Yale Journal of Law and Technology: Recent submissions
Now showing items 1-20 of 127
-
EXPLOIT DERIVATIVES & NATIONAL SECURITYCritical infrastructures remain vulnerable to cyber attack despite a raft of post-9/l] legislation focused on cyber security in critical infrastructures. An emerging discipline known as the "economics of information security" may provide a partial solution in the form of a hypothetical market that trades "exploit derivatives, " a modified futures contract tied to cyber security events. This paper argues that such a market could serve to predict and prevent cyber attacks through the operation of the efficient capital market hypothesis, but only after changes to the present regulatory environment. Specifically, I argue that a statutory safe harbor would allow the creation of a pilot market focused on vulnerabilities in Internet protocol version six, an emerging communications standard that China hopes to deploy throughout its national network before the 2008 Olympics. Indeed, such a safe harbor would align the interests of military and civilian policymakers on the common goal of protecting critical infrastructure from a computer network attack originating in China, whether instigating by the People's Liberation Army or so-called "black-hat" hackers.
-
OF FIRE ANTS AND CLAIM CONSTRUCTION: AN EMPIRICAL STUDY OF THE METEORIC RISE OF THE EASTERN DISTRICT OF TEXAS AS A PREEMINENT FORUM FOR PATENT LITIGATIONForum shopping by patent litigants is nothing new. However, in recent years, there has been an increase in forum shopping by patentee plaintiffs. Because of this forum shopping phenomenon, the Eastern District of Texas, a technological backwater, is on pace to become the leading patent docket in the United States. This Article empirically analyzes the reasons for the popularity of the Eastern District among patentee plaintif and considers a number of possible legislative solutions to the problem of forum shopping gone awry.
-
EVERYTHING NEW IS OLD AGAIN: BRAIN FINGERPRINTING AND EVIDENTIARY ANALOGYBrain Fingerprinting uses electroencephalography to ascertain the presence or absence of information in a subject's brain based on his reaction to particular stimuli. As a new forensic tool, Brain Fingerprinting technology stands poised to exert a tremendous impact on the presentation and outcome of selected legal cases in the near future. It also provides a fertile case study to examine the role of analogical reasoning in the process by which lawyers, experts, judges, and the media influence how fact-finders perceive and evaluate unfamiliar types of proof When juridical metaphor disguises, distorts, or destroys ideas, it ceases to serve as an aid to understanding and functions instead as an obstacle to knowledge. This Note explores the ways in which evidentiary analogy may insidiously shape how courts treat novel forms of scientific evidence.
-
THE EAR OF DIONYSUS: RETHINKING FOREIGN INTELLIGENCE SURVEILLANCEAs the 110th Congress begins to flex its atrophied oversight muscle, it bears remembering that, in the ongoing debate over who should have the authority to authorize and oversee foreign intelligence surveillance programs, someone must, and the existing mechanisms, in particular, the Foreign Intelligence Surveillance Act of 1978 ("FISA') and its related procedures, are no longer adequate and must be updated. The FISA simply did not anticipate the nature of the current threat to national security from transnational terrorism, nor did it anticipate the development of global communication networks or advanced technical methods for intelligence gathering.
-
PATENTLY NON-OBVIOUS II: EXPERIMENTAL STUDY ON THE HINDSIGHT ISSUE BEFORE THE SUPREME COURT IN KSR v. TELEFLEXFor the first time in thirty years, the Supreme Court will consider the core patent requirement that an invention be non-obvious. At the heart of the case lies the challenge of how to insulate non-obvious decisions from the distortion of the hindsight bias. This Article reports the latest empirical studies in a line of hindsight research, which present experimental data bearing directly on the issue before the Court: how individuals make non-obvious decisions under existing Supreme Court and Federal Circuit precedent. The study results indicate that the Federal Circuit's suggestion, teaching, or motivation requirement, the precedent challenged before the Supreme Court in KSR v. Teleflex, does not produce erroneous nonobvious outcomes. This result contradicts the claims of the petitioners in KSR and other critics of the suggestion requirement. On the other hand, the results do not demonstrate that the suggestion test ameliorates the hindsight bias in the manner usually claimed by its supporters. An additional study indicates that the Supreme Court's Graham framework does not resolve the hindsight problem either. Given the substantial and confirmed prejudicial effect of the hindsight bias, the Article concludes that the suggestion test should be retained for several reasons: it does not appear to cause the harms hypothesized by its critics, it potentially reduces the hindsight bias for complex technology inventions, and the problem the test confronts (erroneous decisions that an invention is obvious in hindsight) is known and significant while the problem the test is alleged to create (over-compensation for the hindsight bias) is unconfirmed and conjectural. The Article concludes with a recommendation for bifurcating the nonobvious decision at the Patent and Trademark Office. Combined with an earlier proposal for jury trials, these recommendations present the only known means for eliminating the hindsight effect and producing patent decisions that comport with the Patent Act and Supreme Court precedent.
-
PERVASIVE NEW MEDIA: INDECENCY REGULATION AND THE END OF THE DISTINCTION BETWEEN BROADCAST TECHNOLOGY AND SUBSCRIPTION-BASED MEDIAAfter years of failing to meet expectations, both internet and satellite radio programming are finally challenging terrestrial radio in a manner similar to cable's challenge to broadcast television a generation earlier; these new technologies threaten to hijack market share and revenue from a traditional broadcast medium much as cable did. Broadband technology enables one to broadcast talk radio and music over the internet to reach listeners via their personal computers. Satellite broadcasters use a pay model, selling special radios for listeners to tune into digital satellite programming. Online and satellite stations are increasing their audiences while traditional radio has struggled for over a decade to maintain its audience. The recent high-profile signing of Howard Stern by Sirius Satellite Radio and the 43% average yearly growth in listeners that internet radio has experienced since 2000 have pushed these new media to the forefront of popular culture.
-
WHERE ANTITRUST ENDS AND IP BEGINS - ON THE ROOTS OF THE TRANSATLANTIC CLASHESU.S. antitrust enforcers see little scope for antitrust policy to mitigate the consequences of imperfect IP policies. They are reluctant to intervene in what is perceived to be the sphere of IP policy and take the view that any competitive concerns are better remedied by changes in the IP policy. This trend corresponds with shielding antitrust policy away from fields occupied by other forms of regulation. Exactly the opposite tendencies are present in EU competition law. Both the European Commission and the ECJ seem to see a role for competition law to correct improvidently defined IPRs, even if it entails adjusting competition principles. It may seem reasonable, as unlike competition policy, most issues relating to IP policy within the European Union are still decided at the national level. Yet, there is an inherent danger in this approach. It may lead antitrust authorities to adopt analytically questionable approaches that undermine the coherence of antitrust law. Competition agencies must be particularly cautious in adopting the measures to curb IP laws, as they may discourage private R&D investment. The Commission's views on application of Article 82 to interoperability information, as expressed in the Microsoft Decision and the Article 82 Paper, confirm that these reservations are valid.
-
REGULATING SEARCH ENGINES: TAKING STOCK AND LOOKING AHEADSince the creation of the first pre-Web Internet search engines in the early 1990s, search engines have become almost as important as email as a primary online activity. Arguably, search engines are among the most important gatekeepers in today's digitally networked environment. Thus, it does not come as a surprise that the evolution of search technology and the diffusion of search engines have been accompanied by a series of conflicts among stakeholders such as search operators, content creators, consumers/users, activists, and governments. While few tussles existed in the initial phase of innovation where Internet search engines were mainly used by 'techies' and academics, substantial conflicts emerged once the technology got out of the universities and entered the commercial space. When search technology advanced and search services gained commercial significance, these conflicts became more severe and made their way into the legal arena. At the core of most of these disputes were controversies over intellectual property, particularly trademark and copyright issues.
-
SEARCH ENGINE BIAS AND THE DEMISE OF SEARCH ENGINE UTOPIANISMDue to search engines' automated operations, people often assume that search engines display search results neutrally and without bias. However, this perception is mistaken. Like any other media company, search engines affirmatively control their users' experiences, which has the consequence of skewing search results (a phenomenon called "search engine bias'). Some commentators believe that search engine bias is a defect requiring legislative correction. Instead, this Essay argues that search engine bias is the beneficial consequence of search engines optimizing content for their users. The Essay further argues that the most problematic aspect of search engine bias, the "winner-takeall" effect caused by top placement in search results, will be mooted by emerging personalized search technology.
-
LAW AS A NETWORK STANDARDThe problem of global information flows via computer networks raises issues of competition, interoperability, and standard-setting parallel to those in the analysis of technical standards. Uniform standards, whether technical or legal, give rise to a constellation of positive and negative network effects. As a global network based upon the "end to end" principle of interoperability, the Internet mediates between different, otherwise incompatible computing platforms. To the extent that law and technological "code" may act as substitutes in shaping human behavior, the Internet similarly mediates between different, otherwise incompatible legal platforms. Much of the legal and social controversy surrounding the Internet stems from the interconnection of such incompatible legal systems. As with technical systems, problems of incompatibility may be addressed by the adoption of uniform legal standards. This, however, raises legal standard-setting problems similar to those seen in technical standard setting, where the standard may be "tipped" in favor of dominant producers. In particular, if law is considered a social product, the benefits of interjurisdictional competition and diversity may be lost as a single uniform legal standard dominates the market for law.
-
TOWARD AN ECOLOGY OF INTELLECTUAL PROPERTY: LESSONS FROM ENVIRONMENTAL ECONOMICS FOR VALUING COPYRIGHT'S COMMONSThe 'fair use" defense in copyright law shields an intellectual commons of protected uses of copyrighted material from infringement actions. In determining whether a given use is fair, courts must assess the new use's potential "effect on the market" for the copyrighted work. Fair use jurisprudence too often fails to address the complementary, network, and long-range effects of new technologies on the value of copyrighted works. These effects parallel the indirect, direct, and option values of biodiversity recently recognized by environmental economists. Their sophisticated methods for valuing natural resources in tangible commons can inform legal efforts to address the intellectual commons' "effect on the market" for copyrighted works.
-
THE RISE OF THE OECD AS INFORMAL 'WORLD TAX ORGANIZATION' THROUGH NATIONAL RESPONSES TO E-COMMERCE TAX CHALLENGESThis paper assesses national and international responses to tax challenges presented by cross-border electronic commerce. Ten years after these challenges were first identified, a survey of national government reactions shows that many countries have not passed any significant tax legislation or administrative guidance with respect to the taxation of global e-commerce. This lack of action at the national level can be explained in large part by the leadership role taken by the Organization for Economic Cooperation and Development (OECD) in developing the guiding principles and, subsequently, the tax rules to confront the e-commerce tax challenges. The OECD's general success with e-commerce tax reform demonstrates the OECD's ability to act as a kind of informal (lower case) world tax organization, which emphasizes deliberation, consensus-building and the use of non-binding mechanisms such as the OECD model tax treaty. Moreover, the OECD's success suggests that calls for a more formal (upper-case) World Tax Organization, which could impose binding tax rules on participating nations, may be misplaced.
-
TECHNOLOGY, SECURITY AND PRIVACY: THE FEAR OF FRANKENSTEIN, THE MYTHOLOGY OF PRIVACY AND THE LESSONS OF KING LUDDThis article suggests that the current public debate that pits security and privacy as dichotomous rivals to be traded one for another in a zero-sum game is based on a general misunderstanding and apprehension of technology on the one hand and a mythology of privacy that eonflates secrecy with autonomy on the other. Further, political strategies premised on outla wing particular technologies or techniques or seeking to constrain technology through laws alone are second-best - and ultimately futile - strategies that will result in little security and brittle privacy protection. This article argues that civil liberties can best be protected by employing value sensitive technology development strategies in conjunction with policy implementations, not by opposing technological developments or seeking to control the use of particular technologies or techniques after the fact through law alone. Value sensitive development strategies that take privacy concerns into account during design and development can build in technical features that can enable existing legal control mechanisms and related due process procedures for the protection of civil liberties to function. This article examines how identification, data aggregation and data analysis (including data mining), and collection technologies intersect with security and privacy interests and suggests certain technical features and strategies premised on separating knowledge of behavior from knowledge of identity based on the anonymization of data (for data sharing, matching and analysis technologies) and the pseudonymization of identity (for identification and collection technologies). Technical requirements to support such strategies include rule-based processing, selective revelation, and strong credential and audit.
-
CHALLENGES TO AUTHORITY, BURDENS OF LEGITIMIZATION: THE PRINTING PRESS AND THE INTERNETThe Internet is often regarded as a challenge to the nation-state's ability to regulate flows of finance, information, and symbols. Rather than examining whether it is possible to enforce regulation on such a media, this paper addresses two additional fundamental questions: (1) what do regulatory discourses and attempts to regulate reveal about the nation-state's political authority under globalization, and (2) how does this authority vary across social, political, and cultural contexts? In order to address these challenging queries we follow a unique path, both empirically and theoretically. Theoretically, we argue that political authority is a pivotal common denominator that undergirds diverse understandings of globalization. We then critically examine different conceptions of political authority and construct a typology that orients our study. Empirically, we follow our typology by comparing two historical phenomena: attempts by the Catholic Church to regulate the printing press during the 15th and 16th centuries, and attempts by China, Malaysia and the United States to regulate the Internet. Despite certain important commonalities, we posit that each of these cases illustrates a different model of the legitimization processes and transformations in political authority that occur under globalization.
-
COPYRIGHT VS. FREE EXPRESSION: THE CASE OF PEER-TO-PEER FILE-SHARING OF MUSIC IN THE UNITED KINGDOMThis paper explores the extent to which the peer-to-peer (p2p) file-sharing of music is a form of communication protected from the restrictions of the Copyright, Designs and Patents Act 1988 (U.K) (CDPA) by the guarantee offree expression enshrined in Article 10 of the European Convention on Human Rights (ECHR) and incorporated into domestic law through the Human Rights Act 1998 (UK) (HRA). The paper first examines the protection offered to freedom of expression through the existing copyright scheme. It is asserted that due to a lack of context-sensitivity, mechanisms such as the idea-expression dichotomy must not be relied upon to deny the existence of prima facie breaches of Article 10(1) of the ECHR. Rather, such breaches must be acknowledged and justified (if possible) as being "necessary in a democratic society" under Article 10(2) of the ECHR. Next, the extent to which p2p music file-sharing represents an infringement under the terms of the CDPA (exclusive of any effect of the ECHR) is examined. It is concluded that such sharing does amount to an infringement under the Act and is not subject to any of the enumerated defences. The final part of the paper explores the extent to which the statutory restriction on file-sharing of music may be permitted under Article 10 of the ECHR. It is suggested that, for a number of reasons, the CDPA's restriction on free expression may not be "necessary in a democratic society" under Article 10(2) of the ECHR. As a result, should this statutory restriction be impugned in a UK courtroom in the context of p2p music file-sharing, such a court may be under an obligation to exculpate infringing parties under the "public interest" defence or to make a declaration of incompatibility under the HRA.
-
PRIVACY VS. PIRACYA few years ago, it was fanciful to imagine a world where intellectual property owners - such as record companies, soft ware owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, strategies of copyright enforcement have rapidly multiplied, each strategy more invasive than the last. This new surveillance exposes the paradoxical nature of the Internet: It offers both the consumer and creator a seemingly endless capacity for human expression - a virtual marketplace of ideas- alongside an insurmountable array of capacities for panoptic surveillance. As a result, the Internet both enables and silences speech, often simultaneously. This paradox, in turn, leads to the tension between privacy and intellectual property. Both areas of law face significant challenges because of technology's ever-increasing pace of development. Yet courts often exacerbate these challenges by sacrificing one area of law for the other, by eroding principles of informational privacy for the sake of unlimited control over intellectual property. Laws developed to address the problem of online piracy- in particular, the DMCA -have been unwittingly misplaced, inviting intellectual property owners to create private systems of copyright monitoring that I refer to as piracy surveillance. Piracy surveillance comprises extrajudicial methods of copyright enforcement that detect, deter, and control acts of consumer infringement. In the past, legislators and scholars have focused their attention on other, more visible methods of surveillance, namely those relating to employment, marketing, and national security. Piracy surveillance, however, represents an overlooked fourth area that is completely distinct from these other types, yet incompletely theorized, technologically unbounded, and, potentially, legally unrestrained. The goals of this Article are threefold: first, to trace the origins of piracy surveillance through recent jurisprudence involving copyright; second, to provide an analysis of the tradeoffs between public and private enforcement of copyright; and third, to suggest some ways in which the law can restore a balance between the protection of copyrigh t and civil liberties in cyberspace. This paper was selected as the winning entry for the 2004 Yale Law School Cybererime and Digital Law Enforcement Conference writing competition, sponsored by the Yale Law School Information Society Project and the Yale Journal of Law and Technology.
-
REAL WORLD PROBLEMS OF VIRTUAL CRIMETheoretical debates about how best to address cybererime have their place, but, in the real world, companies and individuals face new harmful criminal activity that poses unique technical and investigatory challenges. One of the greatest challenges posed by this new technology is how to combat wrongdoing effectively without netting innocent actors. This Article will present three case studies drawn from recent highprofile news stories to illustrate the pitfalls of legislating in the e-crimes arena.
-
THE FOURTH AMENDMENT UNPLUGGED: ELECTRONIC EVIDENCE ISSUES & WIRELESS DEFENSESWell-established legal principles govern evidentiary issues arising from technology developments. In the United States, the Supreme Court and Courts of Appeals in every circuit draw from non-computer and non-wireless Fourth Amendment doctrine to address nascent electronic evidence issues. I agree that legal analyses drawing from historical treatment can be effective, but will argue in this Article that Internet access raises difficult legal issues to which standard Fourth Amendment analysis cannot be easily applied. Furthermore, the analyses will become more difficult with the introduction of wireless Internet access. As wireless Internet connectivity burgeons throughout the world, unsecure connections will likely become a haven for illegal activity. Courts should consider and investigate the unique issues presented by wireless Internet access in depth to avoid setting unwanted precedents when they are, inevitably, presented with a defendant whose wireless connection was used to commit a crime.
-
LAUNCH ON WARNING: AGGRESSIVE DEFENSE OF COMPUTER SYSTEMSThere has been a growing interest in "self help" mechanisms to counter Internet-mediated threats. Content providers such as record labels and movie studios have favored proposed federal legislation that would allow them to disable copyright infringers' computers. Software licensors have backed multiple-state legislation, permitting the remote disabling of software in use by the licensee when the license terms are breached. Internet security professionals debate the propriety, and legality, of striking back at computers which attack the Internet through the introduction of worms, viruses, and so on, collectively "malware."
-
ARCHITECTURAL REGULATION AND THE EVOLUTION OF SOCIAL NORMSCurrent legal scholarship on architectural regulation of software focuses on how its lack of transparency may frustrate public accountability or, by the same token, enhance its effectiveness. This paper argues that architectural regulation poses deeper dangers to the very concept of law. Ordinarily, we think of law as rules that a person thinks about when deciding how to act, and which human beings must decide to enforce. Law as architecture operates differently. instead of affecting our calculus of choice, it structures the very conditions of action, such as social settings and the resources available in those settings. Thus, architectural regulation operates surreptitiously and may not even be perceived as governmental action. Architectural regulation thus allows government to shape our actions without our perceiving that our experience has been deliberately shaped, engendering a loss of moral agency. Because our norms are often the product of social experience with and discourse about new technologies, architectural regulation poses the danger that government can distort the evolution of constitutional norms like privacy.