555 research outputs found

    Widening the Aperture on Fourth Amendment Interests: A Comment on Orin Kerr\u27s The Fourth Amendment and the Global Internet

    Get PDF
    Physical-world law may not be suitable for cyberspace. For example, the Supreme Court\u27s sufficient connection test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government uses of cyberspace evolve

    Widening the Aperture on Fourth Amendment Interests: A Comment on Orin Kerr\u27s The Fourth Amendment and the Global Internet

    Get PDF
    Physical-world law may not be suitable for cyberspace. For example, the Supreme Court\u27s sufficient connection test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government uses of cyberspace evolve

    Cybersecurity and the Administrative National Security State: Framing the Issues for Federal Legislation

    Get PDF
    In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden\u27s disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity legislation to improve the nation\u27s posture to strategically address cyber issues. This Article proposes that new framework legislation is needed to comprehensively address issues relating to Snowden\u27s disclosures and broader cybersecurity interests

    Book Review. American War in the 1990s

    Get PDF

    Species Invasion Shifts the Importance of Predator Dependence

    Get PDF
    The strength of interference between foraging individuals can influence per capita consumption rates, with important consequences for predator and prey populations and system stability. Here we demonstrate how the replacement of a previously established invader, the predatory crab Carcinus maenas, by the recently invading predatory crab Hemigrapsus sanguineus shifts predation from a species that experiences strong predator interference (strong predator dependence) to one that experiences weak predator interference (weak predator dependence). We demonstrate using field experiments that differences in the strength of predator dependence persist for these species both when they forage on a single focal prey species only (the mussel Mytilus edulis) and when they forage more broadly across the entire prey community. This shift in predator dependence with species replacement may be altering the biomass across trophic levels, consistent with theoretical predictions, as we show that H. sanguineus populations are much larger than C. maenas populations throughout their invaded ranges. Our study highlights that predator dependence may differ among predator species and demonstrates that different predatory impacts of two conspicuous invasive predators may be explained at least in part by different strengths of predator dependence

    Activity patterns of nesting Mexican spotted owls

    Get PDF
    We collected 2,665 hr of behavioral information using video surveillance on 19 Mexican Spotted Owl (Strix occidentalis lucida) pairs between 25 April and 26 July 1996, Prey deliveries per day increased as the nesting season progressed, with an average of 2.68 prey deliveries during incubation, 4.10 items during brooding, and 4.51 items during the nestling phase. The highest delivery rates were concentrated between 1-3 hours before sunrise (02:00-05:00) and 1-3 hours after sunset(18:00-21:00). Trip duration during diurnal hours increased 14 fold from incubation through the nestling phase, compared with a 7.2 fold increase during nocturnal hours. Nest bout duration decreased during both diurnal (36%) and nocturnal hours (76%) across the nesting season. Nest attentiveness decreased as the nesting season progressed, from 97% during the incubation phase to 47% during the nestling phase. Owls attended nests at higher rates during diurnal hours than nocturnal hours across all nesting phases. Activity patterns of Mexican Spotted Owls showed marked cyclical changes in response to ecological factors. Fluctuations in nesting behavior were related to changes in nesting phase and time of day

    Cybersecurity Leadership

    Get PDF
    The presentation, part of the Tobias Leadership Conference, Indianapolis, IN, 1 May 2015, discusses cybersecurity leadership through four interrelated topics: strategy, policy and governance, security practice, and developing cybersecurity leaders

    A strategy to combine pathway-targeted low toxicity drugs in ovarian cancer.

    Get PDF
    Serous Ovarian Cancers (SOC) are frequently resistant to programmed cell death. However, here we describe that these programmed death-resistant cells are nonetheless sensitive to agents that modulate autophagy. Cytotoxicity is not dependent upon apoptosis, necroptosis, or autophagy resolution. A screen of NCBI yielded more than one dozen FDA-approved agents displaying perturbed autophagy in ovarian cancer. The effects were maximized via combinatorial use of the agents that impinged upon distinct points of autophagy regulation. Autophagosome formation correlated with efficacy in vitro and the most cytotoxic two agents gave similar effects to a pentadrug combination that impinged upon five distinct modulators of autophagy. However, in a complex in vivo SOC system, the pentadrug combination outperformed the best two, leaving trace or no disease and with no evidence of systemic toxicity. Targeting the autophagy pathway in a multi-modal fashion might therefore offer a clinical option for treating recalcitrant SOC
    corecore