BLOG POST: Lessons from the China Initiative: The Perils of Pursuing Foreign Policy Through Prosecutions*
*This writing is a Blog Post. It is not a published IPTF Journal Article. Joshua Nacht One week before Jeff Sessions was fired as Attorney General, he announced the November 2018 creation of the Justice Department’s “China Initiative”.[1] The China Initiative emerged to counter myriad economic and national security threats, including intellectual property (IP) theft, forced technology transfer, cyberespionage of trade secrets and national security information, and efforts to obtain and/or penetrate critical military technology.[2] By some estimates, these PRC-linked efforts cost the United States up to $30 billion a year, and have totaled $600 billion cumulatively.[3] Under Attorney General...
Cyberwarfare and the Computer Fraud and Abuse Act
John Thurston As technology proliferates, cyberspace is becoming increasingly polluted with crime targeted at private enterprises. The escalation is the result of ineffective cybercrime laws. Although an international solution may be ideal, no treaty seems imminent. The U.S. government should focus on a more attainable solution in the short-term: amending the Computer Fraud and Abuse Act (CFAA). This Essay considers how revising the CFAA to allow qualified private companies to engage in offensive tactics would alter incentive structures. It concludes that such a revision would be an efficient solution to increase deterrence and reduce cybercrime. Read Full Text Here
The Edge of Ethics in iParadigms
Michael G. Bennett In an attempt to stem a perceived rise in student plagiarism, educational institutions are increasingly turning to anti-plagiarism technologies. The use of these technological means to police student writings has been controversial, socially, politically, and legally. This article discusses the outcome of A.V. et al. v. iParadigms, to date the most important opinion on the legality of such technology’s use. The author examines the case in detail and presents arguments against the technology’s use, on the grounds that such use undermines educational policy by allowing the ethics of teachers to become a by-product of available technological means and...
Not Quite Cryptus Horribilis: 1997’s Developments in the Encryption Debate Have Pushed Sides Further Apart
Adam White Scoville In late 1997, at least six bills or amendments on the use of encryption were either introduced or circulated in draft form. Seven congressional committees considered encryption legislation. A clear trend is emerging from these developments. Law enforcement and national security interests favoring restrictions on encryption are quickly growing further apart from civil liberties groups and computer and telecommunications industry associations favoring liberalization of encryption rules. The rifts have grown wide enough to induce at least one interested group to predict that no satisfactory compromise could imminently be possible and to cease advocating the passage of encryption...