Mango Pods and the Regulatory State

The Washington Post has called mom-and-pop vape shops “the small business success story of the decade:” a product with high demand and a market with relatively low barrier to entry, there’s a reason you’ve been seeing vape shops pop up everywhere recently. In the Netflix documentary Betting on Zero, Zac Kirby from Ponca City, Oklahoma loses a lot of money with the notorious multi-level marketing company Herbalife. His solution? Turn the brick-and-mortar location he had purchased to hawk Herbalife smoothies into a vape shop. “I was one of the lucky ones,” he says, “who found a new and emerging industry to get into.”

As cigarettes have fallen further out of favor, nicotine and THC vaporizers have started to take their place, with people drawn to the lack of obnoxious smell coupled with a nicotine or THC high. Vaporizers have been around for a while, but their original iteration was large and bulky, and their demographic confined to those who wanted to buy or build something larger than an iPod to get a nicotine fix.

You’ve also likely heard about the spate of vape-related illnesses that have popped up over the past year, capturing huge amounts of media and political attention. President Trump, as he is wont to do, has even threatened executive action to stem the so-called vaping crisis. And while our current administration is much more likely to pass executive orders than previous ones, the federal government actually has little control over the sale of nicotine projects short of executive action.

            In 2009, the Obama administration passed the Family Smoking Prevention and Tobacco Control Act, which gave the FDA the power to regulate certain aspects of the tobacco industry. Importantly, this means that the FDA can pass rules related to tobacco regulation without an explicit mandate from Congress, as long as the rule is within the power granted to the FDA in the Act and enacted in accordance with the administrative procedure act. Prior to the act, tobacco was regulated through a combination of state, federal, and municipal laws, with no federal agency involvement. The Act ceded authority to the FDA over tobacco manufacturing, barring states from passing stricter laws related to that aspect of tobacco regulation. While Beverly Hills is allowed to ban cigarette sales outright, it can’t regulate the way cigarettes are manufactured, because that power lays with the federal government.

            This Act, however, only preempted some forms of state and local regulations against tobacco and preserved others. For instance, states and municipalities still have the power to ban any or all classes of tobacco, but they can’t force more stringent labelling laws than are required by federal statute. In Beverly Hills, for instance, gas stations and convenience stores will be prohibited from selling cigarettes beginning in 2021. 90210 is still an extreme outlier in tobacco regulation; the city was one of the first to ban smoking indoors in the late 80s, and will be one of the only areas of the United States where it’s illegal to sell tobacco products.

            So why have states and municipalities been so quick to ban vape products while leaving traditional cigarettes and other tobacco products on the shelves? Tradition and history likely have a lot to do with it. The Beverly Hills cigarette ban, for instance, has a carve-out for the cigar lounges that have been in the neighborhood since the days of Old Hollywood. Even Auschwitz prisoners—allowed little else– were allotted three cigarettes per week, such was their importance. As unhealthy as cigarettes demonstrably are, and as successful as advocates have been in cutting the number of smokers in America, they’re still an indelible part of at least some corners of social culture. There’s a reason everyone was swooning over that photo of Phoebe Waller-Bridge celebrating at an Emmy’s after-party.

            Vaporizers, on the other hand, are new, and are especially new to a particular class of young urban professional. Much has been written about how the advent of Juul and similar devices, with their sleek, unobtrusive design, has brought vaporizing to the mainstream. Where vaporizing before was an activity limited to those who wanted to buy or build their own large devices, and nicotine oil had to be purchased at specialty shops rather than as gas stations or convenience stores, it’s now been adopted by people in every demographic. Vaporizers just weren’t popular enough to care about before they looked like USBs.

            But Juul and their competitors have changed all of that—the number of high school students who say they have vaped nicotine has doubled since 2017, from 11 percent to nearly 21 percent. The fact that vaporizers have now become the provenance of young urban professionals, however, combined with the fact that there is a legitimate issue with teen use of the products, is arguably what has made vaping such a ripe political target. It’s relatively new, it’s entered the mainstream in a short amount of time, it’s been adopted by teenagers as contraband, it’s made hundreds of people ill—vaporizing was primed to catch the ire of societal moral panic.

            There’s also the issue of the tobacco lobby—or Big Tobacco. Decades of pressure on all levels of government meant a hands-off approach to tobacco regulation prevailed until the 90s. And while the vast majority of states and establishments have chosen to ban smoking indoors, banning cigarettes outright would mean losing monetary support from Big Tobacco and angry constituents, in addition to a host of lawsuits.

Tobacco 21

            You may have seen pro-21-year-old smoking age ads paid for by Juul or Juul’s parent company Altria in magazines or on TV recently. Why on earth, you might wonder, would the companies accused of aggressively marketing to teens supporting raising the age to purchase tobacco products? Because those companies want laws that will raise the smoking age while simultaneously preventing states from passing new tobacco regulations, with the goal of eventually passing a preemptive federal law.

            So if tobacco companies get their way, a federal law that would raise the smoking age would also grant the federal government preemptive authority over other aspects of the tobacco industry, like the ability to ban certain products. This would mean that cities like Beverly Hills that have outlawed cigarettes, and the multitude of other states and municipalities that have banned vaping products recently, would no longer be able to do so. A smoking age of 21 may seem great to most people—which is what tobacco companies are counting on so that they can slide federal preemption of state and municipal power over tobacco into the statute.

Legalize and Regulate

            The Temperance Movement in the United States was the result of a mix of potent cultural forces culminating in the ratification of the 18th Amendment—better known as Prohibition. One of the results of this brief period of constitutional insanity was that on average 1,000 Americans died every year of prohibition from tainted alcohol. Barred from enjoying their vice of choice, prohibition-era Americans would “denature” industrial-strength alcohols like methanol, many times with fatal or paralyzing results. “Blind drunk” became more than a figure of speech.

            There are obvious parallels between prohibition and the current federal legal status of marijuana. When NBC News enlisted cannabis testing agency CannaSafe to run a battery of tests on 18 separate brands of THC vaporizer cartridges, the 3 purchased from legal dispensaries came back negative for pesticides, heavy metals, and solvents. The other 15—purchased on the street—came back positive for at least one. Amanda Chicago Lewis, a prolific cannabis writer and activist, has been warning about the dangers of unregulated vapes for the past few years. A wholesale ban on vaporizers will likely only serve to make the problem worse. When it comes to legitimate THC oil in places where marijuana is legal, for instance, a lot of legal states now limit the parts per million of butane allowed in the oil. Indeed, multiple health professionals and advocates have voiced concerns that traditional cigarette smoking will increase if vapes are banned nationwide. Others fear that the market for THC oil will move further underground with resulting safety concerns. Their fears aren’t unfounded: illegal markets create safety concerns precisely because illegal products and services can’t be regulated or monitored by the government.

Saving Our Spectrum: Handling Radio Layer Vulnerabilities in Wireless Systems

Two of the greatest challenges of the modern technological age are security and privacy. Spectrum, specifically at the radio layer, is particularly vulnerable to attack. How can we better protect our devices and infrastructure? Speakers and panelists at the Silicon Flatirons Center’s Saving Our Spectrum: Handling Radio Layer Vulnerabilities in Wireless Systems Conference came as close as one can to answering this complex question.

A key development in the telecommunications industry is marked by the shift away from the use of wires and fiber to transmit signals to wireless. And while wireless networks reduce capital expenditures, and have great potential in tough to reach places, the world’s increased dependence on radio comes at a cost. Radio receivers, unlike wired connections, cannot be physically protected from attack. This is because in order to function, they must be open to signals.

Professors Hatfield and Gremban led off the conference’s primer with a discussion of three common types of attacks on these systems: sniffing (listening to wireless transmissions for unencrypted signals), spoofing (one user masquerading as another), and jamming (blocking signals to specific or several devices). One of the difficulties in addressing the radio layer vulnerabilities of 4G and 5G networks is that attacks can occur at any layer, meaning both our devices and the network are potentially vulnerable to attack.

Consumers can protect their devices but are limited in their ability to do so. Certainly, one can download any number of applications from the app store that assure consumers of the app’s ability to detect IMSI catchers (or stingray) devices, which helps combat sniffing, but those applications are known to produce false positives, meaning they alert customers to nonexistent threats, and they are not as effective at stopping bad actors as one would hope. This raises the question – if end users can do little to protect themselves, can, and should, companies being doing more to protect devices by securing the network and improving the hardware of our devices?

For the mobile communications companies selling devices and telecommunications equipment, that possess advanced technology and the know-how to address the aforementioned vulnerabilities, there is little incentive for them to make improvements that would secure devices. Adding hardware that would address vulnerabilities in the devices would be expensive, but probably not impossible according to some panelists.

Though it may be some time before we see security features in our devices, more and more companies, advocacy groups, and regulators are attempting to address the vulnerability issue by experimenting with new systems and methods. One way this is being done is by using artificial intelligence and machine learning to detect and respond to attacks on devices and at other layers. AI is particularly useful because of its ability to quickly isolate atypical interactions on the network. Additionally, DARPA’s Spectrum Collaboration Challenge (SC2) is “using AI to unlock the true potential of the RF spectrum,” and promises to deliver some viable solutions as well, so the outcome of that competition will be worth following.

Finally, the 3GPP (Third Generation Partnership Project) has used sophisticated technology to address vulnerabilities to improve user authentication process. This helps networks determine whether users are who they say they are, which helps in instances of spoofing. With each generation of cellular network technologies improving on the last, we have been able to improve our ability to authenticate users – and this trend has held true for 5G. 

Despite the high number of attacks, the situation is not as dismal as it once appeared. In fact, there are already several viable ways to secure radio layer vulnerabilities. These include requiring device manufacturers to include protective features, such as advanced hardware and encryption technology,  before delivering the devices to customers, increasing uses for AI applications, and doing what we have done in the past: hoping that new cellular network generations will lead to improvements in authentication processes.

Though the hope is always that something will be done to totally secure our devices and networks, we must recognize our own technological constraints, as well as the capabilities of bad actors. That said, the three examples outlined above seem to be viable solutions and demonstrate stakeholders’ increased awareness of the issue at hand

Freddy is Managing Editor of CTLJ, Volume 18 and a Research Assistant for the University of Colorado’s Silicon Flatirons Center for Law, Technology, Entrepreneurship. His study and research focus on identifying legal solutions for the issues that arise out of emerging technologies and increasing access to critical technology infrastructure in under-served communities.

Move Fast, Break Things: How carriers could break networks in the race to 5G

In the race to deploy 5G networks across the U.S., the big carriers have adopted a “move fast, break things” mentality that threatens to break existing network architectures for the speculative promise of faster speeds and better networks. This mentality is in large part motivated by the narrative that 5G is a race where the U.S. is competing against China to deploy the next generation mobile network. This narrative of a race even led AT&T to push out an OTA update to certain phones that displayed a “5Ge” logo in the upper-hand corner when users were actually connected to was a legacy 4G LTE network with specialized updates. While modestly faster, it certainly fell short of a generational change in mobile telecommunications. 

What is 5G?

For the uninitiated, 5G refers to refers to a set of standards for the next generation of mobile networks. Here is a good summary for those looking for a deep dive on what makes 5G different. Broadly speaking 5G makes three key improvements over 4G LTE networks: 

(1) higher speeds

(2) lower latency

(3) the ability to connect to more devices at once

Like other mobile networks, 5G depends on spectrum allocations through the Federal Communications Commission (FCC), that authorizes carriers to transmit through cell towers and cell phones at a specific radio frequency. However, unlike other networks, 5G relies on a wider array of spectrum allocations in order to provide more data to consumers. Generally speaking, lower frequency bands provide better coverage over longer distances, but typically don’t provide as much data bandwidth, making low band ideal for rural applications. As frequencies increase, signals typically fall off over a shorter range, but can provide higher data bandwidth. Legacy 4G LTE systems already operate on low and mid band spectrum, but new spectrum allocations in high bands, like millimeter wave (mmWave), promise significantly higher data capacity. 5G also depends on network optimizations to reduce backhaul latency to deliver faster speeds. This is what AT&T tried to argue that they deployed with “5Ge” before eventually settling a lawsuit alleging false advertising.

High Band Issues: Problems with mmWave and the 24 GHz disaster

While new high-band allocations promise the biggest potential in speed gains over legacy 4G LTE networks, these benefits will likely only be available to a select few Americans in specific areas within the biggest metropolitan centers. Due to the propagation characteristics of mmWave technologies, the towers have a very limited range – at best only a couple hundred meters – compared to up to 50-150 km for 3G/4G towers. Thus, to effectively deploy a network using mmWave technologies, a very high degree of “network densification” is necessary to provide service. Essentially, while the 5G towers are smaller, a city needs hundreds, even thousands to reach the density required for a functioning network. While this “densification” is logistically possible and economically feasible in major cities, and football stadiums, the potential promise of downloading movies in seconds will likely remain unavailable for rural Americans. 

Another issue with high-band spectrum is the recent “24 GHz disaster”, which threatens the reliability and accuracy of weather forecasts for the promise of better networks. In the recent “Spectrum Frontiers” auction, the FCC sold access to carriers for blocks of spectrum in the 24 GHz band for use in 5G networks. However, this auction was conducted despite objections from NOAA and NASA that mobile allocations in that band would cause significant interference issues with weather satellites that depend on the unique characteristics of the band 24 GHz to observe water vapor in the atmosphere. Once mobile service is active in the band, interference issues could potentially reduce the accuracy of hurricane forecasts by decreasing the forecast lead time. As strong hurricanes become more common and hit increasingly underprepared cities, this band allocation could result in an increase in property damage and potentially even additional loss of life from superstorms. 

Mid-Band Issues: C-Band & 6 GHz

Beyond the 24 GHz band, other bands the carriers are seeking for 5G have additional interference problems that could threaten incumbent services that are still critical to our telecommunications infrastructure. In the C-Band Proceeding, the FCC is considering a reverse auction to relocate or substantially reduce the number of companies using the using the 3.7-4.2 GHz band for satellite communications. These C-Band incumbents include satellite companies, cable companies, rural broadband providers, and television broadcasters. While a number of these incumbents are likely to participate in the reverse auction and sell their current licenses, some incumbents have indicated that they are either unwilling or unable to relocate their services out of the band. Mobile carriers and satellite incumbents are also fighting over exactly how the 500 MHz of spectrum should be divided between incumbents and entrants, and whether or not guard bands are necessary to protect earth stations from interference. Regardless of what decision the FCC makes, there will likely be impacts for rural Americans who depend on satellite services to receive internet, television, or other services. 

In the nearby 6 GHz band carriers are currently in conflict with manufacturers of unlicensed devices (think Wi-Fi routers), over a proposed change for service rules in the band that would allow unlicensed users to share spectrum with licensed users subject to an “automated frequency coordination” scheme designed to prevent interference. This “AFC” technology would be required to be installed on any unlicensed device that operates within the 6 GHz band, and would prevent these devices from broadcasting signals if it might cause interference with a licensed user broadcasting nearby. Unlicensed users argue that as American’s appetite for data increases, more spectrum will need to be allocated for unlicensed use to provide more room for WiFi services. While WiFi devices are predominantly low power and used indoors, mobile carriers argue that AFC rules should be applied to all unlicensed devices operating in the band. AT&T argues that without AFC rules applied to all unlicensed devices, interference with mobile operations will be inevitable. In these arguments the carriers stress that while expanded spectrum for WiFi may be critical, 5G should also be considered a possible solution to America’s expanding appetite for data. 

Dynamic Efficiency: Critics Claim a Flawed Premise for the T-Mobile/Sprint Merger

In their filings and messaging around the proposed merger, T-Mobile/Sprint argue that as a combined firm they will be able to provide better 5G service than any existing carrier will be able to do alone. This assertion is justified in part by the complementary spectrum assignments each company holds (see the figure below.) Together, these assignments will give the ‘New T-Mobile’ access to more spectrum than any other carrier, enabling them to deliver better service. Essentially, a dynamic efficiency gain that outweighs the potential danger of static efficiency losses. 

However, the Department of Justice placed conditions on the merger that require Sprint to sell some of their spectrum to DISH, a company that has a history of hoarding spectrum. According to critics, this idea is unnecessarily complicated as there are currently four carriers, and DISH won’t be a viable option for quite some time. Additionally, the spectrum divestiture somewhat undermines the initial premise of the merger – the combined spectrum portfolios would empower the ‘New T-Mobile’ to provide better service than anyone else.

A false premise of the race to 5G?

Ultimately, the narrative of a race to 5G may turn out more beneficial to carriers than to consumers. Critics of the 5G race argue that there is likely no harm to consumers, and possibly even US carriers, if China succeeds in deploying 5G before the United States – because the Chinese government controls spectrum allocations, major carriers, and device manufacturers, it is significantly easier for China to rapidly deploy 5G. In effect, China can ignore all dissent and centrally manage their economy. In this way, a race analogy benefits US carriers because it motivates the FCC to take a light tough regulatory approach, effectively coordinating or allowing carriers to coordinate in a way that could mirror a centrally managed economy. This may reflect the White House’s focus on delivering “wins” for America, even if those wins come at a heavy cost or start to ape a communist approach to the economy.

Join the CTLJ Content Team at the Silicon Flatirons Saving Our Spectrum Conference on October 10, 2019 at CU Law. Luminaries in the field of spectrum governance and radio propagation will examine these issues, in particular the security vulnerabilities emerging with the next generation of connected devices.

A Day in Your Data

Artwork by Oxyman.

Digital privacy rights remain a fleeting uneasy feeling to most people, mildly relevant during Facebook’s Cambridge Analytica Scandal or data breaches from companies like Equifax and Capital One. Yet, Consumer data is continuously harvested and utilized in a never-ending effort to turn ‘cookies into cash’. Your information, or rather information about you, is big business, more lucrative and exponentially expanding than oil.

This pervasive, essentially unavoidable, collection and commercialization of data creates extensive social costs (legalese for knock-on effects in the economy that hurt people – like pollution). While some social costs are moderate, who might see a job notice for example, some social costs are extreme. As conversations inappropriately recorded and retained by ‘smart’ home assistants like Amazon’s Alexa are used in court, and automated systems without transparency, or indeed even accuracy or accountability, are used to determine sentences, calculate recidivism risks, or award bail, the social costs created from data utilization may eclipse their benefits in certain contexts.

The data economy is full of risks and benefits. In the U.S., consumers are largely responsible for navigating these issues, and are typically bound to whatever decisions they make. Those decisions are of limited value however, as companies routinely disregard their own policies or violate expressed consumer choices; Google retained and utilized the location data of consumers despite those consumers turning off location services in their settings, just as Apple violated its own commitments not to share consumer listening data with third parties. When evaluating a data decision, consumers must evaluate not only the decision, but also the risk that they are engaging with a bad actor.

To help illustrate our contemporary data reality, the CTLJ Digital Content Team crafted a brief hypothetical timeline of the average day of a CTLJ member, given the nom de plume “Bob” to protect their privacy, that catalogs how data about us is implicated in every facet of daily life.

5:30AM – Rise ‘n Shine

On weekdays Bob wakes up at 5:30AM. He uses a Google Assistant “routine” to reads the forecast for the day, based on his current location. It also plays the most recent episode of the WSJ Tech News Briefing.

Bob is receiving some real benefits here, and without spending any money. Benefits include the alarm itself, the forecast, and the podcast. These are real benefits, and most would agree that they are a good result for Bob.

Google also collected useful information about Bob that they can sell, in some form or another, to generate revenue. They track what time he typically gets up in the morning, and potentially how often he snoozes his alarm, which will be integrated into an advertising profile, and possibly a psychographic profile, similar to those created by Cambridge Analytica. They also track his current location and interests based on the “routine”, which could also be used to tailor advertisements, alter the offering of services, influence prices for certain goods for Bob, and may ultimately impact which job or housing postings he has access to.

5:45AM – Struggling to Get Out of Bed

While Bob does occasionally hop straight out of bed in the morning, all too often he spends about 15 minutes lingering under the sheets scrolling through Twitter or Reddit, or watching videos on YouTube. Sometimes Bob stays in bed under the covers all day.

For every YouTube article or Reddit link Bob clicks, more information is added to his various profiles, updating targeting algorithms to serve him ads that he is more likely to find relevant. Most large data collection firms like Facebook have their proprietary profiles, even if you don’t use their service, while data brokers and other ill-defined entities create and trade their own.

7:30AM – Hitting the Gym

If everything is going well for Bob so far this morning, he’s hopefully getting to the gym around 7:30AM. He uses a Garmin Fenix watch which tracks his location and heart rate. Garmin also has an app where Bob can enter details on his height, weight, and age. Their app also contains “badges” that incentivize Bob to do things like record “activities” for 7 days in a row, climb a certain number of floors in a day, or run a certain number of miles in a week. These “badges” show up on a public profile where Bob can compete with locals or people around the globe at a similar level. 

While Bob enjoys these training metrics, and derives motivation from the gamification of workouts, Garmin likely collects a swath of information about Bob. This data may be used in ads, it may also be eventually used to determine his health insurance coverage and premiums or even his ability to get or keep a job. Health trackers in particular have also been implicated in national security issues, revealing not only the location of security installations but also potentially patrol routes and patterns of activity within these installations.

8:45AM – Morning Coffee

On his way home from the gym, Bob might stop to grab a cup of coffee from his local coffee shop. This purchase will be tracked in a number of ways. If location services are enabled on Bob’s phone, and likely even if they’re turned off, Google tracks that he visited the Brewing Market on Baseline, and may prompt him to write a review, in addition to storing that information in his profile and likely sharing it with third parties. If Bob uses his credit card, Wells Fargo tracks when, where, and how much money Bob just spent. If Bob forgot his wallet at home and uses Google Pay, his transaction information is also shared with Google. Additionally, the WiFi router in Brewing Market likely logs when Bob enters and leaves the area and shares it with third parties, even if Bob’s phone is in ‘airplane mode’.

12:00PM – Lunch

On most days Bob packs a lunch, but occasionally he has a lazy morning and resigns himself to eating out for lunch. Because Bob is perpetually indecisive, he usually spends a fair amount of time searching around for a new place to eat before eventually giving up and heading to Qdoba. As he tools around on Google Maps mulling over the menu choices at the newest food truck or fast casual restaurant, every single click is recorded and analyzed. 

Because Bob has location services enabled on his phone, after he leaves wherever he went for lunch that day, he us immediately prompted with a notification asking him how his experience was and prompting him to write a review. Both Bob’s visit itself, as well as any potential review he posts, will be used to improve his search experience next time, as well as to determine if Bob is a good prospect for a job, a service, or advertisements. These profiles can become so accurate at predicting and interpreting human behavior that some people are convinced that their phones are being used to surreptitiously record them. That is possible, but highly unlikely – several studies have debunked this claim. The reality is these algorithms and profiles are finely tuned with access to nearly limitless data about you, so they are simply that good.

1:30PM – Return to Work

Whether Bob is trying to catch up on readings or email, the first thing he does after booting up his computer is fire up a music app. Bob’s usual choice when he’s trying to be productive is the YouTube channel “lofi hip hop radio” (seriously, check it out). As Bob has been going about his day, algorithms have been hard at work updating his profile with all the data they’ve collected. Perhaps he liked a post by one of the outdoor gear companies he follows on Instagram, so he might receive an ad for a new piece of gear, or maybe Google allowed a third party to analyze his emails and found that Bob has an ailing relative, and he might mysteriously receive an ad for a new breakthrough drug for the disease they were just diagnosed with.

5:30PM – Grocery Shopping

Before Bob heads home he takes care of errands, which usually entails a stop for groceries. Most of the time Bob heads for Whole Foods, tempted by the “Prime Deals” available to Amazon Prime members. Bob is incentivized to use his Prime account every time he shops to receive savings, but at the same time he’s providing Amazon with information including what he likes to eat, how often he buys certain items, and when during the day he likes to shop. All this information can be useful to target advertisements for Bob down the road, as well as evaluate his health, future earning potential, or likelihood for certain personality traits.

Data utilization is a mixed bag. There are risks and real benefits to utilizing behavioral data. Perhaps Bob found the more tailored advertising content more relevant than the generic ads for pharmaceuticals that plague network television. Bob likely derived real benefits from the recommendation received from Google on a new taco truck that he should try in the area. Platforms can also use this data to better understand consumer preferences to deliver higher quality content. Netflix uses behavioral data to decide which shows to greenlight, make decisions about the creative team and casting for origional content, and better source recommendations for existing content to users. According to a recent survey, 39% of consumers thought that Netflix had the best original content (vs. 14% for HBO, and 5% for Amazon Prime Video).  These are real, tangible benefits that cannot be discounted when examining data governance

There are also real costs caused by these data mining operations, that aren’t often visible on the surface. For example, when asked about the profiling tool Cambridge Analytica built to study Facebook users, former employee Brittany Kaiser called it “weapons grade” technology. When behavioral data is used to sell us more widgets or promote new content, there is likely a net benefits to society. When data about us is used to influence electoral outcomes, restrict personal and professional opportunities, or expose our deepest secrets, the costs loom.

Join the CTLJ Content Team at the Silicon Flatiorns Near Future of U.S. Privacy Law Conference on September 6, 2019 at CU Law. Luminaries in the field of data governance and privacy will examine these issues, in particular the possibility of a new Federal Law on data privacy rights.


Releasing Rapunzel(s) from the Trademark Tower: A Consumer’s Real Interest in Trademark Registration

by Rebecca Curtin

The TTAB recently reaffirmed that a consumer can establish standing to oppose a trademark registration because “consumers, like competitors, may have a real interest in keeping merely descriptive or generic words in the public domain, ‘(1) to prevent the owner of a mark from inhibiting competition in the sale of particular goods; and (2) to maintain freedom of the public to use the language involved, thus avoiding the possibility of harassing infringement suits by the registrant against others who use the mark when advertising or describing their own products’” (citation omitted; emphasis is the Board’s). 

In the interest of full disclosure: I am the petitioner in that case, opposing the registration of a word mark, RAPUNZEL for dolls and toy figures that, according to the specimen of use, depict the famous fairy tale character.  I am being represented by the Suffolk Law IP and Entrepreneurship Clinic with pro bono assistance from Workman Nydegger.

At this point, the TTAB has only denied the applicant’s motion to dismiss and allowed the opposition to continue based on adequately plead claims that the word mark RAPUNZEL: 1) fails to function as a trademark and 2) is merely descriptive for dolls and toys. 

Nonetheless, the TTAB’s opinion thus far is heartening. It recognizes that an entity using its trademark power to gain exclusive rights to a descriptive or generic word mark can harm consumers and contribute to market overreach.  This is because, when an entity establishes trademark rights in a word, the word’s use is restricted in the marketplace in relation to the goods that it describes. If the registered mark is descriptive or generic, then consumers of those goods will experience deleterious effects and hindered competition. 

A trademark registration is a powerful tool in the hands of a registrant.  Take a look at these benefits, as articulated by scholar Rebecca Tushnet:

Rather than having to establish in each individual legal proceeding that its mark is in fact valid, a registrant is accorded a presumption of validity, and under certain circumstances that presumption is irrebuttable.  Other benefits to the trademark owner are nationwide priority over other users even without nationwide use, eligibility for assistance from the Customs Service in avoiding infringing imports, the ability to use the U.S. registration as the basis for extending protection in other countries, and preemption of certain state laws (876).

Trademark holders can also use their trademark registration to more effectively police and enforce their exclusive rights. Even if trademark holders never ultimately pursue an action in court to enforce their mark, registrants may make persuasive reference to a trademark registration in their cease-and-desist letters, which they send when they wish to warn a potential competitor off using a mark that they think will confuse consumers as to the source of the products or services being offered.

In the ordinary course, where the purported mark really is functioning to indicate a product’s source, the benefits of registration can ultimately flow to consumers. Marks can protect consumers from confusion as to which entity is producing, sponsoring, or endorsing the products they buy.  This has been recognized by the Supreme Court as the “general concern” of unfair competition law, with the Court elaborating that “while that concern may result in the creation of ‘quasi property rights’ in communicative symbols, the focus is on protection of consumers, not the protection of producers as an incentive to product innovation.”

In that light, consider the harms that may result from granting trademark registration to a descriptive or generic word.  In other words, if the registration is for a word that describes the qualities or function of the product, or is the generic name for the product, then the trademark registration will make it harder for competing producers to communicate with consumers. In this sense, registration of generic and descriptive marks can cause a different kind of consumer confusion.  The Rapunzel name is a helpful one for thinking about what the stakes in such communication really are.

Rapunzel is the name of a fairy tale character, perhaps best known in the versions first published by the Brothers Grimm in 1812, but with roots in tales much older than that, all sharing an archetype identified by folklorists Aarne and Thompson as the “maiden in the tower.”  For centuries, the character has remained a powerful and poignant touchstone for artists with strikingly different takes on the character, from Anne Sexton’s poetic lesbian re-telling of the tale to Dina Goldstein’s photographic series of Fallen Princesses to Carl Payne’s bronze Rapunzel

Naturally, this proliferation of different versions of the character has been accompanied by a broad range of dolls and toy figures, from producers large and small, which are, to my experience as a mother of a young girl, cultural artifacts just as important as the higher art.  Accordingly, when consumers hear the word, “Rapunzel,” they think of the well-known fairy tale character, not any one producer of dolls or toys.  These dolls tell us what “Rapunzel” looks like; they tell us (and our children) what “Rapunzel” means.  Having the ability to choose from various interpretations of “Rapunzel” dolls, and being able to find such a doll from more than one producer is important to consumers—it is important to me as a frequent buyer of fairy-tale-based dolls and toys. 

Unlike other marks, the word mark RAPUNZEL for dolls and toys has no substitute. In this way, trademark rights in “Rapunzel” for dolls and toy figures are importantly different from a trademark like, say, “Cinderella Eyebrows Spa” for various health spa services.  There, we can see that the reference to Cinderella playfully suggests all kinds of things about the services—that the technicians will work as cheerfully as Cinderella at her chores, perhaps, or that the results will be so striking that no one will recognize the beautiful new you at the ball—but none of these suggestions will prevent other health spas from getting into the market and telling consumers the same things about their excellent services using other marks.  By contrast, if the maker of a doll that depicts Rapunzel can’t market the doll using that name, consumers will be deprived of important information that can’t be communicated with other words.  Rapunzel dolls are Rapunzels.

Exclusive trademark rights to market dolls and toy figures under the Rapunzel name could chill new entrants to the market through fear of infringement liability.  Even factoring in defenses like the descriptive fair use doctrine, trademark rights in the Rapunzel name for dolls would raise barriers, both to dollmakers offering “Rapunzels” in the marketplace and to consumers finding “Rapunzels,” where only the trademark holder feels free to use that name in big letters across the front of the box.

As the TTAB acknowledged in its opinion allowing the opposition to go forward, it has already “noted that ‘other doll makers interested in marketing a doll that would depict the character [LITTLE MERMAID] have a competitive need to use that name to describe their products.’”

Thus we are fighting for the consumer interest in Rapunzels that look like this, and this, and this, and this, and this, and this, and this.  We want a marketplace that welcomes a diverse array of producers who engage with the cultural legacy of this ancient fairy tale, from the latest interpretation by a giant corporate content provider to antique dealers who need the name Rapunzel to describe rare French bisque toys like this one, from more than a hundred years ago.   We are fighting for access to artisans like this one, who customize their Rapunzel’s skin tone, hair, and dress color to whatever their customer asks.  We are fighting for creative cos-play dads and crafty-do-it-yourselfers, who have long been inspired by the rich market for dolls and toys that express the Rapunzel character in different ways.  No one needs a trademark on the Rapunzel name to join in this market for dolls and toys that depict the character. Giving one to a single company will only chill the use of that name by others to tell us about the unique dolls and toys they make.

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.

Professor Curtin is a graduate of Princeton University, where she received her A.B. in English, summa cum laude, and of the University of Virginia School of Law, where she served on the editorial board of the Virginia Law Review. Prior to attending law school, she completed her Ph.D. in English and American Literature and Language at Harvard University, and held teaching positions at Harvard University and Brandeis University.

Before joining the faculty at Suffolk Law, Professor Curtin worked as an associate in the IP Transactional practice group at Ropes & Gray LLP, where her practice focused on licensing, collaboration and other commercial agreements involving intellectual property. Professor Curtin teaches courses in Property and Copyright. Her research interests currently include the evolution of intellectual property regimes under the influence of new technologies and licensing transactions.

YouTube Demonetization

by Matthew Martinez

YouTube has recently changed its guidelines for ad revenue and video monetization, which is having a significant impact on content creators. Specifically, content creators are finding that their uploaded videos are flagged for inappropriate content and suffering from demonetization. This is part of a new policy created by YouTube to make the community brand-friendly and attract more advertisers to the platform.

An algorithm was designed to identify the following factors in videos and flag them for demonetization:

  • sexually suggestive content, including partial nudity and sexual humor;
  • violence, including display of serious injury and events related to violent extremism;
  • inappropriate language, including harassment, swearing and vulgar language;
  • promotion of drugs and regulated substances, including selling, use and abuse of such items; and
  • controversial or sensitive subjects and events, including subjects related to war, political conflicts, natural disasters and tragedies, even if graphic imagery is not shown.

These categories have drawn criticism for being overly broad and vague. Combine this with the inaccuracy of bots learning how to enforce the guidelines and the result is unfair demonetization. Many of the demonetized videos are those dealing with subject matter YouTube has marked “not suitable for advertisers.” However, many of these videos are in fact appropriate and not deserving of demonetization. Casey Neistat, a popular YouTuber, after the mass shooting at a Las Vegas concert created a video aimed at raising money for the victims of the tragedy stating that all proceeds from ads would be donated to the victims and their families. A few days after the video was uploaded, the video was demonetized.

YouTube’s algorithm has recently been more widespread and aggressive at removing ads on videos that could have the slightest possibility of being controversial. Because the algorithm is fairly new, the result is that it is over-inclusive and impacting videos that should be deserving of ad profits. As a result, certain YouTubers are unable to sustain a career from making videos, and are being forced to stop uploading content. Even though YouTube is a private company not subject to the usual First Amendment constraints as other public forums of communication, removing ads is still a form of censorship. By flagging videos for demonetization, YouTube is rewarding a very specific kind of content, while forcing controversial, suggestive, or tangentially related content off of the platform. This significantly impacts LGBTQIA content creators because most of their videos deal with sexuality, the coming out process, and other related content that has been flagged for being “sexually suggestive.”

The underlying impetus for the increased policing of videos and the over-inclusive demonetization of videos was a response to right-wing political groups uploading and posting content that verged on extremism and hate speech. After brands found their ads being paired with videos on channels like InfoWars, along with other conservative content creators, they threatened to remove all support from YouTube. While YouTube’s intentions seem well placed, its execution has been isolating for all political groups.

As YouTube attempts to make the platform brand-friendly and palatable, it is acting like a gatekeeper and actively censoring content it deems inappropriate. Through the use of the current demonetization algorithm, YouTube is favoring certain speech over others and unnecessarily harming deserving creators and minority groups. The appeal of the platform is waning, and other services like Patreon and Vid.me are appearing on the horizon as a better market place alternative.

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.

Copyright: (Get It) Out of Fashion

by Caitlin Stover

By interpreting copyright law to provide protection to fashion, has the Supreme Court inadvertently exposed the fashion industry to harm?

At issue in Star Athletica v. Varsity Brands was whether the arrangements of lines, chevrons, and colorful shapes appearing on the surface of Varsity Brands’ cheerleading uniforms were eligible for copyright protection as separable features of the design. Answering this question in the affirmative—after applying the relevant test for “separability” in a markedly different manner than courts have traditionally applied the doctrine—the Supreme Court broadly and categorically changed the game of copyright protection. Now, if a court determines that a design (1) has graphic or pictorial qualities, and (2) could be applied on a painter’s canvas, the test for copyright protection is met.

While perhaps providing some measure of clarity for circuits that are split on the issue, the Court’s opinion generates far more questions than answers.

Are baseball uniforms slim-fit leggings and a buttoned up top—or are they more? For example, let’s say a baseball uniform designer claims, as “copyrighted works,” rights to the pinstripes or the piping along the seams of jerseys. Under the precedent established by Star Athletica, who would prevail in litigation—the claimant, or the alleged copyright infringer? And if the claimant prevails, what does this mean for baseball uniform vendors? And how will this affect end consumers of baseball uniforms?

Copyright, as applied to many industries, operates on an incentive-based theory: copyright protection exists to encourage the creation and dissemination of creative expression. In practice, this protection serves as a vehicle for the commodification of creations.  When rights to a particular expression become a commodity, the scope of affected interests expands; in a capitalistic society, the protection and enforcement of commodity-based rights inevitably impacts the end consumer. After all, consumers create the market for the products (or euphemistically, “expressions”) that copyright owners want to protect their rights to.

Tempted by the potential for securing a monopoly in one of the most lucrative clothing industries in the country, brands that are in the position to assert copyrights over the original designs of sports uniforms may soon flood the courts. And allegedly infringing brands, beware: copyright infringement liability carries with it a truly staggering range of potential damages. Pursuant to § 512 of the Copyright Act of 1976, an infringer may be on the hook for a minimum of $350 and a maximum of $75,000 penalty—for each individual finding of copyright infringement. Where infringement is found to be willful, that $75,000 maximum doubles to $150,000 (again, because this bears repeating) per infringement.

Sure, money talks—but money can also silence. If companies are suddenly left exposed to unanticipated liability, scrambling to develop an adequately non-infringing alternative to their previously unchallenged iterations of Varsity Brands’ designs, there may not be a market for consumers to choose from.  A market contender toeing the new, Court-drawn line of infringement is not likely to gamble in the face of potentially ruinous pecuniary liability.

Threats of litigation, and risks of huge penalties if unable to settle litigation before trial, will likely be an effective deterrent for many potential market contenders lacking the deep pockets to carry on in the face of uncertain liability. For the Little League baseball teams, the AAU basketball teams, and more, this may translate into a sharp decline in the generic alternatives to the name-brand jersey supplier.

This brings us to yet another question: do the justifications advanced in Star Athletica for increasing copyright protections afforded to the fashion industry actually outweigh the increased costs to consumers?  If not, then perhaps copyright protection should not extend to fashion. After all, this was the conclusion previously reached by legal scholars, suggested by the text of the Copyright Act, asserted by the Copyright Register’s Office, held by a majority of federal circuit courts, and advanced by critics of Star Athletica’s holding.

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.

2018—First Potentially Unauthorized Satellites Launched into Space

by Gabrielle Daley

There have been a lot of significant firsts in the history of space exploration: 1957—first artificial satellite, 1961—first man in orbit, 1969—first man on the moon. But now one company may have earned a first that is not so prestigious. On March 7, 2018, the FCC accused a Silicon Valley start-up company named Swarm Technologies (Swarm) of launching unauthorized satellites into orbit. If the allegations are correct, Swarm would be the first company to put unauthorized commercial satellites in orbit.

NewSpace

Space exploration and communications have been undergoing a revolution in technology over the past 20 years. New commercial players like SpaceX have taken aim at the stars and pioneered developments, like compact satellites, reusable launch vehicles, and small launch vehicles, that promise to make it easier to access space by lowering costs.

However, given the complex legal and regulatory environment of space, it’s not as simple as brewing up a batch of homemade rocket fuel and shooting for the moon. The Outer Space Treaty of 1967 placed responsibility for launched objects on their country of origin. Therefore, when U.S citizens or entities want to put something into orbit, they first have to ask permission from the United States authorities that govern space access. Those authorities are the Federal Aviation Administration (FAA) —for launch—and the Federal Communications Commission (FCC)—for communications technologies.

As innovators have persevered they have begun to critique the complex layers of regulatory permissions necessary to launch something into space and called for streamlining the process. In October of 2017, President Trump reconvened the National Space Council, and in February of 2018, the National Space Council approved several recommendations to modernize the licensing process for launches.

Swarm Technologies

Swarm Technologies is a start-up company  founded in 2015 by ex-Google engineer Sara Spangelo and Benjamin Longmier, an adjunct professor at the University of Michigan and entrepreneur who has helped build several space technology companies.  In April of 2017 Swarm applied for an FCC license  to launch four small satellites, about the size of hardback books, into orbit, apparently as a proof of concept of their proposed internet network  that would provide connectivity for internet of things (IoT) devices.  Swarm technologies contracted with Spaceflight Industries, which coordinates and manages space launch and ridesharing for payloads. Spaceflight found a place for the tiny satellites on a Polar Satellite Launch Vehicle, which launched 31 satellites into orbit on January 12, 2018. However, on December 12, 2017, the FCC’s experimental licensing branch denied Swarm’s application on the grounds that the satellites posed too great a risk to other spacecraft, because they were too tiny to accurately and reliably track.

If confirmed that Swarm’s technology launched without the proper regulatory clearance, this would be the first ever unauthorized launch of commercial satellites. While some disruptive start-ups have notoriously disregarded laws and regulations as part of their business models, these kind of actions have increasingly been critiqued. In the space sector, where national security is paramount, this strategy does not seem likely to be tolerated.

Consequences

In the aftermath of the allegations of unauthorized launch of these satellites, the FCC has denied Swarm technologies permission for subsequent launches and operation of ground stations. But the exact long-term consequences of this incident both for Swarm Technologies and the space industry more broadly are uncertain.

The question remains, how did a launch take place with a payload that lacked regulatory clearance? Spaceflight’s official response to the story of the alleged unauthorized launch has been that “Spaceflight has never knowingly launched a customer who has been denied an FCC license. It is the responsibility of our customers to secure all FCC licenses.” However, it’s unclear the extent to which the launch provider was concerned with ensuring that all the satellites launched had obtained such clearances.

As policymakers study this incident and look to prevent such events from occurring in the future, parties are sure to ask what lessons we can take away from this new space ‘first’. Regulators may consider placing greater responsibility on launch providers to ensure that the proper authorities have approved the payload before launch. Entrepreneurs, on the other hand, may point to this launch as an example of the need for greater regulatory coordination to ensure clarity for businesses trying to be good corporate citizens.

While Swarm may become merely a cautionary tale for launch providers and startups alike, this episode may also be the catalyst for regulatory change.

Watch this space . . . .

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.

It’s Official: The End of Net Neutrality

by Cierra White

On February 22, 2018, the final rule rolling back net neutrality was published by the Federal Communications Commission in the Federal Register. This rule makes official the reversal of an Obama-era rule requiring that broadband access be classified as an information service rather than a telecommunications service under the Telecommunications Act of 1996. What this essentially means is that internet service providers could slow down, speed up, or block delivery of certain content to consumers.

Those in favor of the roll back of net neutrality believe that the new rules will improve the overall internet user experience by allowing internet service providers to prioritize quality sites and activities that require faster access, thus encouraging innovation. While some say that with the rollback should come with guidelines for how content can be prioritized or restricted, others believe that competition between service providers will be sufficient to regulate how those providers manage content.

Those in favor of net neutrality argue that this rollback will have dire consequences for consumers, businesses, and the internet as we know it. The American Civil Liberties Union fears that internet service providers will prioritize bigger companies who can afford to pay more for faster service while restricting smaller sites or possibly blocking disfavored content. If companies pay more to acquire faster delivery of their content, this added cost would likely be passed on to consumers in the form of increased subscription prices. In addition, in most places in the United States, consumers have access to only one or two broadband internet service providers in their area. Service providers’ management of content cannot be regulated by competition if there is no competition.

The day the final rule rolling back net neutrality was published, a coalition of 23 Attorneys General filed a petition for review asking the court to block the rule from going into effect. Led by New York Attorney General Eric Schneiderman, the Attorneys General argue that the rule is illegal. The petition claims that the rule is arbitrary, capricious, and unconstitutional. Attorney General Schneiderman argues that the rule fails to justify the FCC’s long-standing policy and practice of defending net neutrality, and that the rule wrongly reclassifies broadband internet as an information service rather than a telecommunications service.

Back in 2015, the FCC effectuated net neutrality when it reclassified broadband internet as a telecommunications service rather than an information service. The classification meant that internet service providers could not favor certain content over other content. In other words, the providers must remain neutral. But this too was a reclassification, just as the new rule is a reclassification.

In 2005, the Supreme Court in the Brand X decision confirmed the FCC’s authority to interpret the classifications from the Telecommunications Act that are at issue now. That case stemmed from an FCC rule classifying broadband internet as an internet service provider, just as it has done again.

Civil liberties and consumer groups, some internet companies, and nearly half of the country’s attorneys general have come out in opposition to the FCC’s new rule. They argue that the people have a right to a free and open and neutral internet. A free and open internet is ideal for many. And it is quite possible that the rollback of net neutrality will be detrimental to consumers and the internet once the new rule goes into effect. It is also true that only a handful internet service providers control broadband access in America and most areas have access to only one or two provider options, so depending on competition to keep the system in check may not be prudent.

However, as a legal matter, the opponents of the FCC’s new rule may not succeed on their petitions to block the rule. As the Supreme Court has held, the FCC has the authority to determine this classification. And agencies are permitted to change their minds. Perhaps the continuing evolution of the internet since Brand X, and especially since the passage of the Telecommunications Act, will lead Congress to revisit this type of classification and settle this issue.

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.

Reconciling DRM in Video Games

by Jordan Demo

Like many young kids who grew up playing video games, I can recall the excitement of going to the store to wait in line for hours just to buy a new game that was set to be released at midnight. It’s amazing how things have changed in the last ten years. Long gone are the midnight waits for games at the store. Now, computer games have primarily become digitized, which means you can create an account on a platform, such as Steam, Uplay, or Origin; purchase a digital copy of the game; and download it directly onto your computer the second it is released. The digitization of video games has created an ease of access for consumers. However, it has also sparked an ongoing debate about how the intellectual properties of digital games are protected by Digital Rights Management (DRM).

DRM is an approach taken by the gaming industry to protect its digital media. This protection occurs at the coding level, where code is embedded to limit copying of the game, the number of computers the game can be installed on, or the number of accounts that can be associated with the game. The basic rationale behind gaming companies using DRM in their games is to combat and prevent piracy.

As it pertains to the legality of DRM, the anti-circumvention provision in the Digital Millennium Copyright Act (DMCA) provides protection for developers who incorporate DRM into their games and outlines some of the technological barriers for those wishing to copy different forms of intellectual property. One clause within this provision pertains to the circumvention of access controls. In essence, this means that, if some form of technology is in place to restrict or control access to the work, then it would be illegal for an individual to circumvent or bypass the technology. If a user were to be caught violating the DMCA by circumventing DRM, they could face harsh penalties.

The widespread incorporation of DRM into computer games has been met with continuous criticism. Recently there have been complaints of the overuse of DRM in particular games where developers are using new forms of DRM, such as Denuvo. Gamers are complaining that this DRM is hampering the performance of games. Moreover, some DRMs require gamers to be continuously online for “check-ins,” and other developers are getting creative in using malware as a form of DRM, where only genuine copies of the game would remove the malware during installation. While studies on DRM affecting performance are thus far inconclusive, the question still remains as to whether this is a necessary practice. In other words, is the overly stringent use of DRM really that effective against piracy, or is it actually encouraging it? From a traditional gaming perspective, the DMCA anti-circumvention provision limits certain aspects of digital gaming, such as sharing games with your friends, reselling old games on the secondary market, and requiring that a user always be connected to the internet in order to play even a single player game. Any attempt to circumvent the DRM to do any of these things places you in violation of the DMCA.

While there are genuine concerns about using DRM, developers argue that there is a justification for doing so. As previously mentioned, piracy is of grave concern, as many take the attitude of “well, these big companies already make a lot of money, so I will just illegally download a cracked DRM version of the game.” However, in computer gaming there are many indie or small game developers who can be negatively impacted by piracy, thus there seems to be a logical reason for these types of developers to use DRM. The problem seems to lie in the fact that digital forms of intellectual property are easier to duplicate and distribute than physical copies of games. Moreover, there are software tools being developed to circumvent the DRM in games, and which violate the anti-circumvention provision. But many of these individuals developing the software or distributing the games freely online are outside the jurisdiction or resources of gaming companies and law enforcement officials. Therefore, this creates a desire for developers to use more sophisticated DRM protection, such as Denuvo.

Overall, it is likely that a practicable solution lies in a balance between using some type of DRM protection, but not so much protection that it places an ease-of-access burden on gamers. It will be interesting to see how this debate plays out in the near future, as DRM is getting more sophisticated and there is more pushback from the gaming community.

*Disclaimer: The Colorado Technology Law Journal Blog contains the personal opinions of its authors and hosts, and do not necessarily reflect the official position of CTLJ.