Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Notice And Takedown In The Domain Name System: Icann’S Ambivalent Drift Into Online Content Regulation, Annemarie Bridy Jun 2017

Notice And Takedown In The Domain Name System: Icann’S Ambivalent Drift Into Online Content Regulation, Annemarie Bridy

Washington and Lee Law Review

No abstract provided.


Securities Regulation In Virtual Space, Eric C. Chaffee Jun 2017

Securities Regulation In Virtual Space, Eric C. Chaffee

Washington and Lee Law Review

No abstract provided.


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


You Buy It, You Break It: A Comment On Dispersing The Cloud, Aaron Perzanowski Jan 2017

You Buy It, You Break It: A Comment On Dispersing The Cloud, Aaron Perzanowski

Washington and Lee Law Review

No abstract provided.


Dispersing The Cloud: Reaffirming The Right To Destroy In A New Era Of Digital Property, Daniel Martin Jan 2017

Dispersing The Cloud: Reaffirming The Right To Destroy In A New Era Of Digital Property, Daniel Martin

Washington and Lee Law Review

No abstract provided.


Hybrid Transactions And The Internet Of Things: Goods, Services, Or Software?, Stacy-Ann Elvy Jan 2017

Hybrid Transactions And The Internet Of Things: Goods, Services, Or Software?, Stacy-Ann Elvy

Washington and Lee Law Review

The Internet of Things (IOT) has been described by the American Bar Association as “one of the fastest emerging,” potentially most “transformative and disruptive technological developments” in recent years. The security risks posed by the IOT are immense and Article 2 of the UCC should play a central role in determinations regarding liability for vulnerable IOT products. However, the lack of explicit clarity in the UCC on how to evaluate Article 2’s applicability to hybrid transactions that involve the provision of goods, services, and software has led to conflicting case law on this issue, which contradicts the UCC’s stated goals …


Appetite For Destruction: Symbolic And Structural Facets Of The Right To Destroy Digital Property, Joshua A.T. Fairfield Jan 2017

Appetite For Destruction: Symbolic And Structural Facets Of The Right To Destroy Digital Property, Joshua A.T. Fairfield

Washington and Lee Law Review

No abstract provided.