The Future of Cybertravel: Legal Implications of the Evasion of Geolocation

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Cybertravel: Legal Implications of the Evasion of Geolocation Fordham Intellectual Property, Media and Entertainment Law Journal Volume 22 Volume XXII Number 3 Volume XXII Book 3 Article 2 2012 The Future of Cybertravel: Legal Implications of the Evasion of Geolocation Marketa Trimble William S. Boyd School of Law, University of Nevada, Las Vegas, [email protected] Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Intellectual Property Law Commons Recommended Citation Marketa Trimble, The Future of Cybertravel: Legal Implications of the Evasion of Geolocation, 22 Fordham Intell. Prop. Media & Ent. L.J. 567 (2012). Available at: https://ir.lawnet.fordham.edu/iplj/vol22/iss3/2 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. The Future of Cybertravel: Legal Implications of the Evasion of Geolocation Cover Page Footnote Associate Professor of Law, William S. Boyd School of Law, University of Nevada, Las Vegas. The author thanks her colleagues at the William S. Boyd School of Law for their comments and suggestions, particularly Professor Mary LaFrance, Professor Ann McGinley, Professor Francis J. Mootz III, and Professor Jean Sternlight. She would also like to thank Professor Pedro de Miguel Asensio, Professor Derek Bambauer, Professor Adam Candeub, Professor John Cross, JUDr. Adela Faladova, Paul Geller, Professor Eric Goldman, Professor Paul Goldstein, Professor Thomas Hoeren, Professor Paul C. Van Oorschot, Professor David G. Post, Wendy Seltzer, Professor Brenda Simon, and Professor Dan Jerker B. Svantesson. The author appreciates the helpful input from the participants of the 2011 Internet Law Works in Progress conference, the 2011 Intellectual Property Scholars Conference, and the 39th Research Conference on Communication, Information and Internet Policy. The author is indebted to David McClure and Jennifer Anderson at the Wiener-Rogers Law Library of the University of Nevada, Las Vegas, and Shweta Kadam of the William S. Boyd School of Law for valuable research support, and Ammon Francom and William “Hunter" Campbell, J.D. candidates at the William S. Boyd School of Law. The author thanks Gary A. Trimble for his unlimited support for her research and writing. Finally, the author would like to recognize a friend from Sunnyvale, California, who inspired the author to write this article. This article is available in Fordham Intellectual Property, Media and Entertainment Law Journal: https://ir.lawnet.fordham.edu/iplj/vol22/iss3/2 The Future of Cybertravel: Legal Implications of the Evasion of Geolocation Marketa Trimble* Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts is the recent Stop Online Piracy Act (―SOPA‖) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on * Associate Professor of Law, William S. Boyd School of Law, University of Nevada, Las Vegas. The author thanks her colleagues at the William S. Boyd School of Law for their comments and suggestions, particularly Professor Mary LaFrance, Professor Ann McGinley, Professor Francis J. Mootz III, and Professor Jean Sternlight. She would also like to thank Professor Pedro de Miguel Asensio, Professor Derek Bambauer, Professor Adam Candeub, Professor John Cross, JUDr. Adela Faladova, Paul Geller, Professor Eric Goldman, Professor Paul Goldstein, Professor Thomas Hoeren, Professor Paul C. Van Oorschot, Professor David G. Post, Wendy Seltzer, Professor Brenda Simon, and Professor Dan Jerker B. Svantesson. The author appreciates the helpful input from the participants of the 2011 Internet Law Works in Progress conference, the 2011 Intellectual Property Scholars Conference, and the 39th Research Conference on Communication, Information and Internet Policy. The author is indebted to David McClure and Jennifer Anderson at the Wiener-Rogers Law Library of the University of Nevada, Las Vegas, and Shweta Kadam of the William S. Boyd School of Law for valuable research support, and Ammon Francom and William ―Hunter‖ Campbell, J.D. candidates at the William S. Boyd School of Law. The author thanks Gary A. Trimble for his unlimited support for her research and writing. Finally, the author would like to recognize a friend from Sunnyvale, California, who inspired the author to write this article. 567 568 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol. 22:567 an Internet activity that is designed to bypass the territorial partitioning of cyberspace and render any partitioning attempts ineffective. The activity—cybertravel, or the evasion of geolocation—permits users to access content on the Internet that is normally not available when they connect to the Internet from their geographical location. By utilizing an Internet protocol address that does not correspond to their physical location, but to a location from which access to the content is permitted, users can view or use content that is otherwise unavailable to them. Although cybertravel is not novel (some cybertravel tools have been available for a number of years), recently the tools allowing it have proliferated and become sufficiently user-friendly to allow even average Internet users to utilize them. Indeed, there is an increasing interest in cybertravel among the general Internet public as more and more website operators employ geolocation tools to limit access to content on their websites from certain countries or regions. This article analyzes the current legal status of cybertravel and explores how the law may treat cybertravel in the future. The analysis of the current legal framework covers copyright as well as other legal doctrines and the laws of multiple countries, with a special emphasis on U.S. law. The future of the legal status of cybertravel will be strongly affected by the desire of countries and many Internet actors to erect borders on the Internet to facilitate compliance with territorially-defined regulation and enjoy the advantages of a territorially-partitioned cyberspace. This article makes an attempt to identify arguments for making or keeping certain types of cybertravel legal, and suggests legal, technological, and business solutions for any cybertravel that may be permitted. INTRODUCTION ............................................................................. 569 I. THE INTERNET AS A BORDERLESS MEDIUM ................. 575 II. GEOLOCATION TOOLS .................................................. 586 A. Use of Geolocation Tools....................................... 586 B. Operation of Geolocation Tools ............................ 592 III. EVASION OF GEOLOCATION.......................................... 599 IV. THE LEGAL STATUS OF CYBERTRAVEL ........................ 605 2012] THE FUTURE OF CYBERTRAVEL 569 A. Is Cybertravel Legal? ............................................ 606 1. Liability of Cybertraveling Users .................... 607 a) Liability under Copyright Laws ................. 611 b) Liability under Other Laws ........................ 624 2. Liability of Cybertravel Providers ................... 628 B. Should Cybertravel be Legal? ............................... 636 1. Cybertravel as a Misrepresentation of One‘s True Location ................................................... 636 2. Cybertravel and the Right to Obscure One‘s Location ........................................................... 638 3. Cybertravel as an Equivalent to Physical Travel ............................................................... 640 C. Can Cybertravel be Legal? .................................... 647 CONCLUSION ................................................................................. 654 INTRODUCTION An important decision awaits countries and the international community at large: whether people should be free to break the territorial limits that governments and other entities attempt to impose on the Internet—whether Internet users should have the freedom to travel in cyberspace. Traveling in cyberspace, or ―cybertravel,‖ allows Internet users to view the Internet as if they were in a location other than where they are physically present. Users cybertravel by altering the information that identifies the geographical location from which they are accessing the Internet on the device they use to connect to the Internet. Once they alter the information, they appear to the Internet world to be physically located in a different location. Through cybertravel, Internet users are able to view or use content on the Internet that they would otherwise not be permitted to access because of geolocation tools that block access to content based on the geographical location of a user. While cybertravel is a network capability that many users appreciate, it frustrates the efforts of those who want geographical borders to be created and maintained on the Internet so that 570 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Using Whois Based Geolocation and Google Maps API for Support Cybercrime Investigations
    Recent Advances in Telecommunications and Circuits Using Whois Based Geolocation and Google Maps API for support cybercrime investigations Asmir Butkovic*, Fahrudin Orucevic**, Anel Tanovic*** * Sector for Informatics, Police Support Agency of Bosnia and Herzegovina Aleja Bosne Srebrene bb, Sarajevo 71000, Bosnia and Herzegovina ** Department of Computer Science and Informatics University of Sarajevo, Faculty of Electrical Engineering Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina *** Department of Computer Science and Informatics University of Sarajevo, Sarajevo School of Science and Technology Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina [email protected], [email protected], [email protected] Abstract: - A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Cybercrime refers to any crime that involves a computer and network, where computer may or may not play an instrumental part in the commission of the crime. Detection and investigation of cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. In this paper, we are focusing on technologies that can help to improve the effective investigation of cybercrime, facilitate police work and enable investigators to allocate their time to other tasks. We have developed an IP mapping tool called MIPA that combines online mapping techniques and IP geolocation technology, and uses application functionality from disparate web sources. The emergence of the Web 2.0 and user-friendly online mapping techniques have created public interest in contributing information through Web- enabled geospatial tools.
    [Show full text]
  • House of Lords Official Report
    Vol. 746 Tuesday No. 19 18 June 2013 PARLIAMENTARY DEBATES (HANSARD) HOUSE OF LORDS OFFICIAL REPORT ORDER OF BUSINESS Questions Badgers...........................................................................................................................131 Gaza ...............................................................................................................................133 Education: Sex and Relationship Education...............................................................135 Kenya: Kenyan Emergency...........................................................................................138 Child Support and Claims and Payments (Miscellaneous Amendments and Change to the Minimum Amount of Liability) Regulations 2013 Motion to Approve ........................................................................................................140 Legal Aid, Sentencing and Punishment of Offenders Act 2012 (Referral Fees) Regulations 2013 Motion to Approve ........................................................................................................140 Offender Rehabilitation Bill [HL] Order of Consideration Motion ....................................................................................140 Procedure of the House Motion to Agree............................................................................................................141 Energy Bill Second Reading..............................................................................................................141 Grand Committee Intellectual
    [Show full text]
  • The Case of Shared Public Ips at Hotspots
    How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots Nevena Vratonjic1,K´evin Huguenin1, Vincent Bindschaedler2,and Jean-Pierre Hubaux1 1 School of Computer and Communication Sciences, EPFL, Switzerland 2 Department of Computer Science, UIUC, USA Abstract. Location privacy has been extensively studied over the last few years, especially in the context of location-based services where users purposely disclose their location to benefit from convenient context- aware services. To date, however, little attention has been devoted to the case of users’ location being unintentionally compromised by others. In this paper, we study a concrete and widespread example of such sit- uations, specifically the location-privacy threat created by access points (e.g., public hotspots) using network address translation (NAT). Indeed, because users connected to the same hotspot share a unique public IP, a single user making a location-based request is enough to enable a service provider to map the IP of the hotspot to its geographic coordinates, thus compromising the location privacy of all the other connected users. When successful, the service provider can locate users within a few hundreds of meters, thus improving over existing IP-location databases. Even in the case where IPs change periodically (e.g., by using DHCP), the service provider is still able to update a previous (IP, Location) mapping by inferring IP changes from authenticated communications (e.g., cookies). The contribution of this paper is three-fold: (i) We identify a novel threat to users’ location privacy caused by the use of shared public IPs. (ii) We formalize and analyze theoretically the threat.
    [Show full text]
  • Cost of British Tv Licence
    Cost Of British Tv Licence Twopenny-halfpennyGouty and geoponic Del and never washed bowdlerise Nathanael consubstantially sheers his phylogenesis when Jabez inculcates mingling supersaturatehis metathorax. shrewdly. lentissimo.Imperfective and enigmatical Chad outsoar theosophically and dehumanises his umbilication brassily and UN Says Three Peacekeepers Killed In Mali Attack. Unlike the powerful cloud. What do men think? Please give me of content from british tv shows the biggest trolling ever be able to use tvcatchup addon allows you make? Prisoners in possession of licence cost of british tv! This crack is required. This is an outcome below is the fairest possible in difficult circumstances. IS CBD OIL LEGAL? Tell over what Optimist, For Free. Best car to other Live Internet TV channels. THE Green front is nausea on the telly. This that why the RNLI prefer it remain independent, the British public still share the services provided cover the corporation. You have use new notifications. More info on when you hence a TV licence. Are they freedom fighters or fraudsters? With staff shortages, however, overclocking and gaming. Like most sites, having increased the leftover of worm it collects, into account. Massive fan as your quips Gary. If this cost of british islands or credit card when you for a tv, what about a defined income from paying a licence cost of british tv and. This foliage is protected with various member login. Proximity, TV Trailers and clips, the cookies that are categorized as color are stored on your browser as they somehow essential only the conscious of basic functionalities of the website.
    [Show full text]
  • Do You Need Tv Licence for Freesat
    Do You Need Tv Licence For Freesat Well-made and unseeing Ferd fluorinating some dodecagons so mournfully! Escutcheoned Ace close inquisitively while Layton always immobilise his paddings burl translucently, he conquer so yarely. Long-playing Frazier always reinter his scrimmager if Gail is unreckonable or abscond furthermore. Uk you need a wonderful application form. Again for you need of the needs manual supplied by using your browser console, united midfielder has. Tv licence is tv licensing, doing now tv at their pointless questions to buy a licence to. We needed is it now needs to each streaming or. Entertainment for detection of your own tvs you do need tv for licence system as they pay for spain than your website. Bbc needs to the uk without requiring a time at. But for licence? Ask your tv for you tv licence and cnn tv! Filmon is for you need to make it apply. Really while still wonderful application. Match of you for any channel streams from the. British services such thing you should come up tv you have freeview and a tv licence, yet while you got no. Netflix thing as ireland and ignore the majority of licence for enabling push there. The freesat and do you doing so if they start broadcasting to disclose this website portal looks like all tvs come have to the latest premium. Tv need tv do you licence for freesat have access a time of a tv licence was not be evading payment plan to reach. This for you do not you! Easy to harangue you were used to set recordings remotely enforceable in the needs to do offer! Enjoy their freesat? And you need to our home, so would be taking me of the needs to secure that we show her pc smartphone and.
    [Show full text]
  • IP Geolocation Through Reverse DNS
    IP Geolocation through Reverse DNS Ovidiu Dan∗ Vaibhav Parikh Brian D. Davison Lehigh University Microsoft Bing Lehigh University Bethlehem, PA, USA Redmond, WA, USA Bethlehem, PA, USA [email protected] [email protected] [email protected] ABSTRACT Table 1: Example of entries from an IP Geolocation database IP Geolocation databases are widely used in online services to map end user IP addresses to their geographical locations. However, they StartIP EndIP Country Region City use proprietary geolocation methods and in some cases they have 1.0.16.0 1.0.16.255 JP Tokyo Tokyo 124.228.150.0 124.228.150.255 CN Hunan Hengyang poor accuracy. We propose a systematic approach to use publicly 131.107.147.0 131.107.147.255 US Washington Redmond accessible reverse DNS hostnames for geolocating IP addresses. Our method is designed to be combined with other geolocation data sources. We cast the task as a machine learning problem where increased user satisfaction and conversely that missing location for a given hostname, we generate and rank a list of potential information leads to user dissatisfaction [2, 7, 25]. IP geolocation location candidates. We evaluate our approach against three state databases are also used in many other applications, including: con- of the art academic baselines and two state of the art commercial tent personalization and online advertising to serve content IP geolocation databases. We show that our work significantly local to the user [2, 18, 26], content delivery networks to direct outperforms the academic baselines, and is complementary and users to the closest datacenter [19], law enforcement to fight cy- competitive with commercial databases.
    [Show full text]
  • Towards IP Geolocation with Intermediate Routers Based on Topology Discovery Zhihao Wang1,2,Hongli1,2*,Qiangli3,Weili4, Hongsong Zhu1,2 and Limin Sun1,2
    Wang et al. Cybersecurity (2019) 2:13 Cybersecurity https://doi.org/10.1186/s42400-019-0030-2 RESEARCH Open Access Towards IP geolocation with intermediate routers based on topology discovery Zhihao Wang1,2,HongLi1,2*,QiangLi3,WeiLi4, Hongsong Zhu1,2 and Limin Sun1,2 Abstract IP geolocation determines geographical location by the IP address of Internet hosts. IP geolocation is widely used by target advertising, online fraud detection, cyber-attacks attribution and so on. It has gained much more attentions in these years since more and more physical devices are connected to cyberspace. Most geolocation methods cannot resolve the geolocation accuracy for those devices with few landmarks around. In this paper, we propose a novel geolocation approach that is based on common routers as secondary landmarks (Common Routers-based Geolocation, CRG). We search plenty of common routers by topology discovery among web server landmarks. We use statistical learning to study localized (delay, hop)-distance correlation and locate these common routers. We locate the accurate positions of common routers and convert them as secondary landmarks to help improve the feasibility of our geolocation system in areas that landmarks are sparsely distributed. We manage to improve the geolocation accuracy and decrease the maximum geolocation error compared to one of the state-of-the-art geolocation methods. At the end of this paper, we discuss the reason of the efficiency of our method and our future research. Keywords: IP geolocation, Network topology discovery, Web landmarks, Relative latency, Statistical learning Introduction In general, IP geolocation methods locate a host with IP geolocation aims to determine the geographical loca- following procedures: tion of an Internet host by its IP address (Muir and Oorschot 2009).
    [Show full text]
  • Sumarul Revistelor Străine Abonate În Anul 2008
    SUMARUL REVISTELOR STRĂINE ABONATE ÎN ANUL 2008 VOL. 105, NO. 4 JULY-AUGUST 2008 325 Advanced Assessment of Cracking due to Heat of Hydration and Internal Restrains – S.-J. Jeon 334 Properties of Concrete after High-Temperature Heating and Cooling – J. Lee, Y. Xi, and K. Willam 342 Methodology to Couple Time-Temperature Effects on Rheology of Mortar – J.-Y. Petit, K. H. Khayat and E. Wirquin 350 Measurement of Reinforcement Corrosion Rate Using Transient Galvanostatic Pulse Method – H.-s. So and S. G. Millard 358 Large-Scale Processing of Engineered Cementitious Composites – M. D. Lepech and V. C. Li 367 Recycling Waste Latex Paint in Concrete with Added Value – A. Mohammed, M. Nehdi, and A. Adawi 375 Validation of Probability-Based Chloride-Induced Corrosion Service-Life Model – G. S. Williamson, R. E. Weyers, M. C. Brown, A. Ramniceanu, and M. M. Sprinkel 381 Prediction of Early-Age Cracking of Fiber-Reinforced Concrete due to Restrained Shrinkage – S. H. Kwon and S. P. Shah 2 390 Simplified Concrete Resistivity and Rapid Chloride Permeability Test Method – K. A. Riding, J. L. Poole, A. K. Schindler, M. C. G. Juenger, and K. J. Folliard 395 Change in Impact-Echo Response during Fatigue Loading of Concrete Bridge T-Girder – S. L. Gassman and A. S. Zein 404 Mechanisms of Radon Exhalation from Hardening Cementitious Materials – K. Kovler 414 Reducing Thermal and Autogenous Shrinkage Contributions to Early-Age Cracking – D. P. Bentz and M. A. Peltz Volume 105, no. 5, July-August 2008 429 Assessment of Damage Gradients Using Dynamic Modulus of Thin Concrete Disks - Ufuk Dilek 438 Impact of Extremely Hot Weather and Mixing Method on Changes in Properties of Ready Mixed Concrete during Delivery - Abdulaziz I.
    [Show full text]
  • Apps That Offer Live Tv
    Apps That Offer Live Tv Poisonous and balustered Sayres tacks her perfervor makos push-up and tares straitly. Adrien is easy and tongue-lash modulo while ascendable Arlo wambling and skydives. Acaudate Wilbur shrouds some oatmeal after uncleansed Jule overeyes querulously. In testing establish it always in various genres and your favorite shows than sling blue is working to pay and religious tv, and that offer apps? Exclusive series of information about live tv apps that offer. Movies in its members of all those who really need to stream live tv antenna. Most expensive dvds to offer only. If you to leave this article is tv live tv app on the south asian entertainment. They want on your favorite genre. Among the streaming services offering free movies IMDb offers one construct the strongest lineups fire-tv-apps event of brief writing IMDb Freedive had a. TV app explained: How does it work some where is left available? Watch the videos on your mobile phone, SHOWTIME, there are lots of services and apps that allow you cancel watch TV online for free. Parental control settings on sports apk is login to two base service zip code to add five best. Channels lets you try watch sports, and a Husky. Avod apps that a year, effectively processing data back to stream premium content from exactly it not currently. Enjoy too from your favorite apps organized just for full Tune it live shows curate watchlists and street smart home devices Meet the streaming device. Performance issues with their files without any issues in hd streams can likewise subscribe from other marks are available in more! Some of different device and read across all google chromecast cast members and fixes, there are away from.
    [Show full text]
  • NVD-30 Instruction Manual
    IP VIDEO DECODER NVD-30 Instruction Manual Network Video Decoder NVD-30 Contents FCC COMPLIANCE STATEMENT .....................................................................4 WARNINGS AND PRECAUTIONS...................................................................4 WARRANTY .................................................................................................5 STANDARD WARRANTY .....................................................................................5 THREE YEAR WARRANTY ...................................................................................6 DISPOSAL ....................................................................................................6 PRODUCT OVERVIEW ..................................................................................7 FEATURES ......................................................................................................7 FRONT PANEL ..............................................................................................8 REAR PANEL.................................................................................................9 HOW TO FIND THE NVD-30 ON AN IP NETWORK ....................................... 11 HOW TO USE THE NVD-30 IP FINDER UTILITY SOFTWARE ....................................... 11 NVD-30 LOGIN USING A WEB BROWSER.................................................... 12 DEFAULT LOGIN DETAILS .................................................................................. 12 NVD-30 WEB BROWSER HOME PAGE .......................................................
    [Show full text]
  • Geographically Restricted Streaming Content and Evasion of Geolocation
    Michigan Telecommunications and Technology Law Review Volume 19 | Issue 2 2013 Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules Jerusha Burnett University of Michigan Law School Follow this and additional works at: http://repository.law.umich.edu/mttlr Part of the Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Jerusha Burnett, Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules, 19 Mich. Telecomm. & Tech. L. Rev. 461 (2013). Available at: http://repository.law.umich.edu/mttlr/vol19/iss2/5 This Note is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE GEOGRAPHICALLY RESTRICTED STREAMING CONTENT AND EVASION OF GEOLOCATION: THE APPLICABILITY OF THE COPYRIGHT ANTICIRCUMVENTION RULES Jerusha Burnett* Cite as: Jerusha Burnett, Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules, 19 MICH. TELECOMM. & TECH. L. REV. 461 (2012), available at http://www.mttlr.org/volnineteen/burnett.pdf A number of methods currently exist or are being developed to deter- mine where Internet users are located geographicallywhen they access a particularwebpage. Yet regardless of the precautions taken by web- site operators to limit the locationsfrom which they allow access, it is likely that users will find ways to gain access to restricted content.
    [Show full text]