Cybersecurity is a conundrum. Despite a decade of sustained attention from scholars, legislators, military officials, popular media, and successive presidential administrations, little, if any, progress has been made in augmenting Internet security. Current scholarship on cybersecurity is bound to ill-fitting doctrinal models; it addresses cybersecurity based upon identification of actors and intent, arguing that inherent defects in the Internet’s architecture must be remedied to enable attribution. These proposals, if adopted, would badly damage the Internet’s generative capacity for innovation. Drawing upon scholarship in economics, animal behavior, and mathematics, the Article takes a radical new path, offering a theoretical model oriented around information, in distinction to the near-obsession with technical infrastructure demonstrated by other models. It posits a regulatory focus on access and alteration of data, and on guaranteeing its integrity. Counterintuitively, it suggests that creating inefficient storage and connectivity best protects user capabilities to access and alter information, but this necessitates difficult tradeoffs with preventing unauthorized interaction with data. The Article outlines how to implement inefficient information storage and connectivity through legislation. Lastly, it describes the stakes in cybersecurity debates: adopting current scholarly approaches jeopardizes not only the Internet’s generative architecture, but also key normative commitments to free expression on-line.
Volume 96 - No. 2
- Note: Big Enough To Matter: Whether Statistical Significance or Practical Significance Should Be the Test for Title VII Disparate Impact Claims
- Note: Of Mosquitoes, Adolescents, and Reproductive Rights: Public Health and Reproductive Risks in a Genomic Age
- Note: Payments on Debt After Discharge: When a Discharge Is Not Really a Discharge and the Limits of Taxpayer Recourse
- Inherent National Sovereignty Constitutionalism: An Original Understanding of the U.S. Constitution
- Reproduction Reconceived
© 2011-2016 Minnesota Law Review. All Rights Reserved.