Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Internet Law

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Understanding Chilling Effects, Jonathon Penney Jan 2022

Understanding Chilling Effects, Jonathon Penney

Articles, Book Chapters, & Popular Press

With digital surveillance and censorship on the rise, the amount of data available online unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence (AI), machine learning, and facial recognition technology (FRT) for surveillance and data analytics, concerns about “chilling effects”, that is, the capacity for these activities “chill” or deter people from exercising their rights and freedoms have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work point. This has left significant gaps in understanding. This article has attempted to fill that void, synthesizing theoretical and empirical …


Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen Jan 2021

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen

Articles, Book Chapters, & Popular Press

Perpetrators of Technology-Facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalker-ware, using drones to non-consensually film or harass, or manipulating and distributing intimate images online such as deep-fakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada’s Supreme Court recently addressed Technology-Facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019). The discussion of …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn Jan 2020

Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn

Articles, Book Chapters, & Popular Press

Technology facilitated gender-based violence (TFGBV) is a complex worldwide phenomenon with devastating results. Research to date shows that victim-survivors of intimate partner violence are tracked by their abusive partners who use technology to monitor their movements and communication. Many women journalists, human rights defenders and politicians face daily death threats and rape threats for speaking out about equality issues or for simply being a woman in a leadership role. Those with intersecting marginalized identities are at specific risk, with Black, Indigenous, and people of colour, LGBTQ+ people, and people with disabilities facing higher rates of attacks and concerted attacks that …


Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar Jan 2020

Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …


Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney Jan 2019

Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …


When Law Frees Us To Speak, Jonathon Penney, Danielle Citron Jan 2019

When Law Frees Us To Speak, Jonathon Penney, Danielle Citron

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood Jan 2018

More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood

Articles, Book Chapters, & Popular Press

The non-consensual distribution of intimate images, or “revenge porn” as it is colloquially known, is a growing phenomenon in the digital era that has devastated the lives of countless individuals. Targets of this conduct have suffered both short and long-lasting harms that have had serious repercussions on their mental health, physical well-being, and safety. Once their intimate images have been shared without their consent, they can face damage to their personal and professional reputations. There are reported cases where individuals have lost their jobs, have had to relocate, were stalked and harassed, experienced some form of emotional trauma, and had …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney Jan 2014

Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

“Code is Law”, the aphorism Larry Lessig popularized, spoke to the importance of computer code as a central regulating force in the Internet age. That remains true, but today, overreaching laws are also increasingly subjugating important social and ethics questions raised by code to the domain of law. Those laws — like the CFAA and DMCA — need to be curtailed or their zealous enforcement reigned; they deter not only legitimate research but also important related social and ethics questions. But researchers must act too: to re-assert control over the social, legal, and ethical direction of their fields. Otherwise, law …


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …


Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney Jan 2012

Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney

Articles, Book Chapters, & Popular Press

Recently, ideas about "rights" to Internet access or connectivity have received growing recognition from governments, legal institutions, and other political actors in several countries, including New Zealand Despite this emerging political and legal recognition, there are few, if any, systematic studies exploring such ideas. This paper aims to change this. First, it offers a theoretical exploration of the idea of a "right" to Internet access, including the diferent versions of such rights talk. Secondly, it examines whether there is any legal basis for such rights claims in New Zealand and ultimately argues that section 14 of the New Zealand Bill …


Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney Jan 2012

Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney

Articles, Book Chapters, & Popular Press

With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …


New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie Jan 2011

New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie

Articles, Book Chapters, & Popular Press

The globalized and decentralized Internet has become the new locus for a wide range of human activity, including commerce, crime, communications and cultural production. Activities which were once at the core of domestic jurisdiction have moved onto the Internet, and in doing so, have presented numerous challenges to the ability of states to exercise jurisdiction. In writing about these challenges, some scholars have characterized the Internet as a separate “space” and many refer to state jurisdiction over Internet activities as “extraterritorial.” This article examines these challenges in the context of the overall international law of jurisdiction, rather than focusing on …


Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney Jan 2011

Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney

Articles, Book Chapters, & Popular Press

If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …