The Lost Nuance of Big Data Policing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
By James Juo
, by James Juo • AT AGE 14, Aaron Swartz was working with leading tech extortion by threat of damage to a computer.9 In addition nologists to craft standards for openly sharing informa to traditional computer hacking, the statute also has tion on the Interner.! He then helped Lawrence Lessig with been asserted against employees who take trade secrets Creative Commons, which promotes the use of simple, stored on their employer's computer before leaving to join standardized copyright licenses that give the public per the competition. IO In 1984, Congress enacted the CFAA mission to share and use creative works.2 At 19, he was to criminalize the hacking of computers in connection with a founding developer of Reddit, a widely used social national security, financial records, and government prop news Web site where users can post news links and vote erty.11 The statute was originally designed to cover unau on them.3 Aaron later became a political activist for thorized access of such protected computers having a Internet freedom and social justice issues and formed the specified federal interesr. 12 advocacy group Demand Progress.4 At 26, facing a crim The CFAA has been expanded a number of times. 13 inal trial under the Computer Fraud and Abuse Act For example, a 1994 amendment expanded the statute to (CFAA) for allegedly circumventing computer restric allow private entities to assert a civil cause of action and tions to an online database of academic articles, Aaron obtain compensatory damages and other equitable relief. 14 Swartz hanged himself in January.s In 1996, the CFAA was further amended to expand the Since then, Internet groups have criticized the U.S. -
How to Fix Legal Scholarmush
Indiana Law Journal Volume 95 Issue 4 Article 4 Fall 2020 How to Fix Legal Scholarmush Adam Kolber Brooklyn Law School, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/ilj Part of the Jurisprudence Commons, Law and Society Commons, Legal Ethics and Professional Responsibility Commons, Legal Profession Commons, and the Public Law and Legal Theory Commons Recommended Citation Kolber, Adam (2020) "How to Fix Legal Scholarmush," Indiana Law Journal: Vol. 95 : Iss. 4 , Article 4. Available at: https://www.repository.law.indiana.edu/ilj/vol95/iss4/4 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Indiana Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. How to Fix Legal Scholarmush ADAM J. KOLBER Legal scholars often fail to distinguish descriptive claims about what the law is from normative claims about what it ought to be. The distinction couldn’t be more important, yet scholars frequently mix it up, leading them to mistake legal authority for moral authority, treat current law as a justification for itself, and generally use rhetorical strategies more appropriate for legal practice than scholarship. As a result, scholars sometimes talk past each other, generating not scholarship but “scholarmush.” In recent years, legal scholarship has been criticized as too theoretical. When it comes to normative scholarship, however, the criticism is off the mark. We need more careful attention to theory, otherwise we’re left with what we have too much of now: claims with no solid normative grounding that amount to little more than opinions. -
KATE STITH Yale Law School, P.O
October 25, 2020 KATE STITH Yale Law School, P.O. 208215, New Haven, CT 06520-8215 Courier: 127 Wall Street, New Haven, CT 06511 (203) 432-4835 [email protected] EMPLOYMENT 1998–present: Lafayette S. Foster Professor of Law, Yale Law School Acting Dean: Spring 2009 Deputy Dean: 2003–04, 1999–2001 1991–1997: Professor of Law, Yale Law School 1985–1990: Associate Professor of Law, Yale Law School 1981–1984: Assistant United States Attorney, Southern District of New York (prosecuting white collar crime and organized crime) 1980–1981: Special Assistant to the Assistant Attorney General for the Criminal Division, Department of Justice, Washington, DC 1979–1980: Staff Economist, Council of Economic Advisers, Executive Office of the President, Washington, DC 1978–1979: Law Clerk to Justice Byron R. White, Washington, DC 1977–1978: Law Clerk to Judge Carl McGowan, United States Court of Appeals, Washington, DC LEGAL EDUCATION Harvard Law School, J.D., 1977 Articles Editor, HARVARD LAW REVIEW Harvard Prison Legal Assistance Project GRADUATE EDUCATION Harvard Kennedy School, Master in Public Policy, 1977 (joint four-year program with Harvard Law School) Master’s Thesis: THE POLITICS AND POLICY OF TAX REFORM UNDERGRADUATE EDUCATION Dartmouth College, B.A., 1973 Highest Distinction in Economics Phi Beta Kappa Rank in Class: First 1 October 25, 2020 COURSES and SEMINARS Constitutional Law; Cuba and the United States; Criminal Law; Criminal Procedure: Investigations; Criminal Procedure: Adjudication; Comparative Criminal Sentencing; Criminal Sentencing; Federal Criminal Prosecution; Federal Criminal Law; Special Counsels: From Watergate to the Present; Free Exercise Clinic: Fieldwork and Seminar; Opioid Crisis; Prosecution Externship; Separation of Powers; Theories of the Fourth Amendment; University Governance; advanced seminars in criminal law and constitutional separation of powers PUBLICATIONS DEFINING FEDERAL CRIMES (Aspen Press) (1st ed. -
Download Legal Document
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK IN RE ORDER REQUIRING APPLE, INC. TO ASSIST IN THE EXECUTION OF A SEARCH WARRANT ISSUED BY THIS COURT. No. 1:15-mc-01902-JO BRIEF OF AMICI CURIAE AMERICAN CIVIL LIBERTIES UNION, NEW YORK CIVIL LIBERTIES UNION, ELECTRONIC FRONTIER FOUNDATION, AND JENNIFER GRANICK AND RIANA PFEFFERKORN Arthur Eisenberg Esha Bhandari Mariko Hirose Alex Abdo New York Civil Liberties Union American Civil Liberties Union 125 Broad Street, 19th Floor Foundation New York, NY 10004 125 Broad Street, 18th Floor Tel: 212-607-3300 New York, NY 10004 [email protected] Tel: 212-549-2500 [email protected] Jennifer Stisa Granick (CA Bar #168423) Andrew Crocker Director of Civil Liberties* Nathan D. Cardozo Riana Pfefferkorn (CA Bar #266817) Electronic Frontier Cryptography Policy Fellow* Foundation Stanford Law School 815 Eddy Street Center for Internet and Society San Francisco, CA 94109 559 Nathan Abbott Way Tel: 415-436-9333 Stanford, CA 94305 [email protected] Tel: 650-736-8675 [email protected] * For affiliation purposes only TABLE OF CONTENTS TABLE OF AUTHORITIES .............................................................................................................ii SUMMARY OF ARGUMENT .........................................................................................................2 BACKGROUND ...............................................................................................................................3 ARGUMENT .....................................................................................................................................3 -
Digital Switzerlands
ARTICLE DIGITAL SWITZERLANDS KRISTEN E. EICHENSEHR† U.S. technology companies are increasingly standing as competing power centers that challenge the primacy of governments. This power brings with it the capacity to bolster or undermine governmental authority, as well as increasing public demands for the companies to protect users from governments. The companies’ power raises serious questions about how to understand their role. Scholars have proposed varying conceptions, suggesting that the companies should be understood as public utilities, information fiduciaries, surveillance intermediaries, or speech governors. This Article takes up another possibility, one suggested by the companies themselves: that they are “Digital Switzerlands.” The Digital Switzerlands concept encompasses two ideas: (1) that the companies are on par with, not subordinate to, the countries that try to regulate them, and (2) that they are, in some sense, neutral. This Article critically evaluates the plausibility of these claims and explores how the companies differ from other powerful private parties. The Digital Switzerlands concept sheds light on why the companies have begun to resist both the U.S. government and foreign governments, but it also means that the companies do not always counter governments. Understanding the relationship between companies, users, and governments as triangular, not purely hierarchical, * This Article reflects developments through February 2019, when it was finalized for publication. † Assistant Professor, UCLA School of Law. For -
How to Fix Legal Scholarmush
Brooklyn Law School BrooklynWorks Faculty Scholarship Fall 2020 How to Fix Legal Scholarmush Adam J. Kolber Follow this and additional works at: https://brooklynworks.brooklaw.edu/faculty Part of the Legal Profession Commons, and the Other Law Commons How to Fix Legal Scholarmush ADAM J. KOLBER* Legal scholars often fail to distinguish descriptive claims about what the law is from normative claims about what it ought to be. The distinction couldn't be more important, yet scholarsfrequently mix it up, leading them to mistake legal authority for moral authority, treat current law as a justificationfor itself and generally use rhetorical strategies more appropriatefor legal practice than scholarship. As a result, scholars sometimes talk past each other, generating not scholarship but "scholarmush." In recent years, legal scholarship has been criticized as too theoretical. When it comes to normative scholarship, however, the criticism is offthe mark. We need more careful attention to theory, otherwise we're left with what we have too much of now: claims with no solid normative grounding that amount to little more than opinions. We have no shortage ofopinions, and simply producing more opinions will not make scholarship more practical. Of course, centuries-olddisputes in jurisprudence have struggledto untangle the precise relationship between law and morality, but my message is simple: scholars must be more clear, transparent, and rigorous about which of their claims are descriptive and which are normative (and what sort of normativity is at issue). By being more precise, we can hope to stop talking past each other and develop more objective criteriafor evaluating both scholarship andpublic policy more generally. -
Perception Versus Punishment in Cybercrime James T
Journal of Criminal Law and Criminology Volume 109 Article 4 Issue 2 Spring Spring 2019 Perception Versus Punishment in Cybercrime James T. Graves Alessandro Acquisti Ross Anderson Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons Recommended Citation James T. Graves, Alessandro Acquisti, and Ross Anderson, Perception Versus Punishment in Cybercrime, 109 J. Crim. L. & Criminology 313 (1019). https://scholarlycommons.law.northwestern.edu/jclc/vol109/iss2/4 This Criminology is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. 0091-4169/19/10902-0313 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 109, No. 2 Copyright © 2019 by James T. Graves, Alessandro Acquisti & Ross Anderson Printed in U.S.A. CRIMINOLOGY PERCEPTION VERSUS PUNISHMENT IN CYBERCRIME JAMES T. GRAVES, ALESSANDRO ACQUISTI & ROSS ANDERSON* TABLE OF CONTENTS I. INTRODUCTION .............................................................................. 314 II. BACKGROUND .............................................................................. 317 A. Factors Affecting Sentencing Under the Computer Fraud and Abuse Act ................................................................ 317 1. Maximum Sentences ................................................. 317 2. Sentencing Guidelines .............................................. -
A REEVALUATION of the COMPUTER FRAUD and ABUSE ACT by Reid Skibelt
CYBERCRIMES & MISDEMEANORS: A REEVALUATION OF THE COMPUTER FRAUD AND ABUSE ACT By Reid Skibelt ABSTRACT This Article contends that the Computer Fraud and Abuse Act is an overly punitive and largely ineffective approach to combating computer crime based on two fundamental critiques. The 1986 version of the CFAA contemplated a core distinction between harmless trespass and more substantial intrusions. Over time, this distinction has become ob- scured and is resulting in over-criminalization of offenders. Furthermore, the increased penalties for computer crime created by the USA PA- TRIOT Act, and the Cyber Security Enhancement Act, are unjust in ap- plication and ineffectual in deterring prospective computer criminals. TABLE OF CONTENTS I. IN TRO DUCTION ....................................................................................................... 9 10 II. THE EVOLUTION OF THE COMPUTER FRAUD AND ABUSE ACT ............................... 912 III. W HAT EXACTLY IS A "HACKER"? ..................................... .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. 917 IV. COPYING OF FILES AND THE TROPHY PROBLEM ..................................................... 922 V. M ENS REA AND THE $5,000 THRESHOLD ................................................................ 926 A. The Problem of "Resecuring" Costs .............................................................. 928 B. The Problem of Calculating Intangible Harms .............................................. 932 VI. THE USAPA AND THE PUNITIVE APPROACH TO CYBERCRIME .............................. -
Sonia Sotomayor and the Construction of Merit
Emory Law Journal Volume 61 Issue 4 The 2011 Randolph W. Thrower Symposium — Judging Politics: Judges as Political Actors, Candidates, and Arbiters of the Political 2012 Sonia Sotomayor and the Construction of Merit Guy-Uriel Charles Daniel L. Chen Mitu Gulati Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Guy-Uriel Charles, Daniel L. Chen & Mitu Gulati, Sonia Sotomayor and the Construction of Merit, 61 Emory L. J. 801 (2012). Available at: https://scholarlycommons.law.emory.edu/elj/vol61/iss4/6 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHARLESCHENGULATI GALLEYS4 7/5/2012 2:09 PM SONIA SOTOMAYOR AND THE CONSTRUCTION OF MERIT ∗ Guy-Uriel Charles ∗∗ Daniel L. Chen ∗∗∗ Mitu Gulati ABSTRACT The appointment of Sonia Sotomayor to the Supreme Court in 2009 was criticized as sacrificing merit on the altar of identity politics. According to critics, Sotomayor was simply “not that smart.” For some conservative critics, her selection illustrated the costs of affirmative action policies, in that this particular choice was going to produce a lower quality Supreme Court. For liberal critics, many were concerned that the President, by selecting Sotomayor, was squandering an opportunity to appoint an intellectual counterweight to conservative Justices like Antonin Scalia, Samuel Alito, and John Roberts. Using a set of basic measures of judicial merit, such as publication and citation rates for the years 2004 to 2006, when Sotomayor was on the Court of Appeals for the Second Circuit, we compare her performance to that of her colleagues on the federal appeals courts. -
The National Security Agency at the Crossroads Speaker
THE NATIONAL SECURITY AGENCY AT THE CROSSROADS SPEAKER BIOS WEDNESDAY, APRIL 2 8:30 pm EVENING ADDRESS [invitation only] Mr. John C. (Chris) Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. As the NSA Deputy Director, Mr. Inglis acted as the Agency's chief operating officer, responsible for guiding and directing strategies, operations and policy. Mr. Inglis holds advanced degrees in engineering and computer science from Columbia University, Johns Hopkins University, and the George Washington University. He is also a graduate of the Kellogg Business School executive development program, the USAF Air War College, Air Command and Staff College, and Squadron Officers' School. Mr. Inglis’ military career includes over 30 years of service in the US Air Force -- nine years on active duty and twenty-one years in the Air National Guard - - from which he retired as a Brigadier General in 2006. He holds the rating of Command Pilot and commanded units at the squadron, group, and joint force headquarters levels. Mr. Inglis' significant Awards include the Clements award as the US Naval Academy's Outstanding Military Faculty member (1984), three Presidential Rank Awards (2000, 2004, 2009), the USAF Distinguished Service Medal (2006), the Boy Scouts of America Distinguished Eagle Scout Award (2009), the Director of National Intelligence Distinguished Service Medal (2014), and The President’s National Security Medal (2014). THURSDAY, APRIL 3 8:50 am WELCOME REMARKS Bobby Chesney is Director of the Robert Strauss Center for International Security and Law and the Charles I. -
Are Technical Difficulties at the Supreme Court Causing a ''Disregard of Duty''?
92 JOURNAL OF LAW, TECHNOLOGY & THE INTERNET [VoL 3:1 ARE TECHNICAL DIFFICULTIES AT THE SUPREME COURT CAUSING A ''DISREGARD OF DUTY''? Mark Grabowski1 ABSTRACT Recent U.S. Supreme Court cases involving technology-related is sues indicate that several Justices are embarrassingly ignorant about computing and communication methods that many Americans take for granted. Indeed, some Justices admit they are behind the times. Yet, as members of the nation's highest court, they are increasingly asked to set legal precedents about these very technologies. The implications are profound for U.S. media law because, with the advent of the Digi tal Age, speech and expression have become intertwined with tech nology. The article argues that it is crucial for our most important decision-makers to keep pace with the times; otherwise, they may make poor legal decisions or avoid hearing important cases because they do not grasp the issues involved. In fact, such missteps may al ready be occurring. A few possible solutions are offered. INTRODUCTION If you are in America and not yet acquainted with cell phones, computers and the Internet, you must have spent the past decade under a rock-or be a member of the United States Supreme Court. Supreme Court Justices lately have displayed a startling level of ignorance about computing and communication methods that many Americans take for granted. Justice Clarence Thomas "generally characterizes the 1 Mark Grabowski is an assistant professor of communication at Adelphi University, where he teaches media law and new media. He also writes a column on legal affairs for AOL News, the third-most visited news website in the nation. -
Split Over the Use of the CFAA Against
Split Over the Use of the CFAA In recent years, employers have used the Computer Fraud and Abuse Act (CFAA)’s focus on the issue of computer trespass against disloyal employees who take proprietary computer data to a competitor. However, lower courts are divided on the CFAA’s scope, and a circuit split has developed over interpretation of the CFAA on the question of authorized access. BY JAMES JUO 50 • THE FEDERAL LAWYER • JAN/FEB 2014 Against Disloyal Employees he Computer Fraud and Abuse Act allowing an unauthorized person to use the valid password of 13 14 (CFAA), a computer trespass statute, another; violating a website’s terms of service; and accessing information stored on an employer’s computer for a competing Thas been called “one of the broadest business.15 In recent years, employers have used the CFAA against federal criminal laws currently on the books.”1 disloyal employees who take proprietary computer data to a com- petitor.16 Indeed, disgruntled employees who are about to resign When enacted in 1984, the act was intended still have access to computer systems and the ability to copy data to criminalize computer hacking.2 One Con- prior to their departure.17 One advantage of using the CFAA is its focus on the issue of computer trespass rather than on the quality gressman noted that “[t]he hacker of today of the computer data being accessed.18 can become the white-collar crime superstar However, the lower courts “are deeply divided on the of tomorrow.”3 Originally designed to protect [CFAA’s] scope, with some courts concluding that the law is re- markably broad.”19 And a circuit split has developed over how computers having a specified federal interest, to interpret the CFAA on the question of authorized access, such as national security, financial records, including whether employers can continue to use the CFAA against disloyal employees.