Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), 2016 University of Oklahoma College of Law
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
When it comes to criminal investigation, time travel is increasingly possible. Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records. And those records not only store our past, but thanks to data mining and big data, in many circumstances they are eerily good at predicting our future. So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond? How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology? Is it meaningfully ...
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, 2015 Indiana University - Bloomington
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States ...
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, 2015 Author, Educator, Entrepreneur & Professional Corporate Director
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise?
This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these ...
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, 2015 Indiana University - Bloomington
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
Although the atmosphere and cyberspace are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and the associated challenges of collective inaction and free riders. Moreover, “[m]illions of actors affect the global atmosphere[,]” just as they do the Internet. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem affecting the entire world, but one in which the benefits are dispersed and the harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a relatively small number of ...
The Shaky Ground Of The Right To Be Delisted, 2015 Universitat Oberta de Catalunya
The Shaky Ground Of The Right To Be Delisted, Miquel Peguera
It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be delisted ...
When Competition Fails To Optimise Quality: A Look At Search Engines, 2015 University of Tennessee
When Competition Fails To Optimise Quality: A Look At Search Engines, Maurice E. Stucke, Ariel Ezrachi
Maurice E Stucke
The European Commission’s Statement of Objections forms the latest addition to the ongoing debate on the possible misuse of Google’s position in the search engine market. The scholarly debate, however, has largely been over the exclusionary effects of search degradation. Less attention has been attributed to the dimension of quality – whether and how a search engine, faced with rivals, could degrade quality on the free side. We set out to address this fundamental issue: With the proliferation of numerous web search engines and their free usage and availability, could any search engine degrade quality? We begin our analysis ...
The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, 2015 University of Illinois College of Law
The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed
This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot ...
Data Privacy Regulation In The Age Of Smartphones, 2015 Touro College Jacob D. Fuchsberg Law Center
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Touro Law Review
No abstract provided.
The Doctrinal Toll Of "Information As Speech", 2015 University of Detroit Mercy School of Law
The Doctrinal Toll Of "Information As Speech", Kyle Langvardt
The courts over the past two decades have reached a near-consensus that computer code, along with virtually every flow of data on the Internet, is “speech” for First Amendment purposes. Today, newer information technologies such as 3D printing, synthetic biology, and digital currencies promise to remake whole other spheres of non-expressive economic activity in the Internet's image. The rush to claim First Amendment protections for these non-expressive but code-dependent technologies has already begun with a lawsuit claiming First Amendment privileges for the Internet distribution of 3D-printable guns. Many similar suits will surely follow, all pursuing the common dream of ...
Digital Anonymity: Investigating The Open Threat By The Hidden User, 2015 American Public University System
Digital Anonymity: Investigating The Open Threat By The Hidden User, Derrick B. Rumer
Master's Capstone Theses
Anonymous networks provide users the opportunity to navigate the internet anonymously by adding additional connections between client and server that mask the users IP address and provide other layers of security that protect user identities while navigating the web. With this technology also come ramifications when criminals use the technology to cover their tracks. This paper will provide insight to digital anonymity as well as review previous research conducted on the subject. The United Stated Government and law enforcement agencies have made great strides in combatting crimes conducted over anonymous networks. The purpose of this study is to determine if ...
The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden
At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use.
As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks ...
Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, 2015 Penn State University
Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden
This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal.
The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act ...
Small Data Surveillance V. Big Data Cybersurveillance, 2015 Pepperdine University
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the ...
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, 2015 Seattle University School of Law
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to ...
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, 2015 Seattle University School of Law
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may ...
Toward A New Language Of Legal Drafting, 2015 Stanford University
Toward A New Language Of Legal Drafting, Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
Freedom In My Heart, 2015 Software Freedom Conservancy
Freedom In My Heart, Karen Sandler
No abstract provided.
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, 2015 College of William & Mary Law School
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
William & Mary Law Review
No abstract provided.
Death By Bullying: A Comparative Culpability Proposal, 2015 Pace University School of Law
Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers
Pace Law Review
This article explores the possibility and advisability of imposing homicide charges against bullies, a controversial approach because of the serious causation questions it poses. Nonetheless, there is precedent for holding a person criminally culpable for a victim’s suicide. A notorious case involved the head of the Ku Klux Klan who was convicted of murder after the woman he raped killed herself by swallowing poison, “distracted by pain and shame so inflicted upon her.” Some may see her shame as analogous to gay teens who commit suicide after being bullied about their sexual orientation. But perhaps the law should not ...
Copyright And Social Media: A Tale Of Legislative Abdication, 2015 New York University School of Law
Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman
Pace Law Review
The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms ...