Cybercrime’s International Challenges

Jane and I are in Cluj-Napoca, Romania, for a conference titled “Crimes, Criminals, and the New Criminal Codes: Assessing the Effectiveness of the Legal Response” at Babes-Bolyai University. Jane is speaking on “Surveillance in a Technological Age: The Case of the NSA,” and I’m giving a talk based on my forthcoming article Ghost in the Network. […]

NZBMatrix Takes the Red Pill

I talked with Lifehacker’s IP guru Adam Dachis about the closure of several Usenet indexing services, including NZBMatrix. NZBMatrix threw in the towel after coming under twin pressures: a flood of DMCA notices related to links pointing to allegedly infringing content, and difficulty navigating the requirements of service providers such as PayPal. It’s the latest […]

Having Solved Piracy, Time for Child Porn!

When I teach Internet Law, I joke that banning child pornography is straightforward since there isn’t a pro-kid porn lobby (unlike, say, banning copyright infringement or adult pornography). I stand corrected: Rick Falvinge, founder of Sweden’s Pirate Party, has taken up the pro-legalization cause. (Interesting choice as a policy focus, but to each their own.) […]

The Obama Administration and Chutzpah

I’ve posted a new essay, titled Chutzpah, to SSRN. It’s forthcoming in the peer-reviewed Journal of National Security Law and Policy. Here’s the abstract: President Barack Obama campaigned on a platform of governmental transparency. This Essay examines how his administration has implemented this commitment in two policy areas: Internet communication, and intellectual property. It finds […]

The Myth of Perfection

As promised, The Myth of Perfection is now available at the Wake Forest Law Review Online.

Censorship at Yale

The first rule of censorship conferences is… do not talk about censorship conferences. Ignoring that, I encourage you to tune in to Yale’s Global Censorship Conference – it is an awesome group of speakers and topics. You can catch the livestream here. For those of you willing to get up on Sunday morning, you can […]

Wired, and Threatened

I have a short op-ed on how technology provides both power and peril for journalists over at JURIST. Here’s the lede: Journalists have never been more empowered, or more threatened. Information technology offers journalists potent tools to gather, report and disseminate information — from satellite phones to pocket video cameras to social networks. Technological advances have […]

Pakistan Scrubs the Net

Pakistan, which has long censored the Internet, has decided to upgrade its cybersieves. And, like all good bureaucracies, the government has put the initiative out for bid. According to the New York Times, Pakistan wants to spend $10 million on a system that can block up to 50 million URLs concurrently, with minimal effect on […]

The Memory Hole

On RocketLawyer’s Legally Easy podcast, I talk with Charley Moore and Eva Arevuo about the EU’s proposed “right to be forgotten” and privacy as censorship. I was inspired by Jeff Rosen and Jane Yakowitz‘s critiques of the approach, which actually appears to be a “right to lie effectively.” If you can disappear unflattering – and […]

Cybersecurity Puzzles

Cybersecurity is in the news: a network intrusion allegedly interfered with railroad signals in the Northwest in December; the Obama administration refused to support the Stop Online Piracy Act due to worries about interfering with DNSSEC; and the GAO concluded that the Department of Homeland Security is making things worse by oversharing. So, I’m fortunate […]