Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 11 of 11
Full-Text Articles in Entire DC Network
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Articles in Law Reviews & Other Academic Journals
It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …
Bulk Biometric Metadata Collection, Margaret Hu
Bulk Biometric Metadata Collection, Margaret Hu
Scholarly Articles
Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …
Sovereignty In The Age Of Cyber, Gary Corn
Sovereignty In The Age Of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Articles in Law Reviews & Other Academic Journals
In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
On “The Lure Of Strike”, Charles J. Dunlap Jr.
On “The Lure Of Strike”, Charles J. Dunlap Jr.
Faculty Scholarship
This commentary is in response to the special commentary, “The Lure of Strike” by Conrad Crane published in the Summer 2013 issue of Parameters (vol. 43, no. 2).
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Book Review, Susan Nevelow Mart
Energy, Environment & Sustainable Development, Lakshman D. Guruswamy
Energy, Environment & Sustainable Development, Lakshman D. Guruswamy
Publications
No abstract provided.
Preliminary Observations: Asymmetrical Warfare And The Western Mindset, Charles J. Dunlap Jr.
Preliminary Observations: Asymmetrical Warfare And The Western Mindset, Charles J. Dunlap Jr.
Faculty Scholarship
No abstract provided.