The reading syllabus (pdf; two pages) for Professor Ryan Calo’s (University of Washington) course on law and robotics – an excellent resource for those interested in robotics/drones/AI. Among other things, it includes Professor Calo’s own paper, Robotics and the Lessons of Cyberlaw, 103 California Law Review (forthcoming 2015), and Professor Jack Balkin’s (Yale) The Path of Robotics Law, 5 California Law Review Circuit (forthcoming 2015). Related: What is a Robot, Anyway? – Harvard Business Review
The EU’s Three April 15, 2015 Releases:
• Antitrust: Commission Sends Statement of Objections to Google on Comparison Shopping Service; Opens Separate Formal Investigation on Android;
• Antitrust: Commission Opens Formal Investigation Against Google in Relation to Android Mobile Operating System; and
• Antitrust: Commission Sends Statement of Objections to Google on Comparison Shopping Service (fact sheet).
Google’s Public Response (from the Google Official Blog): Android has Helped Create More Choice and Innovation on Mobile than Ever Before
Google’s Internal Response (memo): Here Is Google’s Internal Response to the Imminent EU Charges (Memo) – Re/Code
Commentators and News Reports:
Europe Challenges Google, Seeing Violations of Its Antitrust Law – New York Times
A Transcontinental Culture War Could Cost Google Billions – The Atlantic
Behind Google’s Europe Woes, American Accents – Reuters; and A Group of Google’s Competitors Wants the US to Slap Google, Too – Business Insider
Google Is Targeted Late by EU in a Market That Shifted Years Ago – Bloomberg Business
Europe’s Digital Chief Vows to Intervene on Technology Abuses – New York Times (March 2015)
Tough Talk From European Commissioner About U.S. Tech Companies – New York Times (February 2015)
Toronto’s Citizen Lab at the Munk School of Global Affairs posits in an online report that, separate and apart from China’s “Great Firewall”, China possesses a “Great Cannon” offensive cyberattack tool which hijacks traffic to (or from) IP addresses, and which can replace unencrypted content as a man-in-the-middle. According to the report:
“The operational deployment of the Great Cannon represents a significant escalation in state-level information control: the normalization of widespread use of an attack tool to enforce censorship by weaponizing users. Specifically, the Cannon manipulates the traffic of bystander’ systems outside China, silently programming their browsers to create a massive DDoS attack. While employed for a highly visible attack in this case, the Great Cannon clearly has the capability for use in a manner similar to the NSA’s QUANTUM system, affording China the opportunity to deliver exploits targeting any foreign computer that communicates with any China-based website not fully utilizing HTTPS.”
Law, Tech and Policy
Why Security Pros Don’t Like Obama’s Proposal for Antihacking Law – Christian Science Monitor’s Passcode
Edward Snowden’s Impact – an assessment by law professor Orin Kerr in The Washington Post
Will Deep Links Ever Truly Be Deep? – The Buzz over Linking Mobile Apps Obscures Links’ True Potential to Create Profound Networks of Knowledge and Share Power More Widely – Scott Rosenberg at Medium’s Backchannel
The GNU Manifesto Turns Thirty – The New Yorker; the text of the GNU Manifesto written by Richard Stallman at the beginning of the GNU Project in March 1985 (including subsequent clarifying footnotes)
16 ideas from Marc Andreessen for a More Dynamic US Economy – Marc Andreessen’s twitter stream @pmarca (excerpted at the American Enterprise Institute’s public policy blog)
4chan’s Overlord Christopher Poole Reveals Why He Walked Away – Rolling Stone
Fifty Great Genre-Bending Books Everyone Should Read – Flavorwire
The 100 Best Books of the Decade So Far – The Oyster Review
The 100 Best Films of the Decade So Far – A.V. Club
Release of the Net Neutrality Order (March 12, 2015):
FCC Webpages Regarding the Release of the Open Internet Order: main page and webpage with links to the Commissioners’ statements and the FCC Order itself (direct link to pdf of the FCC Order – 400 pages)
But will the FCC Order survive court challenges? – On Net Neutrality, Six Ways The FCC’s Public Utility Order Will Lose In Court – Larry Downes in Forbes
Passage of the FCC Proposal (February 26, 2015):
FCC Press Release Regarding Passage of the Net Neutrality Rules.
The FCC Approves Strong Net Neutrality Rules – Washington Post
Why Everyone was Wrong about Net Neutrality – Tim Wu in The New Yorker
It’s Not Really Net Neutrality – Michael Wolff in USA Today
FCC’s Original Proposal (February 4, 2015):
FCC Fact Sheet (four pages) – Chairman Wheeler Proposes New Rules for Protecting the Open Internet
This is How We Will Ensure Net Neutrality – FCC Chairman Tom Wheeler’s OpEd in Wired
The Head of the FCC Just Proposed the Strongest Net Neutrality Rules Ever – The Washington Post
Don’t Call Them ‘Utility’ Rules: The FCC’s Net Neutrality Regime, Explained – ArsTechnica explainer
GOP, Tech Industry Mostly Out of Step Over Net Neutrality Issue – Los Angeles Times
Net Neutrality: President Obama’s Plan for a Free and Open Internet – President Obama Statement (November 2014)
Net Neutrality: A Guide to (and History of) a Contested Idea – The Atlantic (April 2014)
The Problem with Net Neutrality – Law Professor Richard Epstein (January 2014)
Law, Tech and Policy
How the NSA’s Firmware Hacking Works and Why It’s So Unsettling – Kim Zetter in Wired
We Know How You Feel – Computers are Learning to Read Emotion and the Business World Can’t Wait – Raffi Khatchadourian in The New Yorker
The Believers: the Hidden Story behind the Code that Runs Our Lives – The Chronicle of Higher Education
How the Internet May be Shifting Innovation Away From Big Cities – The Washington Post
Crowd-sourced List of European Investors, Angels and Accelerators – via Hacker News, and The Periodic Table of Venture Capital Blogs – CBInsights
Internet of DNA – A Global Network of Millions of Genomes could be Medicine’s Next Great Advance – MIT Technology Review
Burn After Reading – in 1971, William Powell published ‘The Anarchist Cookbook’, a guide to making bombs and drugs at home, and he spent the next four decades fighting to take it out of print – Harper’s
Re/code’s Kara Swisher interviews the President at Stanford University on February 13th (25 minute video).
00:20 Cybersecurity breaches
04:17 U.S. offensive capabilities
06:22 U.S. cybercommand
08:02 Government relationship with Silicon Valley
10:51 Encryption and Backdoors
15:24 Privacy and Data Ownership
18:13 Immigration, STEM, diversity, loss of U.S. tech leadership
23:22 President’s personal tech habits
What President Obama is Getting Wrong about Encryption – The Washington Post
“While most blogs weren’t deathless examples of great writing, there was the opportunity for individualism, and you don’t get that from . . . . a feed of things snipped and reblogged and pinned and shoveled into The Feed. The web turns into bushels of confetti shoveled into a jet engine, and while something does emerge out the other end, it’s usually made impressive by its velocity and volume, not the shape it makes.”
– James Lileks at The Bleat on why he does not include social sharing buttons on his website or cross-post to Facebook
Law, Tech and Policy
How The FAA’s Proposed Drone Rules Will Affect What You Care About – Professor Ryan Calo in Forbes
How the New York Times Works: This is How the Gray Lady Gets Made in 2015 – Popular Mechanics
Background: Russian Researchers Expose Breakthrough U.S. Spying Program – Reuters
Additional Detail: How ‘Omnipotent’ Hackers Tied to NSA Hid for 14 Years and Were Found at Last – ArsTechnica
The Kaspersky Report that started it all: “Equation Group: Questions and Answers” (pdf – 44 pages)
Additional Links: The Equation Group’s Sophisticated Hacking and Exploitation Tools – Bruce Schneier at LawFare:
“This is targeted surveillance. There’s nothing here that implies the NSA is doing this sort of thing to every computer, router, or hard drive. It’s doing it only to networks it wants to monitor . . . On one hand, it’s the sort of thing we want the NSA to do. It’s targeted. It’s exploiting existing vulnerabilities. In the overall scheme of things, this is much less disruptive to Internet security than deliberately inserting vulnerabilities that leave everyone insecure. On the other hand, the NSA’s definition of ‘targeted’ can be pretty broad . . . On the other other hand — can I even have three hands? — I remember a line from my latest book: ‘Today’s top-secret programs become tomorrow’s PhD theses and the next day’s hacker tools.’ . . . We need to figure out how to maintain security in the face of these sorts of attacks, because we’re all going to be subjected to the criminal versions of them in three to five years. That’s the real problem.”
The entire (not-too-lengthy) post by Schneier at LawFare is worth a read.
Surprise: America Already Has a Manhattan Project for Developing Cyber Attacks – Kevin Poulsen in Wired
Point: How to Leak to The Intercept – Micah Lee at The Intercept
Counterpoint: The Intercept’s Invitation to Criminality — and to Intelligence Agencies – Benjamin Wittes at LawFare
Additional Debate: The Intercept, SecureDrop, and Foreign Intelligence Services: A Response – Benjamin Wittes at LawFare
Background: “DeadDrop/StrongBox Security Assessment (August 11, 2013)” (pdf)
Law, Tech and Policy
Will the FCC’s New Net Neutrality Rules Hold Up in Court? – Jacob Kastrenakes in The Verge
The College Art Association (CAA) has released its Code of Best Practices in Fair Use for the Visual Arts (pdf)
Facebook’s March to Global Domination is Trampling over Net Neutrality – Vlad Savov at The Verge; and Millions of Facebook Users Have No Idea They’re Using the Internet – Leo Mirani in Quartz
Suite of Sophisticated Nation-State Attack Tools Found with Connection to Student – Kim Zetter in Wired
The Shape of Things to Come; How an Industrial Designer (Jony Ive) Became Apple’s Greatest Product – Ian Parker in The New Yorker
The Stanford Undergraduate and the Mentor – Emily Bazelon in The New York Times Magazine
“We already know that there are two dominant mobile operating systems out there. But the current situation doesn’t really allow anyone to experiment, not without going through the interests and lenses of the two dominant players — Apple and Google. That’s why we need a third mobile OS to break this duopoly and move us towards a more open environment for anyone to innovate, without permission. Especially as mobile phones have begun to democratize and broaden the reach of technology around the world . . . why shouldn’t we then also democratize the mobile operating system?”
We Need to Break the Mobile Duopoly – We Need a 3rd Mobile OS – Peter Levine at Andreessen Horowitz
Law, Tech and Policy
Obama’s Proposed Changes to the Computer Hacking Statute: A Deep Dive – Orin Kerr at The Washington Post’s Volokh Conspiracy.
Also by Orin Kerr: Would a New Crime of ‘Willful Refusal to Comply with a Decryption Order’ be the Best Answer to the Device Decryption Puzzle? – Washington Post’s Volokh Conspiracy.
Want to Reform the NSA? Give Edward Snowden Immunity – Any Effort that Tries to Rebuild the Well-Behaved Aspects of the System but Ignores the Critical Role of Whistleblowers is Sure to Fail. – Yochai Benkler at The Atlantic.
Are Takedowns in 48 Hours ‘Expeditious’ Enough? The Case of Square Ring v. UStream – Professor Eric Goldman at the Technology & Marketing Law Blog.
Robots are Starting to Break the Law and Nobody Knows What to Do About It – Daniel Rivero at Fusion.
Can Sony Sue Media Outlets Who Publish the Stolen Sony documents? – Eugene Volokh at the Washington Post’s Volokh Conspiracy.
Most Anticipated – the Great 2015 Book Preview – The Millions.
Reading – This Warren Buffet Guy is on to Something and How I Find Things to Read – M.G. Siegler.