News
ICYMI: Best of the Week
Welcome back to work! OK, so if you’re like me you’ve been back to work for a week now, but it still feels like the first Monday after vacation doesn’t it? In case you weren’t into your normal routine of obsessively scrolling through the news last week, you can catch up on Law Street’s top three articles. Number one was brought to you by Marisa Mostek in her series about the dumbest laws in the United States–this time it was Utah and Nevada. The number two story was from Hannah R. Winsten who had five actionable ideas for making this your most feminist New Year yet. And the third most popular story of the week was an issue brief on hacking as a tool of war by Mike Sliwinski. ICYMI, here is the Best of the Week from Law Street.
#1 The Dumbest Laws in the United States: Utah and Nevada
Nevada is home to legal prostitution and Sin City. Yet, it is surprisingly not home to many stupid laws. However, its neighbor Utah makes up for that with a whole long list of weird laws on the books. Let’s start with Nevada. In Reno, sex toys are outlawed, and it is illegal to lie down on the sidewalk, no matter how drunk and tired you are. Read the full article here.
#2 Five Resolutions for a More Feminist New Year
Folks, the New Year is upon us. Time to break out your most bedazzled dress, pop the champagne, and party your way into 2015, am I right? Fuck yeah I am. But, while New Year’s Eve is a night of epic intoxication, huge crowds, and glittery debauchery (if you’re at the right party), it’s also notorious for being the pre-game to a little thing we all do every New Year’s Day. Resolution making. Read the full article here.
#3 Hacking: The New Kind of Warfare
Following the recent fiasco at Sony, hacking has been catapulted squarely into the spotlight. But hackers are doing more than just delaying movie premieres–they are causing serious damage and have the capability to cause much more. Before we get too scared of these anonymous boogeymen, however, it is important to understand what hacking is and who the hackers are. Read the full article here.
Comments