Tech Law Journal Daily E-Mail Alert
Friday, July 15, 2011, Alert No. 2,259.
Home Page | Calendar | Subscribe | Back Issues | Reference
US Announces That It Reserves the Right to Respond to Cyber Attacks Militarily

7/14. William Lynn, Deputy Secretary of Defense, gave a speech at the National Defense University in Washington DC, in which he stated that the U.S. "reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing".

He said that "bits and bytes can be as threatening as bullets and bombs".

However, he also said that U.S. policy is to strengthen cyber security to deny potential attackers "the benefit of an attack". He said that "our first goal is to prevent war".

The Department of Defense (DOD) also released a paper [19 pages in PDF] on July 14, 2011, titled "Department of Defense Strategy for Operating In Cyberspace". It does not address what attacks would warrant a military response, how the DOD would attribute the source of the attack, or how the U.S. might deliver a military response. Rather, it is a five part plan for building up cyber security. See, related story in this issue titled "Department of Defense Releases Strategy for Operating In Cyberspace".

William LynnLynn (at right) began by stating that "In 2008, a foreign intelligence agency penetrated our classified computer systems". He did not state which one.

Lynn said that the "the centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it.  Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states, or terrorist groups."

"Although in the future we are likely to see destructive or disruptive cyber attacks that could have an impact analogous to physical hostilities, the vast majority of malicious cyber activity today does not cross this threshold." He continued that "the most prevalent cyber threat to date has been exploitation -- the theft of information and intellectual property from government and commercial networks".

Currently, "sophisticated cyber capabilities reside almost exclusively in nation-states". However, he said that in the future non-state actors may pose a cyber threat.

"Terrorist groups and rogue states must be considered separately. They have few or no assets to hold at risk and a greater willingness to provoke. They are thus harder to deter. If a terrorist group gains disruptive or destructive cyber tools, we have to assume they will strike with little hesitation. And it is clear that terrorist groups, as well as rogue states, are intent on acquiring, refining, and expanding their cyber capabilities."

"Commentators have asked whether and how the U.S. would respond militarily to attacks on our networks." He stated in response that "Just as our military organizes to defend against hostile acts from land, air, and sea, we must also be prepared to respond to hostile acts in cyberspace. Accordingly, the United States reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing."

But, he also said that the U.S. will seek to deny potential attackers "the benefit of an attack rather than relying exclusively on the threat of retaliation".

He also said that the nature of the internet "can also make intrusions difficult to attribute", so "we cannot rely on the threat of retaliation alone to deter potential attackers".

Department of Defense Releases Strategy for Operating In Cyberspace

7/14. The Department of Defense (DOD) released a paper [19 pages in PDF] titled "Department of Defense Strategy for Operating In Cyberspace".

Despite the broad title of this paper, its content is limited. It does not address what kinds of cyber attacks would warrant a military response by the U.S. It does not address how the DOD would attribute the source of a cyber attack. It does not address how the U.S. might deliver a military retaliation for a cyber attack.

Rather, this paper is merely a five part plan for building up cyber security. It argues that a degree of deterrence can be achieved by making cyber space less vulnerable to cyber attacks.

First, this paper describes the problem. "The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity -- the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission."

It continues that "many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD's information infrastructure. Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems."

"Foreign cyberspace operations against U.S. public and private sector systems are increasing in number and sophistication. DoD networks are probed millions of times every day, and successful penetrations have led to the loss of thousands of files from U.S. networks and those of U.S. allies and industry partners."

It states that the "DoD is particularly concerned with three areas of potential adversarial activity: theft or exploitation of data; disruption or denial of access or service that affects the availability of networks, information, or network-enabled resources; and destructive action including corruption, manipulation, or direct activity that threatens to destroy or degrade networks or connected systems."

This is an outline of the DOD cyber strategy announced in this paper:

  1. Treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential.
  2. Employ new defense operating concepts to protect DoD networks and systems.
  3. Partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government cybersecurity strategy.
  4. Build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity.
  5. Leverage the nation's ingenuity through an exceptional cyber workforce and rapid technological innovation.
CCIA Releases Report on Importance of Fair Use to U.S. Economy

7/11. The Computer and Communications Industry Association (CCIA) released the 2011 edition of a report [PDF] titled "Fair Use in the U.S. Economy: Economic Contribution of Industries Relying on Fair Use". See also, CCIA release.

It states that the fair use industries make up a large and growing part of the U.S. economy, and that policymakers should consider the importance of the fair use industries when addressing copyright policy proposals.

The report states that the fair use industries include internet search and web hosting providers, software developers, and manufacturers of consumer electronic devices that enable copying of copyrighted works.

This report states that "in 2008 and 2009, fair use industries generated total revenue averaging $4.6 trillion, a 35 percent increase over 2002 revenue of $3.4 trillion." Moreover, "Fair use-related industry value added in 2008 and 2009 averaged $2.4 trillion, approximately 17 percent of total U.S. current dollar GDP."

The report also states that "Employment in industries benefiting from fair use and related limitations and exceptions increased from 16.9 million in 2002 to 17.7 million in 2008."

Also, "From 2002 to 2007, the productivity of U.S. fair use industries increased by 38 percent to nearly $137,000 per employee."

The report also states that "Exports of goods and services related to fair use industries increased by 64 percent from $179 billion in 2002 to $294 billion in 2008, and then fell back to $266 billion in 2009."

The report concludes that "By any measure, the growth rate of fair use industries has outpaced overall economic growth in recent years, fueled productivity gains, and supported millions of jobs."

Rep. Jared Polis (D-CO), Ed Black (head of the CCIA), and Andrew Szamosszegi (Capital Trade Inc.), an author of the report, spoke at an event on Capitol Hill on July 11.

Ed Black argued that policymakers should take note of the size and importance of fair use industries when considering changes to copyright law. However, he did not assert that any recent statute caused a decrease in GDP or total employment, or that any pending legislative proposal would have such an effect.

He argued that fair use is important to the economy, and that policy makers should promote balance in U.S. and international copyright policy.

Black expressed concern about a pending legislative proposal advocated by copyright industries, and particularly the movie and music companies -- S 968 [LOC | WW], the "Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011", or "PROTECT IP Act".

The Senate Judiciary Committee (SJC) amended and approved this bill on May 26, 2011.

Black also argued that the content industries tend to claim more rights than they posses under copyright law, and to blur fair use rights. He cited as examples claims regarding televised sporting events, and book publishers' assertion that nothing in a book can be reproduced without permission.

Supreme Court Applies Heightened Scrutiny to State Regulation of Commercial Data

7/15. On June 23, 2011, the Supreme Court issued its 6-3 opinion [53 pages in PDF] in Sorrell v. IMS Vermont, holding unconstitutional under the First Amendment a Vermont statute that regulates certain sales, disclosures and uses of pharmacy records.

Key to this outcome was the majority's application of "heightened judicial scrutiny" to this speech. That is, the Constitution merely provides that "Congress shall make no law ... abridging the freedom of speech, or of the press". The Supreme Court has long since extended this restriction to other government entities, including state legislatures. In addition, the Supreme Court has invented categories of speech, regulation of which are subjected to widely divergent standards of review. Whether are regulation of speech is found constitutional is often dependent upon which standard of review is applied.

Vermont's regulation of the use of pharmacy records is not in itself of wide reaching importance. However, the analysis applied by the Court provides some indication of how it might rule in future cases involving state or federal legislation, or agency rulemaking, that restricts the collection and sharing of information about individuals under the guise of privacy protection.

On July 8, 2011, Rep. Ed Markey (D-MA) introduced HRes 343, a resolution expressing the disapproval of the House of Representatives. It states that the Supreme Court "incorrectly applied a heightened First Amendment standard of review to a Vermont statute that lawfully regulated purely economic activity".

This resolution has no cosponsors. It was referred to the House Commerce Committee (HCC). See also, Rep. Markey's release.

On July 19, 2011, at 12:00 NOON, the Tech Freedom (TF) will host an event at which this case will be discussed. The first panel is titled "Towards Greater Commercial Free Speech Protections?". The speakers will be Greg Stohr (Bloomberg), Tom Julin (Hunton & Williams), Bob Revere (Davis Wright Tremaine), Greg Beck (Public Citizen), and Richard Ovelmen (Jordan Burt).

The second panel is titled "Reconciling Data Restrictions & the First Amendment". The speakers will be Jim Harper (Cato Institute), John Verdi (Electronic Privacy Information Center), Jonathan Emord (Emord & Associates), John Morris ( Center for Democracy & Technology), and Berin Szoka (TF). See, notice and registration page.

Anthony KennedyJustice Kennedy (at left), writing for a six Justice majority, concluded that the statute at issue violates the First Amendment.

In this case, the state of Vermont enacted a statute that restricts the sale, disclosure, and use of pharmacy records that reveal the prescribing practices of individual doctors. It provides that the information may not be sold, disclosed by pharmacies for marketing purposes, or used for marketing by pharmaceutical manufacturers.

Vermont asserted privacy protection as a rationale for its statute.

The Supreme Court held that "Speech in aid of pharmaceutical marketing, however, is a form of expression protected by the Free Speech Clause of the First Amendment. As a consequence, Vermont's statute must be subjected to heightened judicial scrutiny. The law cannot satisfy that standard."

The Court wrote that the statute is a content based restriction, aimed at diminishing the effectiveness of marketing by manufacturers of brand name drugs, and that the First Amendment requires heightened scrutiny whenever the government creates a regulation of speech because of disagreement with the message it conveys.

The Court also wrote that this statute is not a mere commercial regulation. "Both on its face and in its practical operation, Vermont's law imposes a burden based on the content of speech and the identity of the speaker."

The Court added that "The capacity of technology to find and publish personal information, including records required by the government, presents serious and unresolved issues with respect to personal privacy and the dignity it seeks to secure. In considering how to protect those interests, however, the State cannot engage in content-based discrimination to advance its own side of a debate."

Under the statute at issue, Vermont "gives possessors of the information broad discretion and wide latitude in disclosing the information, while at the same time restricting the information's use by some speakers and for some purposes, even while the State itself can use the information to counter the speech it seeks to suppress. Privacy is a concept too integral to the person and a right too essential to freedom to allow its manipulation to support just those ideas the government prefers."

Justice Breyer wrote a lengthy dissent, joined by Justices Kagan and Ginsburg. He argued that the Court should have applied its intermediate scrutiny test for commercial speech in the case, and under that standard concluded that the Vermont statute passes constitutional muster.

Breyer, relying on the 1980 opinion in Central Hudson Gas & Electric Corp. v. Public Service Commission of New York, which is reported at 447 U.S. 557, argued that heightened scrutiny applies to core political speech, while the Court should apply looser constraints on the regulation of commercial speech.

Berin Szoka
Berin Szoka
Copyright TF

Berin Szoka, head of the Tech Freedom, asserted in a release that "Future courts will therefore strike down privacy laws that burden too much speech, such as by requiring opt-in rather than opt-out. The government must clearly establish the need for privacy regulation and consider the availability of less-restrictive alternatives, such as user empowerment, education and the enforcement of existing laws."

He argued that "Policymakers should carefully consider the values recognized by the Court today before further clamping down on the flow of data that drives speech throughout the information economy."

Sen. Patrick Leahy (D-VT), who represents the state that just lost this case, stated in a release that "the Supreme Court has overturned a sensible Vermont law that sought to protect the privacy of the doctor-patient relationship. This divided ruling is a win for data miners and large corporations and a loss for those of us who care about privacy not only in my home state of Vermont but across the nation. States like Vermont must be able to protect the privacy of sensitive information exchanged between a doctor and patient. This decision undermines that ability, and risks unduly influencing doctors in their future prescription choices."

He wrote that "This decision is another example of this Court using the First Amendment as a tool to bolster the rights of big business at the expense of individual Americans."

In This Issue
This issue contains the following items:
 • US Announces That It Reserves the Right to Respond to Cyber Attacks Militarily
 • Department of Defense Releases Strategy for Operating In Cyberspace
 • CCIA Releases Report on Importance of Fair Use to U.S. Economy
 • Supreme Court Applies Heightened Scrutiny to State Regulation of Commercial Data
 • Senate Judiciary Committee Considers Judicial Nominees
Washington Tech Calendar
New items are highlighted in red.
Friday, July 15

The House will meet at 10:00 AM for legislative business. It will resume consideration of HR 2354 [LOC | WW], the "Energy and Water Appropriations Act, 2012". See, Rep. Cantor's schedule for the week of July 11.

The Senate will not meet.

8:30 AM. The House Commerce Committee's (HCC) Subcommittee on Communications and Technology will hold a hearing titled "Spectrum and Public Safety Issues". The witnesses will be Christopher McCabe (CTIA), Christopher Moore (San Jose Police Department), Peter Cramton (University of Maryland), Gordon Smith (National Association of Broadcasters), and Michael Calabrese (New America Foundation). See, notice and HCC hearing memorandum. Location: Room 2123, Rayburn Building.

10:00 AM. The House Judiciary Committee's (HJC) Subcommittee on Intellectual Property, Competition and the Internet will hold a hearing on HR __, the "Innovative Design Protection and Piracy Prevention Act". See, notice. Location: Room 2141, Rayburn Building.

Monday, July 18

There House will be in session the week of July 18. There will be no votes in the House on July 18. See, 2011 House Calendar.

The Senate will meet at 2:00 PM.

6:00 - 8:30 PM. The Federal Communications Bar Association's (FCBA) Young Lawyers Committee will host an event titled "FCBA Trivia Night". Location: Laughing Man Tavern, 1306 G St., NW.

Deadline to submit reply comments to the Federal Communications Commission (FCC) in response to its Further Notice of Proposed Rulemaking (FNPRM) regarding ex parte communications with the FCC. The FCC adopted this item on February 1, 2011, and released it on February 2, 2011. It is FCC 11-11 in GC Docket No. 10-43. See, notice in the Federal Register, May 2, 2011, Vol. 76, No. 84, at Pages 24434-24436.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response to its Notice of Inquiry (NOI) [27 pages in PDF] regarding rights of way policies and wireless facilities siting requirements. The FCC adopted and released this item on April 7, 2011. It is FCC 11-51 in WC Docket No. 11-59. See, notice in the Federal Register, Vol. 76, No. 95, Tuesday, May 17, 2011, at Pages 28397-28403.

Tuesday, July 19

The House will meet. Votes will be postponed until 6:30 PM. See, 2011 House Calendar.

8:00 -10:00 AM. Broadband Census News LLC will host a panel discussion titled "Making the Universal Service Fund Into a Universal Broadband Fund". Breakfast will be served. See, notice and registration page. This event is also sponsored by the National Cable & Telecommunications Association (NCTA), US Telecom, Telecommunications Industry Association (TIA), and ICF International. Location: Clyde's of Gallery Place, 707 7th St., NW.

8:30 - 9:45 AM. The Information Technology and Innovation Foundation (ITIF) will host a panel discussion titled "What Would Pro-Growth Corporate Tax Reform Look Like?". The speakers will be Ike Brannon (American Action Forum), Robin Beran (Catepillar, Inc.), and Rob Atkinson (ITIF). See, notice and registration page. This event is free and open to the public. A light breakfast will be served. Location: Room B-340, Rayburn Building.

10:30 - 11:30 AM. The Heritage Foundation (HF) will host a lecture by Alan Leong Kah-kit (Legislative Councillor and 2007 Candidate for Chief Executive, Hong Kong SAR) titled "The Centennial of the 1911 Revolution: A Look Into the Future of Hong Kong and China". The HF will webcast this event. This event is free and open to the public. See, notice. Location: HF, 214 Massachusetts Ave., NE.

12:00 NOON - 3:00 PM. The Tech Freedom (TF) will host an event titled "Sorrell: The Supreme Court Confronts Free Speech, Marketing & Privacy". See, the Supreme Court's June 23, 2011, opinion [53 pages in PDF] in Sorrell v. IMS Vermont, TF's amicus curiae brief [PDF], and story titled "Supreme Court Applies Heightened Scrutiny to State Regulation of Commercial Data" in TLJ Daily E-Mail Alert No. 2,259, July 15, 2011. The first panel is titled "Towards Greater Commercial Free Speech Protections?". The speakers will be Greg Stohr (Bloomberg), Tom Julin (Hunton & Williams), Bob Revere (Davis Wright Tremaine), Greg Beck (Public Citizen), and Richard Ovelmen (Jordan Burt). The second panel is titled "Reconciling Data Restrictions & the First Amendment". The speakers will be Jim Harper (Cato Institute), John Verdi (Electronic Privacy Information Center), Jonathan Emord (Emord & Associates), John Morris (Center for Democracy & Technology), and Berin Szoka (TF). See, notice and registration page. This event is free and open to the public. Lunch will be served. Location: Hunton & Williams, 2200 Pennsylvania Ave., NW.

12:00 NOON - 2:00 PM. The Information Technology and Innovation Foundation (ITIF) will host an event titled "The Atlantic Century 2011: Benchmarking U.S. and EU Innovation and Competitiveness". The speakers will include Chan Heng Chee (Singapore's Ambassador to the US), Lenny Mendonca (McKinsey), and Rob Atkinson (ITIF). See, ITIF notice. This event is free and open to the public. Location: ITIF/ITIC, Suite 610A, 1101 K St., NW.

12:30 - 2:00 PM. The Computer & Communications Industry Association (CCIA) will host a panel discussion titled "How Public Policy Can Enable Cloud Computing -- Driving Innovation, Investment & Job Creation Beyond the IT Sector". The speakers will include Michael Nelson (Georgetown University). This event is free and open to the public. Lunch will be served. Register by contacting Maggie Clark at mclark at ccianet dot org or 202-783-0070 ext 120. Location: Room B-340, Rayburn Building.

1:00 - 2:15 PM. The New America Foundation (NAF) will host a panel discussion titled "Kiwi Connected: What Can the U.S. Learn From New Zealand's Broadband Plan?" The speakers will be Tom Glaisyer (NAF), Joanne Hovis (President of Columbia Telecommunications Corporation), Ben Lennett (NAF), and Graham Mitchell (CEO of Crown Fiber Holdings). See, notice. Location: NAF, Suite 400, 1899 L St., NW.

1:00 - 2:30 PM. The American Bar Association (ABA) will host a webcast panel discussion titled "Implications of AT&T Mobility v. Concepcion: Has the Supreme Court Sounded the Death Knell for Some Class Actions?". See, April 27, 2011, opinion of the Supreme Court, and story titled "Supreme Court Holds Class Action Waiver Clauses in Arbitration Contracts Are Enforceable" in TLJ Daily E-Mail Alert No. 2,228, April 28, 2011. The speakers will be Amy Brown (Squire Sanders), Paul Bland (Chavez & Gertler), Sarah Cole (Ohio State law school), and Julia Strickland (Stroock Stroock & Lavan). Prices vary. CLE credits. See, notice.

Wednesday, July 20

9:00 - 10:30 AM. The Information Technology and Innovation Foundation (ITIF) will host an event titled "An App Store for Energy: eKNOW and Data-Driven Innovation for Smart Buildings". See also, S 1029 [LOC | WW], the "Electric Consumer Right to Know Act" or "e-KNOW Act". The speakers will include Sen. Scott Brown (R-MA), Lorie Wigle (Intel), Nick Sinai (EOP's Office of Science and Technology Policy), Dean Garfield (ITIC), and Rob Atkinson (ITIF). See, ITIF notice. This event is free and open to the public. Location: Room SVC 201-00, Capitol Visitor Center.

1:00 - 2:30 PM. The American Bar Association (ABA) will host a webcast panel discussion titled "Are Products of Nature Patentable Subject Matter?". The speakers will be Eileen Kane (Penn State law school), John Hendricks (Hitchcock Evert), Harold Wegner (Foley & Larnder), and Jacqueline Bonilla (Foley & Lardner). Prices vary. CLE credits. See, notice.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response its 3rd Further Notice of Proposed Rulemaking (NPRM) [110 pages in PDF] regarding extensive revisions to its Part 11 rules governing the Emergency Alert System (EAS). The FCC adopted this NPRM on May 25, 2011, and released the text on May 26, 2011. It is FCC 11-82 in EB Docket No. 04-296. See, notice in the Federal Register, Vol. 76, No. 118, Monday, June 20, 2011, at Pages 35810-35831.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response to its Public Notice regarding whether certain docketed FCC proceedings should be terminated as dormant. See, June 3, 2011, Public Notice (DA 11-992 in CG Docket No. 11-99), and notice in the Federal Register, Vol. 76, No. 118, Monday, June 20, 2011, at Pages 35892-35893.

Thursday, July 21

10:00 AM. The Senate Judiciary Committee (SJC) will hold an executive business meeting. The agenda again includes consideration of Steve Six (to be a Judge of the U.S. Court of Appeals for the 10th Circuit), Christopher Droney (USCA/2ndCir) Jane Milazzo (USDC/EDLa), Robert Mariani (USDC/MDPenn), Cathy Bissoon (USDC/WDPenn), Mark Hornak (USDC/WDPenn), and Robert Scola (SDFl). The SJC will webcast this event. See, notice. Location: Room 226, Dirksen Building.

12:15 - 1:15 PM. The Federal Communications Bar Association's (FCBA) Young Lawyers Committee will host a brown bag lunch. The speaker will be Julius Knapp, long time Chief of the FCC's Office of Engineering and Technology (OET). He will discuss "career development" and "professional growth opportunities". For more information, contact Susan Ornstein at susan dot goldhar at gmail dot com, or Brendan Carr at bcarr at wileyrein dot com. Location: FCC, Commission Meeting Room, 445 12th St., SW.

12:00 NOON - 2:00 PM. The DC Bar Association will host an event titled "The ABCs of IP: A Primer on Patent, Copyright, and Trademark Law". The speakers will be Janet Fries (Drinker Biddle & Reath), Gary Krugman (Sughrue Mion), Steven Warner (Fitzpatrick Cella), and Mark Williamson (Fitzpatrick Cella). The price to attend ranges from $40 to $55. For more information, contact 202-626-3463. See, notice. Location: DC Bar Conference Center, B-1 Level, 1250 H St., NW.

Day one of a two day event hosted by the Minority Media and Telecom Council (MMTC) titled "25th Anniversary Access to Capital and Telecom Policy Conference". The speakers will include Robert McDowell (FCC Commissioner), Marc Morial (head of the Broadband Opportunity Coalition), Lewis Dickey (Cumulus Media), Walter McCormick (US Telecom), Dean Garfield (Information Technology Industry Council), Bret Perkins (Comcast), Joseph Waz (Comcast), Tom Tauke (Verizon), and James Cicconi (AT&T). See, conference web site. Location: Westin Georgetown Hotel, 2350 M St., NW.

Friday, July 22

Day two day event hosted by the Minority Media and Telecom Council (MMTC) titled "25th Anniversary Access to Capital and Telecom Policy Conference". See, conference web site. Location: Westin Georgetown Hotel, 2350 M St., NW..

Deadline to submit reply comments to the Federal Communications Commission (FCC) in response to its 4th Further Notice of Proposed Rulemaking (NPRM) [16 pages in PDF] regarding out of band emission limits for mobile Broadband Radio Service (BRS) and Educational Broadband Service (EBS) devices operating in the 2496-2690 MHz band. This item is FCC 11-81 in WT Docket No. 03-66 and RM-11614. The FCC adopted this FNPRM on May 24, 2011, and released the text on May 27, 2011. See, notice in the Federal Register, Vol. 76, No. 109, Tuesday, June 7, 2011, at Pages 32901-32906.

Senate Judiciary Committee Considers Judicial Nominees

7/14. The Senate Judiciary Committee (SJC) held an executive business meeting at which it considered numerous judicial nominees.

The SJC approved by voice vote the nomination of Stephen Higginson to be a Judge of the U.S. Court of Appeals (5thCir).

The SJC again held over consideration of the nomination of Steve Six to be a Judge of the U.S. Court of Appeals (10thCir). His nomination is on the agenda for the SJC's meeting of July 21. See, notice.

The SJC held over for the first time consideration of the nomination of Christopher Droney to be a Judge of the U.S. Court of Appeals (2ndCir). His nomination is on the agenda for the SJC's meeting of July 21. See, notice. He has been a Judge of the U.S. District Court (DConn) since 1997. Judge Droney, sitting by designation, joined in the opinion of a three judge panel of the Second Circuit in Arista Records v. Launch Media, holding that a webcasting service is not an interactive service within the meaning of 17 U.S.C. § 114(j)(7). See also, story titled "Obama Nominates Droney for 2nd Circuit" in TLJ Daily E-Mail Alert No. 2,233, May 5, 2011.

The SJC approved by voice vote the nomination of Katherine Forrest to be a Judge of the U.S. District Court (SDNY). See also, story titled "Obama Nominates Time Warner Copyright Lawyer for SDNY" in TLJ Daily E-Mail Alert No. 2,233, May 5, 2011.

The SJC approved by a vote of 14-4 the nomination of Alison Nathan to be a Judge of the U.S. District Court (SDNY). The ranking Republican on the SJC, Sen. Charles Grassley (R-IA), vote yes, but stated at this meeting that Nathan "has been admitted to practice law for only 8 years" and that she does "not have enough experience." He said that "Being appointed a federal District Judge should be the capstone of an illustrious career. Federal judges should have significant courtroom and trial experience as a litigator or judge. This is not the place for on-the-job training." He explained that due in part to her support from the Senators from New York, including Sen. Charles Schumer (D-NY), who is a member of the SJC, he "will not block or delay" the SJC process. He added that he would vote for her in the SJC, " with the understanding that there will be a second opportunity to fully examine" her record, and the he will not "deprive the full Senate from having the opportunity to express its will".

The SJC also approved the nominations of Jane Milazzo (USDC/EDLa) and Susan Hickey (USDC/WDArk), and held over until the meeting of July 21 the nominations of Robert Mariani (USDC/MDPenn), Cathy Bissoon (USDC/WDPenn), Mark Hornak (USDC/WDPenn), and Robert Scola (USDC/SDFl).

About Tech Law Journal

Tech Law Journal publishes a free access web site and a subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year for a single recipient. There are discounts for subscribers with multiple recipients.

Free one month trial subscriptions are available. Also, free subscriptions are available for federal elected officials, and employees of the Congress, courts, and executive branch. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert are not published in the web site until two months after writing.

For information about subscriptions, see subscription information page.

Tech Law Journal now accepts credit card payments. See, TLJ credit card payments page.

Solution Graphics

TLJ is published by David Carney
Contact: 202-364-8882.
carney at techlawjournal dot com
3034 Newark St. NW, Washington DC, 20008.

Privacy Policy
Notices & Disclaimers
Copyright 1998-2011 David Carney. All rights reserved.