Technology Policy Program

Technology Policy Program

The Technology Policy Program at the Mercatus Center at George Mason University works within the university setting to improve the state of knowledge and debate about the regulation of the Internet and high technology.

Research

Brent Skorup | Aug 19, 2015
The largest challenge in wireless telecommunications policy is transferring spectrum from inefficient legacy operators such as the federal government to bandwidth-hungry wireless broadband operators. Delay results in annual consumer welfare losses totaling hundreds of billions of dollars. One solution would be to auction overlay licenses to commercial bidders and give spectrum incumbents a clearing deadline.
Anthony D. Glosson | Aug 10, 2015
This paper seeks to synthesize the available legal resources on active defense. It confronts the intertwined definitional, legal, and policy questions implicated in the active defense debate. The paper then proposes a legal framework to authorize active defenses subject to liability for third-party damages, an approach grounded in the technical and economic realities of the network security market.
Robert Krol | Jun 24, 2015
In a new study for the Mercatus Center at George Mason University, economist Robert Krol demonstrates that governments are more likely to set up barriers to new technology when the performance advantage of the new technology is small or incremental and lobbying costs are low. Incumbent businesses threatened by a new technology may use the government to block businesses using the new technology from entering the market. Ultimately, government protection of incumbent businesses reduces consumer well-being.
Eli Dourado, Andrea Castillo | Jun 22, 2015
After briefly outlining the current cybersecurity information sharing proposals, we will examine the performance of the many similar programs that the federal government has operated for years. The government’s inability to properly implement previous information sharing systems even internally, along with its ongoing failures to secure its own information systems, casts doubt on the viability of proposed government-led information sharing initiatives to improve the nation’s cybersecurity. We will then examine the flawed assumptions that underlie information sharing advocacy before exploring solutions that can comprehensively address the nation’s cybersecurity vulnerabilities.
Eli Dourado, Andrea Castillo | Jun 22, 2015
This paper will review the laws and standards governing federal cybersecurity policy and will highlight how overlapping responsibilities and unclear lines of authority have accompanied increasing rates of federal information security failures. The paper will then describe how these systemic cybersecurity weaknesses demonstrate the federal government to be an especially poor candidate for managing national systems, and it will explain the shortcomings of a top-down, technocratic approach.
Adam Thierer, Christopher Koopman, Anne Hobson, Chris Kuiper | May 26, 2015
This paper argues that the sharing economy—through the use of the Internet and real time reputational feedback mechanisms—is providing a solution to the lemons problem that many regulators have spent decades attempting to overcome.

Testimony & Comments

Christopher Koopman, Matthew Mitchell, Adam Thierer | May 26, 2015
The commission should shift enforcement efforts away from stopping private restraint of trade and toward stopping public restraint of trade. In light of George Stigler’s observation that “the state has one basic resource which in pure principle is not shared with even the mightiest of its citizens: the power to coerce,” the commission would be wise to adopt Commissioner Wright’s approach and shift resources toward fighting public restraint of trade.
Eli Dourado, Ryan Hagemann, Adam Thierer | Apr 24, 2015
The FAA must carefully consider the potential effect of UASs on the US economy. If it does not, innovation and technological advancement in the commercial UAS space will find a home elsewhere in the world. Many of the most innovative UAS advances are already happening abroad, not in the United States. If the United States is to be a leader in the development of UAS technologies, the FAA must open the American skies to innovation.
Adam Thierer | Feb 11, 2015
We should remain patient and continue to embrace permissionless innovation to ensure that the Internet of Things thrives and American consumers and companies continue to be global leaders in the digital economy.
Brent Skorup | Jan 22, 2015
The focus of the committee’s white paper on how to “foster” various television distributors, while understandable, was nonetheless misguided. Such an inquiry will likely lead to harmful rules that favor some companies and programmers over others, based on political whims. Congress and the FCC should get out of “fostering” the video distribution markets completely. A light-touch regulatory approach will prevent the damaging effects of lobbying for privilege and will ensure the primacy of consumer choice.
Adam Thierer, Ryan Hagemann | Sep 23, 2014
As part of the FAA Modernization and Reform Act of 2012 (FMRA), Congress ordered the Federal Aviation Administration (FAA) to integrate unmanned aircraft systems (UASs)—sometimes referred to as drones—into the National Airspace System by September 2015. As part of that effort, the FAA is currently accepting comments on its “Interpretation of the Special Rule for Model Aircraft” (Section 336 of the FMRA) and the FAA’s enforcement authority over model aircraft as affirmed by the statute.
Brent Skorup | Sep 15, 2014
Though an effective rallying cry, there is no consensus about what “net neutrality” or the “open Internet” means when it comes to putting rules on paper. Professor Barbara van Schewick has said, “If there is no rule against blocking in a proposal, it’s not a network neutrality proposal.

Speeches & Presentations

E-Mail Newsletter

Charts

Eli Dourado, Andrea Castillo | Aug 10, 2015
This week’s charts use data from three sources: a July 8 Government Accountability Office (GAO) report entitled “Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies,” the Office of Management and Budget’s Federal Information Security Management Act (FISMA) Report to Congress for FY 2014, and the White House’s “Cybersecurity Sprint Results” report from July 2015. The charts display reported federal material information security weakness and degree of compliance with prevailing federal cybersecurity standards in fiscal year (FY) 2014.

Experts

Adam Thierer is a senior research fellow with the Technology Policy Program at the Mercatus Center at George Mason University. He specializes in technology, media, Internet, and free-speech policies, with a particular focus on online safety and digital privacy. His writings have appeared in the Wall Street Journal, the Economist, the Washington Post, the Atlantic, and Forbes, and he has appeared on national television and radio. Thierer is a frequent guest lecturer and has testified numerous times on Capitol Hill.
Eli Dourado is a research fellow at the Mercatus Center at George Mason University and director of its Technology Policy Program. He specializes in Internet governance, intellectual property, cryptocurrency, Internet security, and the economics of technology.
Brent Skorup is a research fellow in the Technology Policy Program at the Mercatus Center at George Mason University. His research topics include wireless policy, new media regulation, antitrust, and telecommunications.
Jerry Ellig is a senior research fellow at the Mercatus Center at George Mason University and a former assistant professor of economics at George Mason University. He specializes in the federal regulatory process, economic regulation, and telecommunications regulation.

Videos

Adam Thierer | June 19, 2015
Adam Thierer discusses online privacy regulation at the Washington Legal Foundation.

Podcasts

Eli Dourado | August 04, 2015
The Cybersecurity Information Sharing Act (CISA) is up for a vote in the Senate this week. Eli Dourado talks about the implications of this cyber threat information sharing legislation on Marketplace

Recent Events

Eli Dourado, | November 14, 2012
Please join the Mercatus Center for a panel discussion on the upcoming World Conference on International Telecommunication (WCIT). Once in a generation, governments from around the world gather to revise the International Telecommunication Regulations, a UN-sponsored treaty that governs international telecom practices.

Books

Tom W. Bell | Apr 29, 2014
Intellectual Privilege reveals copyright as a statutory privilege that threatens our natural and constitutional rights. From this fresh perspective comes fresh solutions to copyright’s problems.
' '