Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Brooklyn Law School

Journal

Keyword
Publication Year
Publication

Articles 1 - 10 of 10

Full-Text Articles in Internet Law

Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan Aug 2023

Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan

Brooklyn Journal of International Law

Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …


Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane Dec 2021

Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane

Brooklyn Journal of International Law

The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …


Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker Dec 2021

Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker

Brooklyn Journal of International Law

Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova Jun 2020

A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova

Brooklyn Journal of International Law

Cyber warfare today finds itself on the front page of the news daily. It is increasingly apparent that the cyber domain demands more guidance, with leaders opting for the deployment of cyber capabilities to bypass kinetic warfare norms. Proposed solutions abound, but none adequately address the specific features of cyber warfare that set it apart from traditional kinetic warfare. This Article argues that a new legal framework is necessary to properly address this problem, and such a doctrine should incorporate principles of chaos theory. Chaos theory is a branch of mathematics dealing with complex systems, with the most well-known example …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich Jan 2018

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting social media companies …


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li Jan 2016

The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li

Journal of Law and Policy

Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …


Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein Jan 2016

Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein

Journal of Law and Policy

Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …