Computers, Privacy & the Constitution

100 Recent Changes in CompPrivConst Web retrieved at 13:18 (GMT)

AlexanderHoffmanFirstPaper 16 Nov 2017 - 00:39 EbenMoglen
Quantum Cryptography and the False Promise of an Unhackable Future AlexanderHoffman 21 Mar 2017 Introduction Snowden has sparked a new era in which the privacy ...
SocksProxy 09 Oct 2017 - 19:35 JohnOMeara
Technology Project 2: Better Browsing Control In your first technology project you created a !GPG key and then uploaded it to the public keyservers, making it possible ...
CorinneShimSecondPaper 01 Oct 2017 - 20:14 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
LeonHuangFirstPaper 30 Sep 2017 - 19:50 EbenMoglen
Privacy and Trust By LeonHuang 29 September 2017 Protecting our privacy relies on finding someone we can trust. Our quest for privacy began with a loss of trust ...
CorinneShimSecondPaper2012 26 Sep 2017 - 15:16 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
ZebulunJohnsonFirstPaper 19 Sep 2017 - 15:21 ZebulunJohnson
ZebulunJohnson 19 Sep 2017 Introduction As a child, I often went to hidden places at quiet times to read books my parents had deemed #8220;inappropriate #8221; ...
CorinneShimFirstPaper 25 Jul 2017 - 14:21 EbenMoglen
An Introduction to how Personal Privacy and Personal Autonomy Have Changed with Technology By CorinneShim 22 Mar 2017 Introduction We currently live in a society ...
AndrewWatikerFirstPaper 22 Jul 2017 - 05:39 AndrewWatiker
Privacy in the Mobile Workplace !AirWatch By AndrewWatiker 22 Jul 2017 The Problem For many, the 21st century workplace has expanded far beyond the office. ...
AudreyAmsellemFirstPaper 30 May 2017 - 16:19 AudreyAmsellem
Who Cares If You Listen? Agency and Surveillance in Societies of Control By AudreyAmsellem May 30 2017 In 1984, George Orwell imagined a future society in which ...
TailsInstallation 14 May 2017 - 20:18 AudreyAmsellem
Tails Installation Tails (The Amnesiac Incognito Live System) is a free software operating system descended from Debian, the universal free software OS which is designed ...
EveShabtoFirstPaper 09 May 2017 - 04:40 EveShabto
I Know Where You Live and I've Seen Where you Sleep: Cell Site Location Data and the Fourth Amendment By EveShabto 04 Mar 2017 Introduction Cellular phones are ...
ShayaAfsharFirstPaper 08 May 2017 - 08:15 ShayaAfshar
The Genetic Collection Network By ShayaAfshar 05 Mar 2017 #8220;As gene tests become common, possibilities for abuse will intensify. Banks might not offer you ...
TracyRizkFirstPaper 08 May 2017 - 04:04 TracyRizk
The #8220;Right to Be Forgotten #8221; as a Protection for Freedom of Thought By TracyRizk 8 May 2017 A bill in the New York State Assembly proposes the establishment ...
ShayBanerjeeFirstPaper 08 May 2017 - 01:12 ShayBanerjee
To Understand Polarization, Look at the Software ShayBanerjee 6 May 2017 It is no coincidence that workers most affected by automation are rejecting economic ...
ChristopherPistrittoFirstPaper 05 May 2017 - 22:00 ChristopherPistritto
The Chilling Effect of Surveillance By ChristopherPistritto Introduction The #8220;chilling effect #8221; on free speech brought about by vague and overbroad ...
SunghyeOhFirstPaper 05 May 2017 - 19:49 SunghyeOh
Review of Massive Personal Information Leakage Case and Underlying Problems in South Korea By SunghyeOh 21 Mar 2017 Introduction When we talk about the protection ...
HyunKyungLeeFirstPaper 05 May 2017 - 19:24 HyunKyungLee
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
DavidHammondFirstPaper 05 May 2017 - 18:14 DavidHammond
Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment? By DavidHammond 02 Mar 2017 Introduction What if I had ...
OrBelkinFirstPaper 05 May 2017 - 16:14 OrBelkin
A Right to Keep and Bear Cryptography? By OrBelkin 21 Mar 2017 Introduction The adoption of the individual right theory has broaden the reach of the Second Amendment ...
KosukeUenoFirstPaper 04 May 2017 - 22:09 KosukeUeno
GPS investigation found illegal in Japan's Supreme Court By KosukeUeno 22 Mar 2017 Japan #8217;s Supreme Court Decision on GPS Investigation On March 15, 2017 ...
EthanThomasFirstPaper 03 May 2017 - 21:42 EthanThomas
The Campaign Against Privacy: How Propaganda is Used to Perpetuate Surveillance and State Power EthanThomas 03 May 2017 Propaganda and Power Through Subtle Influence ...
JulianWilliamsSecondPaper 03 May 2017 - 03:08 JulianWilliams
JulianWilliams 03 May 2017 Mass Surveillance and the Limitations of the First Amendment One of the key purposes of the First Amendment is to keep government accountable ...
JessicaCoreyFirstPaper 02 May 2017 - 18:56 JessicaCorey
Technology is Eroding the Fourth Amendment. Can We Stop it? By JessicaCorey 06 Mar 2017 A Radically Different Fourth Amendment The Fourth Amendment was drafted ...
ChenyeNiSecondPaper 02 May 2017 - 18:55 ChenyeNi
Cyber Space in China: What the Government can Do When we are talking about the Constitution #8217;s response to the protection over people #8217;s privacy in the Internet ...
JulianWilliamsFirstPaper 30 Apr 2017 - 22:20 EbenMoglen
Conceptualizing the National Security Exception in a New Media World Almost fifty years have passed since the Supreme Court decided New York Times Co. v. the United ...
LaurenHowardFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Social Networking, the Hyperreal and Informed Consent by Lauren Howard In just a few years, social networking sites like Facebook have become among the most popular ...
JudyWangFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
All eyes are on Apple as it takes on the US government in possibly the highest profile fight in privacy and technology. Posing as a defender of civil liberties and ...
TaehyoungKwonFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
NATIONAL SECURITY? OR FREE SOCIETY? TaehyoungKwon 23 Mar 2008 New York Gov. Eliot Spitzer resigned on March 12. amid a scandal over a $1,000 an hour prostitute ...
UdiKarklinskyFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Complementing Notice with Periodic Disclosures Introduction Privacy policies or terms of use agreements ( #8220;notices #8221;) are too long, time consuming, and ...
NicoleKimFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Privacy on Facebook: Beacon and Beyond INTRODUCTION On February 26th, the 9th Circuit denied petitions for rehearing of the $9.5 million class action settlement approved ...
HibahHussainMissplacedFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Yesterday, during a panel on #8220;Location Tracking and Fourth Amendment Concerns, #8221; lawyer Jeffrey Rosen recalled a conversation with Andrew !McLaughlin, who ...
DanielleTomsonFirstPaper 30 Apr 2017 - 20:52 EbenMoglen
Feeding Us Ourselves: How Using Voter Data to Target Readers Threatens Truth, Choice, and Journalism By DanielleTomson 22 Mar 2017 I. Introduction If you are ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
WebHome 30 Apr 2017 - 18:51 EbenMoglen
Computers, Privacy, the Constitution Office hours the week of May 1 will be held from 2 6pm, Wednesday 3 May. Graduating students' revisions to essays are due ...
ZebJohnsonFirstPaper 24 Apr 2017 - 22:51 ZebulunJohnson
ZebulunJohnson 05 Apr 2017 The Limitations of the 4th Amendment #8211; What it Can and Cannot Do As we #8217;ve discussed in class, the threat posed to individuals ...
PartsNineandFourteen 14 Apr 2017 - 20:03 ChristopherPistritto
Parts Nine and Fourteen: All Privacy and Autonomy Rights Reserved Theory Griswold v. Connecticut, 381 U.S. 479 (Goldberg, J., concurring) Laurence H. Tribe, The ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
WilliamCoombsFirstPaper 23 Mar 2017 - 02:18 WilliamCoombs
Freedom of Thought Through Credit and Creativity By WilliamCoombs 23 Mar 2017 Social norms greatly influence individual behavior. Our #8220;right to privacy ...
AmandaFerberFirstPaper 22 Mar 2017 - 12:01 AmandaFerber
The Right of the People to be Secure in their Pornography By AmandaFerber 22 Mar 2017 Once Upon a Time... In the 1970s (also known as the Age of Porn), people ...
KouroshShaffyFirstPaper 22 Mar 2017 - 06:26 KouroshShaffy
The Press, The People, And Trump: The Need For (Much, Much) More Access By KouroshShaffy 22 Mar 2017 #8220;As Americans grapple with the unreality of the new ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
GPGKeyCreate 09 Mar 2017 - 21:28 MichaelWeholt
Tech project 1: Create a GPG key and upload it to the keyservers Linux instructions There are a number of tools available to Linux users including many different plugins ...
FirstPaper 06 Mar 2017 - 01:47 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. It's your idea. The paper's task is to exposit, weigh, and prepare the reader to explore further ...
WebNotify 05 Mar 2017 - 05:01 ShayaAfshar
AmandaFerber EbenMoglen LeonHuang MalcolmEvans StephanieKato WhitneyLee .WebChangesAlert, ., .TWikiRegistration
ElizabethDoisyFirstPaper 17 Feb 2017 - 22:35 ElizabethDoisy
Seems to me a reasonably comprehensive and certainly clear summary of relatively accessible facts. The comparison between China and the US serves some ...
PartFour 25 Jan 2017 - 16:46 JohnOMeara
Part Four: Surveillance, Search and Seizure Theory Olmstead v. United States, 277 U.S. 438 (1928) Katz v. United States, 389 U.S. 347 (1967) States v. Knotts, 460 ...
ElizabethAkinyemiFirstPaper 26 Jul 2016 - 20:48 ElizabethAkinyemi
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
BriannaCummingsFirstPaper 09 Jul 2016 - 03:40 BriannaCummings
Can Freedom in Person and on the Internet Co Exist for an Activist? By BriannaCummings 09 Jul 2016 I have learned more about the how the Internet works in the ...
JakeLewisFirstPaper 08 Jul 2016 - 20:36 EbenMoglen
Influencing an Electorate of Consumers: Pop Culture Against a Police State Intro The Constitution is no longer a viable safeguard against the encroachment of a police ...
DanielShinerFirstPaper 30 Jun 2016 - 22:18 DanielShiner
Transcending Balance: Mass Surveillance and the Fourth Amendment DanielShiner 07 May 2016 Across both major political parties, the word #8220;balance #8221 ...
LeoFarbmanFirstPaper 28 Jun 2016 - 11:04 EbenMoglen
The Edible Road Back to Privacy By LeoFarbman 05 Mar 2016 Let #8217;s take a second to talk about the food industry. During World War II, the American food ...
RasheedAhmedFirstPaper 26 Jun 2016 - 20:39 EbenMoglen
Privacy vs. National Security By RasheedAhmed 24 Apr 2016 Should Americans relinquish a portion of their privacy rights in exchange for greater security? This ...
TimothyKimFirstPaper 15 May 2016 - 12:36 TimothyKim
TimothyKim 30 Apr 2016 BIG DATA, SOCIAL MEDIA, AND THE FUTURE OF AMERICAN DEMOCRACY The Rise of the Internet in Establishment Politics In the midterm elections ...
DataSelfieApp 13 May 2016 - 18:43 LizzieOShea
Take a Data Selfie Interesting app project launched by two students at Parsons. App will make predictions and personalized profiles based on our browsing history. ...
AlexanderGertenFirstPaper 12 May 2016 - 15:23 EbenMoglen
Technological Threats to Adblocking and Cultural Threats from It The primary motivation of most spying on the Internet is to send more effective advertisements to ...
BrandonNguyenFirstPaper 12 May 2016 - 14:59 EbenMoglen
LinkNYC: Leveling the Playing Field, or Business as Usual? By BrandonNguyen 11 Apr 2016 Background On February 18, New York City Mayor Bill deBlasio announced ...
AlanWongFirstPaper 12 May 2016 - 14:35 AlanWong
The Sharing Economy and Our Privacy By AlanWong 05 Mar 2016 Within recent years, consumers have witnessed and quickly adapted to the rise of the #8220;economy ...
SolomonRotsteinFirstPaper 12 May 2016 - 14:27 EbenMoglen
Transcending utility through negative rights By SolomonRotstein 21 Apr 2016 I. Introduction: #8220;Poca política, mucha administración #8221; #8211; Porfirio ...
ChristopheWassafFirstPaper 12 May 2016 - 14:14 EbenMoglen
U.S. Privacy Laws and Facial Recognition Technology By ChristopheWassaf 16 Mar 2016 The use of biometric software for facial recognition has grown in recent years ...
KarmanLuceroFirstPaper 12 May 2016 - 11:58 EbenMoglen
Serendipity in Law Enforcement By KarmanLucero 11 Mar 2016 This essay addresses the growing capabilities of law enforcement to circumvent traditional barriers ...
AlexiaBedatFirstPaper 12 May 2016 - 09:01 AlexiaBedat
Finding Privacy in the Constitution In Europe, the right to privacy and freedom of expression carry (in theory) equal weight under the Convention on Human Rights ...
DannyStempFirstPaper 12 May 2016 - 00:13 EbenMoglen
It is a poorly kept secret that big companies use consumer data without consumer knowledge or consent. Information about the items people buy, the websites they visit ...
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
PseudonymousEmail 09 May 2016 - 18:58 GreggBadichek
Creating A Pseudonymous Webmail Account Using Tails Using your Tails system, establish an email account at mailbox.org. You can have a 30 day test email account at ...
LizzieOSheaSecondPaper 09 May 2016 - 17:44 LizzieOShea
Theorizing the law of privacy The political economy of the panopticon Contemporary digital life invokes the panopticon for good reason. But there are also limits ...
LizzieOSheaFirstEssay 09 May 2016 - 17:34 LizzieOShea
Data and predictive law enforcement in the age of computing The age of computing has meant that large amounts of data are readily available together with the potential ...
PseudonymousIM 04 May 2016 - 21:50 EbenMoglen
Pseudonymous Instant Messaging and Chat Using Tails Your Tails system includes the multi protocol chat client Pidgin, through which you can use a variety of chat systems ...
TailsOsx 24 Apr 2016 - 06:50 AlexanderGerten
Figuring out how to download and boot Tails from OS X Preliminary The information on this page is based on what I did to boot Tails from a particular piece of Mac ...
PartOne 09 Apr 2016 - 22:06 AlexanderGerten
Part One: Speech, Press, Assembly Theory Lawrence Lessig, Reading the Constitution in Cyberspace (pdf) , 43 Emory L.J. (1996) Potter Stewart, "Or of the Press" ...
PersonalPrivacyTips 08 Apr 2016 - 05:28 GreggBadichek
GerryMoody 12 Feb 2008 I thought it might be helpful to create a topic for personal privacy solutions (encryption, etc.). Chris Soghoian, The day the wiretaps go ...
NewsArticles 07 Apr 2016 - 18:11 LizzieOShea
Hey Prof Moglen I cannot seem to create a new topic page? Is that the way it is suppose to be? I was just going to post article about the Panama papers which critiques ...
RahulWadwaSecondPaper 26 Jul 2015 - 20:54 EbenMoglen
Feeling Safe When Your Health Is at Risk By RahulWadwa 15 Jul 2015 Introduction Thanks to the Internet and the widespread use of smartphones, most of us are ...
BenjaminKastnerSecondPaper 26 Jul 2015 - 18:42 EbenMoglen
The Inadequacy of the Recent Congressional Review of the Patriot Act Recently, facing the expiration of several sections of the Patriot Act, Congress elected to reign ...
LuChenSecondPaper 26 Jul 2015 - 18:30 EbenMoglen
Privacy of Social Media in Litigation By LuChen 18 Jul 2015 Introduction Social media has never been regarded as a guardian of privacy, and those who share information ...
TomasHolguinSecondPaper 30 Jun 2015 - 14:26 MarkDrake
TomasHolguin 27 Apr 2015 How Colombia adopted a so detailed Data Protection Regulation that ended up protecting Facebook Introduction: Colombian Congress recently ...
OlenaSavytskaSecondPaper 30 Jun 2015 - 14:24 MarkDrake
The Trouble with Customization A New York Times headline that caught my eye today says (and I paraphrase) that you can mute the views of people you disagree with a ...
OlenaSavytskaFirstPaper 30 Jun 2015 - 14:24 MarkDrake
Navigating a Free Net The Fourth Amendment, as we discussed in class, has a place dependent quality. It is this place dependence, in part, that has defeated its application ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
JoseEnriqueFrias-SecondPaper 30 Jun 2015 - 14:23 MarkDrake
JoseEnriqueFrias 26 Apr 2015 Tucuy Ricuy Reloaded The Inca Empire: From 1438 to 1533, the Inca Empire was the most important and largest empire of America. Previous ...
EvelynPangSecondPaper 30 Jun 2015 - 14:22 MarkDrake
From the Individual to the Collective: Reconciling Retreat with Reform In Walden , Henry David Thoreau advocates for a self sufficient life of reflection away from ...
EricSantosSecondPaper 30 Jun 2015 - 14:22 MarkDrake
EricSantos 15 May 2015 Nobody Cares What You Think The central struggle presented in this course is over the fate of the One Network that connects all of humanity ...
CarolineVisentiniSecondPaper 30 Jun 2015 - 14:22 MarkDrake
Goodwill data sharing CarolineVisentini 24 Apr 2015 On March 24, 2015 Andreas Lubitz deliberately crashed a passenger jet into the French Alps. One hundred and ...
WillPalmerSecondPaper 29 Jun 2015 - 15:36 MarkDrake
Big Data and Predictive Policing By WillPalmer 15 May 2015 Section I: What is Predictive Policing policing is a method of law enforcement that relies on the use ...
UriHacohenSecondPaper 29 Jun 2015 - 15:35 MarkDrake
Surveillance at will On Surveillance in the Workplace By UriHacohen 30 April 2015 Not too long ago, it was reasonable to assume that only behavior in the net ...
UdiKarklinskySecondPaper 29 Jun 2015 - 15:35 MarkDrake
Why is it that Israelis, Despite Their #8220;Rich Experience, #8221; are Just as Negligent as Anyone Else About Their Privacy? By UdiKarklinsky 02 May 2015 Introduction ...
TomLawrenceSecondPaper 29 Jun 2015 - 15:34 MarkDrake
In 1991, Harvard Law Professor Laurence Tribe proposed a new constitutional amendment for the emerging digital era. #8220;Tribe #8217;s Amendment, #8221; as I will ...
RichardGazonSecondPaper 29 Jun 2015 - 15:33 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
RamShchorySecondPaper 29 Jun 2015 - 15:33 MarkDrake
Evolving Listening #8211; Israeli Case Study By RamShchory 01 May 2015 Concepts of privacy in general, and particularly of state listening have #8211; to use ...
OriKivitySecondPaper 29 Jun 2015 - 15:32 MarkDrake
SOME THOUGHTS CONCERNING HORIZONTAL APPLICATION OF CONSTITUTIONAL RIGHTS By OriKivity 01 May 2015 Introduction One of the underlying propositions of Professor ...
NelsonHuaSecondPaper 29 Jun 2015 - 15:31 MarkDrake
ALPR Mass Surveillance as a Matter of Privacy By NelsonHua 16 May 2015 As of 2012, approximately 71% of United States police departments utilized some form of ...
NealBurstynSecondPaper 29 Jun 2015 - 15:31 MarkDrake
BART and the Cellphone Kill Switch By NealBurstyn 08 May 2015 Kill switches are in the news again. On April 27, the Department of Justice filed its response to ...
NathanielCriderSecondPaper 29 Jun 2015 - 15:28 MarkDrake
The First Amendment Autonomy By NathanielCrider 02 May 2015 Introduction The Fourth Amendment's anachronistic focus on places is insufficient to protect the ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
LeylaHadiSecondPaper 29 Jun 2015 - 15:26 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
KevinHoungSecondPaper 29 Jun 2015 - 15:26 MarkDrake
Anarchy and Currency By KevinHoung 11 May 2015 Introduction #8220;Anarchism stands for the liberation of the human mind from the dominion of religion and liberation ...
KathrynMearesSecondPaper 29 Jun 2015 - 15:24 MarkDrake
Fear and Apathy and Surveillance Fear is the enemy of reason. It impairs judgment, distorts perceptions, and fundamentally undermines the ability to make rational ...
JoshuaDellSecondPaper 29 Jun 2015 - 15:24 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
Found 98 topics

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Navigation

Webs Webs

r3 - 15 Nov 2006 - 19:43:52 - TWikiContributor
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM