The Persistent Myths of Identity Theft
Stealing credit card numbers from corporate computers is a serious crime, but it is not "identity theft." Why does terminology matter? See below: h…
Stealing credit card numbers from corporate computers is a serious crime, but it is not "identity theft." Why does terminology matter? See below: h…
Net neutrality is back. Rather than rehash my earlier arguments against it, I point out a few relevant differences between the legislation proposed last time ar…
I write extensively in Chapter 8 of my new book,The Laws of Disruption, about the madness of prosecuting Lori Drew, a Missouri woman, for her participation in a…
Inc. magazine has published Part Two of their early look at my upcoming book, "The Laws of Disruption." (See Href=http://www.inc.com/articles/2009/04/…
A "small band of law librarians," including the wonderful staff here at Stanford, asks you to sign their petition to improve the online court docket s…
September 2008 amendments to the Computer Fraud and Abuse Act broaden the already extensive reach of the law, and fail to clarify the most vexing question about…
Socio-economic aspects are not intrinsic to the current Internet architecture. Today's architecture is becoming stressed as stakeholders introduce "hac…
I haven't posted much the last few months as I finished the manuscript for a new book, "The Laws of Disruption,” which appears in October. Inc. magazin…
The most interesting aspect of cyberspace is not what happens for a time to its visitors. It’s not the absence of regulation nor the presence of perfect regula…
A paper by M. Chris Riley and Ben Scott called Deep Packet Inspection: The End of the Internet as We Know It?, is available at: http://www.freepress.net/files/D…
Packets is production of the Stanford Center for Internet & Society (CIS). It is written by members of the Stanford Law and Technology Association (SLATA),…
The New York Times runs an interesting Open-Ed piece by Kenneth M. Duberstein today: 1,000 Points of Data . While it remains to be seen if governmental data is…