Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (5)
- Human Rights (4)
- AI (3)
- Artificial Intelligence (3)
- CFAA (3)
-
- Machine Learning (3)
- Security (3)
- Adversarial Machine Learning (2)
- Chilling Effects (2)
- Computer Fraud And Abuse Act (2)
- Encryption (2)
- Ethics (2)
- International Law (2)
- Internet Censorship (2)
- Surveillance (2)
- Telecommunications (2)
- Algorithms (1)
- Code Is Law (1)
- Communications Law (1)
- Computer Code (1)
- Copyright (1)
- Creative Content (1)
- Cultural Institutions (1)
- Cyberbullying (1)
- Cyberharassment (1)
- Cybersecurity (1)
- DMCA (1)
- Data Breach (1)
- Data Science (1)
- Design (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Law
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Articles, Book Chapters, & Popular Press
Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.
Now, research on adversarial …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Articles, Book Chapters, & Popular Press
Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney
Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
“Code is Law”, the aphorism Larry Lessig popularized, spoke to the importance of computer code as a central regulating force in the Internet age. That remains true, but today, overreaching laws are also increasingly subjugating important social and ethics questions raised by code to the domain of law. Those laws — like the CFAA and DMCA — need to be curtailed or their zealous enforcement reigned; they deter not only legitimate research but also important related social and ethics questions. But researchers must act too: to re-assert control over the social, legal, and ethical direction of their fields. Otherwise, law …
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Cross-Border Extended Collective Licensing: A Solution To Online Dissemination Of Europe’S Cultural Heritage, Johan Axhamn, Lucie Guibault
Cross-Border Extended Collective Licensing: A Solution To Online Dissemination Of Europe’S Cultural Heritage, Johan Axhamn, Lucie Guibault
Articles, Book Chapters, & Popular Press
The ever increasing use of the Internet and of digitisation technologies have opened up new possibilities for distributing and accessing creative content online, including for cultural heritage institutions. However, the digitisation and dissemination of a substantial proportion of the collections held by European cultural institutions may be considerably hindered due to high transaction costs related to clearance of copyright and related rights. This holds equally true for the cultural institutions taking part in the Europeana project. This study examines whether the Nordic “extended collective licensing” (ECL) model could provide a viable solution to the problems of digitisation and dissemination of …