Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

American University Washington College of Law

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 158

Full-Text Articles in Law

Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Trusted Framework For Cross-Border Data Flows, Alex Joel Sep 2023

A Trusted Framework For Cross-Border Data Flows, Alex Joel

Joint PIJIP/TLS Research Paper Series

The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …


Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton Jul 2023

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


Opaque Notification: A Country-By-Country Review, Lauren Mantel Jun 2023

Opaque Notification: A Country-By-Country Review, Lauren Mantel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Necessity, Proportionality, And Executive Order 14086, Alex Joel May 2023

Necessity, Proportionality, And Executive Order 14086, Alex Joel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid Jan 2023

How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid

American University Journal of Gender, Social Policy & the Law

In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


Letter Form The Editor, Wayne Rash, Iii Jan 2023

Letter Form The Editor, Wayne Rash, Iii

American University National Security Law Brief

In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski Jan 2023

Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski

American University National Security Law Brief

Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …


Defi: Shadow Banking 2.0?, Hilary J. Allen Jan 2023

Defi: Shadow Banking 2.0?, Hilary J. Allen

Articles in Law Reviews & Other Academic Journals

The growth of so-called “shadow banking” was a significant contributor to the financial crisis of 2008, which had huge social costs that we still grapple with today. Our financial regulatory system still hasn’t fully figured out how to address the risks of the derivatives, securitizations, and money market mutual funds that comprised Shadow Banking 1.0, but we’re already facing the prospect o fShadow Banking 2.0in the form of decentralized finance, or “DeFi.” DeFi’s proponents speak of a future where sending money is as easy as sending a photograph–but money is not the same as a photograph. The stakes are much …


Digital Habit Evidence, Andrew Guthrie Ferguson Jan 2023

Digital Habit Evidence, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

This Article explores how “habit evidence” will become a catalyst for a new form of digital proof based on the explosive growth of smart homes, smart cars, smart devices, and the Internet of Things. Habit evidence is the rule that certain sorts of semiautomatic, regularized responses to particular stimuli are trustworthy and thus admissible under the Federal Rules of Evidence (“FRE”) 406 “Habit; Routine Practice” and state equivalents.

While well established since the common law, “habit” has made only an inconsistent appearance in reported cases and has been underutilized in trial practice. But intriguingly, once applied to the world of …


Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen Jan 2023

Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen

Articles in Law Reviews & Other Academic Journals

The recent U.S. Supreme Court decision West Virginia v. EPA has cast a pall over the discretion of administrative agencies at a very inopportune time. The private sector is currently adopting new technologies at a rapid pace, and as regulated industries become more technologically complex, administrative agencies must innovate technological tools of their own in order to keep up. Agencies will increasingly struggle to do their jobs without that innovation, but the private sector is afforded something that is both critical to the innovation process, and often denied to administrative agencies: “permission to fail.” Without some grace for the inevitable …


The 'Merge' Did Not Fix Ethereum, Hilary J. Allen Oct 2022

The 'Merge' Did Not Fix Ethereum, Hilary J. Allen

Popular Media

The Ethereum blockchain that facilitates much of the crypto world last month finally accomplished the long-promised and oft-delayed “Merge”, a technical switch in the way it works.


Why Digital Policing Is Different, Andrew Ferguson Jan 2022

Why Digital Policing Is Different, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Many Fourth Amendment debates boil down to following argument: if police can already do something in an analog world, why does it matter that new digital technology allows them to do it better, more efficiently, or faster? This Article addresses why digital is, in fact, different when it comes to police surveillance technologies. The Article argues that courts should think of these digital technologies not as enhancements of traditional analog policing practices but as something completely different, warranting a different Fourth Amendment approach. Properly understood, certain digital searches should be legally distinguishable from analog search precedent such that the older …


Persistent Surveillance, Andrew Guthrie Ferguson Jan 2022

Persistent Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.

In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …


Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes Jul 2021

Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes

Articles in Law Reviews & Other Academic Journals

Effective regulation of blockchain-based markets calls for coordination among lawyers, businesses, coders, and lawmakers. How might we achieve adequate coordination and why is it important? This Article takes up these questions, using one example of an increasingly popular type of blockchain-based financial transaction: the issuance of tokens backed by off-chain assets. The objective here is not to advocate for a particular regulatory treatment for asset tokenization, but rather to use this deal type as a springboard to discuss what "effective regulation" means in the context of blockchain-enabled markets.


Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes Jul 2021

Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes

Articles in Law Reviews & Other Academic Journals

Secured transactions are governed by Uniform Commercial Code Article 9. UCC Article 9 governs any extension of credit secured by personalty. If you think about it, this statute governs a massive swath of market activity: secured credit facilities, margin trading of securities, asset securitizations, and purchase money transactions for goods, I could name more. But it's a statute that's very wide ranging. Given this expansive scope, blockchain-based transaction platforms have numerous implications for lawyers who deal with secured transactions. In my brief time here, I'm going to identify just two of them.


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan Jan 2021

A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …


Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan Jan 2021

Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.

This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


The Integration Of Artificial Intelligence In The Intelligence Community: Necessary Steps To Scale Efforts And Speed Progress, Corin R. Stone Jan 2021

The Integration Of Artificial Intelligence In The Intelligence Community: Necessary Steps To Scale Efforts And Speed Progress, Corin R. Stone

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan Dec 2020

Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan

Amicus Briefs

Perhaps unexpectedly, a case on the constitutionality of the Patent Trial and Appeal Board has major significance to the pressing policy crisis of drug prices in the United States. Erroneously issued patents monopolize medical therapies, making them unaffordable or inaccessible to numerous Americans. The inter partes review proceedings that the Board conducts have repeatedly and successfully overcome such patents, enabling competition and dramatically lowering prices. This Court should ensure the continued viability of the Board and of inter partes review, by preserving the Board’s objectivity and independence from executive branch political influence.


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman Aug 2020

Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman

Joint PIJIP/TLS Research Paper Series

The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …


The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig Aug 2020

The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk Jul 2020

Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk

Articles in Law Reviews & Other Academic Journals

Prosecutors across the country are collecting and using data to make decisions in their offices. At the same time, prosecutors are interested in developing and sustaining prosecutorial diversion approaches. Prosecutors can use data to assist in decision-making regarding diversion case processing choices as well as to make office policy and resource allocation decisions that, in turn, support expanded diversion programs. Data collection can help prosecutors decide if a prosecutorial diversion program will work for them, and if so, what characteristics it should have. Finally, data can help prosecutors see whether they are obtaining their intended outcomes. Prosecutors possess varying levels …


Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan Jul 2020

Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

Recently, Congress has considered legislation to amend§ 101, a section of the Patent Act that the Supreme Court has held to prohibit patenting of laws of nature, natural phenomena, and abstract ideas. This draft legislation would expand the realm of patent-eligible subject matter, overturning the Court's precedents along the way. The draft legislation, and movement to change this doctrine of patent law, made substantial headway with a subcommittee of the Senate holding numerous roundtables and hearings on the subject.

This article considers some less-discussed consequences of that draft legislative proposal. The legislation likely opens the door to patenting of subject …


Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan Jul 2020

Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan

Joint PIJIP/TLS Research Paper Series

Global platforms such as YouTube, Facebook, Instagram or TikTok live on users ‘freely’ sharing content, in exchange for the data generated in the process. Many of these digital market actors nowadays employ automated copyright enforcement tools, allowing those who claim ownership to identify matching content uploaded by users. While most debates on state-sanctioned platform liability and automated private ordering by platforms has focused on the implications of user generated content being blocked, this paper places a spotlight on monetization. Using YouTube’s Content ID as principal example, I show how monetizing user content is by far the norm, and blocking the …