ArticlePDF Available

The Fourth Quadrant

Authors:

Abstract

Jonathan Zittrain, The Fourth Quadrant, 78 Fordham Law Review 2767 (2010).
A preview of the PDF is not available
... In fact, much of the environment's resilience can be credited to loose affiliations of unchartered and even unpaid experts working together to forestall attacks or to minimize the potential for damage from them (Zittrain 2009). Thinking through ways to reinforce these natural defenses may be better over the long run than attempting to literally send in digital Marines (Zittrain 2010). ...
Article
The architecture and offerings of the Internet developed without much steering by governments, much less operations by militaries. That made talk of “cyberwar” exaggerated, except in very limited instances. Today that is no longer true: States and their militaries see the value not only of controlling networks for surveillance or to deny access to adversaries, but also of subtle propaganda campaigns launched through a small number of wildly popular worldwide platforms such as Facebook and Twitter. This form of hybrid conflict – launched by states without state insignia, on privately built and publicly used services – offers a genuine challenge to those who steward the network and the private companies whose platforms are targeted. While interventions by one state may be tempered by defense by another state, there remain novel problems to solve when what users see and learn online is framed as organic and user-generated but in fact it is not.
Article
We developed a mathematical model of a cows-to-consumers supply chain associated with a single milk-processing facility that is the victim of a deliberate release of botulinum toxin. Because centralized storage and processing lead to substantial dilution of the toxin, a minimum amount of toxin is required for the release to do damage. Irreducible uncertainties regarding the dose–response curve prevent us from quantifying the minimum effective release. However, if terrorists can obtain enough toxin, and this may well be possible, then rapid distribution and consumption result in several hundred thousand poisoned individuals if detection from early symptomatics is not timely. Timely and specific in-process testing has the potential to eliminate the threat of this scenario at a cost of <1 cent per gallon and should be pursued aggressively. Investigation of improving the toxin inactivation rate of heat pasteurization without sacrificing taste or nutrition is warranted. • bioterrorism • mathematical modeling
A Library as Big as the World, BUSINESSWEEK
  • See Heather Green
See Heather Green, A Library as Big as the World, BUSINESSWEEK, Feb. 28, 2002, http://www.businessweek.com/technology/content/feb2002/tc20020228_1080.htm.
Welcome-to-Google-the-new-capital-of-Kansas) (describing Topeka's effort to entice Google to select Topeka as the test market for its ultra-high-speed broadband by renaming the city " Google " for a month). 5. For a general overview of the development and governance of the Internet
  • E G See
See, e.g., Posting of Matthew Shaer to Horizons, http://www.csmonitor.com/ Innovation/Horizons/2010/0302/Welcome-to-Google-the-new-capital-of-Kansas (Mar. 2, 2010) (describing Topeka's effort to entice Google to select Topeka as the test market for its ultra-high-speed broadband by renaming the city " Google " for a month). 5. For a general overview of the development and governance of the Internet, see DAVID G. POST, IN SEARCH OF JEFFERSON'S MOOSE: NOTES ON THE STATE OF CYBERSPACE (2009).
[German Interior Minister Otto Schily] suggested that the German government itself might engage in denial-of-service attacks—in effect, hacking—to shut down some sites based in the United States
  • Steve Kettmann
  • Nebraska Neo-Nazi Irks German Pol
  • Wired
Steve Kettmann, Nebraska Neo-Nazi Irks German Pol, WIRED, Jan. 10, 2002, http://www.wired.com/politics/law/news/2002/01/49566 ( " [German Interior Minister Otto Schily] suggested that the German government itself might engage in denial-of-service attacks—in effect, hacking—to shut down some sites based in the United States. " ). 27. See generally Joel R. Reidenberg, Lex Informatica: The Formulation of Information Policy Rules Through Technology, 76 TEX. L. REV. 553 (1998) (discussing rules created by nongovernmental actors for digital networks).
Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it. LOCKSS, About Us
  • Home Page
LOCKSS, Home Page, http://lockss.stanford.edu/lockss/Home (last visited Apr. 7, 2010). Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it. LOCKSS, About Us, http://lockss.stanford.edu/lockss/ About_LOCKSS (last visited Apr. 7, 2010).
  • David G Internet
  • I N Post
  • Search
  • Jefferson's Moose
For a general overview of the development and governance of the Internet, see DAVID G. POST, IN SEARCH OF JEFFERSON'S MOOSE: NOTES ON THE STATE OF CYBERSPACE (2009).
Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it
  • Home Lockss
  • Page
LOCKSS, Home Page, http://lockss.stanford.edu/lockss/Home (last visited Apr. 7, 2010). Its icon is a tortoise, both because the tortoise lives so long and because it is so boring that no one notices it. LOCKSS, About Us, http://lockss.stanford.edu/lockss/ About_LOCKSS (last visited Apr. 7, 2010).
See supra note 17 and accompanying text
See supra note 17 and accompanying text. 30. Internet Archive, http://www.archive.org/ (last visited Apr. 7, 2010).