Articles by Jerry Brito

Jerry is a senior research fellow at the Mercatus Center at George Mason University, and director of its Technology Policy Program. He also serves as adjunct professor of law at GMU. His web site is jerrybrito.com.


Marvin Ammori, a fellow at the New American Foundation and author of the new book On Internet Freedom explains his view of how the First Amendment applies the Internet through the lens of constitutional law and real world case studies.

According to Ammori, Internet freedom is a foundational issue for democracy, equivalent to the right to vote or freedom of speech. In fact, he says, the First Amendment can be used as a design principle for how we think about the challenges we face as Internet technology increasingly becomes a part of our lives.

Ammori’s belief in a positive right to speech—that everyone should have access to the most important speech tools in society and be able to speak with and listen to any other speaker without having to seek permission— translates to a belief that Internet should be made available for everybody, without restrictions aside from those placed on offlinet speech.

Ammori goes on to explain why he thinks SOPA threatened to infringe upon free speech while net neutrality protects it, suggesting that allowing ISPs to control bandwidth usage is tantamount to forcing internet users to become passive consumers of information, rather than creators and content-spreaders.

Download

Related Links

Mention the word “drone” to the average American today and the mental image it will conjure is likely to be of a flying robot weapon being wielded by a practically unaccountable executive. That’s why Sen. Rand Paul’s filibuster to draw attention to the administration opaque targeting process was important. I’m afraid, though, that Americans will end up seeing drones only in this negative light. In reality, the thousands of drones that will populate our skies before the end of the decade will be more like this one:

Over at Reason.com today I try to draw the distinction between killbots and TacoCopters, and I make the case we can’t let our legitimate fears of police surveillance and unaccountable assassinations keep us from the benefits of commercial drones.

Requiring that police get a warrant before engaging in surveillance is a no-brainer. But there is a danger that fear of governmental abuse of drones might result in the public demanding—or at least politicians hearing them ask for—precautionary restrictions on personal and commercial uses as well. For example, a bill being considered in New Hampshire would make all aerial photography illegal. And a bill recently introduced in the U.S. House of Representatives would make it a crime to use a private drone to photograph someone “in a manner that is highly offensive to a reasonable person … engaging in a personal or familial activity under circumstances in which the individual had a reasonable expectation of privacy”—a somewhat convoluted standard.

Restrictions on private drones may indeed be necessary some day, as the impending explosion of drone activity will no doubt disrupt our current social patterns. But before deciding on these restrictions, shouldn’t legislators and regulators wait until we have flying around more than a tiny fraction of the thousands of domestic drones the FAA estimates will be active this decade?

If officials don’t wait, they are bound to set the wrong rules since they will have no real data and only their imaginations to go on. It’s quite possible that existing privacy and liability laws will adequately handle most future conflicts. It’s also likely social norms will evolve and adapt to a world replete with robots.

You can read the whole article here.

In our 2011 law review article, Tate Watkins and I warned: “[A] cyber-industrial complex is emerging, much like the military-industrial complex of the Cold War. This complex may serve not only to supply cybersecurity solutions to the federal government, but to drum up demand for those solutions as well.”

In The Hill today, Kevin Bogardus writes under the headline “K St. ready for cybersercurity cash grab”:

The cybersecurity push has drummed up work for influence shops downtown. There have been more than a dozen lobbying registrations for clients that mention “cybersecurity” since Election Day, according to lobbying disclosure records.

Robert Efrus, a long-time Washington hand, is one of many lobbyists working the issue.

“It is a growing niche on K Street,” Efrus said. “I think there are a lot of new players that are seeing action with the executive order and legislation being on worked in Congress, not forgetting the funding opportunities. A lot of tech lobbyists have upped their involvement in cyber for sure.” …

“From a lobbying perspective, with everything else going south, this is one of the few positive developments in the whole federal policy arena,” said Efrus[.] …

Lobbyists note that cybersecurity is one of the few areas where budget-conscious lawmakers are looking to spend.

Cybersecurity is officially government’s growth sector.

Last week, Pandora CEO Tim Westergren was at the Heritage Foundation, “trying to rally the conservative troops,” according to Politico. The company is pushing the Internet Radio Fairness Act, which would let government bureaucrats set the rates for the music it uses one way. Arguing for another (more expensive) way on Wednesday, was RIAA president Cary Sherman who, again according to Politico, was “ranting against the Internet Radio Fairness Act and condemning Pandora for its efforts to change the standard royalty rate.”

Essentially, they are negotiating through Congress; each side wanting to use the government to gore the other’s ox. In a new article at Reason.com, I make the case that the principled free market approach would be to get rid of compulsory licenses and allow the two sides to negotiate with each other. As I point out, this is yet another opportunity for the G.O.P. to take on copyright cronyism:

If a federal policy strips owners of their rights to dispose of their property as they see fit, institutes price-fixing by unelected bureaucrats, and in the process picks an industry’s winners and losers, you’d expect Republicans in Congress to be against it. But when it comes to copyright, all bets are off. …

If Republicans really care about copyright as a property right, they should treat it as property and allow copyright holders to decide to whom they will license their music. That would mean prices negotiated in a free market, not fixed by apparatchiks, and an end to politically determined winners and losers.

Read the whole thing here.

Marc Ambinder has some phenomenal reporting in Foreign Policy today about how the NSA assists companies that are the victims of (usually Chinese) cyberespionage. It is a must read.

One thing we learn: “Cyber-warfare directed against American companies is reducing the gross domestic product by as much as $100 billion per year, according to a recent National Intelligence Estimate.”
That is just slightly more than half a percent of GDP, which puts the scope of the threat in perspective.

The most interesting thing, though, is this:

In the coming weeks, the NSA, working with a Department of Homeland Security joint task force and the FBI, will release to select American telecommunication companies a wealth of information about China’s cyber-espionage program, according to a U.S. intelligence official and two government consultants who work on cyber projects. Included: sophisticated tools that China uses, countermeasures developed by the NSA, and unique signature-detection software that previously had been used only to protect government networks.

Press reports have indicated that the Obama administration plans to give certain companies a list of domain names China is known to use for network exploitation. But the coming effort is of an entirely different scope. These are American state secrets.

Very little that China does escapes the notice of the NSA, and virtually every technique it uses has been tracked and reverse-engineered. For years, and in secret, the NSA has also used the cover of some American companies – with their permission – to poke and prod at the hackers, leading them to respond in ways that reveal patterns and allow the United States to figure out, or “attribute,” the precise origin of attacks. The NSA has even designed creative ways to allow subsequent attacks but prevent them from doing any damage. Watching these provoked exploits in real time lets the agency learn how China works.

Will you look at that? Information sharing between the government and the private sector without liability protection. Even more than information sharing, it seems some businesses are allowing the NSA to monitor their systems.

As I’ve said before, there is nothing preventing the government from sharing information about cyberattacks with the private sector. Legislation isn’t required to allow that. As for businesses sharing information with government, they too are free to do so. The only question is whether they should get a free pass for violating contracts or breaking the law when they share in the name of security. I think that would be a mistake.

As Ambiner points out, “the NSA’s reputation has been tarnished by its participation in warrantless surveillance[.]” People don’t trust the NSA with good reason. Security is important, but so are civil liberties. Removing the possibility of liability would also remove any incentive companies might have to be a check on what information the NSA collects. Ambinder writes that given their experience with the warrantless wiretapping program, today “telecoms are wary of cooperating with the NSA beyond the scope of the law.” That’s as it should be. Do we really want to give companies cover to cooperate with the NSA beyond the scope of the law?

According to Ambinder, the NIE suggests “that the NSA will have to perform deep packet inspection on private networks at some point.” (This is the so-called EINSTEIN 3 system This doesn’t sound like a good idea, but if it is to happen, it should be debated in public. Liability protection might allow businesses to allow the NSA to employ the system in secret.

In a recent blog post Scott Cleland endorses the Administration’s stance that the DMCA should be reformed to accommodate, as he puts it, “pro-competitive exceptions that consumers who have fully paid for the phone and fulfilled their legal and contractual obligations, of course should be able to use it with other carriers.” As he deftly explains,

In a nutshell, if one has honored one’s legal obligations to others, one should be free to unlock their phone/property because they indeed own the lock and the key. However if one has not honored one’s full-payment and legal obligations to others, one may have the phone in one’s possession, but one does not legally own the key to unlocking all the commercial value in the mobile device. Most everyone understands legally and morally that there is a huge difference between legally acquiring the key to unlock something of value and breaking into property without permission. The core cleave of this cellphone issue is just that simple.

I couldn’t have put it better myself. There is a key distinction to be drawn between two very different conceptions of “cellphone unlocking.”

Continue reading →

I just had a very respectful, reasoned, and, most importantly, informative conversation with Derek Khanna and CTIA on Twitter. It helps clarify a lot about the debate over cellphone unlocking, and I thought I’d share it with you after the jump.

The fact is that carriers today offer a [wide range of unlocked devices](http://blog.ctia.org/2013/03/04/unlocked-devices-2/) for sale, so you never have to worry about unlocking or breaking the law. In fact, almost all of the phones Verizon sells are always unlocked. And as far as I can tell, almost all carriers will unlock your phone, once you end your contract, if you just ask. This is all truly great for consumers.

So I don’t understand why carriers should be opposed to an unlocking DMCA exemption. (To be clear, I’m not aware of individual carriers taking positions on the matter, but their trade association did [file](http://www.copyright.gov/1201/2012/comments/Bruce_G._Joseph.pdf) in the most recent proceeding against the exemption.) It would be better if their customers didn’t have to ask for permission before unlocking a phone that happens to be locked—especially since carriers are willing to give that permission. And if unlocking is no big deal as long as you live up to your contractual obligations, I don’t understand why there should be limits on who can do the unlocking. Here is the exchange: Continue reading →

donny-walter

Conservatives and libertarians believe strongly in property rights and contracts. We also believe that businesses should compete on a level playing field without government tipping the scales for anyone. So, it should be clear that the principled position for conservatives and libertarians is to oppose the DMCA anti-circumvention provisions that arguably prohibit cell phone unlocking.

Indeed it’s no surprise that it is conservatives and libertarians—former RSC staffer Derek Khanna and Rep. Jason Chaffetz (R–Utah)—who are leading the charge to reform the laws.

In it’s response to the petition on cell phone unlocking, the White House got it right when it said: “[I]f you have paid for your mobile device, and aren’t bound by a service agreement or other obligation, you should be able to use it on another network.”

Let’s parse that.

Continue reading →

Joe Karaganis, vice president at The American Assembly at Columbia University, discusses the relationship between digital convergence and cultural production in the realm of online piracy.

Karaganis’s work at American Assembly arose from a frustration with the one-sided way in which industry research was framing the discourse around global copyright policy. He shares the results of Copy Culture in the US & Germany, a recent survey he helped conduct that distinguishes between attitudes towards piracy in the two countries. It found that nearly half of adults in the U.S. and Germany participate in a broad, informal “copy culture,” characterized by the copying, sharing, and downloading of music, movies, TV shows, and other digital media. And while citizens support laws against piracy, they don’t support outsized penalties.

Karaganis also discuses the new “six-strike” Copyright Alert System in the U.S., of which he is skeptical. He also talks about the politics of copyright reform and notes that there is a window of opportunity for the Republican Party to take up the issue before demography gives the advantage to the much younger Democratic Party. 

Download

Related Links

Geordi

Yesterday I explained why I’m not too worried about Silicon Valley’s penchant for “solutionism,” which Evgeny Morozov tackles in his new book. Essentially I think that as long as we make decisions about which technologies to adopt via market processes, people will reject those applications that are stupid or bad. Today I want to explore one reason why I’m optimistic that, in the long run, the public will get the technology it wants, despite the perennial squeamishness of some intellectuals.

The problem some thinkers and pundits have with my sanguine let-a-thousand-flowers-bloom approach is that inevitably the public will embrace some technologies that the thinkers don’t like. The result is usually a lot of fretting and hand-wringing by public intellectuals about what the scary new technology will do to our brains or society. Eventually, activists take on the cause and try to use state power to limit the choices the rest of us can make—for our own good, rest assured.

Today it seems that the next technology to get this treatment will be life-logging and personal data mining, as I discussed in my last post. Squarely in the crosshairs right now is Google Glass.

In this CNN op-ed about Glass Andrew Keen waits only seven words before using the adjective “creepy”—the watchword of nervous nellies everywhere. His concern is that those wearing Google Glass will be spying on anyone in their line of sight. Mark Hurst expresses similar concerns in a widely circulated blog post that also frets about what happens when we’re all not just recording but also being recorded.

This time around, though, I think the worrywarts face an uphill battle. That’s because in the case of life-logging and personal data mining, the “creepy” parts of the technologies are one in the same with the technologies themselves. The “creepiness” is not a bug, it’s the feature, and it can’t be severed without destroying the technology.

Continue reading →