Technology Policy Program

Technology Policy Program

The Technology Policy Program at the Mercatus Center at George Mason University works within the university setting to improve the state of knowledge and debate about the regulation of the Internet and high technology.

Research

Eli Dourado, Christopher Koopman | Dec 10, 2015
We report on new data received from the Internal Revenue Service that sheds light on the changes in independent contracting. Our data support the claim that there has been an increase in nontraditional employment, but the data refute the idea that this increase is caused by the sharing-economy firms that have arisen since 2008. Instead, we view the rise of sharing-economy firms as a response to a stagnant traditional labor sector and a product of the growing independent workforce.
Alexander Salter | Sep 23, 2015
A new paper for the Mercatus Center at George Mason University conducts an economically rigorous analysis of the problems posed by space debris and concludes that the problem is significantly more legally, institutionally, and economically complicated than some may believe.
Brent Skorup | Aug 19, 2015
A new paper for the Mercatus Center at George Mason University shows that auctioning overlay licenses is an effective means of repurposing underused federal spectrum for consumer uses. Overlay licenses have been used to reassign nonfederal spectrum but never federal spectrum. The paper presents new evidence from a 2006 spectrum auction (AWS-1) that suggests billions of dollars of underused federal spectrum could be deployed more quickly than other policy alternatives. Crucially, overlay licenses allow agencies to receive payment for spectrum sales, and this reordering of spectrum rights would benefit taxpayers and wireless broadband users.
Anthony D. Glosson | Aug 10, 2015
This paper seeks to synthesize the available legal resources on active defense. It confronts the intertwined definitional, legal, and policy questions implicated in the active defense debate. The paper then proposes a legal framework to authorize active defenses subject to liability for third-party damages, an approach grounded in the technical and economic realities of the network security market.
Robert Krol | Jun 24, 2015
In a new study for the Mercatus Center at George Mason University, economist Robert Krol demonstrates that governments are more likely to set up barriers to new technology when the performance advantage of the new technology is small or incremental and lobbying costs are low. Incumbent businesses threatened by a new technology may use the government to block businesses using the new technology from entering the market. Ultimately, government protection of incumbent businesses reduces consumer well-being.
Eli Dourado, Andrea Castillo | Jun 22, 2015
After briefly outlining the current cybersecurity information sharing proposals, we will examine the performance of the many similar programs that the federal government has operated for years. The government’s inability to properly implement previous information sharing systems even internally, along with its ongoing failures to secure its own information systems, casts doubt on the viability of proposed government-led information sharing initiatives to improve the nation’s cybersecurity. We will then examine the flawed assumptions that underlie information sharing advocacy before exploring solutions that can comprehensively address the nation’s cybersecurity vulnerabilities.

Testimony & Comments

Eli Dourado | Mar 10, 2016
We are at an exciting point in the history of unmanned aircraft. I think of drones as occupying a similar position now as the Internet did in the late 1980s. As members of this committee know, until 1989, use of the Internet for commercial purposes was generally prohibited. The removal of that prohibition resulted in an explosion of innovation, much of it completely unanticipated, that has persisted until today.
Adam Thierer | Mar 03, 2016
If America hopes to be a global leader in wearable technologies, as it has been for the Internet more generally over the past two decades, then the country first has to get public policy right. America took a commanding lead in the digital economy because, in the mid-1990s, Congress and the Clinton administration crafted a nonpartisan vision for the Internet that protected “permissionless innovation”—the idea that experimentation with new technologies and business models should generally be permitted without prior approval.
Eli Dourado, Samuel Hammond | Jan 15, 2016
The Federal Aviation Administration (FAA) has issued an interim final rule creating a new electronic registration system for unmanned aircraft systems (UAS) and requiring, for the first time, the registration of model aircraft operators. This comment highlights an omission in the agency’s alternative scenario analysis, questions some of the purported benefits of the rule, and points out some of the continuing legal shortcomings associated with the FAA’s approach. While we support the advent of a simple and streamlined registration system, we object to the extension of the registration requirement to model aircraft operators.
Brent Skorup | Dec 21, 2015
Contrary to Title II proponents’ claims, wireless carriers do not infringe free speech rights when they filter text messaging content they believe their customers do not wish to receive. Title II regulation of text messaging and short code service would not protect free speech. In fact, because mobile carriers exercise editorial discretion over mass messages they transmit, regulation would impermissibly chill wireless carriers’ exercise of speech. Further, since wireless carriers transmit short codes and other messaging based on individual arrangements and exercise control over the content of certain messages, messaging does not resemble telecommunications. For these reasons, regulating short code and similar messaging services under Title II of the Communications Act would likely be unconstitutional and contrary to law.
Eli Dourado, Samuel Hammond | Nov 06, 2015
The Department of Transportation (DOT) is proposing to implement a national registration system for small Unmanned Aircraft Systems (UASs), the details of which are to be recom- mended by a task force no later than November 20. The stated aim of the registry is to assist in identifying owners and operators of UASs that violate the law and endanger safety, thereby closing a perceived gap in enforcement. This comment highlights several major procedural concerns, followed by an examination of whether the safety benefits of a registry are likely to outweigh the societal and budgetary costs.
Christopher Koopman, Matthew Mitchell, Adam Thierer | May 26, 2015
The commission should shift enforcement efforts away from stopping private restraint of trade and toward stopping public restraint of trade. In light of George Stigler’s observation that “the state has one basic resource which in pure principle is not shared with even the mightiest of its citizens: the power to coerce,” the commission would be wise to adopt Commissioner Wright’s approach and shift resources toward fighting public restraint of trade.

Speeches & Presentations

n/a

Charts

Eli Dourado, Joseph Kane, Andrea Castillo | Apr 27, 2016
The FBI’s recent conflict with Apple over accessing a locked iPhone in its investigation of the San Bernardino terrorist attack eventually settled out of court when an external party was able to unlock the device. Contrary to the government’s claims that this incident was about just one iPhone, this was far from the first time that law enforcement cited the All Writs Act of 1789 (AWA) to compel private companies to compromise secure devices. This week’s chart shows that law enforcement agencies have attempted to apply this law numerous times in recent years for a range of criminal offenses, particularly drug-related crimes.

Experts

Adam Thierer is a senior research fellow with the Technology Policy Program at the Mercatus Center at George Mason University. He specializes in technology, media, Internet, and free-speech policies, with a particular focus on online safety and digital privacy. His writings have appeared in the Wall Street Journal, the Economist, the Washington Post, the Atlantic, and Forbes, and he has appeared on national television and radio. Thierer is a frequent guest lecturer and has testified numerous times on Capitol Hill.
Eli Dourado is a research fellow at the Mercatus Center at George Mason University and director of its Technology Policy Program. He specializes in Internet governance, intellectual property, cryptocurrency, Internet security, and the economics of technology.
Brent Skorup is a research fellow in the Technology Policy Program at the Mercatus Center at George Mason University. His research topics include wireless policy, new media regulation, competition, and telecommunications.
Jerry Ellig is a senior research fellow at the Mercatus Center at George Mason University and a former assistant professor of economics at George Mason University. He specializes in the federal regulatory process, economic regulation, and telecommunications regulation.

Videos

Adam Thierer | April 19, 2016
Adam Thierer, senior research fellow at the Mercatus Center at George Mason University, discusses these questions and the ideas in the expanded edition of his book, Permissionless Innovation.

Podcasts

Eli Dourado | February 01, 2016
Eli Dourado discusses the rise off the 1099 workforce and its relation to the gig economy on KPCC radio (CA)

Recent Events

Adam Thierer | March 31, 2016
Join Adam Thierer, senior research fellow at the Mercatus Center at George Mason University, for a discussion of the expanded edition of his book, Permissionless Innovation.

Books

Adam Thierer | Mar 15, 2016
In this book, Adam Thierer argues that if the former disposition, “the precautionary principle,” trumps the latter, “permissionless innovation,” the result will be fewer services, lower-quality goods, higher prices, diminished economic growth, and a decline in the overall standard of living.
' '