Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Civil liberties (2)
- Cyber hate (2)
- Digital citizenship (2)
- Fusion centers (2)
- Hate speech (2)
-
- Information privacy (2)
- Intelligence (2)
- Antitrust (1)
- Copyright infringement (1)
- Copyright law (1)
- DMCA (1)
- Doctrine (1)
- Domain names (1)
- Dominance (1)
- Essential facilities (1)
- Filesharing (1)
- Filesharing wars (1)
- Google (1)
- ICE (1)
- Infringing speech (1)
- International Law Studies (1)
- International Law Studies Series U.S. Naval War College (1)
- Internet (1)
- Internet exceptionalism (1)
- Operation in Our Sites (1)
- Search engines (1)
- Websites (1)
Articles 1 - 10 of 10
Full-Text Articles in Law
President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen
President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen
Faculty Scholarship
Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton
Faculty Scholarship
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a Jew Day,” for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like “How to Kill Beaners,” “Execute the Gays,” and “Murder Muslim Scum.” The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.
Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …
Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron
Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron
Faculty Scholarship
No abstract provided.
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton
Faculty Scholarship
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.
Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based …
Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale
Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale
Faculty Scholarship
When American lawyers talk about "essential facilities," they are usually referring to antitrust doctrine that has required certain platforms to provide access on fair and nondiscriminatory terms to all comers. Some have recently characterized Google as an essential facility. Antitrust law may shape the search engine industry in positive ways. However, scholars and activists must move beyond the crabbed vocabulary of competition policy to develop a richer normative critique of search engine dominance.
In this chapter, I sketch a new concept of "essential cultural and political facility," which can help policymakers recognize and address situations where a bottleneck has become …
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars
The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars
Faculty Scholarship
In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.
This Paper examines three specific harms resulting from Operation In Our Sites, and …
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Faculty Scholarship
In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."
To what extent is …
Is Internet Exceptionalism Dead?, Tim Wu
Is Internet Exceptionalism Dead?, Tim Wu
Faculty Scholarship
Is there such a thing as Internet exceptionalism? If so, just what is the Internet an exception to? It may appear technical, but this is actually one of the big questions of our generation, for the Internet has shaped the United States and the world over the last twenty years in ways people still struggle to understand. The question is not merely academic. The greatest Internet firms can be succinctly defined as those that have best understood what makes the Internet different.