Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Technology (37)
- Privacy (16)
- Fourth Amendment (9)
- Law and technology (9)
- Patent (8)
-
- Copyright (7)
- Science (7)
- Big data (6)
- Evidence (6)
- IP (6)
- Intellectual property (6)
- Ip (6)
- National security (6)
- Science and Technology (6)
- Social media (6)
- Software (6)
- Data (5)
- International law (5)
- Internet (5)
- Police (5)
- Security (5)
- Surveillance (5)
- AI (4)
- Blockchain (4)
- Communications Law (4)
- Criminal procedure (4)
- Fourth amendment (4)
- Policing (4)
- Search (4)
- Big Data (3)
- Publication Year
- Publication
-
- Articles in Law Reviews & Other Academic Journals (60)
- American University Law Review (27)
- Sustainable Development Law & Policy (25)
- Joint PIJIP/TLS Research Paper Series (11)
- American University National Security Law Brief (8)
-
- Amicus Briefs (7)
- American University Business Law Review (2)
- American University International Law Review (2)
- American University Journal of Gender, Social Policy & the Law (2)
- Articles in Law Reviews & Journals (2)
- Contributions to Books (2)
- Criminal Law Practitioner (2)
- Intellectual Property Brief (2)
- Legislation and Policy Brief (2)
- Upper Level Writing Requirement Research Papers (2)
- J. Jonas Anderson (1)
- Popular Media (1)
- The Modern American (1)
- Publication Type
Articles 1 - 30 of 159
Full-Text Articles in Law
Content Moderation And The Least Cost Avoider, Paul Rosenzweig
Content Moderation And The Least Cost Avoider, Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.
This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Necessity, Proportionality, And Executive Order 14086, Alex Joel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
American University Journal of Gender, Social Policy & the Law
In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
Letter Form The Editor, Wayne Rash, Iii
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Defi: Shadow Banking 2.0?, Hilary J. Allen
Defi: Shadow Banking 2.0?, Hilary J. Allen
Articles in Law Reviews & Other Academic Journals
The growth of so-called “shadow banking” was a significant contributor to the financial crisis of 2008, which had huge social costs that we still grapple with today. Our financial regulatory system still hasn’t fully figured out how to address the risks of the derivatives, securitizations, and money market mutual funds that comprised Shadow Banking 1.0, but we’re already facing the prospect o fShadow Banking 2.0in the form of decentralized finance, or “DeFi.” DeFi’s proponents speak of a future where sending money is as easy as sending a photograph–but money is not the same as a photograph. The stakes are much …
Digital Habit Evidence, Andrew Guthrie Ferguson
Digital Habit Evidence, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
This Article explores how “habit evidence” will become a catalyst for a new form of digital proof based on the explosive growth of smart homes, smart cars, smart devices, and the Internet of Things. Habit evidence is the rule that certain sorts of semiautomatic, regularized responses to particular stimuli are trustworthy and thus admissible under the Federal Rules of Evidence (“FRE”) 406 “Habit; Routine Practice” and state equivalents.
While well established since the common law, “habit” has made only an inconsistent appearance in reported cases and has been underutilized in trial practice. But intriguingly, once applied to the world of …
Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen
Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen
Articles in Law Reviews & Other Academic Journals
The recent U.S. Supreme Court decision West Virginia v. EPA has cast a pall over the discretion of administrative agencies at a very inopportune time. The private sector is currently adopting new technologies at a rapid pace, and as regulated industries become more technologically complex, administrative agencies must innovate technological tools of their own in order to keep up. Agencies will increasingly struggle to do their jobs without that innovation, but the private sector is afforded something that is both critical to the innovation process, and often denied to administrative agencies: “permission to fail.” Without some grace for the inevitable …
The 'Merge' Did Not Fix Ethereum, Hilary J. Allen
The 'Merge' Did Not Fix Ethereum, Hilary J. Allen
Popular Media
The Ethereum blockchain that facilitates much of the crypto world last month finally accomplished the long-promised and oft-delayed “Merge”, a technical switch in the way it works.
Why Digital Policing Is Different, Andrew Ferguson
Why Digital Policing Is Different, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Many Fourth Amendment debates boil down to following argument: if police can already do something in an analog world, why does it matter that new digital technology allows them to do it better, more efficiently, or faster? This Article addresses why digital is, in fact, different when it comes to police surveillance technologies. The Article argues that courts should think of these digital technologies not as enhancements of traditional analog policing practices but as something completely different, warranting a different Fourth Amendment approach. Properly understood, certain digital searches should be legally distinguishable from analog search precedent such that the older …
Persistent Surveillance, Andrew Guthrie Ferguson
Persistent Surveillance, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.
In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …
Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes
Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes
Articles in Law Reviews & Other Academic Journals
Secured transactions are governed by Uniform Commercial Code Article 9. UCC Article 9 governs any extension of credit secured by personalty. If you think about it, this statute governs a massive swath of market activity: secured credit facilities, margin trading of securities, asset securitizations, and purchase money transactions for goods, I could name more. But it's a statute that's very wide ranging. Given this expansive scope, blockchain-based transaction platforms have numerous implications for lawyers who deal with secured transactions. In my brief time here, I'm going to identify just two of them.
Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes
Designing Effective Regulation For Blockchain-Based Markets, Heather Hughes
Articles in Law Reviews & Other Academic Journals
Effective regulation of blockchain-based markets calls for coordination among lawyers, businesses, coders, and lawmakers. How might we achieve adequate coordination and why is it important? This Article takes up these questions, using one example of an increasingly popular type of blockchain-based financial transaction: the issuance of tokens backed by off-chain assets. The objective here is not to advocate for a particular regulatory treatment for asset tokenization, but rather to use this deal type as a springboard to discuss what "effective regulation" means in the context of blockchain-enabled markets.
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …
Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan
Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.
This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.
This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …
The Integration Of Artificial Intelligence In The Intelligence Community: Necessary Steps To Scale Efforts And Speed Progress, Corin R. Stone
The Integration Of Artificial Intelligence In The Intelligence Community: Necessary Steps To Scale Efforts And Speed Progress, Corin R. Stone
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan
Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan
Amicus Briefs
Perhaps unexpectedly, a case on the constitutionality of the Patent Trial and Appeal Board has major significance to the pressing policy crisis of drug prices in the United States. Erroneously issued patents monopolize medical therapies, making them unaffordable or inaccessible to numerous Americans. The inter partes review proceedings that the Board conducts have repeatedly and successfully overcome such patents, enabling competition and dramatically lowering prices. This Court should ensure the continued viability of the Board and of inter partes review, by preserving the Board’s objectivity and independence from executive branch political influence.
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Joint PIJIP/TLS Research Paper Series
The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan
Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals
Recently, Congress has considered legislation to amend§ 101, a section of the Patent Act that the Supreme Court has held to prohibit patenting of laws of nature, natural phenomena, and abstract ideas. This draft legislation would expand the realm of patent-eligible subject matter, overturning the Court's precedents along the way. The draft legislation, and movement to change this doctrine of patent law, made substantial headway with a subcommittee of the Senate holding numerous roundtables and hearings on the subject.
This article considers some less-discussed consequences of that draft legislative proposal. The legislation likely opens the door to patenting of subject …
Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk
Innovative Approaches To Diversion Data, Sean Flynn, Robin Olsen, Maggie Wolk
Articles in Law Reviews & Other Academic Journals
Prosecutors across the country are collecting and using data to make decisions in their offices. At the same time, prosecutors are interested in developing and sustaining prosecutorial diversion approaches. Prosecutors can use data to assist in decision-making regarding diversion case processing choices as well as to make office policy and resource allocation decisions that, in turn, support expanded diversion programs. Data collection can help prosecutors decide if a prosecutorial diversion program will work for them, and if so, what characteristics it should have. Finally, data can help prosecutors see whether they are obtaining their intended outcomes. Prosecutors possess varying levels …