<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-14T18:21:00+00:00</dc:date>

	
	<item>
		<title> The Case Against Regulating AI in One Chart (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststhe-case-against-regulating-ai-in-one-chart</guid>
		<link>https://circleid.com/poststhe-case-against-regulating-ai-in-one-chart</link>
		<description><![CDATA[A three-decade natural experiment suggests America's centralized regulatory review fostered far greater wealth creation than Europe's precautionary principle, raising stark questions about whether importing EU-style AI rules would undermine US innovation and prosperity. <a href="https://circleid.com/poststhe-case-against-regulating-ai-in-one-chart">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Law as Unusual: Quantum Computing's Five-Dimensional Challenge to the Legal Establishment (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20220525-law-as-unusual-quantum-computingas-five-dimensional-challenge-to-the-legal-establishment</guid>
		<link>https://circleid.com/posts20220525-law-as-unusual-quantum-computingas-five-dimensional-challenge-to-the-legal-establishment</link>
		<description><![CDATA[Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? <a href="https://circleid.com/posts20220525-law-as-unusual-quantum-computingas-five-dimensional-challenge-to-the-legal-establishment">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Regulating Magic: Why We Need to Establish a Regulatory Framework for Quantum Computing and Artificial Intelligence (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20211028-why-we-need-to-establish-regulatory-framework-for-quantum-computing-artificial_intelligence</guid>
		<link>https://circleid.com/posts20211028-why-we-need-to-establish-regulatory-framework-for-quantum-computing-artificial_intelligence</link>
		<description><![CDATA[The promises of quantum computing, artificial intelligence, and other advancing technologies sound like magic. However, even magic is subject to the laws of economics. And even quantum computers are “legal things…technological tools that are bound to affect our lives in a tangible manner,” as Valentin Jeutner explains in The Quantum Imperative: Addressing the Legal Dimension of Quantum Computers. Analogous to Asimov’s Three Laws of Robotics, Professor Jeutner proposes a three-part “quantum imperative,” which “provides that regulators and developers must ensure that the development of quantum computers. <a href="https://circleid.com/posts20211028-why-we-need-to-establish-regulatory-framework-for-quantum-computing-artificial_intelligence">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> STEM to STEMM: It Will Take Musicians to Save the Internet (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20171106_stem_to_stemm_it_will_take_musicians_to_save_the_internet</guid>
		<link>https://circleid.com/posts20171106_stem_to_stemm_it_will_take_musicians_to_save_the_internet</link>
		<description><![CDATA[The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... <a href="https://circleid.com/posts20171106_stem_to_stemm_it_will_take_musicians_to_save_the_internet">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Should the EB-5 Investor Visa Program Recognize Cyber Workers? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20170812_should_the_eb_5_investor_visa_program_recognize_cyber_workers</guid>
		<link>https://circleid.com/posts20170812_should_the_eb_5_investor_visa_program_recognize_cyber_workers</link>
		<description><![CDATA[The EB-5 Investor Visa Program was created by Congress in 1990 to "stimulate the U.S. economy through job creation and capital investment by foreign investors." The program, administered by the Department of Homeland Security's U.S. Citizenship and Immigration Services (USCIS), provides that entrepreneurs (and their spouses and unmarried children under 21) are eligible to apply for a green card (permanent residence) if they make the necessary investment in a commercial enterprise in the United States; and plan to create or preserve 10 permanent full-time jobs. <a href="https://circleid.com/posts20170812_should_the_eb_5_investor_visa_program_recognize_cyber_workers">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Is the Internet a Tobacco Product? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20160511_is_the_internet_a_tobacco_product</guid>
		<link>https://circleid.com/posts20160511_is_the_internet_a_tobacco_product</link>
		<description><![CDATA[Audacity by federal policy makers can be admirable, at least in some cases, but it can a bit more problematic in others. A case in point is the Food and Drug Administration's "deeming" of the internet to be a tobacco product. The FDA explained that it was exercising its authority under the Family Smoking Prevention and Tobacco Control Act which gave the agency an extensive set of duties, responsibilities and authorities over "tobacco products." <a href="https://circleid.com/posts20160511_is_the_internet_a_tobacco_product">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Is the FCC Inviting the World's Cyber Criminals into America's Living Rooms? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20160420_is_fcc_inviting_world_cyber_criminals_into_americas_living_rooms</guid>
		<link>https://circleid.com/posts20160420_is_fcc_inviting_world_cyber_criminals_into_americas_living_rooms</link>
		<description><![CDATA[In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese telecommunications companies Huawei and ZTE to "use another vendor." The bipartisan statement explains that the Intelligence Committee's Report, "highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies." <a href="https://circleid.com/posts20160420_is_fcc_inviting_world_cyber_criminals_into_americas_living_rooms">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20160119_federal_data_crisis_unreliable_databases_destroying_opportunities</guid>
		<link>https://circleid.com/posts20160119_federal_data_crisis_unreliable_databases_destroying_opportunities</link>
		<description><![CDATA[Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. <a href="https://circleid.com/posts20160119_federal_data_crisis_unreliable_databases_destroying_opportunities">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Correcting Federal Databases: A Procedural Guide (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20141002_correcting_federal_databases_a_procedural_guide</guid>
		<link>https://circleid.com/posts20141002_correcting_federal_databases_a_procedural_guide</link>
		<description><![CDATA[Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. <a href="https://circleid.com/posts20141002_correcting_federal_databases_a_procedural_guide">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Economics of Magic (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20150504_the_economics_of_magic</guid>
		<link>https://circleid.com/posts20150504_the_economics_of_magic</link>
		<description><![CDATA[Arthur C. Clarke said any sufficiently advanced technology is indistinguishable from magic. Milton Friedman said there's no such thing as a free lunch. The validity of the former statement does not invalidate the later. From this we can see that even magic has a price. Hence, its application is subject to cost-benefit analysis. There are many developing technologies that may eventually qualify as magic. <a href="https://circleid.com/posts20150504_the_economics_of_magic">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Why OIRA Needs to Coordinate Federal Cyber Security Regulation (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20141210_why_oira_needs_to_coordinate_federal_cyber_security_regulation</guid>
		<link>https://circleid.com/posts20141210_why_oira_needs_to_coordinate_federal_cyber_security_regulation</link>
		<description><![CDATA[Two quick facts about American industry's resilience against cyber-attack, (1) our critical infrastructure is inadequately protected and (2) federal regulation will be required to fix the problem, reliance on market forces alone will not be sufficient irrespective of whether or not Sony Pictures survives. Although regulation is needed, it needs to be coordinated and, above all, cost-effective. Which agency is charge of regulating cybersecurity? Right now, it's a free for all with agencies staking out turf and claims of authority. <a href="https://circleid.com/posts20141210_why_oira_needs_to_coordinate_federal_cyber_security_regulation">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20141002_cigarette_smuggling_cyber_security_low_tech_crimes_fund_high_tech</guid>
		<link>https://circleid.com/posts20141002_cigarette_smuggling_cyber_security_low_tech_crimes_fund_high_tech</link>
		<description><![CDATA[You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don't remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you're reading this. <a href="https://circleid.com/posts20141002_cigarette_smuggling_cyber_security_low_tech_crimes_fund_high_tech">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> FISMA Failings: Could EPA's IT Defense Deficiencies Silence the Agency? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20121112_fisma_failings_could_epas_it_defense_deficiencies_silence_agency</guid>
		<link>https://circleid.com/posts20121112_fisma_failings_could_epas_it_defense_deficiencies_silence_agency</link>
		<description><![CDATA[The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. <a href="https://circleid.com/posts20121112_fisma_failings_could_epas_it_defense_deficiencies_silence_agency">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120910_cost_effectiveness_the_prerequisite_for_cybersecurity_regulation</guid>
		<link>https://circleid.com/posts20120910_cost_effectiveness_the_prerequisite_for_cybersecurity_regulation</link>
		<description><![CDATA[Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. <a href="https://circleid.com/posts20120910_cost_effectiveness_the_prerequisite_for_cybersecurity_regulation">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20120820_agencies_authority_to_issue_critical_infrastructure_protection</guid>
		<link>https://circleid.com/posts20120820_agencies_authority_to_issue_critical_infrastructure_protection</link>
		<description><![CDATA[The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. <a href="https://circleid.com/posts20120820_agencies_authority_to_issue_critical_infrastructure_protection">More...</a>]]></description>
		<dc:date>2026-04-14T11:21:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>