Yale Journal of Law and Technology
http://hdl.handle.net/20.500.13051/7
2024-03-29T05:35:14ZEXPLOIT DERIVATIVES & NATIONAL SECURITY
http://hdl.handle.net/20.500.13051/7864
EXPLOIT DERIVATIVES & NATIONAL SECURITY
SCHWALB, MICAH
Critical infrastructures remain vulnerable to cyber attack despite a raft of post-9/l] legislation focused on cyber security in critical infrastructures. An emerging discipline known as the "economics of information security" may provide a partial solution in the form of a hypothetical market that trades "exploit derivatives, " a modified futures contract tied to cyber security events. This paper argues that such a market could serve to predict and prevent cyber attacks through the operation of the efficient capital market hypothesis, but only after changes to the present regulatory environment. Specifically, I argue that a statutory safe harbor would allow the creation of a pilot market focused on vulnerabilities in Internet protocol version six, an emerging communications standard that China hopes to deploy throughout its national network before the 2008 Olympics. Indeed, such a safe harbor would align the interests of military and civilian policymakers on the common goal of protecting critical infrastructure from a computer network attack originating in China, whether instigating by the People's Liberation Army or so-called "black-hat" hackers.
2007-01-01T00:00:00ZOF FIRE ANTS AND CLAIM CONSTRUCTION: AN EMPIRICAL STUDY OF THE METEORIC RISE OF THE EASTERN DISTRICT OF TEXAS AS A PREEMINENT FORUM FOR PATENT LITIGATION
http://hdl.handle.net/20.500.13051/7865
OF FIRE ANTS AND CLAIM CONSTRUCTION: AN EMPIRICAL STUDY OF THE METEORIC RISE OF THE EASTERN DISTRICT OF TEXAS AS A PREEMINENT FORUM FOR PATENT LITIGATION
LEYCHKIS, YAN
Forum shopping by patent litigants is nothing new. However, in recent years, there has been an increase in forum shopping by patentee plaintiffs. Because of this forum shopping phenomenon, the Eastern District of Texas, a technological backwater, is on pace to become the leading patent docket in the United States. This Article empirically analyzes the reasons for the popularity of the Eastern District among patentee plaintif and considers a number of possible legislative solutions to the problem of forum shopping gone awry.
2007-01-01T00:00:00ZEVERYTHING NEW IS OLD AGAIN: BRAIN FINGERPRINTING AND EVIDENTIARY ANALOGY
http://hdl.handle.net/20.500.13051/7866
EVERYTHING NEW IS OLD AGAIN: BRAIN FINGERPRINTING AND EVIDENTIARY ANALOGY
ROBERTS, ALEXANDRA
Brain Fingerprinting uses electroencephalography to ascertain the presence or absence of information in a subject's brain based on his reaction to particular stimuli. As a new forensic tool, Brain Fingerprinting technology stands poised to exert a tremendous impact on the presentation and outcome of selected legal cases in the near future. It also provides a fertile case study to examine the role of analogical reasoning in the process by which lawyers, experts, judges, and the media influence how fact-finders perceive and evaluate unfamiliar types of proof When juridical metaphor disguises, distorts, or destroys ideas, it ceases to serve as an aid to understanding and functions instead as an obstacle to knowledge. This Note explores the ways in which evidentiary analogy may insidiously shape how courts treat novel forms of scientific evidence.
2007-01-01T00:00:00ZTHE EAR OF DIONYSUS: RETHINKING FOREIGN INTELLIGENCE SURVEILLANCE
http://hdl.handle.net/20.500.13051/7863
THE EAR OF DIONYSUS: RETHINKING FOREIGN INTELLIGENCE SURVEILLANCE
TAIPALE, K.
As the 110th Congress begins to flex its atrophied oversight muscle, it bears remembering that, in the ongoing debate over who should have the authority to authorize and oversee foreign intelligence surveillance programs, someone must, and the existing mechanisms, in particular, the Foreign Intelligence Surveillance Act of 1978 ("FISA') and its related procedures, are no longer adequate and must be updated. The FISA simply did not anticipate the nature of the current threat to national security from transnational terrorism, nor did it anticipate the development of global communication networks or advanced technical methods for intelligence gathering.
2007-01-01T00:00:00Z