Computers, Privacy & the Constitution

CompPrivConst Web Changed By
MachineTestimonyandConfrontation 14 Jan 2015 - 22:34 IanSullivan
Last semester I was thinking about the topic of machine generated testimony and the Confrontation Clause of the Sixth Amendment. I am curious, as we wrap up the semester ...
MadhuPochaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
What Happens in Vegas, Stays in . . . a Government Hard Drive? By MadhuPocha 27 Mar 2008 Few people have heard of Jonas, a man whose work has helped transform ...
MadhuPochaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Iraqi biometric identification program and its relevance to privacy rights in the U.S. MadhuPocha 13 May 2008 Last year news organizations on the U.S. military ...
MahaAtalFirstPaper 05 Jan 2010 - 22:30 IanSullivan
How Do You Protect That Which You Cannot Define (revised) By MahaAtal 17 May 2009 In March, a journalism listserv to which I subscribe ignited over legislation up ...
MahaAtalSecondPaper 05 Jan 2010 - 22:32 IanSullivan
The Truth is Not Enough By MahaAtal 18 May 2009 In our class on Part Four, we determined that until we can build a legal infrastructure for privacy, we should take ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
MathewKenneallyFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Why Eric Holder Really Cares if Edward Snowden is a "Whistleblower". Second Draft Chelsea Manning exposes complicity in torture and the actual death toll from the ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
MattDavisRatner-FirstPaper 05 Jan 2010 - 22:30 IanSullivan
Individual Privacy: A Social Construction? Introduction In order to change the massive trend of disappearing privacy, many aspects of our daily lives must change ...
MattDavisRatnerSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Health Insurance and the Net Individuals are risk averse. We buy insurance to mitigate our personal risks. One of the most important expenses in an individual's ...
MattKokotFirstPaper 11 Jan 2013 - 21:48 IanSullivan
United States v. Jones: A Fleeting Victory for Privacy By MattKokot 13 Mar 2012 Introduction In States v. Jones, the Supreme Court held that the Fourth Amendment ...
MatthewAmsterdamFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction : Years ago, when Facebook was still only accessible to students with registered .edu email addresses, I sat in a lecture with my other high school seniors ...
MatthewAmsterdamSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction I was troubled, if perhaps unsurprised, to read the statement from the founder of Cree.py, an application that tracks individual's locations based on ...
MatthewEckmanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Encryption, Privacy, and the Fifth Amendment By MatthewEckman 08 Mar 2009 PAPER IN PROGRESS The Electronic Frontier Foundation highly recommends that people encrypt ...
MatthewEckmanSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Correction By MatthewEckman 15 May 2009 I made a mistake in class one day. Professor Moglen, as I recall, was speaking in ominous tones about the fact that grocery ...
MatthieuWharmbyFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Draft #2 Escaping your online past: the case against a global right to be forgotten. By MatthieuWharmby 06 Mar 2015 Introduction Recently there have been many ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
MayelaGarzaFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DNA Collection in the US: Where does it end? In the late 1980 #8217;s, US crime laboratories began DNA testing. Shortly, thereafter crime labs in different States ...
MayelaGarzaSecondPaper 14 Jan 2015 - 22:44 IanSullivan
MayelaGarza 13 May 2013 The Data Collectors Before coming to Columbia my doctor back in Mexico found a cyst and gave me birth pills to see if they would remove it ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
MeharJagotaFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Behavioral Economics and Privacy Rights By MeharJagota 11 Apr 2012 Introduction A theme of our class has been the apparent cognitive bias which prevents people ...
MenahemGrossmanFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Hiding in Plain Sight: Alternative Approaches to Cybersecurity (Draft 2) By MenahemGrossman 14 May 2015 Introduction Much of conventional cybersecurity efforts ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
MislavMataijaFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Assessing a Regulatory Approach to Data Protection: the EU Directive By MislavMataija 01 May 2009 Can the collection of personal data be regulated by the market ...
MislavMataijaSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Flea Market and the Public Square #8211; Giving the First Amendment a Say in Copyright MislavMataija 11 May 2009 File sharing cases are based on the 1984 ...
ModuleTest28Jun2012 28 Jun 2012 - 06:57 XmvlYzlv?
XmvlYzlv 28 Jun 2012 jlkhgvkihbloijn;oijbnoiuybjuytvuytrcvuytfvjuyg
MunKiNamFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Problems of the Adoption of the Notice and Takedown Regime by Other Countries By MunKiNam 01 May 2010 The Notice and Takedown Regime in DMCA Section 512 (c) of ...
MunKiNamSecondPaper 17 Jan 2012 - 17:48 IanSullivan
YouTube vs. South Korean Government: Real Name Verification System in South Korea and its Threat to the Freedom of Expression on the Internet By MunKiNam 01 May ...
Found 30 topics
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM