Articles by Jerry Brito

Jerry is a senior research fellow at the Mercatus Center at George Mason University, and director of its Technology Policy Program. He also serves as adjunct professor of law at GMU. His web site is jerrybrito.com.


Nicolas Christin, Associate Director of the Information Networking Institute at Carnegie Mellon University, discuses the Silk Road anonymous online marketplace. Silk Road is a site where buyers and sellers can exchange goods much like eBay and Craigslist. The difference is that the identity of both the buyers and sellers is anonymous and goods are exchanged for bitcoins rather than traditional currencies. The site has developed a reputation of being a popular online portal for buying and selling drugs because of this anonymity, which has caused some politicians to call for the site to be investigated and closed by law enforcement. Despite all of this, the Silk Road remains a very stable marketplace with a very good track record of consumer satisfaction. Christin conducted an extensive empirical study of the site, which he discusses.


Download

Fred Campbell, director of the Competitive Enterprise Institute’s Communications Liberty and Innovation Project and adjunct professor of Law at the University of Nebraska, discusses the deployment of broadband in the United States. ISPs such as Verizon and AT&T; have had difficulty rolling out their fiber networks due to regulatory barriers that are legacies from past technological eras, says Campbell. The natural contrast to the difficulties of these companies is the recent entrance of Google into the broadband market with its own fiber network service in Kansas City. Rather than going to municipalities and asking for the right to install their network, Google turned the tables by holding a contest for their service and selecting the most accommodating city. Campbell talks about pros and cons to these and various other strategies to deploy broadband, including as open access.

embed type=”application/x-shockwave-flash” wmode=”transparent” src=”http://www.google.com/reader/ui/3523697345-audio-player.swf?audioUrl=http://surprisinglyfree.com/wp-content/uploads/SFC-124-120714.mp3″height=”27″ width=”320″>
Download

Related Links

Donald P. Harris, associate professor of law at Temple University discusses the regulation of file sharing. Harris explains that Alcohol Prohibition of the 1920s and 1930s as an historical example of laws that were inconsistent with the vast majority of society’s morals and norms. Looking back, one can see many similarities between the Alcohol and Filesharing Prohibitions. Harris suggests, then, that lessons learned from the failed “noble experiment” of Alcohol Prohibition should be applied to the current filesharing controversy. Doing so, he advocates legalizing certain noncommercial filesharing. A scheme along those lines would better comport with societal norms, he argues, and would force new business models to replace outdated and ineffective business models.


Download

Related Links

Stefan Krappitz, writer of the book Troll Culture: A Comprehensive Guide, discusses the phenomenon of internet trolling. For Krappitz trolling is disrupting people for personal amusement. Trolling is largely a positive phenomenon argues Krappitz. While it can become very negative in some cases, for the most part trolling is simply an amusing practice that is no different than playing practical jokes. Krappitz believes that trolling has been around since before the age of the internet. He notes that the behavior of Socrates is reminiscent of trolling because he pretended to be a student and then used his questioning to mock people who did not know what they were talking about. Krappitz also discusses anonymity and how it contributes and takes away from trolling as well as discussing where the line is between good trolling and cyber-bullying.


Download

Related Links

I’m working on a project looking at libertarian views on copyright (more on that soon), and I’d like to solicit your feedback on an analogy I’m developing. I’ve set up [a comment thread at Google+](https://plus.google.com/u/0/117169003326996777677/posts/TjzX6ZHLTK6) and I’d sincerely appreciate your thoughts on this post. Email feedback is also appreciated. Here goes…

Libertarians, conservatives and other supporters of a free market tend to be critical of government programs that subsidize particular industries. For example, the loan guarantees that allowed Solyndra to set up shop. We don’t like them because they distort the market and tend to lead to rent-seeking, if not corruption.

Why do we have loan guarantees for renewable energy projects like Solyndra’s solar power technology? Quite simply it’s because we’d like to see more renewable energy technology developed; more than is profitable to develop right now. So, the government offers a subsidy to incentivize the creation of such technology, which will eventually benefit the public at large. So far so good, but there are problems with this kind of [government privilege](http://mercatus.org/publication/pathology-privilege-economic-consequences-government-favoritism).

First, there is a [knowledge problem](http://en.wikipedia.org/wiki/Local_knowledge_problem). How do we know that we’re not already getting the right amount of investment in renewable technologies? Without a government subsidy, there would still be investment in renewable energy technologies. We just think it’s not enough. But even putting aside how we can know that, the other question is, how much investment is optimal? Without a market process to guide investment, we don’t know how much is enough. So when the government offers subsidies, it’s guessing. It’s likely offering too little or too much, with each error introducing its own inefficiencies. Continue reading →

Parmy Olson, London Bureau chief for Forbes, discusses her new book We are Anonymous: Inside the Hacker World of Lulzsec, Anonymous and the Global Cyber Insurgency. The book is an inside look at the people behind Anonymous, explaining the movement’s origins as a group of online pranksters, and how they developed into the best known hacktivist organization in the world. Olson discusses the tension that has existed between those that would rather just engage in pranks and those that want to use Annoymous to protest different groups they see as trying to clamp down on internet freedom, as well as some of the group’s most famous campaigns like the attacks against the Church of Scientology and the campaign against Paypal and Mastercard. Olson also describes the development of LulzSec which became famous for a series of attacks in 2011 on high profile websites including Fox, PBS, Sony, and the CIA.


Download

Christopher Sprigman, professor of law at the University of Virginia discusses his upcoming book the Knockoff Economy: How Imitation sparks Innovation co authored with Kal Raustiala. The book is an accessible look at how industries that do not have heavily enforced copyright law, such as the fashion and culinary industries, are still thriving and innovative. Sprigman explains how copyright was not able to be litigated heavily in these cases and what the results could teach us about what other industries that do have extensive copyright enforcement, such as the music and movie industries, could look like without it.


Download

Eli Dourado, a research fellow at the Mercatus Center at George Mason University, discusses malware and possible ways to deal with it. Dourado notes several shortcomings of a government response including the fact that the people who create malware come from many different countries some of which would not be compliant with the US or other countries seeking to punish a malware author. Introducing indirect liability for ISPs whose users spread malware, as some suggest, is not necessary, according to Dourado. Service providers have already developed informal institutions on the Internet to deal with the problem. These real informal systems are more efficient than a hypothetical liability regime, Dourado argues.


Download

Related Links

Tyler Cowen [asks on his blog today](http://marginalrevolution.com/marginalrevolution/2012/06/today-is-probably-a-funny-blogging-day.html):

>By the way, didn’t it just [come out in](http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html) *The Washington Post* that the United States helped attack Iran with Flame, Stuxnet and related programs? If they did this to us, wouldn’t we consider it an act of war? Didn’t we just take a major step toward militarizing the internet? Doesn’t it seem plausible to you that the cyber-assault is not yet over and thus we face immediate questions looking forward? Won’t somebody fairly soon try to do it to us? Won’t it encourage substitution into more dangerous biological weapons?

Those are good questions. Let’s take them in turn.

**If they did it to us, would we consider it an act of war?** I tend to agree with [Franz-Stefan Gady’s perspective](http://www.huffingtonpost.com/franzstefan-gady/the-cyberwar-hoax_b_1549927.html) that Stuxnet should not be considered an act of war. One of the most overlooked aspects of the great reporting done by the NYT and WaPo uncovering the details of Stuxnet is that the U.S. did not “hack in” to Iran’s nuclear facilities from thousands of miles away. Instead it [had to rely on Israel’s](http://jerrybrito.org/post/24193112996/nyt-reveals-the-backstory-on-stuxnet) extensive intelligence apparatus to not only understand the target, but to deliver the worm as well. That is, humans had to physically infiltrate Iran’s operations to engage in the spying and then the sabotage.

Espionage [is not an act of war](http://legal-dictionary.thefreedictionary.com/espionage) under international law. Nations expect and tolerate espionage as an inevitable political practice. Spies are sometimes prosecuted criminally when caught, sometimes traded for other spies, and often simply expelled from the country. Sabotage I’m less certain about, but I think it inhabits a similar space as espionage: frowned up, prosecuted criminally, but not an act of war *per se*. (I’ve been trying to find the answer to that question in vein, so if any international law experts would like to send me the answer, I’d appreciate it.)

So what do we have with Flame? It’s essentially spying, albeit in a frighteningly efficient manner. But, it’s not act of war. Stuxnet is similarly not an act of war if we assume sabotage is not. There’s little difference between Stuxnet and a spy infiltrating Natanz and throwing a wrench into the works. Stuxnet is just the wrench. Now, it’s key to point out what makes Stuxnet political sabotage and not terrorism, and that is that there were no deaths, much less civilian deaths.

**Did we take a big step in militarizing the Internet? Won’t somebody fairly soon try to do it to us?** Well, it’s already happening and it’s been happening for years. U.S. government networks are very often the subject of espionage–and maybe even sabotage–by foreign states. If something feels new about Stuxnet, it’s that for the first time we have definitive attribution to a state. As a result, the U.S. loses moral high ground when it comes to cybersecurity, and if someone doing it to the U.S. gets caught, they will be able to say, “You started it.” But they’re already doing it. Not that it’s necessarily a good thing, but the militarization of cyberspace is not just inevitable, it’s been [well underway](http://en.wikipedia.org/wiki/United_States_Cyber_Command) for some time.

Finally, Tyler asks, **Won’t it encourage substitution into more dangerous biological weapons?** The answer to that, I think, is a definitive no. “Cyber weapons” arecompletely different from biological weapons and even chemical or conventional, and certainly nuclear. For one thing, they are [nowhere near](http://jerrybrito.org/post/23994462855/the-united-states-is-more-secure-than-washington-wants) [as dangerous](http://jerrybrito.org/post/23994472311/how-scary-was-the-white-houses-cyber-simulation-for). No one has ever died from a cyber attack. Again, short of already being in a shooting war, these capabilities won’t be employed beyond espionage and surgical sabotage like Stuxnet.

That raises the question, however, if we’re in a shooting war with a Lybia or a Syria, say, will they resort to cyber? Perhaps, but as Thomas Rid has pointed out, the more destructive a “cyber weapon” the more [difficult and costly](http://jerrybrito.org/post/23994467276/why-anonymous-will-never-be-able-to-take-down-the-power) it is to employ. Massively so. This is why it’s probably only the U.S. at this point who has the capability to pull off an operation as difficult as Stuxnet, and then only with the assistance of Israel’s existing traditional intelligence operation. Neither al Qaeda, nor Anonymous, nor even Iran will be able to carry out an operation on the same level as Stuxnet any time soon.

So, Tyler, you can sleep well. For now at least. ;o) Yes, we should have a national discussion about what sorts of weapons we want our government employing, and what sort of authorization and oversight should be required, but we should not panic or think we’re a few keystrokes away from Armageddon. The more important question to me is, [why does one keeps $2.85 million in bitcoin?](http://jerrybrito.org/post/25726774959/someone-is-holding-2-85-million-in-bitcoins)

When it comes to the UN exerting greater control over Internet governance, all of us who follow Internet policy in the U.S. seem to be on the same page: keep the Internet free of UN control. Many folks have remarked how rare this moment of agreement among all sides–right, left, and center–can be. And Congress seized that moment yesterday, [unanimously approving](http://techdailydose.nationaljournal.com/2012/06/house-committee-votes-to-preve.php) a bi-partisan resolution calling on the Secretary of State to “to promote a global Internet free from government control[.]”

However, below the surface of this “Kumbaya moment,” astute observers will have noticed quite a bit of eye-rolling. Adam Thierer and I wrote [a piece](http://www.theatlantic.com/technology/archive/2012/06/a-note-to-congress-the-united-nations-isnt-a-serious-threat-to-internet-freedom-151-but-you-are/258709/) for *The Atlantic* pointing out the obvious fact that when a unanimous Congress votes “to promote a global Internet free from government control,” they are being hypocrites. That’s a pretty uncontroversial statement, as far as I can tell, but of course no one likes a skunk at the garden party. Continue reading →