Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, 2023 Maurer School of Law - Indiana University
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, 2023 National Forensic Sciences University
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
Journal of Digital Forensics, Security and Law
Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …
How The Blockchain Undermined Digital Ownership, 2023 University of Michigan Law School
How The Blockchain Undermined Digital Ownership, Aaron Perzanowski
Washington and Lee Law Review
The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …
Tax Reporting As Regulation Of Digital Financial Markets, 2023 Benjamin N. Cardozo School of Law
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Articles
FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …
Keynote Address, 2023 Duke University
Keynote Address, Sultan Meghji
Washington and Lee Law Review
Keynote address presented virtually at the Washington and Lee Law Review's 54th Annual Lara D. Gass Symposium: The Future of E-Commerce: Is It on a Blockchain? on Friday, March 17, 2023 in Lexington, Virginia.
Digital Property Cycles, 2023 Washington and Lee University School of Law
Digital Property Cycles, Joshua Fairfield
Washington and Lee Law Review
The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of …
Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, 2023 Macquarie University
Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai
Washington and Lee Law Review
Tantamount with the increasing application of blockchain technologies around the world, the use of blockchain-based smart contracts has rapidly risen. In a “smart contract,” computer protocols automatically facilitate, verify, and enforce arrangements made between parties on a blockchain. Such smart contracts offer a variety of commercial benefits, notably immutability and increased efficiency facilitated by removing the need for a trusted intermediary. However, as discussed in recent legal scholarship, it is difficult for smart contracts to uphold certain fundamental principles of contract law. Translating concepts of individual intention and responsibility into the decentralized space of blockchain is problematic. Aggregating such individual …
Tax Reporting As Regulation Of Digital Financial Markets, 2023 Benjamin N. Cardozo School of Law, Yeshiva University
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Washington and Lee Law Review
FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …
The Internet, Personal Jurisdiction, And Daos, 2023 DeFi Labs, GmbH
The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire
Washington and Lee Law Review
Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.
Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …
Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, 2023 Texas A&M University School of Law
Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, Wayne Barnes
Faculty Scholarship
Online commerce has skyrocketed in recent years, and shoppers are purchasing goods or services online in greater numbers every year. The COVID-19 pandemic has only hastened the trend. One significant aspect of online shopping is the presence of consumer reviews posted by prior purchasers of goods or services, describing their experience with the products, the services and/or the selling merchant. A vast majority of online shoppers say that they rely on these reviews to help inform their purchasing decisions. Positive reviews can be tremendously beneficial to a business’ profitability, whereas negative reviews can be equally detrimental. Users of the internet …
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, 2023 Notre Dame Law School
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar
Washington Journal of Law, Technology & Arts
The persistence of the privacy paradox is proof that current industry regulation is insufficient to protect consumer’s privacy. Although consumer choice is essential, we argue that it should not be the main pillar of modern data privacy legislation. This article argues that legislation should aim to protect consumer’s personal data in the first place, while also giving internet users the choice to opt-in to the processing of their information. Ideally, privacy by design principles would be mandated by law, making privacy an essential component of the architecture of every tech-product and service.
“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, 2023 Pace University Elisabeth Haub School of Law
“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini
Washington Journal of Law, Technology & Arts
Telehealth’s expansion during the COVID-19 pandemic has drastically changed the approach to healthcare in the United States. This is particularly true in the behavioral health sector where several behavioral telehealth companies have emerged to treat Attention-Deficit/Hyperactivity Disorder (“ADHD”). These companies utilize a direct-to-consumer (“DTC”) model with a virtual platform that connects subscribing patients to medical providers who can treat them for ADHD. Although this telemedicine model emphasizes convenience and efficiency, the reality is that those benefits come at the cost of patient care. The federal regulations promulgated in the Ryan Haight Online Pharmacy Consumer Protection Act of 2008 to curtail …
Genetic Technologies: Patent Protections & The Case For Technology Transfer, 2023 University of Washington School of Law
Genetic Technologies: Patent Protections & The Case For Technology Transfer, Smitha Gundavajhala
Washington Journal of Law, Technology & Arts
Genetic technologies range in scope from agricultural to medical applications. Most recently, during the COVID-19 pandemic, companies like Moderna developed and patented genetic technologies for diagnostic and therapeutic purposes, like the mRNA vaccine. However, patent protection provides these companies with a monopoly that ultimately limits domestic production of generic versions, thus limiting access to life-saving diagnostics and therapeutics. When a company located in one country files a patent for recognition in another country, it effectively places a hold on production of any technologies covered by that patent’s reach, whether that patent is enforced or not. However, the TRIPS Agreement, the …
Consensus’S Consolidation Conundrum, 2023 Georgetown University Law Center
Consensus’S Consolidation Conundrum, James J. Bernstein
Washington Journal of Law, Technology & Arts
In Part I, this piece will highlight the history, basis, and justifications for blockchain systems over the present version of the internet. This section helps to frame where consensus mechanisms may undermine Web3’s core premise. Part II will describe the fundamentals of consensus mechanisms. Thereafter, in Part III this piece will demonstrate the pitfalls of each system - and why proof of stake is not necessarily better at fighting off some of the risks associated with consensus mechanisms. Finally, in Part IV this article offers an architectural solution: introducing a series of new protocols which would increase the cost of …
Civil Liability Arising From Hacking E-Mail Information, 2023 Assistant Professor of Civil Law - College of Law University of Science and Technology in Fujairah
Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr.
مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL
It is completely easy to pass and send any electronic data everywhere to the persons you want in the world in a very quick and short time, regardless the size and the data type.
This is due to the invention of electronic programs that help to save time and efforts. (the E – mail).
As a result of this electronic development in the all related fields that serve humankind, a new encounter technology and illegal use of technology has occurred and used illegally by hackers to destroy and penetrate exclusive information for specific people.
For this illegal hacking attempt requires …
The Five Internet Rights, 2023 University of Tennessee
The Five Internet Rights, Nicholas J. Nugent
Washington Law Review
Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …
Security-Enhanced Serial Communications, 2023 University of South Florida
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, 2023 University of Detroit Mercy School of Law
The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach
Seattle Journal of Technology, Environmental & Innovation Law
The COVID-19 pandemic hit communities of color hard. The City of Detroit was particularly vulnerable to COVID-19 due to racial, socioeconomic, and environmental health factors. To analyze the exacerbating role of technology and connectivity challenges on older Detroiters' health in a pandemic, we first examined Detroit’s demographics. This analysis involved looking at the continued evolution of the City's population toward older adults, as well as the impact of COVID-19 and the healthcare services on Detroit’s elder population. Next, we examined Detroit’s internet access challenges, including the presence of digital exclusion among older adults in Detroit, the impact of COVID-19 on …
Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, 2023 Seattle University School of Law
Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons
Seattle Journal of Technology, Environmental & Innovation Law
The dawning of the digital age introduced new and unique interpretive quandaries for judges and litigators alike. These quandaries include (but are not limited to) misinterpretation of pictorial slang as used in instant messaging, new or collateral meanings invented by phrases paired with specific emoticons or emojis, and the existence of emojis alone as communicative accessories.
This Note analyzes how lawyers and judges have essential free reign to treat emojis as they see fit: a prosecutor can argue, even in good faith, that the inclusion of an emoji depicting an open flame means the sender knew the heroin he sold …
From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, 2023 Seattle University School of Law
From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica Mcgarvie
Seattle Journal of Technology, Environmental & Innovation Law
In the summer of 2021, Apple announced it would release a Child Safety Feature (CSF) aimed at reducing Child Sex Abuse Materials (CSAM) on its platform. The CSF would scan all images a user uploaded to their iCloud for CSAM, and Apple would report an account with 30 or more flagged images to the National Center for Missing and Exploited Children. Despite Apple’s good intentions, they received intense backlash, with many critics arguing the proposed CSF eroded a user’s privacy. This article explores the technology behind Apple’s CSF and compares it to similar features used by other prominent tech companies. …