Richmond Journal of Law and Technology

The first exclusively online law review.

As Expected, the FTX Investigation Is a Complete Fiasco

By Dante Bosnic

 

 

After FTX filed for bankruptcy in the beginning of November, Samuel Bankman-Fried was finally arrested and extradited to the U.S. in late December.[1] In early January, Bankman-Fried appeared in federal court and pled not guilty to eight felony counts, including fraud, conspiracy, and money laundering.[2] If convicted, Bankman-Fried could face over 100 years in prison.[3]

Even worse for the once famed cryptocurrency star, according to a recent statement by the U.S. Attorney of the Southern District of New York, Damien Williams, Caroline Ellison, a former executive of Alameda Research, and Gary Wang, the co-founder of FTX, have agreed to cooperate with authorities to build a case against Bankman-Fried.[4] According to recent court documents, Ellison has agreed to provide investigators with key inside information, including handing over relevant documents, giving crucial eye-witness testimony, and fully disclosing the extent of her crimes as well as the crimes of other defendants.[5]

Along with going after Bankman-Fried, federal prosecutors are investigating an alleged cybercrime that drained more than $370 million out of FTX just hours after the cryptocurrency exchange filed for bankruptcy.[6] According to an individual who is familiar with the case but has been asked not to be identified, U.S. authorities have managed to seize some of the stolen funds. However, the frozen assets represent only a fraction of the $370 million.[7] In interviews before his arrest, Bankman-Fried indicated that the cyberattack may have been an inside job.[8] The conduct could amount to a charge in connection with computer fraud, which carries a maximum sentence of ten years in prison.[9] Regardless, the amount stolen is significantly less than the amount of money Bankman-Fried is accused of misusing while in charge of FTX.[10] According to authorities, Bankman-Fried, who is currently on bail in California, fraudulently raised $1.8 billion from investors and used FTX funds to wage high-risk bets at hedge fund Alameda Research to cover personal expenses.[11]

It also appears that individuals outside of FTX may be culpable as well. According to FTX’s lawyers, some of FTX’s immediate family aren’t cooperating with the investigation.[12] Bankman-Fried’s brother, mother, and father were his “advisors” and should be subpoenaed alongside former company executives.[13] FTX, known in bankruptcy proceedings as the Debtor, alleges that Gabriel Bankman-Fried, Sam Bankman-Fried’s brother, used his lobbying organization, Guarding Against Pandemics, to purchase a multi-million dollar property just a few blocks from the United States Capital.[14] Additionally, Fried’s political action committee, Mind the Gap, allegedly received donations from Sam Bankman-Fried and other FTX staffers. Furthermore, both parents resided in a $16.4 million [Bahamas] house titled in their names, despite understanding that the house was intended to be the company’s property.[15] In an emailed statement, Marissa McBride, Executive Director of Mind the Gap, told CoinDesk that “Sam Bankman-Fried contributed to some of the programs that Mind the Gap recommended to its network, but he did not make any direct contributions to Mind the Gap,” and that the group publicly discloses all contributions received to the Federal Election Commission. Finally, FTX and investigators are questioning Sam Bankman-Fried’s decision to send $400 million to an obscure cryptocurrency firm named Modulo Capital.[16] The young firm, which was founded in March and operated out of the same Bahamian compound where Mr. Bankman-Fried lived, had no track record or public profile.[17] According to the New York Times, prosecutors are investigating if Bankman Fried used FTX’s customers’ funds to invest in Modulo Capital, given that he is also accused of doing the same with Alameda Research.[18]

As it stands, Bankman-Fried has quite a lot on his plate. While the investigation continues, we most likely will not see or hear from him until his trial in October.[19] Depending on how the investigation goes, this could be a very long or short ten months for Samuel Bankman-Fried.

 

 

 

 

 

[1] See Travis Cartwright-Carroll, SBF Extradited, The Nassau Guardian (Dec. 22, 2022), https://thenassauguardian.com/sbf-extradited/.

[2] See Lauren Leffer, Sam Bankman-Fried Pleads ‘Not Guilty’ on All Counts, Gizmodo (Jan. 3, 2023), https://gizmodo.com/sbf-ftx-not-guilty-sam-bankman-fried-crypto-1849943902.

[3] Id.

[4] Mehron Rokhy, FTX Debacle: Two Top-Level Insiders Cooperating With Prosecutors in Criminal Case Against Sam Bankman-Fried, The Daily Hodl (Dec. 22, 2022), https://dailyhodl.com/2022/12/22/ftx-debacle-two-top-level-insiders-cooperating-with-prosecutors-in-criminal-case-against-sam-bankman-fried/.

[5] Id.

[6] Ava Benny-Morrison, U.S. Probes How $372 Million Vanished In Hack After FTX Bankruptcy, Bloomberg (Dec. 27, 2022), https://www.bloomberg.com/news/articles/2022-12-27/us-probes-how-372-million-vanished-in-hack-after-ftx-bankruptcy.

[7] See id.

[8] See id.

[9] Id.

[10] Benny-Morrison, supra note 6.

[11] See id.

[12] See id.

[13] Jack Schickler, Sam Bankman-Fried’s Mother and Brother Not Cooperating With Financial Probe, FTX Lawyers Say, Coindesk, (Jan. 26, 2023), https://www.coindesk.com/policy/2023/01/26/sam-bankman-frieds-mother-and-brother-not-cooperating-in-financial-probe-ftx-lawyers-say/.

[14] Id.

[15] Id.

[16] David Yaffe-Bellany, Matthew Goldstein, and Royston Jones Jr., The Unknown Hedge Fund That Got $400 Million From Sam Bankman-Fried, N.Y. Times (Jan. 24, 2023), https://www.nytimes.com/2023/01/24/business/ftx-sbf-modulo-capital.html.

[17] See id.

[18] See id.

[19] See Soumen Datta, SBF free on bail for 10 months until trial in October as he pleads not guilty, CryptoSlate (Jan. 3, 2023), https://cryptoslate.com/sbf-free-on-bail-for-10-months-until-trial-in-october-as-he-pleads-not-guilty/.

 

Image Source: https://abcnews.go.com/US/ftx-crypto-ceo-sam-bankman-fried-expected-plead/story?id=96107918

Digital Redaction Is Out, Sharpies and Scissors Are In: How Digital Redaction Fails to Keep Information Secure

By Brianna Hughes

 

 

The harm from a breach of privacy can not only be potential fines, litigation costs, loss of trade secrets and reputational damage, a breach of privacy can also put the nation’s safety at risk.[1] An important tool to maintain privacy and secure confidential information is the technique of redaction.[2] Redaction is used to filter information out of documents to keep that information secret from unauthorized individuals.[3] In the past, redaction was performed manually by using a black marker to mark out the information or by cutting out the information with scissors.[4] These manual methods were costly and time-consuming.[5] As technology evolved, different digital techniques for redaction came to light, making it easier to filter out confidential information.[6] Many individuals, businesses, and governments rely on these digital techniques to keep their sensitive information confidential.[7] Though these digital techniques are easier, this does not mean that the redactions done are secure.[8]

Those who use digital redaction typically use PDF redaction tools.[9] This involves placing a black box over the sensitive information that is supposed to remove the information behind the box.[10] When this technique fails, it is usually because the text data remained in the document.[11] This allows an individual who would like to access the information to simply copy and paste the information behind the black box into a new word document, defeating the purpose of the redaction.[12] Some information can also be shown when converting a redacted document from Microsoft Word to PDF.[13] Additionally, the inclusion of enough details can allow individuals to decipher what the redactions were meant to be.[14] When these failures occur, information that was supposed to be unknown to the public could be exploited through the press.[15] Examples of this include the redacted court deposition of Ghislaine Maxwell, the partner of Jeffrey Epstein, being published after being deciphered by journalists.[16] The journalists were able to decipher many names that were redacted, many of those names being high-profile individuals.[17] Redaction failures do not only happen in court filings; anyone using digital redaction techniques can fall victim.[18] An unintentional exploitation of private information through the press occurred through the New York Times when they published redacted information that fell victim to the copy and paste method.[19] This redacted information revealed CIA operations and the name of a program’s target; this information is a matter of national security and was not intended to be known by the public.[20] There are multiple high-profile redaction failures that have exposed information that someone wanted to keep secret.[21]

Ineffective redaction can be detected before information is leaked; however, if it is not detected, that information sits available to all.[22] Researchers have built a tool called Edact-Ray to identify, break, and fix information leaks.[23] The program focuses on the size of the characters and their positioning; it then compares the size of the redaction with a predefined “dictionary” of words to estimate what has been replaced.[24] This software can eliminate 80,000 estimates per second. When it detects a vulnerable PDF redaction, it removes the underlying text from the PDF.[25] The inventors of this tool intend to release parts of this program to help identify non-excising redactions and help repair those redactions.[26] For those individuals and entities that intend to use digital redaction in the future and do not intend on using Edact-Ray, changing the content of the original document before redacting can be one way to avoid failure.[27] While redacting will never be proof, understanding that redaction is not as secure as one thinks will help avoid careless mistakes.[28]

 

 

 

 

 

[1] See e.g., Adam Pez, Digital Redaction Fails & Best Practices: How to Keep Your Sensitive Information Safe, Intralinks (Sept. 3, 2020), https://www.intralinks.com/blog/2020/09/digital-redaction-fails-best-practices-how-keep-your-sensitive-information-safe; Matt Burgess, Redacted Documents Are Not as Secure as You Think, wired (Nov. 25, 2022), https://www.wired.com/story/redact-pdf-online-privacy/.

[2] See Pez, supra note 1.

[3] Id.

[4] See Maxwell Bland, et al., Story Beyond the Eye: Glyph Positions Break PDF Text Redaction 1 (2022).

[5] See Pez, supra note 1.

[6] See Burgess, supra note 1.

[7] See id.

[8] See id.

[9] See Bland, supra note 4, at 1.

[10] Burgess, supra note 1.

[11] Lisa C. Wood & Marco J. Quina, Litigation Practice Notes from the Field the Perils of Electronic Filing and Transmission of Documents, 22 Antitrust ABA 91, 91 (2008).

[12] See Bland, supra note 4, at 2.

[13] See Judge Herbert B. Dixon Jr., Embarrassing Redaction Failures, 58 the judges journal 37, 38 (2019).

[14] See Burgess, supra note 1.

[15] See Wood, supra note 11, at 91.

[16] Burgess, supra note 1; Josh Levin, et al., We Cracked the Redactions in the Ghislaine Maxwell Deposition, slate (Oct. 22, 2020), https://slate.com/news-and-politics/2020/10/ghislaine-maxwell-deposition-redactions-epstein-how-to-crack.html.

[17] Levin, supra note 16.

[18] Id.

[19] See Dixon, supra note 13, at 39.

[20] Id.

[21] Burgess, supra note 1.

[22] Wood, supra note 11, at 92.

[23] Bland, supra note 4, at 2.

[24] Burgess, supra note 1.

[25] Id.

[26] Bland, supra note 4, at 18.

[27] Id. at 17.

[28] See Burgess, supra note 1.

 

 

Image Source: https://images.squarespace-cdn.com/content/v1/58090c87d1758ec5d1815f6f/1507577772082-FHNXIFFO7VSSSFCMEWOB/howto.PNG?format=1500w

The Era of Artificial Womb Technology

By Manasi Singh

 

 

Reproductive rights have been a heavily controversial topic in the United States for several decades. In Dobbs v. Jackson Women’s Health Organization (2022), the Supreme Court overturned two past decisions: Roe vs. Wade (1973) and Planned Parenthood v. Casey (1992).[1] While these cases are broadly remembered for upholding the right to abortion, the intricacies of these cases are where we get into discussions about the definition of legal personhood regarding a fetus and the legal and ethical implications of that definition.

Prior to the Dobbs decision, abortion jurisprudence said that the state could not impose an undue burden on a woman’s right to an abortion before the fetus is viable, with the implication that states may restrict abortion access after viability.[2] This theory of viability was based in the Casey decision. While the Dobbs decision now makes it a mostly moot point, it does beg the question of how we define personhood as a general legal term, specifically in the context of fetuses.[3]

Medicine today is on the path toward ectogenesis, which is gestation that takes place entirely outside the body.[4] In other words, artificial wombs may become a realistic medical option in the near future. This type of technology would allow conception and fetal development to occur outside the human body. It would also allow for a fetus to be transferred from its womb into an artificial womb for the remainder of its gestation.[5] These possibilities would serve many benefits such as removing the need for a surrogate, drastically increasing survival chances for premature babies, and effectively eliminating the health and career risks that are most commonly associated with pregnancy.[6] However, these benefits should not distract from the variety of complex legal questions that this technology raises.

While there are several legal and ethical considerations, three encompass the conversation most broadly. This is not a comprehensive list by any means, but I believe the most likely legal issues to arise out of the development of artificial wombs include: (1) the balance of maternal, paternal, and state interests in the fetus, (2) the enforceability and validity of contracts regarding fetuses in artificial wombs, and (3) the creation of new liability concerns and the exacerbation of existing liability concerns with fetuses in artificial wombs. This list reveals an interesting phenomenon, which is that all these issues require assessing the value and autonomy of a fetus independent of its relationship to the physical body of a biological mother. This takes us back to our earlier conversation about the viability doctrine. This doctrine may not be a constitutional standard anymore. Still, discussions about viability will come into play again when we attempt to resolve some of these issues being brought by artificial womb technology.

 

 

 

[1] Dobbs v. Jackson Women’s Health Organization, 142 U.S. 2228, 2241 (2022).

[2] Planned Parenthood v. Casey, 112 U.S. 2791, 2804 (1992).

[3] Id. at 2807.

[4] Jessica H. Schultz, Development of Ectogenesis: How Will Artificial Wombs Affect the Legal Status of a Fetus or Embryo?, 84 Chicago-Kent L. Rev. 877, 878 (2009).

[5] Id. at 879.

[6] Seppe Segers, The Path Toward Ectogenesis: Looking Beyond the Technical Challenges, 22 BMC Medical Ethics 59, (2021), https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-021-00630-6#citeas.

 

Image Source: https://rewirenewsgroup.com/2012/02/23/what-do-artificial-wombs-mean-women/

 

Police No Longer Need A Warrant to Track You

By Bryce Yancey

 

 

Since 2018, a company called Fog Data Science has been procuring and selling private individuals’ data which allows private security companies and government agencies to track people without a warrant through its program called ‘Fog Reveal.’[1] Fog Reveal uses its technology to take cellphone location data that was originally collected by smartphone apps.[2] Each cell phone has an advertising ID that is comprised of a set numbers that are unique to the specific phone.[3] Fog Reveal uses smartphones’ GPS capability, which provides detailed location data that it collects from commercially available data brokers that wherever a smartphone goes and any time a user downloads an app or visits a website, a trail is created.[4]

This has become especially controversial since several of the Company’s clients include several government entities, including Virginia State Police.[5] Police have been able to use the technology to sweep an area to see which phones were in a particular location at a given time.[6] The technology has been used in several criminal investigations, including the murder of a nurse in Arkansas in 2018 and tracing participants from the January 6, 2021, attack on the capital.[7] However, the technology is rarely, if ever, mentioned in court documents.[8]

Fog Data Science has maintained that the data collected is anonymous and isn’t tied to individuals.[9] However, the true nature of Fog Reveal came to light when a digital privacy nonprofit called ‘Electronic Frontier Foundation’ publicized information through the Freedom of Information Act that found the data collected was indeed linked to individuals.[10] A senior attorney for Electronic Frontier Foundation said it’s “child’s play” for police to figure out the identity of any given cellphone user based on their individual patterns of life, including where they live, sleep, and work.[11]

The U.S. Supreme Court has ruled in Carpenter v. United States that the Constitution’s Fourth Amendment protects individuals from unreasonable search and seizures by requiring law enforcement agencies to obtain a warrant before tracking someone using a GPS device or cell site location information.[12] However, Fog Reveal technology has been used as a loophole to get around these requirements and to gather the same information without court oversight or public transparency. This technology usage has brought to light to many the differences between Electronic surveillance and data privacy. Under the Electronic Communications Privacy Act and Fourth Amendment of the Constitution, law enforcement officers are required to get a warrant based on probable cause if they wish to intercept communications or track a person’s location.[13] However, the concern raised by many is that there aren’t any comprehensive laws that protect people from their data being bought and sold to government agencies and private entities.

However, there is hope. Civil Rights lawyers and Senators have started pushing for legislation limiting law enforcement’s ability to purchase peoples’ data without a warrant.[14] But until any meaningful steps are taken, data capturing will continue to expand in both the public and private sectors as the unregulated data market grows.

 

 

 

[1] Jason Dearen & Garance Burke, Senators push to reform police’s cellphone tracking tools, ABC 13 News (September 29, 2022), https://wset.com/news/local/senators-push-to-reform-polices-cellphone-tracking-tools-fog-reveal-virginia-data-science-tracking-democrats-lawyers-civil-rights.

[2] Ben Paviour, Virginia State Police is using software to track cellphone location data, VPM News (January 12, 2023, 12:54 AM), https://vpm.org/news/articles/38757/virginia-state-police-is-using-software-to-track-cellphone-location-data.

[3] Anne McKenna, What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant, The Conversation (October 17, 2022, 8:31 AM), https://theconversation.com/what-is-fog-reveal-a-legal-scholar-explains-the-app-some-police-forces-are-using-to-track-people-without-a-warrant-189944.

[4] Garance Burke & Jason Dearen, Tech tool offers police ‘mass surveillance on a budget,’ AP (September 2, 2022), https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef.

[5] Paviour, supra note 2.

[6] Id.

[7] Dearen & Burke, supra note 1.

[8] Id.

[9] Paviour, supra note 2.

[10] McKenna, supra note 3.

[11] Paviour, supra note 2.

[12] Carpenter v. United States, 138 S. Ct. 2206 (2018).

[13] Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2523.

[14] Dearen & Burke, supra note 1.

 

Image Source: https://static.wixstatic.com/media/5a1250_4e52a6d7e2964302b2cd9b308a01876d~mv2_d_2262_1557_s_2.jpg/v1/fill/w_916,h_660,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/5a1250_4e52a6d7e2964302b2cd9b308a01876d~mv2_d_2262_1557_s_2.jpg

India’s Digital Personal Data Protection Bill, 2022: How Practical is Consent?

By Anubhav Das [1]

 

 

INTRODUCTION

In the aftermath of Justice K. S. Puttaswamy v. Union Of India decision (2017) by the Supreme Court of India – that held that the right to privacy is a fundamental right – India recently unveiled the much-awaited draft of the data protection law called ‘The Digital Personal Data Protection Bill, 2022’[2] (“DPDPB 2022”). This is the fourth iteration (once in 2018, then in 2019, then in 2021, and now in 2022) of the draft law, and it is currently under public consultation. The DPDPB 2022 contains many important ingredients of a (good?) data protection law, such as (i) the grounds for processing personal data, (ii) the rights of individuals with respect to their personal data, (iii) the establishment of a data protection board to oversee compliance with the law, and (iv) penalties/fines for violation or non-compliance with the law.[3]

Given the above, an aspect that has been consistent with the Indian government’s approach towards data protection law is the reliance on ‘consent’ as the only practical ground for processing personal data. While there are other grounds under the DPDPB 2022 for processing personal data that are categorised as ‘deemed consent’ (Section 8), however, they are limited to public interest grounds or for employment purposes.[4] On the other hand, the counterpart of DPDPB 2022 – the European General Data Protection Regulation (“GDPR”)[5] – has identified other grounds (Article 6) for processing personal data, such as performance of a contract, legitimate interest, etc.

A key question concerning the discussion above is – what exactly is consent in the context of processing personal data? Is it clicking the ‘I agree’ checkbox while installing an application or accessing a website? But generally, that ‘I agree’ checkbox is accompanied by a line stating that “by clicking on ‘I agree,’ you also agree to the terms and conditions and the privacy policy.” But won’t this be regarded as processing personal data under a contract that is not recognised as a ground for processing personal data under the DPDPB 2022? Considering the above, this article attempts to answer the questions above in the context of DPDPB 2022.

CONSENT: TAKEN OR NOT?

The DPDPB 2022 contemplates consent under Section 7 by stating that it must be ‘freely given, specific, informed, and unambiguous’ and it must be obtained with a clear affirmative action for a specific purpose.[6] With respect to clear affirmative action, it means that organisations cannot use pre-ticked boxes for ‘I agree’ (to get an individual’s consent). Further, to comply with the specific purpose requirement, organisations must provide written digital notice to the individuals in itemised format in plain language containing the description of personal data sought to be collected along with the purpose of processing such personal data.[7]  In addition, organisations are also required to inform the individuals about the contact details of the data protection officer (if applicable) or the grievance redressal officer.[8]

While the above approach can be complied with by small companies/organisations who undertake processing for limited and specified purposes, the problem is that it does not contemplate those companies/organisations that process personal data for many and varied purposes. For example, a social media company may process personal data for (i) targeted advertisement, (ii) improving its services, (iii) enabling communication for its users, (iv) enabling the ease of logging in, and (v) various other purposes. Effectively, such companies (e.g., social media companies) will be required to display a long notice detailing every purpose for which it is processing personal data and will be required to seek individual consent.[9] Now, it is unclear if such consent can be obtained from individuals for all such purposes (as a whole) at once or if organisations will be required to seek consent for each of these purposes separately. If such consent can be obtained for all such purposes (as a whole) at once, then that would mean that individuals by clicking on ‘I agree’ are basically agreeing to the privacy policy and/or the terms and conditions of the website or application. This may raise the question of whether such a consent obtained from the individuals is actually consent or whether such personal data is being processed under a contract. Going with this approach, if it is regarded as processing under a contract, then the entire processing of personal data by such companies will be deemed unlawful under the DPDPB 2022.

Consequently, consent as a ground for processing personal data can only be complied with if individuals agree and consent to each of the purposes for which personal data is processed by such organisation, e.g., by clicking on each of the checkboxes corresponding to the specific purposes.[10] This could of course, dissuade individuals due to such complexity in onboarding from ever taking the services or accessing the websites/application of the organisations, thereby hampering business.

Another consequence of establishing a purely consent-based regime (other than its practical ambiguity) is that it will end data scrapping as a form of business.[11] Data scrapping is an operation wherein data is not extracted from the source (that is from the individual).[12] Instead, it is generally extracted from websites where data is displayed or is in open access. The extracted data may contain personal data, and in such circumstances, consent cannot be obtained by organisations. The DPDPB 2022 neither foresees such a situation nor provides any guidance on obtaining consent on an ex-post facto basis.

PERFORMANCE OF A CONTRACT AS A GROUND FOR PROCESSING PERSONAL DATA

On the one hand and from a business perspective, recognising performance of a contract as a ground for processing personal data will provide an easy solution to the problems (as mentioned above) faced in a purely consent-based regime. Under a contract-based regime, individuals will have to click the ‘I agree’ checkbox, which will bind them to the terms and conditions and privacy policy of the website or the application. However, on the other hand, due to the usually lengthy and complex language used in the terms and conditions and privacy policy of a website/application, individuals may agree to such processing purposes that may be detrimental to their privacy. Therefore, a balance needs to be struck between a contract-based regime and a consent-based regime.

A balanced approach in this regard will be to detail and outline the applicability of processing personal data under a contract and consent for different types of businesses. For example, small to mid-sized businesses with less processing complexity may process personal data under consent. However, large-sized businesses that undertake complex processing activity may rely on contract as a ground for processing personal data. This should be subject to the sensitivity of the personal data processed by such organisations, e.g., financial data must be processed via consent only.

CONCLUSION

While the DPDPB 2022 is a much-required step towards establishing a comprehensive data protection legal framework, however, it does contain a few structural inefficacies. Given that it is still in the draft form, one can hope to get some respite concerning the grounds of processing with the inclusion of additional grounds, such as contractual processing. If granting additional grounds is an inconvenient approach, then the Indian government must issue clarificatory notes and/or a compliance guide for the ease of business as well as for the protection of individual privacy.

 

 

 

 

[1] Anubhav Das is an Associate at Saraf and Partners in Delhi (NCR), focusing on IP and Technology Law. He regularly advises businesses on legal issues with respect to data privacy and intellectual property. LinkedIn.

[2] The Digital Personal Data Protection Bill, 2022 (India).

[3] Id.

[4] The Digital Personal Data Protection Bill, 2022, Section 8 (India).

[5] European General Data Protection Regulation, 2016 (Europe).

[6] The Digital Personal Data Protection Bill, 2022, Section 7 (India).

[7] The Digital Personal Data Protection Bill, 2022, Section 6 (India).

[8] The Digital Personal Data Protection Bill, 2022, Section 9(7) (India).

[9] The Digital Personal Data Protection Bill, 2022, Section 7, (India).

[10] Id.

[11] Fiona Campbell, Data Scrapping – Considering the Privacy Issues, Fieldfisher (Jan. 04, 2023, 12:46 PM), https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/data-scraping-considering-the-privacy-issues.

[12] Id.

 

Image Source: https://unsplash.com/photos/JFk0dVyvdvw

 

Vending with V-Bucks: What In-Game Purchases in Online Games Can Teach Us about Taxation Within Meta’s Metaverse

By Owen Giordano

 

 

Since Mark Zuckerburg, founder of and chief executive officer of Meta, announced the company’s plans to construct their interpretation of metaverse, there have been many valid questions concerning the legal implications of such a novel development.[1] However, much like with many disruptive developments, many of the answers already exist.

To start, a working understanding of what the metaverse is needed. The metaverse is generally considered an extension of the internet as a multimedia platform.[2] Specifically, the metaverse envisions a distinct, virtual world that utilizes augmented[3] and virtual reality[4] technology (such as headsets) for users to be fully immersed in the virtual environment. To use pop culture as an analog, the metaverse’s closest analog is the Matrix from The Matrix in its aims to be an all-encompassing simulation for users to partake in.[5]

In tracing the development of Meta’s metaverse, many point to the onset of Massively Multiplayer Online Games (MMOs). For clarification, MMOs are a genre of video games where an individual plays with other individuals (in real-time) and complete quests or objectives together.[6] Importantly, the world in such games is “persistent,” meaning the world continues to operate and develop even when players are not present within it.[7] Some notable titles within the genre include World of Warcraft.[8] While Meta’s plans for the Metaverse may go beyond the realm of gaming, the similarities remain palpable, such as the idea of the metaverse being “persistent.”[9]

Importantly, many titles within this genre (as well as other games from other genres) allow players to purchase items for cosmetic (i.e., personalizing their in-game character) or practical purposes (i.e., allowing their character to complete quests or objectives more efficiently).[10] These purchases may be bought with in-game currency gained by completing quests (or by buying such funds via credit or debit card).[11] Given the goals of Meta’s metaverse, which include in-metaverse purchases to create a more immersive experience, the similarities between such games and the metaverse become more apparent.[12]

The Internal Revenue Service (IRS) has issued guidance concerning “virtual currencies” like Bitcoin and Ether.[13] Such guidance established that purchases made with virtual currencies for goods or services are taxable.[14] However, in a later statement, the IRS clarified that such taxation only applies to virtual currencies that are “convertible” (meaning that they can act as a substitute for real-world currency by “leaving the game environment”).[15] More specifically, IRS published this statement to clarify that “[t]ransacting in virtual currencies as part of a game that do not leave the game environment . . . would not require a taxpayer to indicate this on their tax return.” [16] Put into simpler terms, in-game purchases conducted with non-convertible virtual currencies would not be taxed at the federal level.[17]

Given the similarities between the metaverse and such video games, this guidance creates concern about a massive tax loophole for companies and individuals to take advantage of within the metaverse. Specifically, in-game (or, in this case, in-metaverse) transactions would go untaxed. However, the language of the statement seems to address this issue. This principle would apply only to virtual currencies that cannot leave the “game environment.”[18] As such, if the purchases are made with currencies such as cryptocurrency and card payments, then a tax must be reported paid.[19]

Overall, given the lack of specific guidance given by the federal government, it might very well be likely that the guidance that governs in-game transactions represents the de facto treatment of sales within the metaverse (at least when it comes to items solely used and consumed within the metaverse) for federal reporting purposes. However, given the scale and scope that Meta plans for their metaverse, the IRS may plan to develop more targeted guidance on the tax treatment of transactions conducted within the metaverse.

 

 

 

 

 

[1] Casey Newton, Mark in the Metaverse, The Verge (Jul 21, 2022), https://www.theverge.com/22588022/mark-zuckerberg-facebook-ceo-metaverse-interview; Nitin Kumar, Six Unaddressed Legal Concerns For The Metaverse, Forbes (Feb. 17, 2022),   https://www.forbes.com/sites/forbestechcouncil/2022/02/17/six-unaddressed-legal-concerns-for-the-metaverse/?sh=75d47ca47a94. See also Ethan E. White, Massively Multiplayer Online Fraud: Why the Introduction of Real World Law in A Virtual Context Is Good for Everyone, 6 Nw. J. Tech. & Intell. Prop. 228, 228 (2008) (arguing for the application of real world law in massively multiplayer online games, which are viewed as direct ancestors to contemporary understandings of the metaverse).

[2] Cory Ondrejka, Escaping the Gilded Cage: User Created Content and Building the Metaverse, 1 N.Y.L. Sch. L. Rev. 81, 81 (2005) (describing the metaverse as an “online environment that was a real place to its users, one where they interacted using the real world as a metaphor and socialized, conducted business, and were entertained”).  See also Adi Robertson & Jay Peters, What is the Metaverse, and Do I Have to Care?, The Verge (Oct. 4, 2022) https://www.theverge.com/22701104/metaverse-explained-fortnite-roblox-facebook-horizon; Peter Allen Clark, The Metaverse Has Already Arrived. Here’s What That Actually Means, Time (Nov. 15, 2021) https://time.com/6116826/what-is-the-metaverse/

[3] Matt O’Brien & Kelvin Chan, Explainer: What is the Metaverse and How Will It Work?, L.A. Times (Oct. 28, 2021), https://www.latimes.com/business/story/2021-10-28/explainer-what-is-the-metaverse-and-how-will-it-work#:~:text=Think%20of%20it%20as%20the,looking%20at%20on%20a%20screen; Casey Newton, Mark in the Metaverse, The Verge (Jul 21, 2022), https://www.theverge.com/22588022/mark-zuckerberg-facebook-ceo-metaverse-interview .

[4] Cory Ondrejka, Escaping the Gilded Cage: User Created Content and Building the Metaverse, 1 N.Y.L. Sch. L. Rev. 81, 82 (2005); Casey Newton, Mark in the Metaverse, The Verge (Jul 21, 2022), https://www.theverge.com/22588022/mark-zuckerberg-facebook-ceo-metaverse-interview.

[5] Sans the machine overlords, concerning lack of free will, and general inability to differentiate between the real and virtual worlds (hopefully).

[6] Ethan E. White, Massively Multiplayer Online Fraud: Why the Introduction of Real World Law in A Virtual Context Is Good for Everyone, 6 Nw. J. Tech. & Intell. Prop. 228, 228 (2008); Cory Ondrejka, Escaping the Gilded Cage: User Created Content and Building the Metaverse, 1 N.Y.L. Sch. L. Rev. 81, 81 (2005).

[7] Richard Bartle, Designing Virtual Worlds 1 (2003).

[8] Bob Woods, In Microsoft’s Activision Deal, It’s Not Just Stock Prices But a Future World at Stake, CNBC (May 7, 2022), https://www.cnbc.com/2022/05/07/in-microsofts-activision-deal-a-future-world-is-at-stake.html.

[9] Cory Ondrejka, Escaping the Gilded Cage: User Created Content and Building the Metaverse, 1 N.Y.L. Sch. L. Rev. 81, 81 (2005) (persistency as a key aspect of the metaverse); Ethan E. White, Massively Multiplayer Online Fraud: Why the Introduction of Real World Law in A Virtual Context Is Good for Everyone, 6 Nw. J. Tech. & Intell. Prop. 228, 228 (2008); (persistency as a key aspect of MMOs).

[10] Simulation & Gaming Through Times and Across Disciplines 422 (Marcin Wardaszko ed., 2019).

[11] Simulation & Gaming Through Times and Across Disciplines 422-23 (Marcin Wardaszko ed., 2019).

[12] See Casey Newton, Mark in the Metaverse, The Verge (Jul 21, 2022), https://www.theverge.com/22588022/mark-zuckerberg-facebook-ceo-metaverse-interview. (Mark Zuckerburg stating that “And this [the metaverse] is something that I hope eventually millions of people will be working in and creating content for — whether it’s experiences, or spaces, or virtual goods, or virtual clothing, or doing work helping to curate and introduce people to spaces and keep it safe. I just think this is going to be a huge economy and frankly, I think that that needs to exist”).

[13] Notice 2014-21, I.R.B. Q&A 3, IRS, https://www.irs.gov/pub/irs-drop/n-14-21.pdf

[14] Notice 2014-21, I.R.B. Q&A 3, IRS, https://www.irs.gov/pub/irs-drop/n-14-21.pdf

[15] RS Statement on Changes to Virtual Currency Webpage, IRS (Feb. 14, 2020), https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage.

[16] IRS Statement on Changes to Virtual Currency Webpage, IRS (Feb. 14, 2020), https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage.

[17] See Notice 2014-21, I.R.B. Q&A 3, IRS, https://www.irs.gov/pub/irs-drop/n-14-21.pdf; https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage; IRS Statement on Changes to Virtual Currency Webpage, IRS (Feb. 14, 2020), https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage.

[18] IRS Statement on Changes to Virtual Currency Webpage, IRS (Feb. 14, 2020), https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage.

[19] See Notice 2014-21, I.R.B. Q&A 3, IRS, https://www.irs.gov/pub/irs-drop/n-14-21.pdf; https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage; IRS Statement on Changes to Virtual Currency Webpage, IRS (Feb. 14, 2020), https://www.irs.gov/newsroom/irs-statement-on-changes-to-virtual-currency-webpage.

 

Image Source: https://www.mmorpg.com/editorials/is-the-metaverse-an-mmorpg-2000124322.

Picasso? Monet? Renoir? Bah, who needs them anymore?

Picasso? Monet? Renoir? Bah, who needs them anymore?

By Joseph R. Patrell

Congress passed 17 U.S.C. § 101 in 1976, which is commonly known as the Copyright Act (“The Act”).[1] Among other things, the Act grants exclusive protection to copyright owners to exclude others from reproducing and displaying the copyrighted item.[2]

Under the Act, one of the requirements for copyright protection is Initial Ownership.[3] As defined vaguely under § 201(a), copyright protection “vests with the initially in the author, or authors of the work.”[4] Additionally, that protection allows authors to recover monetary damages and receive injunctions against infringers.[5]  One of the theoretical underpinnings of Copyright law is Lockean Labor Theory.[6] Under this theory, creators are granted the rights to their intellectual property because of the physical and intellectual labor that went into creating the expression.[7]

Congress could not have predicted the rise of the internet in the 1970s when creating the Act. During the 1990s, when the internet became commercially available, many new and unexpected problems for copyright owners were created, especially in protecting their work from infringers.[8]

How Could Jeans Do this? – The “Science” of Photo Analysis in Criminal Cases

By Tundun Oladipo

 

 

Various methods of interpreting evidence have been prominent over the last century in criminal court cases.[1] Bite mark evidence, DNA testing, and fingerprint analysis are some of the more prominent methods used by law enforcement in criminal cases to secure convictions or implicate a suspect.[2] These methods are labeled forensic science and claim to use the latest technology to analyse evidence and match them to suspects of a crime.[3] As more wrongful convictions are overturned based on forensic science errors, [4] more researchers and scientists are taking a closer look at the reliability of these analysis methods. [5] Most studies have found forensic science methods, except DNA testing, unreliable.[6]

One method of forensic analysis that has gained popularity in the last decade is Photo Analysis. In this practice, technicians analyse pictures down to their pixels, trying to determine if suspects’ faces, hands, clothes, or cars match images collected by investigators from cameras at crime scenes. [7] The practice in photo analysis is derived from Dr. Vorder Breugge’s article on denim jeans identification. [8] The article asserts the ability to identify denim trousers from bank surveillance film through side-by-side comparison. Denim jeans are believed to have individual identifying characteristics, such as folds and creases, that are generated in the manufacturing process and during normal wear-and-tear. These characteristics may then be recognized on denim trousers and in photographs. [9]

Today’s advanced technology, high-quality imaging, and ability to enhance photos or videos have made this practice of photo analysis compelling.[10] However, these methods, although more recent, are similar to the types of comparisons done in other unreliable forensic sciences and are just as unreliable.[11] The matching of ridges or arcs in denim jeans or the curvature of a person’s body, height, or size of feet from side to side comparison of images is similar to methods used to match curvature or size of teeth in bite mark analysis.[12] The experts that testify before courts make subjective statements and guesses, just like those who testified about bite mark evidence in the past. [13] Dr. Vorder Bruegge, in one case, claimed the button-down plaid shirt found in the defendant’s house was the exact shirt on the robber in black-and-white surveillance pictures. Bruegge said he matched lines in the shirt patterns at eight points along the seams and that the fabric pattern in a plaid shirt worn by a suspect in a surveillance photo generated a “1 in 650 billion match … give or take a few billion.”[14] Similar findings have been found in other “pattern matching” forensic sciences like bullet marks analysis. The National Academy of Science, Engineering, and Medicine found that statements by the FBI lab asserting the ability to match bullets to a gun or match bullets via chemical compounds cannot be accurate.[15] Its report suggested that similar chemical compositions could exist in anywhere from 12,000 and 35 million other matching bullets. [16]

Although newer and compelling, photo analysis shows a remarkable resemblance to past methods of forensic science that are unreliable and have led to a significant number of wrongful convictions. It has drawn less scrutiny because of its relative novelty but is just as dangerous.

 

 

 

 

[1] Office of Legal Policy U.S. Department of Justice, Forensic Science, https://www.justice.gov/olp/forensic-science.

[2] Id.

[3] Kimmy Gustafson, 9 Modern Forensic Technologies Used Today – Forensics Colleges (last visited Nov. 30, 2022), https://www.forensicscolleges.com/blog/resources/10-modern-forensic-science-technologies

[4] DNA Exonerations in the U.S., Innocence Project, http://www.innocenceproject.org/dna-exonerations-in-the-united-states/ (last visited Nov 27, 2022); see Rebecca P. Arrington, STUDY OF FORENSIC TESTIMONY AND WRONGFUL CONVICTIONS BACKS NEED FOR SCIENTIFIC REFORM, UVAToday (Mar. 16, 2009), https://news.virginia.edu/content/study-forensic-testimony-and-wrongful-convictions-backs-need-scientific-reform.

[5] Supra Arrington, note 5.

[6] National Research Council, National Academy of Sciences, Strengthening Forensic Science in the United States: A Path Forward (2009); FBI Testimony on Microscopic Hair Analysis Contained Errors in at Least 90 Percent of Cases in Ongoing Review, FBI (April 20, 2015), https://www.fbi.gov/news/press-releases/press-releases/fbi-testimony-on-microscopic-hair-analysis-contained-errors-in-at-least-90-percent-of-cases-in-ongoing-review.

[7] Ryan Gabrielson, A Key FBI Photo Analysis Method Has Serious Flaws, Study Says (Feb. 25, 2020), https://www.forensicmag.com/561164-A-Key-FBI-Photo-Analysis-Method-Has-Serious-Flaws-Study-Says/

[8] Id.; Richard W. Vorder Bruegge, Photographic Identification of Denim Trousers from Bank Surveillance Film, 44 J. of Forensic Scis. 613 (1999).

[9] Supra Bruegge, note 8.

[10] Shawn, The Rapid Evolution Of Video Resolution – Past, Present And Future, Digital Connect Mag (May 11, 2018), https://www.digitalconnectmag.com/the-rapid-evolution-of-video-resolution-past-present-and-future

[11] Michael Fortino, Latest Forensic Technology, Pattern Analysis, May Be ‘Pseudoscience’, Criminal Legal News (MAY 15, 2020) https://www.criminallegalnews.org/news/2020/may/15/latest-forensic-technology-pattern-analysis-may-be-pseudoscience/.

[12] Id.

[13] Nicole A. Spaun and Richard W. Vorder Bruegge, Forensic Identification of People from Images and Video, IEEE, 29 Sept. 2008, (stating examiners perform their assessments without automation – “the examinations are performed without the assistance of any type of automated biometric technology”).

[14] Ryan Gabrielson, The FBI Says Its Photo Analysis Is Scientific Evidence. Scientists Disagree, ProPublica (Jan. 17, 2019, 05:00 a.m. EST), https://www.propublica.org/article/with-photo-analysis-fbi-lab-continues-shaky-forensic-science-practices; Supra note 11.

[15] Supra note 11.

[16] Id.

Image Source: https://bigstarsite.com/wp-content/uploads/2021/02/ccelebritiesskinny-jeans-3-1034×641.jpg

Live Nation, You’re the Problem

By Kasey Hall

 

 

For a while now, there has been a growing call from industry insiders for more robust antitrust enforcement to investigate the practices of Live Nation Entertainment.[1] However, these concerns were mainly brushed aside by the general public until recently when Taylor Swift fans stormed the Ticketmaster website in mass to purchase tickets to a long-awaited tour, only to come up empty-handed.[2] The sheer amount of fans flocking to the website was enough to cause Ticketmaster’s system to crash and, in turn, galvanize more support for antitrust enforcement.[3]

In 2010 Live Nation Entertainment (“Live Nation”) was formed through the merger of Ticketmaster and Live Nation.[4] Ticketmaster, already well known for being an industry giant in the concert ticket space, merged with Live Nation, an up-and-coming regional events promoter.[5] Live Nation was seen as a potential challenger of Ticketmaster’s ticket-selling business, so there was a high degree of skepticism about Ticketmaster’s purchase of a future competitor.[6] At the time of their impending merger, many consumer watchdog groups and a coalition of bipartisan lawmakers pleaded with the Obama administration to block the deal, fearing that decreased competition in this market would unduly hurt consumers.[7] Today, Live Nation holds a substantial market share of over 70%.[8] Without large-scale competition, Live Nation has been able to seize more market share and increasingly raise its prices as it knows consumers have nowhere else to turn.[9]

Many are concerned about the country’s widening income and wealth inequality, and the strengthening of industry competition should appeal to large swatches of the American public.[10] Evidence shows that U.S. antitrust laws have “been too lax toward consolidation” and that a more aggressive approach is needed to combat the rise in horizontal and vertical mergers.[11] The concept is simple; more market competition increases the fight among businesses for sales and customers, something critics argue Live Nation has not had to worry about since its merger.[12] Predictably, Live Nation has had less of a need to innovate to win over new customers. Instead, it has only allowed Live Nation to raise its prices and fees, squeezing consumers.[13] Live Nation, through its monopolistic control of the concert market, has been able to add on additional hidden fees such as; service fees, processing fees, facility fees, and promoting fees and label them as merely “an extension of the ticket price.”[14]

The U.S. Department of Justice differs from 12 years ago and should bring more antitrust cases forward. Officials within the Biden administration have been continually pushing back on major mergers signaling a shift in antitrust enforcement philosophy.[15] In an executive order dated July 9, 2021, the Biden administration cited federal government inaction over the last several decades as a significant factor leading to excess industry consolidation.[16] The Federal Government has the authority to mount challenges to significant moves in industry consolidation through the Sherman Antitrust Act, the Clayton Antitrust Act, or other laws.[17] Similarly, President Biden has tasked federal agencies such as the Federal Trade Commission to increase their exercise of regulatory authority over industry mergers.[18]

Without stronger federal antitrust enforcement, consumers will have fewer choices, higher prices, and less customer satisfaction in this modern era of big mergers.[19] Live Nation, in the past, has shown a “sense of entitlement and dismissiveness toward their customers.”[20] Suppose Live Nation still holds that sentiment today. In that case, there should be enough support from lawmakers, industry insiders, and the general public for the U.S. Department of Justice to not only investigate but to go further and attempt the long process to break them up.

 

 

 

 

[1] Winston Cho, Activist Group Asks Justice Dept. to Unwind Live Nation and Ticketmaster Merger, The Hollywood Reporter (Oct. 19, 2022, 7:00 AM), https://www.hollywoodreporter.com/business/business-news/activist-group-justice-dept-unwind-live-nation-ticketmaster-merger-1235244376/.

[2] Peter Cohan, Taylor Swift Overwhelms Live Nation-Ticketmaster’s 70% Monopoly, Forbes (Nov. 18. 2022 4:26 PM), https://www.forbes.com/sites/petercohan/2022/11/18/taylor-swift-overwhelms-live-nation-ticketmasters-70-monopoly/?sh=74272462685f.

[3] Id.

[4] David Segal, Calling Almost Everyone’s Tune, N.Y. Times (Apr. 24, 2010), https://www.nytimes.com/2010/04/25/business/25ticket.html.

[5] Id.

[6] Id.

[7] Bill Pascrell Jr., Op-Ed: Everyone’s worst fears about the Live Nation-Ticketmaster Merger have come true, L.A. Times (May 17, 2018, 4:05 AM), https://www.latimes.com/opinion/op-ed/la-oe-pascrell-live-nation-concert-ticketing-20180517-story.html.

[8] Florian Ederer, Did Ticketmaster’s Market Dominance Fuel the Chaos for Swifties?, Yale Insights (Nov. 23, 2022), https://insights.som.yale.edu/insights/did-ticketmasters-market-dominance-fuel-the-chaos-for-swifties.

[9] Id.

[10] Modern Antitrust Enforcement: Modern U.S. antitrust theory and evidence amid rising concerns of market power and its effects, Yale School of Management, https://som.yale.edu/centers/thurman-arnold-project-at-yale/modern-antitrust-enforcement.

[11] Id.

[12] See Pascrell Jr., supra note 6.

[13] Id.

[14] Id.

[15] Emily Birnbaum, Biden Team to Push ‘Ambitious’ Antitrust Crackdown on Big Tech in Congress, Bloomberg (Nov. 4, 2022, 4:21 PM), https://www.bloomberg.com/news/articles/2022-11-04/biden-plans-ambitious-antitrust-crackdown-on-big-tech-post-midterms?leadSource=uverify%20wall.

[16] Exec. Order No. 14036, 86 FR 36987 (2021).

[17] See 15 U.S.C. 18; Standard Oil Co. v. United States, 221 U.S. 1, 60-62 (1911).

[18] Exec. Order No. 14036.

[19] Modern Antitrust Enforcement: Modern U.S. antitrust theory and evidence amid rising concerns of market power and its effects, supra note 9.

[20] See Pascrell Jr., supra note 6.

 

Image Source:  https://nypost.com/2021/04/20/biden-urged-to-probe-live-nation-ticketmaster-monopoly/

Page 13 of 85

Powered by WordPress & Theme by Anders Norén