Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (9)
- Internet Law (8)
- Human Rights Law (5)
- Privacy Law (4)
- Comparative and Foreign Law (3)
-
- Law and Society (3)
- Legislation (3)
- Communications Law (2)
- Constitutional Law (2)
- Criminal Law (2)
- Intellectual Property Law (2)
- International Law (2)
- Legal Ethics and Professional Responsibility (2)
- Civil Procedure (1)
- Courts (1)
- Jurisprudence (1)
- Law and Gender (1)
- Legal Writing and Research (1)
- National Security Law (1)
- Keyword
-
- Privacy (6)
- Human Rights (4)
- AI (3)
- Artificial Intelligence (3)
- CFAA (3)
-
- Machine Learning (3)
- Security (3)
- Adversarial Machine Learning (2)
- Chilling Effects (2)
- Computer Fraud And Abuse Act (2)
- Computer Law (2)
- Copyright (2)
- Encryption (2)
- Ethics (2)
- International Law (2)
- Internet Censorship (2)
- Surveillance (2)
- Telecommunications (2)
- Academic Research (1)
- Algorithms (1)
- Border (1)
- Cellphone (1)
- Charter (1)
- Civil Procedure (1)
- Civil litigation (1)
- Code Is Law (1)
- Communications Law (1)
- Computer (1)
- Computer Code (1)
- Copyright Protection (1)
Articles 1 - 12 of 12
Full-Text Articles in Computer Law
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Articles, Book Chapters, & Popular Press
Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.
Now, research on adversarial …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Articles, Book Chapters, & Popular Press
Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Articles, Book Chapters, & Popular Press
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Is Europe Falling Behind In Data Mining? Copyright's Impact On Data Mining In Academic Research, Christian Handke, Lucie Guibault, Joan-Josep Vallbé
Is Europe Falling Behind In Data Mining? Copyright's Impact On Data Mining In Academic Research, Christian Handke, Lucie Guibault, Joan-Josep Vallbé
Articles, Book Chapters, & Popular Press
This empirical paper discusses how copyright affects data mining (DM) by academic researchers. Based on bibliometric data, we show that where DM for academic research requires the express consent of rights holders: (1) DM makes up a significantly lower share of total research output; and (2) stronger rule-of-law is associated with less DM research. To our knowledge, this is the first time that an empirical study bears out a significant negative association between copyright protection and innovation.
Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney
Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
“Code is Law”, the aphorism Larry Lessig popularized, spoke to the importance of computer code as a central regulating force in the Internet age. That remains true, but today, overreaching laws are also increasingly subjugating important social and ethics questions raised by code to the domain of law. Those laws — like the CFAA and DMCA — need to be curtailed or their zealous enforcement reigned; they deter not only legitimate research but also important related social and ethics questions. But researchers must act too: to re-assert control over the social, legal, and ethical direction of their fields. Otherwise, law …
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Cross-Border Extended Collective Licensing: A Solution To Online Dissemination Of Europe’S Cultural Heritage, Johan Axhamn, Lucie Guibault
Cross-Border Extended Collective Licensing: A Solution To Online Dissemination Of Europe’S Cultural Heritage, Johan Axhamn, Lucie Guibault
Articles, Book Chapters, & Popular Press
The ever increasing use of the Internet and of digitisation technologies have opened up new possibilities for distributing and accessing creative content online, including for cultural heritage institutions. However, the digitisation and dissemination of a substantial proportion of the collections held by European cultural institutions may be considerably hindered due to high transaction costs related to clearance of copyright and related rights. This holds equally true for the cultural institutions taking part in the Europeana project. This study examines whether the Nordic “extended collective licensing” (ECL) model could provide a viable solution to the problems of digitisation and dissemination of …
'Canada' In Electronic Evidence, Steve Coughlan
'Canada' In Electronic Evidence, Steve Coughlan
Articles, Book Chapters, & Popular Press
Canada is a bilingual and bi-jurisdictional country. Most provinces and territories are mainly English speaking and have common law as the basis for their legal system. The exception is the province of Quebec which is governed by civil law and where the majority speaks French. However, it must be noted that Quebec civil law has been substantially affected by common law, in particular with respect to discovery rules. The latter are closer to common law discovery rules than they are from, for instance, French civil law. Another important factor for the review of the management of digital evidence in Canada …