Depictions of the Pig Roast: Restricting Violent Speech Without Burning the House – Note by Michael Reynolds

From Volume 82, Number 2 (January 2009)
DOWNLOAD PDF

Pornography dominates the discussion about free speech on the Internet. Congress has twice enacted legislation aimed at preventing minors from getting access to online pornography. Federal and local law enforcement agencies have dramatically increased efforts to combat the spread of child pornography. The Department of Justice has renewed attempts to crack down on obscene material after years of lax enforcement.

Yet the debate about online pornography has overshadowed another disturbing Internet phenomenon. The Internet has facilitated growth in the availability of extremely violent images and videos. A little online searching reveals depictions of torture, of both humans and animals; videos depicting murders and executions, including beheadings by Islamic militants; videos of brutal amateur street fights, some consensual, but many not; videos of minors engaged in schoolyard fights and beatings, some posted to humiliate the victims; and videos of cockfighting. Online retailers have sold videos of dog fights and extremely violent video games, including one in which the player is tasked with making graphic snuff videos and another which allows the player to play fetch with dogs using human heads.


 

82_341

Clearing a Path for Digital Development: Taking Patents in Eminent Domain Through the Adoption of Mandatory Standards – Note by Brian Cook

From Volume 82, Number 1 (November 2008)
DOWNLOAD PDF

Though largely unnoticed by the public, March 1, 2007, marked the transition from traditional analog television to digital broadcast television (“DTV”), a move some have characterized as the most significant change to the television broadcast industry since color replaced black and white. On that date, Federal Communications Commission (“FCC”) regulations went into effect mandating that all televisions sold in the United States contain a digital tuner capable of receiving DTV broadcast signals. If consumers are unaware of the change now, it will not escape their attention on February 17, 2009, when their old analog sets go dark as broadcasters comply with further FCC regulations mandating the cessation of all analog television broadcasts. Ultimately, the government intends to profit by auctioning off the additional frequency spectrum freed up by the more efficient digital use of the broadcast spectrum.


 

82_97

Cyber Crime 2.0: An Argument to Update the United States Criminal Code to Reflect the Changing Nature of Cyber Crime – Note by Charlotte Decker

From Volume 81, Number 5 (July 2008)
DOWNLOAD PDF

In 1945, two engineers at the University of Pennsylvania invented the first general-purpose electronic computing device—the Electronic Numerical Integrator and Computer (“ENIAC”). The ENIAC was capable of 5000 simple calculations a second, yet it took up the space of an entire room, “weighed 30 tons, and contained over 18,000 vacuum tubes, 70,000 resistors, and almost 5 million hand-soldered joints.” This machine cost over $1 million dollars, equivalent to roughly $9 million today. Over the next thirty years integrated circuits shrunk, yielding microprocessors able to perform millions and billions of calculations per second with new storage media able to hold megabits and gigabits of data. As a result, computers became smaller, more advanced, and dramatically less expensive. Still, prior to the late-1980s, these and other computers were “solely the tool[s] of a few highly trained technocrats.” In the mid-1980s, only 8.2 percent of American households contained computers. American public businesses, universities, and research organizations used only 56,000 large “general purpose” computers and 213,000 smaller “business computers”; private businesses used another 570,000 “mini-computers” and 2.4 million desktop computers; and the federal government employed between 250,000 and 500,000 computers.


81_959

Reservoirs of Danger: The Evolution of Public and Private Law at the Dawn of the Information Age – Article by Danielle Keats Citron

From Volume 80, Number 2 (January 2007)
DOWNLOAD PDF

A defining problem of the Information Age is securing computer databases of ultrasensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict-liability standard as undermining economic development, American courts and scholars embraced it once the economy matured and catastrophes such as the Johnstown Flood made those hazards impossible to ignore.

Public choice analysis suggests that a meaningful public law response to insecure databases is as unlikely now as it was in the early Industrial Age. The Industrial Age’s experience can, however, help guide us to an appropriate private law remedy for the new risks and new types of harm of the early Information Age. Just as the Industrial Revolution’s maturation tipped the balance in favor of early tort theorists arguing that America needed, and could afford, a Rylands solution, so too the Information Revolution’s deep roots in American society and many strains of contemporary tort theory support strict liability for bursting cyber-reservoirs of personal data instead of a negligence regime overmatched by fast-changing technology. More broadly, the early Industrial Age offers valuable lessons for addressing other important Information Age problems.


 

80_241

Pacifica is Dead. Long Live Pacifica: Formulating a New Argument Structure to Reserve Government Regulation of Indecent Broadcasts – Note by Joshua B. Gordon

From Volume 79, Number 6 (September 2006)
DOWNLOAD PDF

At 9:00 PM on April 7, 2003, Fox Broadcasting (“Fox”) aired the penultimate episode of Married by America, a reality television show that allowed the public to select potential spouses for its contestants. Six minutes of the episode detailed the remaining two couples’ bachelor and bachelorette parties, during which strippers attempted to “lure participants into sexual activities.” Of the five million people who watched the broadcast, ninety complaints were filed with the Federal Communications Commission (“FCC” or “Commission”), the government agency that regulates television communications. In October 2004, the FCC determined that the six-minute segment contained explicit and patently offensive depictions of sexual activities. It thus determined that the content was indecent and in violation of federal law. For this violation, the FCC penalized both Fox and 169 Fox affiliates by issuing a Notice of Apparent Liability for $1,183,000 in fines. At the time, this was the largest proposed fine, or “forfeiture,” in FCC history.


 

79_1451

Wireless Telecommunications: Spectrum as a Critical Resource – Article by Gerald R. Faulhaber

From Volume 79, Number 3 (March 2006)
DOWNLOAD PDF

Telecommunications services have always been a mix of wireline services, such as wireline telephone, cable television, and Internet access, and wireless services, such as AM/FM radio, broadcast television, and microwave-satellite transmission of electronic signals. Each mode of service has certain properties, both beneficial and detrimental. Wireline has the potential for almost unlimited capacity, such as the use of multigigabit fiber optics, but requires that the service be delivered to a particular location. Wireless frees the customer from being tied to a specific location, allowing service to be rendered wherever the customer is, but suffers from fading or nonexistent connections and possible privacy concerns. The mix between wireline mode and wireless mode is in constant flux; recently, however, the focus of the market has been shifting toward wireless. Cellular telephony has exploded worldwide, and after a slow start, the market penetration has increased dramatically. Meanwhile, the number of wired access lines in the United States has been declining, for the first time since the Great Depression.

The ability of engineers and innovative firms to bring new and compelling wireless telecommunications applications to an ever-communicating market is very impressive, and bodes well for even greater applications in the future. But even the cleverest of engineers cannot escape the one critical resource absolutely required for wireless services to be deployed: electromagnetic spectrum. Wireless services and devices are all radios, emitting electromagnetic radiation into free space and receiving such radiation. If other nearby transmitters are emitting radiation at the same frequency, the intended receivers will be unable to disentangle the signal they wish to receive from the spurious “interfering” signal. Fundamental to wireless technology is the need to solve this potential interference problem. Since the birth of radio in the 1920s, the interference problem has been solved by government licensing of transmission rights; each licensee is permitted to transmit from a particular place at a particular frequency at a maximum power for a particular application (for example, broadcast radio or police dispatch). Licensing has traditionally been a highly bureaucratic and political process. The outcome, all agree, has been a hugely inefficient use of spectrum resulting from this “command and control” regulatory allocation of a scarce resource.


 

79_537

Municipal Wireless Broadband: Hype or Harbinger? – Article by Sharon E. Gillett

From Volume 79, Number 3 (March 2006)
DOWNLOAD PDF

Municipal wireless is an important trend, but not for the reasons implied by much of the popular reporting that surrounds this topic. Cities are unlikely to dominate the roster of wireless broadband operators that directly serve the residential and business public. Municipalities, however, have been significant early adopters of innovative unlicensed wireless broadband technologies, providing both a market toehold to innovative products and services using those technologies, and an experimental testing ground for novel organizational models. Most cases of municipal wireless involve the use of unlicensed wireless broadband to meet the local government’s own needs for ubiquitous broadband services, or to construct public-private partnerships aimed at facilitating broadband wireless services to the business and residential public. These uses express local government interests long recognized as legitimate: provision of efficient city services, local economic development, and equity within the community. Thus, the concern for policymakers should not be whether cities should be involved in wireless broadband; there are legitimate reasons why they should, and why increasing numbers of them will be. Rather, the important public policy concern is how to ensure that, in the process of facilitating the first uses of wireless, city authority does not get subverted to create artificial limits on future broadband wireless competition. Doing so will require thoughtful melding of separate legal frameworks governing access to city property and public rights of way into a coherent policy that guides when exclusivity legitimately can or cannot feature in public-private partnership arrangements for communications services.


 

79_561

On Software Regulation – Article by R. Polk Wagner

From Volume 78, Number 2 (January 2005)
DOWNLOAD PDF

This Article develops a novel analytic framework for the evaluation of regulatory policy in cyberspace, flowing from a reconceptualization of cyberlaw’s central premise: software code as complementary to law rather than its substitute. This approach emphasizes the linkage between law and software; for every quantum of legal-regulatory impact, there is a corresponding equilibrium of regulation-by-software. The absence of a legal right will stimulate a technological response – and such incentives will moderate with increased rights. Rather than “code is law,” this is “code meets law.”

The implications of this methodological shift are explored in the context of the emerging (and intensely controversial) cyberproperty right – defined as the right to exclude others from one’s network resources. The debate over whether, how, and why concepts of property rights can be extended to bits stored on Web servers, e-mail systems, and the like is both deeply intertwined with technology and fundamentally comparative in nature, bringing the importance of understanding the regulatory costs and benefits of software, as compared to law, into sharp relief.

The analysis that emerges suggests that, contrary to much of the relevant scholarly literature (and perhaps counterintuitively), the availability of technological mechanisms to replace legal rights likely strengthens, rather than weakens, the case for legal regulation in the form of property rights. At least in this context, a software-centric regulatory approach is dominated by regimes premised on property-backed contractual relationships.

Considering the regulatory environment of cyberspace from this perspective may have profound effects on the way we think about the form and function of law online. The nature of cyberspace as particularly sensitive to emerging concerns about the tyranny of software suggests that the online environment might be better suited for a broad property rights regime than has been recognized to date.


 

78_457