Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen Dec 2011

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen

Faculty Scholarship

Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton Jul 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a Jew Day,” for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like “How to Kill Beaners,” “Execute the Gays,” and “Murder Muslim Scum.” The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton Jan 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based …


Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale Jan 2011

Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale

Faculty Scholarship

When American lawyers talk about "essential facilities," they are usually referring to antitrust doctrine that has required certain platforms to provide access on fair and nondiscriminatory terms to all comers. Some have recently characterized Google as an essential facility. Antitrust law may shape the search engine industry in positive ways. However, scholars and activists must move beyond the crabbed vocabulary of competition policy to develop a richer normative critique of search engine dominance.

In this chapter, I sketch a new concept of "essential cultural and political facility," which can help policymakers recognize and address situations where a bottleneck has become …


Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


Is Internet Exceptionalism Dead?, Tim Wu Jan 2011

Is Internet Exceptionalism Dead?, Tim Wu

Faculty Scholarship

Is there such a thing as Internet exceptionalism? If so, just what is the Internet an exception to? It may appear technical, but this is actually one of the big questions of our generation, for the Internet has shaped the United States and the world over the last twenty years in ways people still struggle to understand. The question is not merely academic. The greatest Internet firms can be succinctly defined as those that have best understood what makes the Internet different.