22, 2017 Abstract Viacoin is an open source crypto-currency created in 2014, derived from the [6]Bitcoin protocol that supports embedded consensus with an extended OP_RETURN of 120 byte. Viacoin features Scrypt Merged mining, also called Auxiliary proof of work or AuxPoW, and 25x faster transactions than Bitcoin. Viacoin mining reward halving takes place every 6 months and has a total supply of 23,000,000 coins. The inflation rate of Viacoin is low due to minimal mining reward. As the block reward of Viacoin is low, miners are given incentive to mine Viacoin through Merged mining (AuxPoW). Viacoin is currently mined by one of the biggest mining pools (F2Pool) with a very high hashrate. Other features include a mining difficulty adjustment algorithm to address flaws in Kimoto’s Gravity Well (DarkGravityWave), Versionbits to allow for 29 simultaneous Soft Fork changes to be implemented at a time, Segwit and the Lightning Network Note: The whitepaper, documentation, designs are in research and development phase and subject to change. 1 1 Scrypt In cryptography, [7]Scrypt is a password based key derivation function created by Colin Percival. The al- gorithm was designed to make it costly to perform large-scale custom hardware attacks by requiring large amounts of memory. In 2012, the algorithm was published by the IETF as an internet draft intended to become an informational RFC, but a version of Scrypt is now used as a proof of work scheme by cryptocur- rencies like Viacoin. Scrypt is a memory hard key derivation function, it requires a reasonably large amount of Random Ac- cess Memory to be evaluated.
    [Show full text]
  • A Survey on Consensus Mechanisms and Mining Strategy Management
    1 A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks Wenbo Wang, Member, IEEE, Dinh Thai Hoang, Member, IEEE, Peizhao Hu, Member, IEEE, Zehui Xiong, Student Member, IEEE, Dusit Niyato, Fellow, IEEE, Ping Wang, Senior Member, IEEE Yonggang Wen, Senior Member, IEEE and Dong In Kim, Fellow, IEEE Abstract—The past decade has witnessed the rapid evolution digital tokens between Peer-to-Peer (P2P) users. Blockchain in blockchain technologies, which has attracted tremendous networks, especially those adopting open-access policies, are interests from both the research communities and industries. The distinguished by their inherent characteristics of disinterme- blockchain network was originated from the Internet financial sector as a decentralized, immutable ledger system for transac- diation, public accessibility of network functionalities (e.g., tional data ordering. Nowadays, it is envisioned as a powerful data transparency) and tamper-resilience [2]. Therefore, they backbone/framework for decentralized data processing and data- have been hailed as the foundation of various spotlight Fin- driven self-organization in flat, open-access networks. In partic- Tech applications that impose critical requirement on data ular, the plausible characteristics of decentralization, immutabil- security and integrity (e.g., cryptocurrencies [3], [4]). Further- ity and self-organization are primarily owing to the unique decentralized consensus mechanisms introduced by blockchain more, with the distributed consensus provided by blockchain networks. This survey is motivated by the lack of a comprehensive networks, blockchains are fundamental to orchestrating the literature review on the development of decentralized consensus global state machine1 for general-purpose bytecode execution. mechanisms in blockchain networks. In this survey, we provide a Therefore, blockchains are also envisaged as the backbone systematic vision of the organization of blockchain networks.
    [Show full text]
  • P2P Mixing and Unlinkable Bitcoin Transactions Anonymity of the People, by the People, and for the People
    P2P Mixing and Unlinkable Bitcoin Transactions Anonymity of the people, by the people, and for the people Tim Ruffing Pedro Moreno-Sanchez Aniket Kate CISPA, Saarland University Purdue University Purdue University tim.ruffi[email protected] [email protected] [email protected] Abstract—Starting with Dining Cryptographers networks Starting with the dining cryptographers network (DC-net) (DC-net), several peer-to-peer (P2P) anonymous communication protocol [14], another line of ACNs research emerged, where protocols have been proposed. Despite their strong anonymity users (or peers) do not employ any third party proxies and guarantees none of those has been employed in practice so instead communicate with each other to send their messages far: Most fail to simultaneously handle the crucial problems anonymously. While the DC-net protocol can guarantee suc- of slot collisions and malicious peers, while the remaining ones cessful termination and anonymity against honest-but-curious handle those with a significant increased latency (communication rounds) linear in the number of participating peers in the best adversary controlling a subset of users (or peers), it is easily case, and quadratic in the worst case. We conceptualize these prone to disruption by a single malicious peer who sends P2P anonymous communication protocols as P2P mixing, and invalid protocol messages (active disruption) or omits protocol present a novel P2P mixing protocol, DiceMix, that only requires messages entirely (crash). Moreover, a DC-net protects the constant (i.e., four) communication rounds in the best case, and anonymity of the involved malicious peers and subsequently 4 + 2f rounds in the worst case of f malicious peers.
    [Show full text]
  • A Policymaker's Guide to Blockchain Technology Implementation And
    Background paper to the preparation of the 24th CSTD priority theme on Harnessing Blockchain for sustainable development Author: Rasim A Policymaker’s Guide to Alam, MPP, Harvard Kennedy School Blockchain Technology Implementation and Innovation Abstract: As Blockchain technology matures and applications of the technology become more widespread, policymakers will need to assess their country’s ability to harness Blockchain technology and recognize the best pathway to Blockchain adoption. This research paper presents a country-level assessment framework for Blockchain implementation and recommends pathways to improve the rate of learning. The assessment framework can be used to identify the stages of Blockchain development, the steps towards full Blockchain adoption, and the opportunities and challenges in the implementation process. Keywords: Blockchain, Assessment Framework The findings, interpretations, and conclusions herein are those of the author and do not necessarily reflect the views of the United Nations or its official Member States. The designations employed and the presentation of material on any map in this work do not imply the expression of any opinion whatsoever on the part of the United Nations concerning the legal status of any country, territory, cities, or area or of its authorities, or concerning the delimitation of its frontiers and boundaries. This paper represents the personal views of the author(s) only, not the views of the CSTD, UNCTAD secretariat or member States. The author accepts full responsibility for
    [Show full text]
  • Ride the Lightning: Turning Bitcoin Into Money
    Ride the Lightning: Turning Bitcoin into Money Anantha Divakaruni∗ Peter Zimmermany June 1, 2020 Click here for latest version Abstract We show that recent technological innovations have improved the efficiency of Bit- coin as a means of payment. We find a robust and significant association between reduced blockchain congestion since the beginning of the 2018, and adoption of the Lightning Network, a means of netting payments off the blockchain. This im- provement cannot be explained by other factors, such as changes in speculative demand for Bitcoin. Our findings have implications for the design of central bank digital currencies. We show that the Lightning Network has become increasingly centralised, with payments channelled through relatively few intermediaries. We conclude that improved functioning of Bitcoin is positive for welfare, and may re- duce the environmental footprint of Bitcoin mining. JEL classification: D4, E42, G10, O33. Keywords: Bitcoin, blockchain, cryptocurrency, Lightning Network, SegWit, networks, money. ∗University of Bergen. E-mail: [email protected]. yFederal Reserve Bank of Cleveland. This paper does not necessarily reflect the views of the Fed- eral Reserve System. E-mail: [email protected]. 1 1 Introduction The intended purpose of Bitcoin is to serve as a means of payment outside of the control of centralised monetary authorities, and to maintain privacy for users (Nakamoto 2008). Since its introduction in 2008, it has grown immensely in value, but still sees relatively little use as a means of payment (Thakor 2019). One important reason is that blockchain technology imposes capacity constraints on handling transactions. Bitcoin can handle an average of only seven transactions per second across the entire system.
    [Show full text]
  • Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack
    Received September 11, 2019, accepted September 28, 2019, date of publication October 4, 2019, date of current version October 16, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2945600 Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack SEONGGEUN KIM , (Student Member, IEEE), AND SANG-GEUN HAHN, (Member, IEEE) Department of Mathematical Sciences, Korea Advanced Institute of Science and Technology, Daejeon 34141, South Korea Corresponding author: Seonggeun Kim ([email protected]) This work was supported by the Information and Communication Technology Promotion (IITP) Grant Funded by the Korean Government (MSIT) (The mathematical structure of functional encryption and its analysis) under Grant 2016-6-00598. ABSTRACT In the current blockchain network, many participants rationally migrate the pool to receive a better compensation according to their contribution in situations where the pools they engage encounter undesirable attacks. The Nash equilibria of attacked pool has been widely analyzed, but the analysis of practical methodology for obtaining it is still inadequate. In this paper, we propose an evolutionary game theoretic analysis of Proof-of-Work (PoW) based blockchain network in order to investigate the mining pool dynamics affected by malicious infiltrators and the feasibility of autonomous migration among individual miners. We formulate a revenue model for mining pools which are implicitly allowed to launch a block withholding attack. Under our mining game, we analyze the evolutionary stability of Nash equilibrium with replicator dynamics, which can explain the population change with time between participated pools. Further, we explore the statistical approximation of successful mining events to show the necessity of artificial manipulation for migrating.
    [Show full text]
  • THE WEEKLY UPDATE WEEK 31 Sponsored by Sponsored By
    THE WEEKLY UPDATE WEEK 31 Sponsored by Sponsored by Market Update ▪ The strong momentum in the market continues this week, even 1 after $1.3 billion got liquidated during the massive sell-off this weekend. ▪ The volatility has pushed higher over the past week, leading to a massive spike in bitcoin’s trading volume. Bakkt Bitcoin Futures $160 $30 ▪ Professional traders are back in the market after bitcoin crossed $10,000, as both Bakkt and CME see record high inflows and surge in trading activity. $140 $25 $120 Valuation $20 ▪ The bitcoin prices closed last week above the important $10,500 2 $100 level, which could now be an important support level. Last week’s close was the highest in one year, and BTC is looking strong technically. $80 $15 ▪ The funding rates of the perpetual swaps have spiked recently, as more traders seek leveraged exposure to the upside. $60 Daily Volume ($m) $10 Open Interest ($m) Blockchain Activity $40 3 ▪ Ethereum fees climb further and are currently at its highest levels $5 since January 2018. DeFi is said to have contributed the most to the $20 fees, but recently a Ponzi scheme has been linked to the influx in transactions on the Ethereum Network. $0 $0 ▪ The activity on the Bitcoin blockchain is high but the fees are Jan 20 Feb 20 Mar 20 Apr 20 May 20 Jun 20 Jul 20 Aug 20 nowhere near the fees seen in late December 2017 as SegWit transactions and batching have grown in usage. Open Interest Volume Subscribe to The Weekly Update Sponsored by THE NEWSROOM Crypto Venture Fund Raises $110 The 2020 Rainy Season Is Tougher Than IRS-CI Announces Charges Against Million From Universities Ever for China’s Bitcoin Miners Three Individuals, Including Florida Teen, In Twitter Hack Internal Revenue Service - Criminal Investigations (IRS- The rain has come.
    [Show full text]
  • Federal Communications Commission FCC 06-105 Before the Federal
    Federal Communications Commission FCC 06-105 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Applications for Consent to the Assignment ) MB Docket No. 05-192 and/or Transfer of Control of Licenses ) ) Adelphia Communications Corporation, ) (and subsidiaries, debtors-in-possession), ) Assignors, ) to ) Time Warner Cable Inc. (subsidiaries), ) Assignees; ) ) Adelphia Communications Corporation, ) (and subsidiaries, debtors-in-possession), ) Assignors and Transferors, ) to ) Comcast Corporation (subsidiaries), ) Assignees and Transferees; ) ) Comcast Corporation, Transferor, ) to ) Time Warner Inc., Transferee; ) ) Time Warner Inc., Transferor, ) to ) Comcast Corporation, Transferee ) MEMORANDUM OPINION AND ORDER Adopted: July 13, 2006 Released: July 21, 2006 By the Commission: Chairman Martin, and Commissioners Tate and McDowell issuing separate statements; Commissioner Copps dissenting and issuing a statement; and Commissioner Adelstein approving in part, dissenting in part and issuing a statement. TABLE OF CONTENTS Heading Paragraph # I. INTRODUCTION.................................................................................................................................. 1 II. DESCRIPTION OF THE PARTIES......................................................................................................6 A. Adelphia Communications Corporation .......................................................................................... 6 B. Comcast Corporation ......................................................................................................................
    [Show full text]