Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 112

Full-Text Articles in Law

Wikileaks And The First Amendment, Geoffrey R. Stone May 2012

Wikileaks And The First Amendment, Geoffrey R. Stone

Federal Communications Law Journal

FCBA Distinguished Speaker Series

In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …


Law And The Open Internet, Adam Candeub, Daniel Mccartney May 2012

Law And The Open Internet, Adam Candeub, Daniel Mccartney

Federal Communications Law Journal

The FCC has issued a new set of Internet access regulations and policies (namely Preserving the Open Internet Broadband Industry Practices, Report and Order, FCC 10-201, rel. Dec. 23, 2010), which would prohibit broadband service providers like AT&T or Comcast from discriminating against unaffiliated content providers. The FCC's proceedings, and the network neutrality debate, concentrate on two economic questions: (1) whether to broadband service providers can or will steer traffic to affiliated content limiting consumer access, and (2) how to preserve the Internet's capacity for creativity and innovation. Yet despite the prominence of economics in the debate, economic theory cannot …


Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert May 2012

Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert

Federal Communications Law Journal

The balancing act between protecting First Amendment rights and the necessity of law enforcement to maintain the public order is not simple under normal circumstances. On August 11, 2011, San Francisco's Bay Area Rapid Transit ("BART") created a paradigm embodying the very essence of this problem by shutting down cell phone and Internet service to prevent citizens from organizing and planning a protest. Both the constitutional and telecommunications law implications of BART's cell phone and Internet shutdown beg for analysis and reform, especially in an age of rapidly advancing technology. This Note analyzes the legal implications of BART's shutdown, and …


Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham May 2012

Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham

Federal Communications Law Journal

More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub May 2012

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


Is It Time To Recreate The E-Rate Program?, Lynne Holt, Mary Galligan Mar 2012

Is It Time To Recreate The E-Rate Program?, Lynne Holt, Mary Galligan

Federal Communications Law Journal

The Schools and Libraries program, commonly known as the "E-rate" program, was created by the FCC in 1997, as authorized by the federal Telecommunications Act of 1996. The E-rate program provides eligible schools and libraries with discounts of 20 to 90 percent from the rates charged by providers of telecommunications services, Internet access, and internal network connections. These discounts are paid from the federal Universal Service Fund under the regulatory oversight of the FCC. The FCC has modified certain aspects of the program since its inception but has not modified its highest programmatic funding priorities-support for telecommunications and Internet access. …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro Mar 2012

From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro

Federal Communications Law Journal

Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …


How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry May 2011

How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry

Federal Communications Law Journal

In Citizens United v. Federal Election Commission (2010), the U.S. Supreme Court overruled a century of precedent to hold that corporations must be treated identically to natural persons with regard to political speech. This Article describes how the Court's decision is a radical departure from history that mirrors the FCC's flawed analysis in its classification of broadband Internet access services as an information service with no separable telecommunications component subject to common carriage regulation. Overall, the combinatorial effect of Citizens United and the FCC's classification of broadband access service as an information service is to elevate the constitutional free speech …


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal Mar 2011

The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

Policy debates about the evolution of the Internet show varying degrees of understanding about the underlying technology. A fundamental principle of the design of the Internet, from the early 1980s, is the so-called "end-to-end argument" articulated in a seminal technical paper. Intended to provide guidance for what kind of capability is built into a network as opposed to the devices that use the network, the end-to-end argument has been invoked in …


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Mar 2011

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.


Wireless Efficiency Versus Net Neutrality, Charles L. Jackson Mar 2011

Wireless Efficiency Versus Net Neutrality, Charles L. Jackson

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion. One tool for controlling such congestion is giving higher priority to some applications, such as telephone calls, and …


The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald Mar 2011

The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

This Article explores how the emerging Internet architecture of "cloud computing," content distribution networks, private peering and data-center services can simultaneously foster a perception of "unfair" network access while at the same time enabling significant competition for services, content, and innovation. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. Another is the design of successful Internet …


Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig Mar 2011

Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

It is axiomatic that government licensing is a foundational requirement for the use of the electromagnetic spectrum. Yet in some bands there is no licensing requirement, providing an empirical site that can be used to examine wireless coexistence without licenses. This Article draws on ethnographic work with wireless Internet Service Providers to report on the extralegal means that are used to share or allocate spectrum in these license exempt bands. Operators …


Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders Mar 2011

Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders

Federal Communications Law Journal

In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …


Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor Mar 2011

Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor

Federal Communications Law Journal

Plaintiffs' access to media has long been a factor in defamation cases, enabling courts to determine whether that plaintiff is a public figure who must meet the actual malice standard, or whether that plaintiff is a private figure worthy of greater protection from defamation. This component of the public-private distinction can no longer be applied with clear precision, given the advent of social networking and today's world of widespread media access. In light of the massive changes that have taken place in the media world, the access to media test must be revisited and appropriately retailored to avoid an inappropriate …


The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey Dec 2010

The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda Dec 2010

Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda

Federal Communications Law Journal

Symposium: The Future of Digital Communications: Essays from Time Warner Cable's Research Program on Digital Communications.


The Future Of Digital Communications Research And Policy, Scott Wallsten Dec 2010

The Future Of Digital Communications Research And Policy, Scott Wallsten

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


The Changing Patterns Of Internet Usage, Christopher S. Yoo Dec 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding Dec 2010

Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding

Federal Communications Law Journal

A decade of broadband access deregulation has landed the FCC at a legal deadend. After the D.C. Circuit's Comcast decision, the FCC finds itself unable to enforce its "net neutrality" goals. To reassert its jurisdiction over "net neutrality," the FCC proposes to reclassify broadband Internet access as a Title II "telecommunications service" while continuing to forbear from most other facets of common carrier regulation. The FCC's current dilemma results from an unfortunate combination of unverified predictive judgments associating deregulation with investment; overly optimistic assessments of competition in the consumer broadband market; the abandonment of the "bright line" between transmission and …


The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee Dec 2010

The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield Dec 2010

The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell Dec 2010

Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell

Federal Communications Law Journal

In 2009, the Supreme Court upheld the FCC's finding in Fox TV Stations v. Federal Communications Commission that the broadcast of "fleeting expletives" violated a federal law prohibiting the broadcast of indecency, but remanded the case for consideration of the broadcast networks' claims that the FCC action violated the First Amendment. On remand, the Second Circuit found that the FCC's prohibition against "fleeting expletives" was unconstitutionally vague. It is widely expected that the Supreme Court will review this decision and that the networks will ask the Court to reconsider its 1978 decision in Pacifica Foundation v. Federal Communications Commission. This …


Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo Jun 2010

Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo

Federal Communications Law Journal

Comic-book heroes show us how to be valiant, how to fight for those less fortunate, and, in some circumstances, how to combat those who break the law. Such is the situation in the case of Marvel Enterprises, Inc. v. NCSofl Corp., a battle between user-generated content and the copyright violations that resulted.

While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed, could endanger the protection afforded to authors. Federal and state suits have …


The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian Jun 2010

The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian

Federal Communications Law Journal

Academics and popular critics alike want to distill, reform, or altogether destroy U.S. copyright law as we know it. Much of this stems from animosity toward the old-guard record industry's alleged practices of overcharging consumers, underpaying royalties to artists, and suing teenagers and grandmas. But what those calling for reform all seem to neglect is a tiny but inevitable fact: for the first time in history, composers and recording artists can keep their copyrights.

Tangible media sales are being replaced by P2P file sharing, retail downloads, and streaming Webcasts. Digital technologies and wireless networks have opened prime channels for music …


Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V Jun 2010

Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V

Federal Communications Law Journal

As the Internet continues to play a more central role in the daily lives of Americans, concerns about how Internet service providers manage their networks have arisen. Responding to these concerns and recognizing the importance of maintaining the open and competitive nature of the Internet, the FCC has taken incremental steps to regulate network management practices. Perhaps the most significant of these steps was its August 2008 Memorandum Decision and Order in which the FCC condemned Comcast Corporation's network management practices as "discriminatory and arbitrary." In that Order, the FCC required that Comcast (1) adopt new practices that complied with …