Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young Oct 2003

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young

Michigan Telecommunications & Technology Law Review

This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …


Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale Apr 2003

Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale

Michigan Telecommunications & Technology Law Review

The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …


Fool Us Once Shame On You—Fool Us Twice Shame On Us: What We Can Learn From The Privatizations Of The Internet Backbone Network And The Domain Name System, Jay P. Kesan, Rajiv C. Shah Jan 2001

Fool Us Once Shame On You—Fool Us Twice Shame On Us: What We Can Learn From The Privatizations Of The Internet Backbone Network And The Domain Name System, Jay P. Kesan, Rajiv C. Shah

Washington University Law Review

One goal of this Article is to describe and document the privatization processes for the backbone network and the DNS. We initially assumed the privatization of the Internet consisted of a simple shift from a subsidized network to a competitive market for backbone services. However, we found the privatization process to be quite complex and problematic. Unfortunately, many of these same problems are reoccurring in the current privatization of the DNS. Our study found three categories of problems that occurred during the privatizations of the Internet’s backbone network and the DNS: procedural problems, problems with the management of competition, and …