Publications

Network Neutrality and Quality of Service: What a Non-Discrimination Rule Should Look Like

Author(s): 
Barbara van Schewick
Publication Date: 
June 11, 2012
Publication Type: 
White Paper / Report

Over the past ten years, the debate over "network neutrality" has remained one of the central debates in Internet policy. Governments all over the world, including the United States, the European Union, the United Kingdom, France and Germany, have been investigating whether legislative or regulatory action is needed to limit the ability of providers of Internet access services to interfere with the applications, content and services on their networks. Read more » about Network Neutrality and Quality of Service: What a Non-Discrimination Rule Should Look Like

On Banning Autonomous Lethal Systems: Human Rights, Automation and the Dehumanizing of Lethal Decision-making

Author(s): 
Peter Asaro
Publication Date: 
June 1, 2014
Publication Type: 
Academic Writing

This article considers the recent literature concerned with establishing an international prohibition on autonomous weapon systems. It seeks to address concerns expressed by some scholars that such a ban might be problematic for various reasons. It argues in favour of a theoretical foundation for such a ban based on human rights and humanitarian principles that are not only moral, but also legal ones. In particular, an implicit requirement for human judgement can be found in international humanitarian law governing armed conflict. Read more » about On Banning Autonomous Lethal Systems: Human Rights, Automation and the Dehumanizing of Lethal Decision-making

Chain-Link Confidentiality

Author(s): 
Woodrow Hartzog
Publication Date: 
April 24, 2012
Publication Type: 
Academic Writing

Disclosing personal information online often feels like losing control over one’s data forever; but this loss is not inevitable. This essay proposes a “chain-link confidentiality” approach to protecting online privacy. One of the most difficult challenges to guarding privacy in the digital age is the protection of information once it is exposed to other people. A chain-link confidentiality regime would contractually link the disclosure of personal information to obligations to protect that information as the information moves downstream. Read more » about Chain-Link Confidentiality

The Conversation: Time to Mobilize for Cyberwar

Author(s): 
Marvin Ammori
Publication Date: 
April 8, 2012
Publication Type: 
Other Writing

Iran's drive to become a nuclear power hinges partly on a facility outside the small mountain town of Natanz. According to intelligence analysts, the facility houses thousands of centrifuges used to enrich uranium to levels that could support nuclear weapons development,which has raised worldwide fears of a nuclearIran. Amid faltering negotiations with the West to curb Iran's drive for nuclear power and with enrichment activities well under way, the Natanzfacility mysteriously began to suffer technical difficulties in late 2009 and early 2010. Read more » about The Conversation: Time to Mobilize for Cyberwar

Megaupload.com Indictment Leaves Everyone Guessing - Part 1

Author(s): 
Anthony Falzone
Jennifer Granick
Publication Date: 
March 15, 2012
Publication Type: 
Other Writing

Days after anti-piracy legislation stalled in Congress, the U.S. Department of Justice coordinated an unprecedented raid on the Hong Kong-based website Megaupload.com. New Zealand law enforcement agents swooped in by helicopter to arrest founder Kim Dotcom at his home outside of Auckland, and seized millions of dollars worth of art, vehicles and real estate. Six other Megaupload employees were also arrested. Meanwhile, the Justice Department seized Megaupload's domain names and the data of at least 50 million users worldwide. Read more » about Megaupload.com Indictment Leaves Everyone Guessing - Part 1

Megaupload Indictment Leaves Everyone Guessing - Part 2

Author(s): 
Anthony Falzone
Jennifer Granick
Publication Date: 
April 6, 2012
Publication Type: 
Other Writing

Daily/Journal Op/Ed

The first part of this article outlined the mechanics of the Megaupload website, and the novel questions of criminal inducement on which the government's indictment is premised. Here, we explore two more extensions of existing law on which the indictment is based, and the impact this prosecution is likely to have on Internet innovators and users alike. Read more » about Megaupload Indictment Leaves Everyone Guessing - Part 2

Pages

Subscribe to Publications