Robotics Law and Policy

The reading syllabus (pdf; two pages) for Professor Ryan Calo’s (University of Washington) course on law and robotics – an excellent resource for those interested in robotics/drones/AI. Among other things, it includes Professor Calo’s own paper, Robotics and the Lessons of Cyberlaw, 103 California Law Review (forthcoming 2015), and Professor Jack Balkin’s (Yale) The Path of Robotics Law, 5 California Law Review Circuit (forthcoming 2015). Related: What is a Robot, Anyway? – Harvard Business Review

EU v. Google (link roundup)

04/15/2015: 

China’s Great Cannon

Toronto’s Citizen Lab at the Munk School of Global Affairs posits in an online report that, separate and apart from China’s “Great Firewall”, China possesses a “Great Cannon” offensive cyberattack tool which hijacks traffic to (or from) IP addresses, and which can replace unencrypted content as a man-in-the-middle. According to the report:

“The operational deployment of the Great Cannon represents a significant escalation in state-level information control: the normalization of widespread use of an attack tool to enforce censorship by weaponizing users. Specifically, the Cannon manipulates the traffic of bystander’ systems outside China, silently programming their browsers to create a massive DDoS attack. While employed for a highly visible attack in this case, the Great Cannon clearly has the capability for use in a manner similar to the NSA’s QUANTUM system, affording China the opportunity to deliver exploits targeting any foreign computer that communicates with any China-based website not fully utilizing HTTPS.”

04/10/2015: 

Recommended:

Law, Tech and Policy

Why Security Pros Don’t Like Obama’s Proposal for Antihacking Law – Christian Science Monitor’s Passcode

Edward Snowden’s Impact – an assessment by law professor Orin Kerr in The Washington Post

U.S. Secretly Tracked Billions of Calls for Decades – USA Today

How the Computer Got Its Revenge on the Soviet Union; Condemned as a Capitalist Tool, the Computer Would Help Expose the USSR’s Weakness – Nautilus

Internet Privacy, Funded by Spooks: A Brief History of the Broadcasting Board of Governors (BBG) – Pando Daily

The Anti-Information Age; How Governments are Reinventing Censorship in the 21st Century – The Atlantic

Will Deep Links Ever Truly Be Deep? – The Buzz over Linking Mobile Apps Obscures Links’ True Potential to Create Profound Networks of Knowledge and Share Power More Widely – Scott Rosenberg at Medium’s Backchannel

The GNU Manifesto Turns Thirty – The New Yorker; the text of the GNU Manifesto written by Richard Stallman at the beginning of the GNU Project in March 1985 (including subsequent clarifying footnotes)

No, Entrepreneurs, Most of You Don’t Need Angel Investors or Venture Capitalists – Washington Post

16 ideas from Marc Andreessen for a More Dynamic US Economy – Marc Andreessen’s twitter stream @pmarca (excerpted at the American Enterprise Institute’s public policy blog)

4chan’s Overlord Christopher Poole Reveals Why He Walked Away – Rolling Stone

General Interest

Fifty Great Genre-Bending Books Everyone Should Read – Flavorwire

The 100 Best Books of the Decade So Far – The Oyster Review

The 100 Best Films of the Decade So Far – A.V. Club

04/8/2015: 

FCC’s Net Neutrality Proposal (link roundup; updated to reflect release of the FCC Order)

Release of the Net Neutrality Order (March 12, 2015):

FCC Webpages Regarding the Release of the Open Internet Order: main page and webpage with links to the Commissioners’ statements and the FCC Order itself (direct link to pdf of the FCC Order – 400 pages)

But will the FCC Order survive court challenges? – On Net Neutrality, Six Ways The FCC’s Public Utility Order Will Lose In Court – Larry Downes in Forbes

Passage of the FCC Proposal (February 26, 2015):

FCC Press Release Regarding Passage of the Net Neutrality Rules.

The FCC Approves Strong Net Neutrality Rules – Washington Post

Why Everyone was Wrong about Net Neutrality – Tim Wu in The New Yorker

It’s Not Really Net Neutrality – Michael Wolff in USA Today

The FCC’s Net Neutrality Rules: Five Things You Need to Know – PCWorld

FCC’s Original Proposal (February 4, 2015):

FCC Fact Sheet (four pages) – Chairman Wheeler Proposes New Rules for Protecting the Open Internet

This is How We Will Ensure Net Neutrality – FCC Chairman Tom Wheeler’s OpEd in Wired

The Head of the FCC Just Proposed the Strongest Net Neutrality Rules Ever – The Washington Post

Don’t Call Them ‘Utility’ Rules: The FCC’s Net Neutrality Regime, Explained – ArsTechnica explainer

AT&T Previews Lawsuit it Plans to File Against FCC Over Net Neutrality – ArsTechnica

GOP, Tech Industry Mostly Out of Step Over Net Neutrality Issue – Los Angeles Times

Background:

Net Neutrality: President Obama’s Plan for a Free and Open Internet – President Obama Statement (November 2014)

Net Neutrality: A Guide to (and History of) a Contested Idea – The Atlantic (April 2014)

The Problem with Net Neutrality – Law Professor Richard Epstein (January 2014)

03/12/2015: 

Recommended:

03/1/2015: 

President Obama on Surveillance, Cybersecurity and Related Matters


Re/code’s Kara Swisher interviews the President at Stanford University on February 13th (25 minute video).

00:20    Cybersecurity breaches
04:17    U.S. offensive capabilities
06:22    U.S. cybercommand
08:02    Government relationship with Silicon Valley
10:51    Encryption and Backdoors
15:24    Privacy and Data Ownership
18:13    Immigration, STEM, diversity, loss of U.S. tech leadership
23:22    President’s personal tech habits

But:

President Obama’s Cyber Pitch Misses Mark in Silicon Valley – The Hill

What President Obama is Getting Wrong about Encryption – The Washington Post

Quote of the Day:

“While most blogs weren’t deathless examples of great writing, there was the opportunity for individualism, and you don’t get that from . . . . a feed of things snipped and reblogged and pinned and shoveled into The Feed. The web turns into bushels of confetti shoveled into a jet engine, and while something does emerge out the other end, it’s usually made impressive by its velocity and volume, not the shape it makes.”

– James Lileks at The Bleat on why he does not include social sharing buttons on his website or cross-post to Facebook

02/22/2015: 

Recommended:

02/20/2015: 

Equation Group (link roundup)

Background: Russian Researchers Expose Breakthrough U.S. Spying Program – Reuters

Additional Detail: How ‘Omnipotent’ Hackers Tied to NSA Hid for 14 Years and Were Found at Last – ArsTechnica

The Kaspersky Report that started it all: “Equation Group: Questions and Answers” (pdf – 44 pages)

Additional Links: The Equation Group’s Sophisticated Hacking and Exploitation Tools – Bruce Schneier at LawFare:

“This is targeted surveillance. There’s nothing here that implies the NSA is doing this sort of thing to every computer, router, or hard drive. It’s doing it only to networks it wants to monitor . . . On one hand, it’s the sort of thing we want the NSA to do. It’s targeted. It’s exploiting existing vulnerabilities. In the overall scheme of things, this is much less disruptive to Internet security than deliberately inserting vulnerabilities that leave everyone insecure. On the other hand, the NSA’s definition of ‘targeted’ can be pretty broad . . . On the other other hand — can I even have three hands? — I remember a line from my latest book: ‘Today’s top-secret programs become tomorrow’s PhD theses and the next day’s hacker tools.’ . . . We need to figure out how to maintain security in the face of these sorts of attacks, because we’re all going to be subjected to the criminal versions of them in three to five years. That’s the real problem.”

The entire (not-too-lengthy) post by Schneier at LawFare is worth a read.

Surprise: America Already Has a Manhattan Project for Developing Cyber Attacks – Kevin Poulsen in Wired

02/19/2015: 

How Secure are SecureDrop and Similar Services – in Design and in Use?

Point: How to Leak to The Intercept – Micah Lee at The Intercept

Counterpoint: The Intercept’s Invitation to Criminality — and to Intelligence Agencies – Benjamin Wittes at LawFare

Additional Debate: The Intercept, SecureDrop, and Foreign Intelligence Services: A Response – Benjamin Wittes at LawFare

Background: “DeadDrop/StrongBox Security Assessment (August 11, 2013)” (pdf)

02/19/2015: 

Recommended:

02/17/2015: 

Android, iOS and ?

“We already know that there are two dominant mobile operating systems out there. But the current situation doesn’t really allow anyone to experiment, not without going through the interests and lenses of the two dominant players — Apple and Google. That’s why we need a third mobile OS to break this duopoly and move us towards a more open environment for anyone to innovate, without permission. Especially as mobile phones have begun to democratize and broaden the reach of technology around the world . . . why shouldn’t we then also democratize the mobile operating system?”

We Need to Break the Mobile Duopoly – We Need a 3rd Mobile OS – Peter Levine at Andreessen Horowitz

02/10/2015: 

Recommended:

02/4/2015: