Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Law

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Submission To Canadian Government Consultation On A Modern Copyright Framework For Ai And The Internet Of Things, Sean Flynn, Lucie Guibault, Christian Handke, Joan-Josep Vallbé, Michael Palmedo, Carys Craig, Michael Geist, Joao Pedro Quintais Jan 2021

Submission To Canadian Government Consultation On A Modern Copyright Framework For Ai And The Internet Of Things, Sean Flynn, Lucie Guibault, Christian Handke, Joan-Josep Vallbé, Michael Palmedo, Carys Craig, Michael Geist, Joao Pedro Quintais

Reports & Public Policy Documents

We are grateful for the opportunity to participate in the Canadian Government’s consultation on a modern copyright framework for AI and the Internet of Things. Below, we present some of our research findings relating to the importance of flexibility in copyright law to permit text and data mining (“TDM”). As the consultation paper recognizes, TDM is a critical element of artificial intelligence. Our research supports the adoption of a specific exception for uses of works in TDM to supplement Canada’s existing general fair dealing exception.

Empirical research shows that more publication of citable research takes place in countries with “open” …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney Jan 2014

Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

“Code is Law”, the aphorism Larry Lessig popularized, spoke to the importance of computer code as a central regulating force in the Internet age. That remains true, but today, overreaching laws are also increasingly subjugating important social and ethics questions raised by code to the domain of law. Those laws — like the CFAA and DMCA — need to be curtailed or their zealous enforcement reigned; they deter not only legitimate research but also important related social and ethics questions. But researchers must act too: to re-assert control over the social, legal, and ethical direction of their fields. Otherwise, law …