Sean Flaim, an attorney focusing on antitrust, intellectual property, cyberlaw, and privacy, discusses his new paper “Copyright Conspiracy: How the New Copyright Alert System May Violate the Sherman Act,” recently published in the New York University Journal of Intellectual Property and Entertainment Law. Flaim describes content owners early attempts to enforce copyright through lawsuit as a “public relations nightmare” that humanized piracy and created outrage over large fines imposed on casual downloaders.
Susan W. Brenner, associate dean and professor of law at the University of Dayton School of Law, discusses her new paper published in the Minnesota Journal of Law, Science & Technology entitled “Cyber-threats and the Limits of Bureaucratic Control.” Brenner argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats. She explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratic organizations. This is not an effective way of approaching cyber-threat control, she argues.
Scott Shackelford, assistant professor of business law and ethics at Indiana University, and author of the soon-to-be-published book Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace, explains how polycentric governance could be the answer to modern cybersecurity concerns.
Nicolas Christin, Associate Director of the Information Networking Institute at Carnegie Mellon University, discuses the Silk Road anonymous online marketplace. Silk Road is a site where buyers and sellers can exchange goods much like eBay and Craigslist. The difference is that the identity of both the buyers and sellers is anonymous and goods are exchanged for bitcoins rather than traditional currencies.
Parmy Olson, London Bureau chief for Forbes, discusses her new book We are Anonymous: Inside the Hacker World of Lulzsec, Anonymous and the Global Cyber Insurgency. The book is an inside look at the people behind Anonymous, explaining the movement’s origins as a group of online pranksters, and how they developed into the best known hacktivist organization in the world.
Eli Dourado, a research fellow at the Mercatus Center at George Mason University, discusses malware and possible ways to deal with it. Dourado notes several shortcomings of a government response including the fact that the people who create malware come from many different countries some of which would not be compliant with the US or other countries seeking to punish a malware author.
Jim Harper, director of information policy studies at the Cato Institute, and Ryan Radia, associate director of technology studies at the Competitive Enterprise Institute, discuss Congress’s recent interest in cybersecurity. Harper and Radia begin by discussing why Congress wants to legislate cybersecurity and the potential threats that have Congress frightened.