Leeds Thesis Template

Total Page:16

File Type:pdf, Size:1020Kb

Leeds Thesis Template Is Internet privacy dead? Recovering Internet privacy in an increasingly surveillant society. Jeremy Michael Harmer Submitted in accordance with the requirements for the degree of Doctor of Philosophy The University of Leeds School of Law January, 2017 - ii - The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. The right of Jeremy Michael Harmer to be identified as Author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. © 2017 The University of Leeds and Jeremy Michael Harmer - iii - Acknowledgements This thesis concludes 8 years and 7 months of research (including 2 extensions given on medical grounds) as a part-time Ph.D. student in School of Law at the University of Leeds. First and foremost, I am grateful to my employer - IT Services at the University of Leeds - for subsidising part of my academic fee and allowing me 5 days study leave from work annually to conduct and complete this doctoral research. I would also like to express my greatest thanks to my supervisors, Dr. Subhajit Basu and Mr. Nick Taylor, for supervision and understanding and encouraging me at critical stages of my research. I am grateful to have had the opportunity to benefit from their academic guidance, motivation, encouragement and support. Also, I would like to express my thanks and appreciation to Dr. Yaman Akdeniz for his guidance and support during the first few months of my research. I would especially like to thank my wife Yim Ling and my two children for their endless support and understanding, in particular through stressful times and my ill health. - iv - Abstract Surveillance on the Internet is a new battleground which attracts attention from all walks of life in our society. Since the 2013 Snowden revelations, the practice of Internet surveillance has become common knowledge. This research critically examines whether or not Internet privacy is dead, with a specific focus on the technical aspects of the Internet in order to express how technology is used to enhance and to invade privacy. This sets it apart from the existing literature in the field. In this research, three jurisdictions are chosen as case studies: the US and the UK as western jurisdictions with different legal systems, and China which has extensive surveillance and limited Internet privacy. The research explores the meaning of privacy in the information society and investigates the ways in which Internet privacy is integrated in the three chosen jurisdictions are critically analysed and discussed. The research findings reveal that Internet privacy is being taken away in both the US and the UK and it is hard to be optimistic for the future in the light of the 2013 Snowden revelations and ongoing changes to legislation, particularly the Investigatory Powers Bill in the UK. Through the examination of the evolution of the Internet in China and its nascent and evolving laws relating to data protection and privacy, the research findings demonstrate that China holds a great deal of control over its Internet and has implemented technical measures of surveillance, effectively meaning that Internet privacy in China is dead. Most importantly, through the examination of these three jurisdictions, there is strong evidence to suggest that these nation states are not so different when it comes to the invasion of Internet privacy. Despite these, there is still hope and the research concludes by examining possible ways to prevent the demise of Internet privacy. - v - Table of Contents Acknowledgements ............................................................................ iii Abstract ............................................................................................... iv Table of Contents ................................................................................ v List of Tables ...................................................................................... ix List of Figures ..................................................................................... x Table of Cases .................................................................................... xi Table of Legislation .......................................................................... xvi List of Abbreviations ...................................................................... xxiii Chapter 1: Introduction ....................................................................... 1 1.1 Background ............................................................................. 1 1.2 Research scope, aim and objectives ....................................... 4 1.3 Justification of the chosen jurisdictions ................................... 6 1.4 Research methodology ......................................................... 10 1.5 Research limitations .............................................................. 11 1.6 Structure of the thesis ........................................................... 12 Chapter 2: Privacy and the Internet ................................................. 13 2.1 Introduction ........................................................................... 13 2.2 Privacy defined ...................................................................... 16 2.2.1 Privacy and international human rights ...................... 22 2.2.2 The European Convention on Human Rights ............. 24 2.2.3 Sources of privacy in the US ...................................... 28 2.2.4 Sources of privacy in the UK ...................................... 32 2.2.5 Sources of privacy in China ........................................ 36 2.2.6 Summary .................................................................... 39 2.3 The Internet and privacy risks ............................................... 41 2.3.1 Privacy and the Information Society ........................... 41 2.3.1.1 EU Data Protection.......................................... 43 2.3.1.2 Evolving EU data protection law ...................... 45 2.3.1.3 Updating EU data protection ........................... 46 2.3.2 Internet structure ........................................................ 49 2.3.3 Data network communication ..................................... 54 2.3.4 Network Address Translation ..................................... 55 2.3.5 Privacy implications of an IP address ......................... 56 2.3.6 Internet infrastructure ................................................. 60 - vi - 2.3.6.1 Carrier Grade Network Address Translation ... 61 2.3.7 The Domain Name Service (DNS) ............................. 62 2.3.8 Internet summary ....................................................... 63 2.4 The growth of the web as a social environment .................... 63 2.5 The evolving Internet - Internet of Things (IoT) and cloud based services .................................................................... 65 2.5.1 Cloud based services ................................................. 66 2.5.2 The Internet of Things (IoT) ........................................ 66 2.6 Conclusion ............................................................................ 67 Chapter 3: Internet privacy and communications surveillance in the US ......................................................................................... 69 3.1 Introduction ........................................................................... 69 3.2 Communications surveillance in the USA .............................. 69 3.2.1 The introduction of warrant requirements ................... 72 3.2.2 Strengthening warrant requirements .......................... 74 3.3 The Foreign Intelligence Surveillance Act of 1978 ................ 76 3.4 Privacy in communications data given voluntarily ................. 80 3.5 Executive Order 12333: Expanding FISAs reach .................. 81 3.6 The Electronic Communications Privacy Act ......................... 82 3.6.1 The Stored Communications Act ................................ 83 3.6.2 Warshak, a challenge to the SCA grant of access to e- mails ............................................................................ 84 3.7 The Communications Assistance for Law Enforcement Act (CALEA) .............................................................................. 86 3.8 9/11 and the USA PATRIOT Act ........................................... 88 3.8.1 Expanding surveillance capabilities ............................ 90 3.8.2 Bulk collection programs ............................................ 96 3.9 Conclusion ............................................................................ 98 Chapter 4: Internet privacy and communications surveillance in UK ............................................................................................. 101 4.1 Introduction ......................................................................... 101 4.2 Communications surveillance in the UK .............................. 101 4.2.1 Telephone interception – the Malone cases ............. 103 4.2.2 The Telecommunications Act ................................... 105 4.2.3 The Interception of Communications Act .................. 106 4.2.4 Halford: the issue of private communications systems ..................................................................... 108 - vii - 4.2.5 Copland: the issue of
Recommended publications
  • Crypto Wars of the 1990S
    Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S CYBERSECURITY June 2015 | INITIATIVE © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. AUTHORS Danielle Kehl, Senior Policy Analyst, Open Technology Institute Andi Wilson, Program Associate, Open Technology Institute Kevin Bankston, Director, Open Technology Institute ABOUT THE OPEN TECHNOLOGY INSTITUTE ACKNOWLEDGEMENTS The Open Technology Institute at New America is committed to freedom The authors would like to thank and social justice in the digital age. To achieve these goals, it intervenes Hal Abelson, Steven Bellovin, Jerry in traditional policy debates, builds technology, and deploys tools with Berman, Matt Blaze, Alan David- communities. OTI brings together a unique mix of technologists, policy son, Joseph Hall, Lance Hoffman, experts, lawyers, community organizers, and urban planners to examine the Seth Schoen, and Danny Weitzner impacts of technology and policy on people, commerce, and communities.
    [Show full text]
  • 1 Court of Appeal Found No Love for Topshop Tank
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CLoK Court of Appeal found no love for Topshop tank: theimage right that dare not speak its name Susan Fletcher Senior Lecturer in Law, University of Central Lancashire Justine Mitchell Associate Lecturer in Law, University of Central Lancashire Subject:Passing Off. Other related subjects: Torts. Image rights.Personalityrights.Publicityrights.Passing off. Tradeconnections.Intellectual property. Keywords:passing off, image rights, personality rights, publicity rights, trade marks, goodwill, misrepresentation, merchandising, endorsements, English law, comparative law, unfair competition, freeriding, unjust enrichment, dilution, monopoly, social media, photograph, Rihanna, Topshop, Fenty, Arcadia Abstract:This article contains an analysis of the first instance and appeal decisions of the “Rihanna case”.In particular, the authors consider the substantive law of passing off in the context of the unauthorised use of a celebrity's image on a Topshop tank vest top. This is followed by a discussionof the consequences of the caseforcelebrities, consumers and stakeholders in theentertainmentand fashion industries. Every time you see me it's a different colour, a different shape, a different style. ....because it really...I/we just go off of instinct. Whatever we feel that very moment, we just go for it. Creatively, fashion is another world for me to get my creativity out.12 1Rihanna quote from the Talk That Talk music video available at www.youtube.com/watch?v=cVTKxwO2UnU
    [Show full text]
  • Fickle Justice: Judicial Idiosyncrasy in UK Privacy Cases
    Fickle Justice: Judicial Idiosyncrasy in UK Privacy Cases PAUL WRAGGt I. INTRODUCTION In 1990, the Federal Court of Australia rejected counsel's submission that English authorities on the "public interest" defense in breach of confidence claims ought to be adopted. The court dismissively described those authorities as "not so much a rule of law as an invitation to judicial idiosyncrasy."' The same comment seems equally applicable today. As is well-established in British common law, when deciding claims for misuse of private information (which replaces breach of confidence),2 the court must decide whether the claimant's reasonable expectation of privacy is outweighed by the contribution to a debate of public interest that the publication makes.3 As the case law shows, this is usually a delicate balance that may involve fine distinctions. Yet despite judicial recognition that the "applicable principles [should] be stated with reasonable clarity ' 4 so as to avoid accusations of judicial idiosyncrasy, the approach taken to determining the question of "public interest" remains an invitation to such, especially where celebrities' private lives are involved. Recent developments suggest broad diversity in the methodology of evaluating the worth of privacy-invading expression in which both skeptical and generous approaches are evident. These idiosyncratic factors are the subject of discussion in this Article.5 By examining the recent case law, it will be argued that since the public interest test pervades a range of measures relating to the misuse of private information tort, the issue of judicial idiosyncrasy must be addressed by an appellate court. The adoption of the skeptical approach as tLecturer in Law, School of Law, University of Leeds, UK.
    [Show full text]
  • Consensgx: Scaling Anonymous Communications Networks With
    Proceedings on Privacy Enhancing Technologies ; 2019 (3):331–349 Sajin Sasy* and Ian Goldberg* ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments Abstract: Anonymous communications networks enable 1 Introduction individuals to maintain their privacy online. The most popular such network is Tor, with about two million Privacy is an integral right of every individual in daily users; however, Tor is reaching limits of its scala- society [72]. With almost every day-to-day interaction bility. One of the main scalability bottlenecks of Tor and shifting towards using the internet as a medium, it similar network designs originates from the requirement becomes essential to ensure that we can maintain the of distributing a global view of the servers in the network privacy of our actions online. Furthermore, in light to all network clients. This requirement is in place to of nation-state surveillance and censorship, it is all avoid epistemic attacks, in which adversaries who know the more important that we enable individuals and which parts of the network certain clients do and do not organizations to communicate online without revealing know about can rule in or out those clients from being their identities. There are a number of tools aiming to responsible for particular network traffic. provide such private communication, the most popular In this work, we introduce a novel solution to this of which is the Tor network [21]. scalability problem by leveraging oblivious RAM con- Tor is used by millions of people every day to structions and trusted execution environments in order protect their privacy online [70].
    [Show full text]
  • Directors of Central Intelligence As Leaders of the U.S
    All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm.
    [Show full text]
  • Executive Order 12036 1-11. The
    Executive~ Order 12036 Proposed Executive Order Reason for Change 1-11. The Department of Defense. 1.11 The Department of Defense. The Secretary of The Secretary of Defense Defense shall: shall: 1-1101. Collect national (a) Collect national Technical change. foreign intelligence and be foreign intelligence and be responsive to collection tasking responsive to collection tasking by the NITC. by the Director of Central · Intelligence; I I 1-1102. Collect, produce (b) Collect, produce and Technical change. and disseminate foreign military disseminate military and and military-related intelligence military-related foreign intelli­ information, including scien- · gence and counterintelligence as tific, technical, political, required for execution of the geographic and economic. informa­ Secretary's responsibilities; tion as required for execution of the Secretary's responsibilities; 1-1103. Conduct programs (c) Conduct programs and and missions necessary to fulfill missions necessary to fulfill national and tactical foreign national, departmental and intelligence requirements; tactical foreign intelligence requirements; 43 E~ecutive Order 12036 Proposed ~x e c~ t ive Orae r Reason for Change (1.11 Continued) 1-1104. Conduct counter­ (d) Conduct counter­ Unnecessary language intelligence activities in intelligence activities in eliminated. support of Department of Defense support of Department of Defense components outside the United components outside the United States in coordination with the States in coordination with the CIA, and within the United States CIA, and within the United States in coordination with the FBI in coordination with the FBI, pursuant to procedures agreed pursuant to procedures agreed upon by the Secretary of Defense upon by the Secretary of Defense and the Attorney General, and and the Attorney General; produce and disseminate counter­ intelligence studies and reports; 1-1105.
    [Show full text]
  • Doswell, Stephen (2016) Measurement and Management of the Impact of Mobility on Low-Latency Anonymity Networks
    Citation: Doswell, Stephen (2016) Measurement and management of the impact of mobility on low-latency anonymity networks. Doctoral thesis, Northumbria University. This version was downloaded from Northumbria Research Link: http://nrl.northumbria.ac.uk/30242/ Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full items can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided the authors, title and full bibliographic details are given, as well as a hyperlink and/or URL to the original metadata page. The content must not be changed in any way. Full items must not be sold commercially in any format or medium without formal permission of the copyright holder. The full policy is available online: http://nrl.northumbria.ac.uk/policies.html MEASUREMENT AND MANAGEMENT OF THE IMPACT OF MOBILITY ON LOW-LATENCY ANONYMITY NETWORKS S.DOSWELL Ph.D 2016 Measurement and management of the impact of mobility on low-latency anonymity networks Stephen Doswell A thesis submitted in partial fulfilment of the requirements of the University of Northumbria at Newcastle for the degree of Doctor of Philosophy Research undertaken in the Department of Computer Science and Digital Technologies, Faculty of Engineering and Environment October 2016 Declaration I declare that the work contained in this thesis has not been submitted for any other award and that it is all my own work.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Changing of the Guards: a Framework for Understanding and Improving Entry Guard Selection in Tor
    Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor Tariq Elahi†, Kevin Bauer†, Mashael AlSabah†, Roger Dingledine‡, Ian Goldberg† †University of Waterloo ‡The Tor Project, Inc. †{mtelahi,k4bauer,malsabah,iang}@cs.uwaterloo.ca ‡[email protected] ABSTRACT parties with anonymity from their communication partners as well Tor is the most popular low-latency anonymity overlay network as from passive third parties observing the network. This is done for the Internet, protecting the privacy of hundreds of thousands by distributing trust over a series of Tor routers, which the network of people every day. To ensure a high level of security against cer- clients select to build paths to their Internet destinations. tain attacks, Tor currently utilizes special nodes called entry guards If the adversary can anticipate or compel clients to choose com- as each client’s long-term entry point into the anonymity network. promised routers then clients can lose their anonymity. Indeed, While the use of entry guards provides clear and well-studied secu- the client router selection protocol is a key ingredient in main- rity benefits, it is unclear how well the current entry guard design taining the anonymity properties that Tor provides and needs to achieves its security goals in practice. be secure against adversarial manipulation and leak no information We design and implement Changing of the Guards (COGS), a about clients’ selected routers. simulation-based research framework to study Tor’s entry guard de- When the Tor network was first launched in 2003, clients se- sign. Using COGS, we empirically demonstrate that natural, short- lected routers uniformly at random—an ideal scheme that provides term entry guard churn and explicit time-based entry guard rotation the highest amount of path entropy and thus the least amount of contribute to clients using more entry guards than they should, and information to the adversary.
    [Show full text]
  • Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
    Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies.
    [Show full text]
  • The CIA Mandate and the War on Terror
    The CIA Mandate and the War on Terror Grant T. Harrist I. INTRODUCTION The American intelligence infrastructure is in the midst of its most radical overhaul since the formation of the modem intelligence community following World War II. The Intelligence Reform and Terrorism Prevention Act of 2004,1 the political compromise resulting from the nation's post-September 11 intelligence soul searching, has fundamentally transformed the U.S. intelligence bureaucracy. Yet the policy debate to date has paid insufficient attention to whether the fifty-eight-year-old mandate of the Central Intelligence Agency (CIA) requires amendment in light of the contemporary fight against terrorism. A primary impetus for reform of the U.S. intelligence infrastructure was the breakdown of critical distinctions upon which the division of labor among national security agencies is based. The current national security context and the war on terrorism have blurred the line between intelligence and law enforcement, and it has become hackneyed to note that terrorist plots do not observe the foreign and domestic divisions that exist in the jurisdictional duties of U.S. agencies. Still an important area of analysis has so far escaped any serious public debate or legislative attention: Do the limits of CIA authority outlined in the National Security Act of 19472 meet the needs of the modem national security environment? Policymakers should revisit the CIA's statutory mandate in light of the current struggle against terrorism in order to clarify the limits of CIA authority. t J.D. expected 2005, Yale Law School; M.P.A. expected 2005, Woodrow Wilson School of Public and International Affairs, Princeton University.
    [Show full text]
  • Tugendhat and Christie: the Law of Privacy and the Media Online
    DFwnN (Free pdf) Tugendhat and Christie: The Law of Privacy and The Media Online [DFwnN.ebook] Tugendhat and Christie: The Law of Privacy and The Media Pdf Free From Oxford University Press *Download PDF | ePub | DOC | audiobook | ebooks Download Now Free Download Here Download eBook #6465806 in Books 2016-03-14Original language:EnglishPDF # 1 7.00 x 2.20 x 9.80l, .0 #File Name: 01996857461010 pages | File size: 26.Mb From Oxford University Press : Tugendhat and Christie: The Law of Privacy and The Media before purchasing it in order to gage whether or not it would be worth my time, and all praised Tugendhat and Christie: The Law of Privacy and The Media: 0 of 0 people found the following review helpful. lsquo;THE FOGGY BOUNDARIES BETWEEN PRIVACY AND FREEDOM OF EXPRESSIONrsquo;By Phillip Taylor MBElsquo;THE FOGGY BOUNDARIES BETWEEN PRIVACY AND FREEDOM OF EXPRESSIONrsquo;ARE EXAMINED IN THIS DEFINITIVE WORK OF REFERENCE-- NOW IN A NEW THIRD EDITIONAn appreciation by Phillip Taylor MBE and Elizabeth Taylor of Richmond Green ChambersThis book, says co-editor Sir Mark Warby is lsquo;not an academic treatise, but a practitionerrsquo;s textbookrsquo; adding that lsquo;the practitionerrsquo;s insight is an enormously important part of this workrsquo;, newly published by the Oxford University Press.Now in its third edition, this long established and authoritative work of reference is an absolute boon to practitioners in this difficult field where, more often than not, controversies rage. Within its almost 900 pages, the book contains the insightful -- and not altogether non- controversial -- commentary of some twenty-nine erudite contributors, including the two editors and interestingly, nine foreign law contributors from as many jurisdictions ndash; a useful feature here, for comparative lawyers.The wealth of new material and commentary in this edition reflects the significant developments in this area of law that have emerged since the previous edition of 2011.
    [Show full text]