Eli Dourado

Eli Dourado

  • Research Fellow
  • Director of the Technology Policy Program

Eli Dourado is a research fellow at the Mercatus Center at George Mason University and director of its Technology Policy Program. He specializes in Internet governance, intellectual property, political economy, and the economics of technology. His writing has appeared in The New York Times, The Washington PostForeign PolicyThe GuardianArs Technica, and Wired, among other outlets.

In 2012, Dourado co-created the International Telecommunication Union transparency site WCITLeaks.org and participated in the World Conference on International Telecommunication as a member of the U.S. delegation. Along with WCITLeaks co-creator Jerry Brito, he won an IP3 award from Public Knowledge in 2013 for his contributions on Internet governance.

Dourado is a PhD candidate in economics at George Mason University and received his BA in economics and political science from Furman University.

Follow Eli on Google+

Published Research

Working Papers

Policy Briefs

Testimony & Comments

Expert Commentary

May 15, 2014

One of the proposals being considered today by the Federal Communications Commission for its proposed "net neutrality" rules is whether to reclassify Internet service providers as Title II services subject to common carrier regulation. Below, Mercatus Center research fellow Eli Dourado in a new blog post explains that reclassificaiton could backfire, particularly with ongoing UN efforts to regulate the Internet.
Apr 21, 2014

With Congress debating the Commerce Department’s plans to gradually relinquish its administrative control of the Internet’s domain name system, policymakers and stakeholders from around the world are headed to Brazil’s NetMundial conference to discuss the future of Internet governance.
Dec 02, 2013

Mercatus Center research fellow Eli Dourado comments on the news that Amazon.com is looking into using drones to improve delivery times.
Oct 08, 2013

In the wake of the disclosures about the National Security Agency’s surveillance programs, considerable attention has been focused on the agency’s collaboration with companies like Microsoft, Apple and Google, which according to leaked documents appear to have programmed “back door” encryption weaknesses into popular consumer products and services like Hotmail, iPhones and Android phones.
' '