Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Federal Communications Law Journal

Journal

Articles 1 - 30 of 51

Full-Text Articles in Entire DC Network

Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert May 2012

Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert

Federal Communications Law Journal

The balancing act between protecting First Amendment rights and the necessity of law enforcement to maintain the public order is not simple under normal circumstances. On August 11, 2011, San Francisco's Bay Area Rapid Transit ("BART") created a paradigm embodying the very essence of this problem by shutting down cell phone and Internet service to prevent citizens from organizing and planning a protest. Both the constitutional and telecommunications law implications of BART's cell phone and Internet shutdown beg for analysis and reform, especially in an age of rapidly advancing technology. This Note analyzes the legal implications of BART's shutdown, and …


Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham May 2012

Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham

Federal Communications Law Journal

More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters May 2011

Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters

Federal Communications Law Journal

This Article addresses whether WikiLeaks could claim a federal reporter's privilege if the U.S. government or a U.S. entity tried to compel one of the site's staff members to disclose the source(s) of any documents it has released. After exploring the origins of the First Amendment-based privilege, the Author argues that WikiLeaks would not be able to claim it. First, the website does not engage in investigative reporting. Second, it has not taken steps consistently to minimize harm. He also discusses congressional attempts to pass a federal shield law, paying special attention to H.R. 985 and S. 448, the two …


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal Mar 2011

The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

Policy debates about the evolution of the Internet show varying degrees of understanding about the underlying technology. A fundamental principle of the design of the Internet, from the early 1980s, is the so-called "end-to-end argument" articulated in a seminal technical paper. Intended to provide guidance for what kind of capability is built into a network as opposed to the devices that use the network, the end-to-end argument has been invoked in …


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Mar 2011

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


Wireless Efficiency Versus Net Neutrality, Charles L. Jackson Mar 2011

Wireless Efficiency Versus Net Neutrality, Charles L. Jackson

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion. One tool for controlling such congestion is giving higher priority to some applications, such as telephone calls, and …


Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders Mar 2011

Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders

Federal Communications Law Journal

In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …


Combating Cyberbullying: Emphasizing Education Over Criminalization, Jessica P. Meredith Dec 2010

Combating Cyberbullying: Emphasizing Education Over Criminalization, Jessica P. Meredith

Federal Communications Law Journal

The advent of new technologies such as social media websites like MySpace and Facebook have increased the methods through which bullying takes form and causes harm to children and teenagers. As the public has become more aware of the dangers of this new form of bullying, cyberbullying, legislators have responded by proposing legislation to criminalize this type of behavior with varying degrees of success. This Note explains the problem of cyberbullying and evaluates state and federal legislative efforts to combat the issue through criminalization, then argues that prevention through education will be the most effective solution. Unlike criminalization, educational initiatives …


Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person Apr 2010

Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person

Federal Communications Law Journal

Privacy concerns associated with information available on the Internet has become a central focus for policymakers in Washington, D.C., and around the world. Specifically, the use of deep packet inspection (DPI) technology to offer behavioral advertising on the Internet has become the focus of policy discussions. While there are legitimate concerns related to improper use of this technology, the benefits of the proper use of DPI should not be overlooked. This Note asks how increasing regulatory barriers to limit online behavioral advertising could affect the consumer's experience online. To answer this question, this Note first looks at what DPI is, …


Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth Apr 2010

Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth

Federal Communications Law Journal

In a remarkably short time, Google, Inc. has grown from two people working in a rented garage to a pervasive Internet force. Much of Google's unprecedented success stems from online advertising sales which employ behavioral advertising techniques-techniques that track consumer behavior--thereby increasing relevance and decreasing the cost of reaching a targeted audience. In the same span that saw Google's inception and explosive online dominance, the Federal Trade Commission has struggled to define not only the privacy issues involved in online behavioral advertising, but also the practice of behavioral advertising itself. Freed from the restraints of comprehensive federal laws and restrictive …


Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider Jun 2009

Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider

Federal Communications Law Journal

The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness-a set of properties (including security, survivability, and safety) that guarantee expected behavior. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination or "network neutrality" obligation on network providers is justified by the condition of competition among last-mile providers. Rules proposed by scholars and policymakers would allow network providers to deviate from network neutrality to protect network trustworthiness, but none of these proposals has explored the implications of such exceptions for either neutrality or trustworthiness.

This …


Who Needs Tickets? Examining Problems In The Growing Online Ticket Resale Industry, Clark P. Kirkman Jun 2009

Who Needs Tickets? Examining Problems In The Growing Online Ticket Resale Industry, Clark P. Kirkman

Federal Communications Law Journal

The Internet has dramatically changed the methods by which people purchase tickets to events. In the past decade, the secondary ticket market has grown exponentially, and today the online ticket resale industry is valued at approximately $4 billion. Although there are consumer benefits to this industry growth, some of the industry practices have precipitated a consumer backlash. This was typified in 2007 when many parents, hoping to purchase tickets to the Hannah Montana "Best of Both Worlds Tour," watched as tickets sold out online in only a few minutes or less. Coupled with this episode was the Ticketmaster v. RMG …


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti Jun 2008

The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti

Federal Communications Law Journal

Publicity-seeking crimes, including terrorism, almost by definition depend on the media for their effectiveness. Twenty-five years ago, when the bulk of this article was written, critics both within and outside the news industry had begun to voice an awareness, if not a concern, for the ease with which such criminals obtained publicity on both a national and international platform and it looked as if something might be done within the media establishments to thwart this manipulation of the press. Today, it is possible to look back and see that, in fact, nothing has been done and, so, individuals such as …


The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong Dec 2006

The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong

Federal Communications Law Journal

This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware's functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note …


A Model For Emergency Service Of Voip Certification And Labeling, Tom Lookabaugh, Patrick S. Ryan, Douglas C. Sicker Jan 2006

A Model For Emergency Service Of Voip Certification And Labeling, Tom Lookabaugh, Patrick S. Ryan, Douglas C. Sicker

Federal Communications Law Journal

The diffusion of VoIP technology promises revolutionary changes to a century old model of voice telephony. Though these changes bring extraordinary opportunities, they also bring challenging policy implications for businesses and regulators. In this Article, the Authors examine the technical difficulties of providing the same quality and dependability of emergency services in VoIP based telephony as consumers have come to expect from PSTN-based telephone networks. Given the technical complexity and heterogeneity of VolP, the Authors propose industry self-regulation through an advanced certification framework as a more effective alternative to direct government regulation. After surveying a number of successful self-regulatory regimes, …


Communications Policy For 2006 And Beyond, Reed H. Hundt, Gregory L. Rosston Jan 2006

Communications Policy For 2006 And Beyond, Reed H. Hundt, Gregory L. Rosston

Federal Communications Law Journal

In this Article, the Authors propose sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the Authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. Through maximizing the operation of the markets, the authors argue that communications policy will better serve its goals of increasing business productivity and consumer welfare through the better services and lower prices. Important steps to achieve optimal market operation include deregulating retail prices where multifirm competition is available, minimizing the cost of public property …


Discriminatory Filtering: Cipa's Effect On Our Nation's Youth And Why The Supreme Court Erred In Upholding The Constitutionality Of The Children's Internet Protection Act, Katherine A. Miltner May 2005

Discriminatory Filtering: Cipa's Effect On Our Nation's Youth And Why The Supreme Court Erred In Upholding The Constitutionality Of The Children's Internet Protection Act, Katherine A. Miltner

Federal Communications Law Journal

Congress introduced the Children's Internet Protection Act ("CIPA") in order to filter obscene and indecent material in response to a perceived threat to members of the public, specifically minors, who are exposed to pornographic material on the Internet. The provisions of CIPA have provoked tension between two competing interests: protecting minors from cyberpornography, and safeguarding First Amendment rights. This Note argues that the Supreme Court erred by upholding the constitutionality of CIPA. As a result of the Supreme Court's decision, the nation's youth will have restricted access to constitutionally protected information. The Court improperly relied on a provision of the …


An Architecture For Spam Regulation, David Dickinson Dec 2004

An Architecture For Spam Regulation, David Dickinson

Federal Communications Law Journal

Junk email, commonly referred to as "spam," is the current scourge of the Internet. In late 2004, unwanted email messages were being delivered at a rate of 12.4 billion per day. The variety of tools used to combat spam have failed to make a significant impact. Legislative efforts, such as the CAN-SPAM Act of 2003, met with substantial enforcement complications. The communications industry responded with a variety of technical advances, such as filters and blacklists, but those innovations are still unable to reliably distinguish between wanted and unwanted messages. Real coordination between legislative and technical spam control tactics has yet …


Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors Mar 2003

Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors

Federal Communications Law Journal

This Note argues that although privacy and economic concerns have ruled the encryption debate during the past decade, the move toward increased privacy on the Internet and relaxed encryption regulation, designed to promote electronic commerce, comes at the expense of national security and the protection of Americans' safety. The Article begins with historical information about encryption and an examination of how businesses use encryption to secure their communications and financial transactions on the Internet. This Section also observes that this technology is employed by terrorist organizations to accomplish the same goal: to send private communications. The Author next details the …


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion May 2002

Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion

Federal Communications Law Journal

While we credit employers that provide employees with free Internet access, such access comes at a price to the public because employers are one of the traditional defendents in defamation suits. Complicating matters, Congress enacted the Communications Decency Act. Its section 230 provides broad federal immunity for ISPs when defamatory material of a third party is published using their services. With the passage of section 230, Congress rendered employers immune for the same tort which they are so closely associated. Some argue that employers should not be capable of invoking the immunity because it would allow employers to defame with …


The Digital Divide And Courtroom Technology: Can David Keep Up With Goliath?, Michael E. Heintz May 2002

The Digital Divide And Courtroom Technology: Can David Keep Up With Goliath?, Michael E. Heintz

Federal Communications Law Journal

The federal judiciary recently embraced the technological revolution. Select courts are now equipped with state-of-the-art technology to aid in trial presentations. Before the judiciary made the improvements, litigants had to keep pace with the technological advancements themselves, often at a great cost. One might think that the recent technological improvements made to federal courtrooms would have widened the gap between large and small firms where the available resources are vastly different, but that is not the case. In fact, the installation of new technology into courtrooms serves to equalize what would otherwise be a "digital divide."

Part II of this …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


Editor's Note, Tom W. Brummett Mar 2002

Editor's Note, Tom W. Brummett

Federal Communications Law Journal

No abstract provided.


The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis Mar 2002

The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis

Federal Communications Law Journal

This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.


Does Internet Gambling Strengthen The U.S. Economy? Don't Bet On It, Ryan D. Hammer Dec 2001

Does Internet Gambling Strengthen The U.S. Economy? Don't Bet On It, Ryan D. Hammer

Federal Communications Law Journal

Commercial gambling in the United States is a mammoth industry. In the past few decades, the United States developed from a country with few gambling options to one permitting some form of legalized gambling in almost every state. Presently, a new wave of technology affects this industry. Legislators and regulators must deal with the phenomenon of Internet gambling. This Note asserts that Internet gambling must be curbed to lessen its negative impact on the American economy. Many state and local governments are dependent on tax revenues associated with traditional forms of gambling. Internet gambling not only deprives the economy of …