Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Science and Technology Law

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo Jan 2014

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

All Faculty Scholarship

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?"


The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Jan 2014

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Faculty Scholarship

Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation’s communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC’s net neutrality rules contained in its 2010 Open Internet Order. FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit’s invitation to implement rules that, consistent with historic practice, “will meet the court’s test for preventing improper blocking of and discrimination among Internet traffic.”

Chairman Wheeler’s statement invites an obvious question: presuming that the FCC wants …


Technological Determinism And Its Discontents, Christopher S. Yoo Jan 2014

Technological Determinism And Its Discontents, Christopher S. Yoo

All Faculty Scholarship

This book review takes a critical review of the claim advanced by Susan Crawford in Captive Audience that the merger between Comcast and NBC Universal would harm consumers and that policymakers should instead promote common carriage regulation and subsidize municipal symmetrical gigabit fiber-to-the-home (FTTH). First it evaluates the extent to which next-generation digital subscriber lines (DSL) and wireless broadband technologies can serve as effective substitutes for cable modem service, identifying FCC data showing that the market has become increasingly competitive and likely to continue to do so. Furthermore, the market is not structured in a way that would permit the …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal Jan 2014

Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal

Publications

This Article examines the puzzle of whether today's Federal Communications Commission ("FCC" or the "Agency") is institutionally suited to craft telecommunications innovation policy and, if not, what changes are needed to better equip the Agency to respond to twenty-first century realities. Evaluation of FCC innovation policy performance is stubbornly difficult. Some criticize the FCC as a brake on innovation yet, under the FCC's oversight, the United States' communications industry has become an innovative engine propelling the overall economy more than ever before. It is difficult to untangle whether the FCC deserves credit for helping usher in today's communications age, whether …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …