JTIP Blog: Five New Posts Published

By: Alessandra Fable, Jeanne Boyd, Elisabeth Bruckner, Angela Petkovic, and Shelby Yuan

Volume 20, Issue 3 now available

JTIP Blog: Legal Implications of Digital Economies in Gaming and E-Payments

By: Kathleen Denise Arteficio


By: Rohun Reddy

Volume 20, Issue 2 now available

JTIP Blog: Collecting Student Athlete Biometric Data

By: Anthony Vitucci

JTIP Blog: Facial Recognition Technology in the Commercial Sector

By: Michael Willian

Volume 20, Issue 1 now available

JTIP Blog: Personal Privacy & Biometric Data in the COVID-19 Pandemic

By: Luke Shadley


By: Gilligan, Brendan | April 1, 2023

In 2017, National Security Agency hacking tools were leaked on the Internet. One of these hacking tools relied on a vulnerability in Microsoft software. Its leak caused “the most destructive and costly N.S.A. breach in history.” This hacking tool took out: [the British health care system], Russian railroads and banks, Germany’s railway, French automaker Renault, Indian airlines, four thousand universities in China, Spain’s largest telecom, Telefonica, Hitachi and Nissan in Japan, the Japanese police, a hospital in Taiwan, movie theater chains in South Korea, nearly every gas station run by PetroChina, China’s state owned oil company, and, in the United States, FedEx and small electrical companies across the country. Then, this hacking tool was added to a different cyberweapon, where it caused an additional $10 billion in damage. Some consider this total a “gross underestimate.” The executive branch, through an internal process, had withheld this vulnerability from Microsoft for seven years. According to the executive branch, this Microsoft vulnerability was too valuable to disclose: the hacking tool using the Microsoft vulnerability “netted some of the very best counterterrorism intelligence” the NSA received. But the executive branch lacks the authority to unilaterally decide a vulnerability’s intelligence value outweighs the cost of withholding it. Vulnerabilities like the Microsoft one that the executive branch withheld are known as zero-day vulnerabilities (“zero-days”). This Comment’s thesis is that the executive branch can’t unilaterally withhold these zero-days to conduct offensive cyber operations or surveillance. I demonstrate this thesis in three steps. First, I explain what zero-days are and why they are dangerous. Second, I show the executive branch of the U.S. government unilaterally withholds zero-days. Third, and finally, I explain why the executive branch’s unilateral withholding of zero-days to conduct offensive cyber operations or national security surveillance is unconstitutional.


By: Bhatnagar, Varun | April 1, 2023

Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor from deploying a black-box algorithm that generates unfair outcomes on racial, class, or gendered lines.4 Fortunately, researchers have recognized this issue and developed interpretability frameworks to better understand such black-box algorithms. One of these remedies, the Shapley Additive Explanation (“SHAP”) method, ranks determinative factors that led to the algorithm’s final decision and measures the partial effects of the independent variables that were used in the model.5 Another, the Local Interpretable Model-agnostic Explanations (“LIME”) method, uses a similar method to reverse-engineer the determinative factors harnessed by the algorithm.6 Both the SHAP/LIME methods have the potential to shine light into the most accurate, precise black-box algorithms. These black-box algorithms can harm peoples’ physical being and property interests.7 However, algorithm developers currently hide behind the nominally impenetrable nature of the algorithm to shield themselves from liability. These developers claim that black-box algorithms are the industry standard, due to the increased accuracy and precision that these algorithms typically possess. However, SHAP/LIME can ascertain which factors might be cloud the judgement of the algorithm, and therefore cause harm. As such, SHAP/LIME may lower the foreseeability threshold currently set by tort law and help consumer-rights advocates combat institutions which recklessly foist malevolent algorithms upon the public. Part II will provide an overview of the SHAP/LIME methods, as well as applying it to a tort scenario involving a self-driving car accident. Part III will cover the potential tort claims that may arise out of the self-driving car accident, and how SHAP/LIME would advance each of these claims. SHAP/LIME’s output has not yet been compared to the foreseeability threshold under negligence or product/service liability. There are numerous factors that sway SHAP/LIME both towards and against reaching that threshold. The implications of this are severe—if the foreseeability threshold is not reached, a finder of fact might not find fault with the algorithm generator. Part IV will cover the evidentiary objections that might arise when submitting SHAP/LIME-generated evidence for admission. Reverseengineering an algorithm mirrors crime scene re-creation. Thus, the evidentiary issues involved in recreating crime scenes appear when reverseengineering algorithms.8 Important questions on relevance, authenticity, and accessibility to the algorithm directly affect the viability of submitting evidence derived using either the SHAP or LIME methods.9 Part V will conclude by contextualizing the need for transparency within an increasingly algorithm-driven society. I conclude that tort law’s foreseeability threshold is currently not fit for purpose when it comes to delivering justice to victims of biased black-box algorithms. As for complying with the Federal Rules of Evidence, SHAP/LIME’s admissibility depends on the statistical confidence level of the method’s results. I conclude that SHAP/LIME generally have been properly tested and accepted by the scientific community, so it is probable that statistically relevant SHAP/LIME-generated evidence can be admitted.10


By: Pales, Eli | April 1, 2023

The video game industry is massive, with an annual revenue of $180 billion worldwide; $60 billion of that in America alone. For context, the industry’s size is greater than that of the movie, book, and music industries combined. Yet, despite this market dominance, the video game industry is relatively new. Only in the 2011 decision of Brown v. Entertainment Merchants Association did the Supreme Court extend First Amendment protection to games. Still, the Court failed to define the scope of the game medium. As understood by an average person, a video game could be something as simple as Pac-Man or as complicated as a sophisticated $200 million recreation of the American West. If treated literally, the Supreme Court’s rule in Brown would require lower courts to treat all video games—regardless of their individual characteristics, sophistication, and visuals—as equally protected under the law. Yet lower courts have not been following this Supreme Court decision by its word. Instead, judges have scrutinized how complicated a video game is, whether it has a narrative, if its characters are unique, and other characteristics that should be irrelevant. This Article confronts the ways that lower courts discriminate against video games compared to established mediums and argues that this violates the Supreme Court mandate in Brown. It also provides a context and legal basis for constitutionally protecting video games that the Supreme Court failed to provide in its relatively simplistic decision. Ultimately, I argue that lower courts should take the Brown decision seriously and treat video games like any other protected medium, even if the results at first seem counterintuitive.

Journal of Technology and Intellectual Property Tweets