Computers, Privacy & the Constitution

1000 Recent Changes in CompPrivConst Web retrieved at 20:45 (GMT)

AlexanderHoffmanFirstPaper 16 Nov 2017 - 00:39 EbenMoglen
Quantum Cryptography and the False Promise of an Unhackable Future AlexanderHoffman 21 Mar 2017 Introduction Snowden has sparked a new era in which the privacy ...
SocksProxy 09 Oct 2017 - 19:35 JohnOMeara
Technology Project 2: Better Browsing Control In your first technology project you created a !GPG key and then uploaded it to the public keyservers, making it possible ...
CorinneShimSecondPaper 01 Oct 2017 - 20:14 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
LeonHuangFirstPaper 30 Sep 2017 - 19:50 EbenMoglen
Privacy and Trust By LeonHuang 29 September 2017 Protecting our privacy relies on finding someone we can trust. Our quest for privacy began with a loss of trust ...
CorinneShimSecondPaper2012 26 Sep 2017 - 15:16 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
ZebulunJohnsonFirstPaper 19 Sep 2017 - 15:21 ZebulunJohnson
ZebulunJohnson 19 Sep 2017 Introduction As a child, I often went to hidden places at quiet times to read books my parents had deemed #8220;inappropriate #8221; ...
CorinneShimFirstPaper 25 Jul 2017 - 14:21 EbenMoglen
An Introduction to how Personal Privacy and Personal Autonomy Have Changed with Technology By CorinneShim 22 Mar 2017 Introduction We currently live in a society ...
AndrewWatikerFirstPaper 22 Jul 2017 - 05:39 AndrewWatiker
Privacy in the Mobile Workplace !AirWatch By AndrewWatiker 22 Jul 2017 The Problem For many, the 21st century workplace has expanded far beyond the office. ...
AudreyAmsellemFirstPaper 30 May 2017 - 16:19 AudreyAmsellem
Who Cares If You Listen? Agency and Surveillance in Societies of Control By AudreyAmsellem May 30 2017 In 1984, George Orwell imagined a future society in which ...
TailsInstallation 14 May 2017 - 20:18 AudreyAmsellem
Tails Installation Tails (The Amnesiac Incognito Live System) is a free software operating system descended from Debian, the universal free software OS which is designed ...
EveShabtoFirstPaper 09 May 2017 - 04:40 EveShabto
I Know Where You Live and I've Seen Where you Sleep: Cell Site Location Data and the Fourth Amendment By EveShabto 04 Mar 2017 Introduction Cellular phones are ...
ShayaAfsharFirstPaper 08 May 2017 - 08:15 ShayaAfshar
The Genetic Collection Network By ShayaAfshar 05 Mar 2017 #8220;As gene tests become common, possibilities for abuse will intensify. Banks might not offer you ...
TracyRizkFirstPaper 08 May 2017 - 04:04 TracyRizk
The #8220;Right to Be Forgotten #8221; as a Protection for Freedom of Thought By TracyRizk 8 May 2017 A bill in the New York State Assembly proposes the establishment ...
ShayBanerjeeFirstPaper 08 May 2017 - 01:12 ShayBanerjee
To Understand Polarization, Look at the Software ShayBanerjee 6 May 2017 It is no coincidence that workers most affected by automation are rejecting economic ...
ChristopherPistrittoFirstPaper 05 May 2017 - 22:00 ChristopherPistritto
The Chilling Effect of Surveillance By ChristopherPistritto Introduction The #8220;chilling effect #8221; on free speech brought about by vague and overbroad ...
SunghyeOhFirstPaper 05 May 2017 - 19:49 SunghyeOh
Review of Massive Personal Information Leakage Case and Underlying Problems in South Korea By SunghyeOh 21 Mar 2017 Introduction When we talk about the protection ...
HyunKyungLeeFirstPaper 05 May 2017 - 19:24 HyunKyungLee
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
DavidHammondFirstPaper 05 May 2017 - 18:14 DavidHammond
Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment? By DavidHammond 02 Mar 2017 Introduction What if I had ...
OrBelkinFirstPaper 05 May 2017 - 16:14 OrBelkin
A Right to Keep and Bear Cryptography? By OrBelkin 21 Mar 2017 Introduction The adoption of the individual right theory has broaden the reach of the Second Amendment ...
KosukeUenoFirstPaper 04 May 2017 - 22:09 KosukeUeno
GPS investigation found illegal in Japan's Supreme Court By KosukeUeno 22 Mar 2017 Japan #8217;s Supreme Court Decision on GPS Investigation On March 15, 2017 ...
EthanThomasFirstPaper 03 May 2017 - 21:42 EthanThomas
The Campaign Against Privacy: How Propaganda is Used to Perpetuate Surveillance and State Power EthanThomas 03 May 2017 Propaganda and Power Through Subtle Influence ...
JulianWilliamsSecondPaper 03 May 2017 - 03:08 JulianWilliams
JulianWilliams 03 May 2017 Mass Surveillance and the Limitations of the First Amendment One of the key purposes of the First Amendment is to keep government accountable ...
JessicaCoreyFirstPaper 02 May 2017 - 18:56 JessicaCorey
Technology is Eroding the Fourth Amendment. Can We Stop it? By JessicaCorey 06 Mar 2017 A Radically Different Fourth Amendment The Fourth Amendment was drafted ...
ChenyeNiSecondPaper 02 May 2017 - 18:55 ChenyeNi
Cyber Space in China: What the Government can Do When we are talking about the Constitution #8217;s response to the protection over people #8217;s privacy in the Internet ...
JulianWilliamsFirstPaper 30 Apr 2017 - 22:20 EbenMoglen
Conceptualizing the National Security Exception in a New Media World Almost fifty years have passed since the Supreme Court decided New York Times Co. v. the United ...
HibahHussainMissplacedFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Yesterday, during a panel on #8220;Location Tracking and Fourth Amendment Concerns, #8221; lawyer Jeffrey Rosen recalled a conversation with Andrew !McLaughlin, who ...
NicoleKimFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Privacy on Facebook: Beacon and Beyond INTRODUCTION On February 26th, the 9th Circuit denied petitions for rehearing of the $9.5 million class action settlement approved ...
UdiKarklinskyFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Complementing Notice with Periodic Disclosures Introduction Privacy policies or terms of use agreements ( #8220;notices #8221;) are too long, time consuming, and ...
TaehyoungKwonFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
NATIONAL SECURITY? OR FREE SOCIETY? TaehyoungKwon 23 Mar 2008 New York Gov. Eliot Spitzer resigned on March 12. amid a scandal over a $1,000 an hour prostitute ...
JudyWangFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
All eyes are on Apple as it takes on the US government in possibly the highest profile fight in privacy and technology. Posing as a defender of civil liberties and ...
LaurenHowardFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Social Networking, the Hyperreal and Informed Consent by Lauren Howard In just a few years, social networking sites like Facebook have become among the most popular ...
DanielleTomsonFirstPaper 30 Apr 2017 - 20:52 EbenMoglen
Feeding Us Ourselves: How Using Voter Data to Target Readers Threatens Truth, Choice, and Journalism By DanielleTomson 22 Mar 2017 I. Introduction If you are ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
WebHome 30 Apr 2017 - 18:51 EbenMoglen
Computers, Privacy, the Constitution Office hours the week of May 1 will be held from 2 6pm, Wednesday 3 May. Graduating students' revisions to essays are due ...
ZebJohnsonFirstPaper 24 Apr 2017 - 22:51 ZebulunJohnson
ZebulunJohnson 05 Apr 2017 The Limitations of the 4th Amendment #8211; What it Can and Cannot Do As we #8217;ve discussed in class, the threat posed to individuals ...
PartsNineandFourteen 14 Apr 2017 - 20:03 ChristopherPistritto
Parts Nine and Fourteen: All Privacy and Autonomy Rights Reserved Theory Griswold v. Connecticut, 381 U.S. 479 (Goldberg, J., concurring) Laurence H. Tribe, The ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
WilliamCoombsFirstPaper 23 Mar 2017 - 02:18 WilliamCoombs
Freedom of Thought Through Credit and Creativity By WilliamCoombs 23 Mar 2017 Social norms greatly influence individual behavior. Our #8220;right to privacy ...
AmandaFerberFirstPaper 22 Mar 2017 - 12:01 AmandaFerber
The Right of the People to be Secure in their Pornography By AmandaFerber 22 Mar 2017 Once Upon a Time... In the 1970s (also known as the Age of Porn), people ...
KouroshShaffyFirstPaper 22 Mar 2017 - 06:26 KouroshShaffy
The Press, The People, And Trump: The Need For (Much, Much) More Access By KouroshShaffy 22 Mar 2017 #8220;As Americans grapple with the unreality of the new ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
GPGKeyCreate 09 Mar 2017 - 21:28 MichaelWeholt
Tech project 1: Create a GPG key and upload it to the keyservers Linux instructions There are a number of tools available to Linux users including many different plugins ...
FirstPaper 06 Mar 2017 - 01:47 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. It's your idea. The paper's task is to exposit, weigh, and prepare the reader to explore further ...
WebNotify 05 Mar 2017 - 05:01 ShayaAfshar
AmandaFerber EbenMoglen LeonHuang MalcolmEvans StephanieKato WhitneyLee .WebChangesAlert, ., .TWikiRegistration
ElizabethDoisyFirstPaper 17 Feb 2017 - 22:35 ElizabethDoisy
Seems to me a reasonably comprehensive and certainly clear summary of relatively accessible facts. The comparison between China and the US serves some ...
PartFour 25 Jan 2017 - 16:46 JohnOMeara
Part Four: Surveillance, Search and Seizure Theory Olmstead v. United States, 277 U.S. 438 (1928) Katz v. United States, 389 U.S. 347 (1967) States v. Knotts, 460 ...
ElizabethAkinyemiFirstPaper 26 Jul 2016 - 20:48 ElizabethAkinyemi
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
BriannaCummingsFirstPaper 09 Jul 2016 - 03:40 BriannaCummings
Can Freedom in Person and on the Internet Co Exist for an Activist? By BriannaCummings 09 Jul 2016 I have learned more about the how the Internet works in the ...
JakeLewisFirstPaper 08 Jul 2016 - 20:36 EbenMoglen
Influencing an Electorate of Consumers: Pop Culture Against a Police State Intro The Constitution is no longer a viable safeguard against the encroachment of a police ...
DanielShinerFirstPaper 30 Jun 2016 - 22:18 DanielShiner
Transcending Balance: Mass Surveillance and the Fourth Amendment DanielShiner 07 May 2016 Across both major political parties, the word #8220;balance #8221 ...
LeoFarbmanFirstPaper 28 Jun 2016 - 11:04 EbenMoglen
The Edible Road Back to Privacy By LeoFarbman 05 Mar 2016 Let #8217;s take a second to talk about the food industry. During World War II, the American food ...
RasheedAhmedFirstPaper 26 Jun 2016 - 20:39 EbenMoglen
Privacy vs. National Security By RasheedAhmed 24 Apr 2016 Should Americans relinquish a portion of their privacy rights in exchange for greater security? This ...
TimothyKimFirstPaper 15 May 2016 - 12:36 TimothyKim
TimothyKim 30 Apr 2016 BIG DATA, SOCIAL MEDIA, AND THE FUTURE OF AMERICAN DEMOCRACY The Rise of the Internet in Establishment Politics In the midterm elections ...
DataSelfieApp 13 May 2016 - 18:43 LizzieOShea
Take a Data Selfie Interesting app project launched by two students at Parsons. App will make predictions and personalized profiles based on our browsing history. ...
AlexanderGertenFirstPaper 12 May 2016 - 15:23 EbenMoglen
Technological Threats to Adblocking and Cultural Threats from It The primary motivation of most spying on the Internet is to send more effective advertisements to ...
BrandonNguyenFirstPaper 12 May 2016 - 14:59 EbenMoglen
LinkNYC: Leveling the Playing Field, or Business as Usual? By BrandonNguyen 11 Apr 2016 Background On February 18, New York City Mayor Bill deBlasio announced ...
AlanWongFirstPaper 12 May 2016 - 14:35 AlanWong
The Sharing Economy and Our Privacy By AlanWong 05 Mar 2016 Within recent years, consumers have witnessed and quickly adapted to the rise of the #8220;economy ...
SolomonRotsteinFirstPaper 12 May 2016 - 14:27 EbenMoglen
Transcending utility through negative rights By SolomonRotstein 21 Apr 2016 I. Introduction: #8220;Poca política, mucha administración #8221; #8211; Porfirio ...
ChristopheWassafFirstPaper 12 May 2016 - 14:14 EbenMoglen
U.S. Privacy Laws and Facial Recognition Technology By ChristopheWassaf 16 Mar 2016 The use of biometric software for facial recognition has grown in recent years ...
KarmanLuceroFirstPaper 12 May 2016 - 11:58 EbenMoglen
Serendipity in Law Enforcement By KarmanLucero 11 Mar 2016 This essay addresses the growing capabilities of law enforcement to circumvent traditional barriers ...
AlexiaBedatFirstPaper 12 May 2016 - 09:01 AlexiaBedat
Finding Privacy in the Constitution In Europe, the right to privacy and freedom of expression carry (in theory) equal weight under the Convention on Human Rights ...
DannyStempFirstPaper 12 May 2016 - 00:13 EbenMoglen
It is a poorly kept secret that big companies use consumer data without consumer knowledge or consent. Information about the items people buy, the websites they visit ...
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
PseudonymousEmail 09 May 2016 - 18:58 GreggBadichek
Creating A Pseudonymous Webmail Account Using Tails Using your Tails system, establish an email account at mailbox.org. You can have a 30 day test email account at ...
LizzieOSheaSecondPaper 09 May 2016 - 17:44 LizzieOShea
Theorizing the law of privacy The political economy of the panopticon Contemporary digital life invokes the panopticon for good reason. But there are also limits ...
LizzieOSheaFirstEssay 09 May 2016 - 17:34 LizzieOShea
Data and predictive law enforcement in the age of computing The age of computing has meant that large amounts of data are readily available together with the potential ...
PseudonymousIM 04 May 2016 - 21:50 EbenMoglen
Pseudonymous Instant Messaging and Chat Using Tails Your Tails system includes the multi protocol chat client Pidgin, through which you can use a variety of chat systems ...
TailsOsx 24 Apr 2016 - 06:50 AlexanderGerten
Figuring out how to download and boot Tails from OS X Preliminary The information on this page is based on what I did to boot Tails from a particular piece of Mac ...
PartOne 09 Apr 2016 - 22:06 AlexanderGerten
Part One: Speech, Press, Assembly Theory Lawrence Lessig, Reading the Constitution in Cyberspace (pdf) , 43 Emory L.J. (1996) Potter Stewart, "Or of the Press" ...
PersonalPrivacyTips 08 Apr 2016 - 05:28 GreggBadichek
GerryMoody 12 Feb 2008 I thought it might be helpful to create a topic for personal privacy solutions (encryption, etc.). Chris Soghoian, The day the wiretaps go ...
NewsArticles 07 Apr 2016 - 18:11 LizzieOShea
Hey Prof Moglen I cannot seem to create a new topic page? Is that the way it is suppose to be? I was just going to post article about the Panama papers which critiques ...
RahulWadwaSecondPaper 26 Jul 2015 - 20:54 EbenMoglen
Feeling Safe When Your Health Is at Risk By RahulWadwa 15 Jul 2015 Introduction Thanks to the Internet and the widespread use of smartphones, most of us are ...
BenjaminKastnerSecondPaper 26 Jul 2015 - 18:42 EbenMoglen
The Inadequacy of the Recent Congressional Review of the Patriot Act Recently, facing the expiration of several sections of the Patriot Act, Congress elected to reign ...
LuChenSecondPaper 26 Jul 2015 - 18:30 EbenMoglen
Privacy of Social Media in Litigation By LuChen 18 Jul 2015 Introduction Social media has never been regarded as a guardian of privacy, and those who share information ...
TomasHolguinSecondPaper 30 Jun 2015 - 14:26 MarkDrake
TomasHolguin 27 Apr 2015 How Colombia adopted a so detailed Data Protection Regulation that ended up protecting Facebook Introduction: Colombian Congress recently ...
OlenaSavytskaSecondPaper 30 Jun 2015 - 14:24 MarkDrake
The Trouble with Customization A New York Times headline that caught my eye today says (and I paraphrase) that you can mute the views of people you disagree with a ...
OlenaSavytskaFirstPaper 30 Jun 2015 - 14:24 MarkDrake
Navigating a Free Net The Fourth Amendment, as we discussed in class, has a place dependent quality. It is this place dependence, in part, that has defeated its application ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
JoseEnriqueFrias-SecondPaper 30 Jun 2015 - 14:23 MarkDrake
JoseEnriqueFrias 26 Apr 2015 Tucuy Ricuy Reloaded The Inca Empire: From 1438 to 1533, the Inca Empire was the most important and largest empire of America. Previous ...
EvelynPangSecondPaper 30 Jun 2015 - 14:22 MarkDrake
From the Individual to the Collective: Reconciling Retreat with Reform In Walden , Henry David Thoreau advocates for a self sufficient life of reflection away from ...
EricSantosSecondPaper 30 Jun 2015 - 14:22 MarkDrake
EricSantos 15 May 2015 Nobody Cares What You Think The central struggle presented in this course is over the fate of the One Network that connects all of humanity ...
CarolineVisentiniSecondPaper 30 Jun 2015 - 14:22 MarkDrake
Goodwill data sharing CarolineVisentini 24 Apr 2015 On March 24, 2015 Andreas Lubitz deliberately crashed a passenger jet into the French Alps. One hundred and ...
WillPalmerSecondPaper 29 Jun 2015 - 15:36 MarkDrake
Big Data and Predictive Policing By WillPalmer 15 May 2015 Section I: What is Predictive Policing policing is a method of law enforcement that relies on the use ...
UriHacohenSecondPaper 29 Jun 2015 - 15:35 MarkDrake
Surveillance at will On Surveillance in the Workplace By UriHacohen 30 April 2015 Not too long ago, it was reasonable to assume that only behavior in the net ...
UdiKarklinskySecondPaper 29 Jun 2015 - 15:35 MarkDrake
Why is it that Israelis, Despite Their #8220;Rich Experience, #8221; are Just as Negligent as Anyone Else About Their Privacy? By UdiKarklinsky 02 May 2015 Introduction ...
TomLawrenceSecondPaper 29 Jun 2015 - 15:34 MarkDrake
In 1991, Harvard Law Professor Laurence Tribe proposed a new constitutional amendment for the emerging digital era. #8220;Tribe #8217;s Amendment, #8221; as I will ...
RichardGazonSecondPaper 29 Jun 2015 - 15:33 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
RamShchorySecondPaper 29 Jun 2015 - 15:33 MarkDrake
Evolving Listening #8211; Israeli Case Study By RamShchory 01 May 2015 Concepts of privacy in general, and particularly of state listening have #8211; to use ...
OriKivitySecondPaper 29 Jun 2015 - 15:32 MarkDrake
SOME THOUGHTS CONCERNING HORIZONTAL APPLICATION OF CONSTITUTIONAL RIGHTS By OriKivity 01 May 2015 Introduction One of the underlying propositions of Professor ...
NelsonHuaSecondPaper 29 Jun 2015 - 15:31 MarkDrake
ALPR Mass Surveillance as a Matter of Privacy By NelsonHua 16 May 2015 As of 2012, approximately 71% of United States police departments utilized some form of ...
NealBurstynSecondPaper 29 Jun 2015 - 15:31 MarkDrake
BART and the Cellphone Kill Switch By NealBurstyn 08 May 2015 Kill switches are in the news again. On April 27, the Department of Justice filed its response to ...
NathanielCriderSecondPaper 29 Jun 2015 - 15:28 MarkDrake
The First Amendment Autonomy By NathanielCrider 02 May 2015 Introduction The Fourth Amendment's anachronistic focus on places is insufficient to protect the ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
LeylaHadiSecondPaper 29 Jun 2015 - 15:26 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
KevinHoungSecondPaper 29 Jun 2015 - 15:26 MarkDrake
Anarchy and Currency By KevinHoung 11 May 2015 Introduction #8220;Anarchism stands for the liberation of the human mind from the dominion of religion and liberation ...
KathrynMearesSecondPaper 29 Jun 2015 - 15:24 MarkDrake
Fear and Apathy and Surveillance Fear is the enemy of reason. It impairs judgment, distorts perceptions, and fundamentally undermines the ability to make rational ...
JoshuaDellSecondPaper 29 Jun 2015 - 15:24 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JasonRosenbaumSecondPaper 29 Jun 2015 - 15:23 MarkDrake
ACLU v. Clapper Statutory and Constitutional Limits On Mass Surveillance By JasonRosenbaum 09 May 2015 On May 7, 2015, the Second Circuit decided that the NSA ...
GrahamGodwynSecondPaper 26 Jun 2015 - 21:14 MarkDrake
Law Enforcement Behaving Like Spies By GrahamGodwyn 13 May 2015 Introduction Spooks and spies should be kept apart from domestic law enforcement. It is expected ...
EstherLukmanSecondPaper 26 Jun 2015 - 21:13 MarkDrake
Identity Ownership and the Fourth Amendment By EstherLukman 12 May 2015 Property and Privacy Rights in Our Identity The right to publicity is both a property ...
EdyGlozmanSecondPaper 26 Jun 2015 - 21:11 MarkDrake
Antitrust Is Not the Solution, Constitution Is By EdyGlozman 01 May 2015 Introduction Scholars have been debating in the recent years over whether privacy should ...
ArthurMERLEBERALSecondPaper 26 Jun 2015 - 20:49 MarkDrake
EU Data protection: A further step back Introduction On 25th January 2012, the EU Commission released a proposal for a new regulation on data protection. Yet, it ...
AriGlattSecondPaper 26 Jun 2015 - 20:48 MarkDrake
Why Are Our Device Manufacturers Harming Us and What Can Be Done To Prevent It? By AriGlatt 10 May 2015 Introduction Privacy evokes a cornucopia of concepts for ...
ArchanHazra1SecondPaper 26 Jun 2015 - 20:46 MarkDrake
The TSA's Pre #10003; #8482; Program and Security Theater By ArchanHazra1 17 May 2015 Introduction Over spring break, I had the opportunity to go to a moot court ...
AndrewChungSecondPaper 26 Jun 2015 - 20:46 MarkDrake
Stingray Technology: Do We Own Our Locations? Stingrays, a technology that can track a cellphone's location to startling accuracy, have become a staple in the arsenal ...
AndresZambranoSecondPaper 26 Jun 2015 - 20:46 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AnaCarolinaVarelaSecondPaper 26 Jun 2015 - 20:44 MarkDrake
Amici Curiae in the FISA Court By AnaCarolinaVarela 09 May 2015 ACLU v. Clapper May Mean the FREEDOM Act is Adopted The Second Circuit #8217;s in ACLU v ...
AliceBertramSecondPaper 26 Jun 2015 - 20:43 MarkDrake
AliceBertram 14 Feb 2015 The German Supreme Court on hearing Snowden in the Parliament's NSA investigation committee By AliceBertram 14 Feb 2015 Opposition's ...
AdrianNtwatwaSecondPaper 26 Jun 2015 - 20:43 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
WillPalmerFirstPaper 26 Jun 2015 - 20:27 MarkDrake
The Need for A Property Based Approach to Data Privacy By WillPalmer 06 Mar 2015 Section I: Fourth Amendment Protection Expanded from Physical Places to Include ...
UriHacohenFirstPaper 26 Jun 2015 - 20:26 MarkDrake
Once Bitten Twice Shy On The Eroding Standard for Privacy With Regard To Israel's Internal Affairs By UriHacohen 22 Feb 2015 The Israeli public has accepted over ...
TomasHolguinFirstPaper 26 Jun 2015 - 20:26 MarkDrake
The weight of videos in trials 1. Introduction Since its beginnings, photography has been the subject of several discussions. While many considered photography ...
TomLawrenceFirstPaper 26 Jun 2015 - 20:25 MarkDrake
Last week, the Supreme Court denied certiorari in Raynor v. Maryland , a case challenging the constitutionality of a conviction based on DNA evidence obtained without ...
ThomasStreinzFirstPaper 26 Jun 2015 - 20:24 MarkDrake
Fighting the NSA in the German Constitutional Court By ThomasStreinz 06 Mar 2015 In absence of any political will by the German government to take meaningful steps ...
RichardGazonFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Municipal Wi Fi: Dangers in Monitoring Municipal Wi Fi has long been discussed as the next convenience coming to a city near you. Major cities such as San ...
RamShchoryFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Informed Consent to the Use of Private Data By RamShchory The Problem #8211; Softwares #8217; Privacy Policies Do Not Actually Provide Either Notice or Choice ...
RahulWadwaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Aadhaar : Digital India's Shaky Foundation By RahulWadwa 06 Mar 2015 Introduction #8220;Digital India #8221; is the Indian government #8217;s attempt to smooth ...
OriKivityFirstPaper 26 Jun 2015 - 20:22 MarkDrake
THE CONSTITUTIONAL RIGHT TO PRIVACY IN ISRAEL: DIGNITY VERSUS LIBERTY Introduction The boundaries and content of what is considered the private domain which ought ...
NelsonHuaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Self help in the Privacy Arena By NelsonHua 06 Mar 2015 On February 28, the Obama administration proposed the Privacy Bill of Rights Act. The proposed bill, supposedly ...
NealBurstynFirstPaper 26 Jun 2015 - 20:21 MarkDrake
Riley and the Tragedy of Part Four By NealBurstyn 06 Mar 2015 February Professor Moglen has made it abundantly clear that he believes the Fourth Amendment to ...
NawalMaaloufFirstPaper 26 Jun 2015 - 20:17 MarkDrake
Revenge Porn By NawalMaalouf 08 Mar 2015 I. INTRODUCTION We #8217;ll call it #8220;revenge porn #8221; #8211; sexually graphic images of individuals distributed ...
NathanielCriderFirstPaper 26 Jun 2015 - 20:16 MarkDrake
The Revolutionary James Madison By NathanielCrider 06 Mar 2015 Introduction From the textbooks, we see James Madison as a diminutive and earnest conciliator. ...
MenahemGrossmanFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Hiding in Plain Sight: Alternative Approaches to Cybersecurity (Draft 2) By MenahemGrossman 14 May 2015 Introduction Much of conventional cybersecurity efforts ...
MatthieuWharmbyFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Draft #2 Escaping your online past: the case against a global right to be forgotten. By MatthieuWharmby 06 Mar 2015 Introduction Recently there have been many ...
MathewKenneallyFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Why Eric Holder Really Cares if Edward Snowden is a "Whistleblower". Second Draft Chelsea Manning exposes complicity in torture and the actual death toll from the ...
LuChenFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Employee Privacy and the BYOD Movement By LuChen 06 Mar 2015 No Expectations of Privacy It is no secret that little privacy is afforded to employees who use company ...
LeylaHadiFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Relying on the Constitutional Agenda By LeylaHadi 04 Mar 2015 Parts Four and One While the First Amendment prohibits the government from creating any law ...
KevinHoungFirstPaper 26 Jun 2015 - 20:14 MarkDrake
Big Data and its Intrusion Into Our Medical History: An Investigation Into Matchback Programs By KevinHoung 05 May 2015 Introduction Silently, large data companies ...
KeunjungChoFirstPaper 26 Jun 2015 - 20:13 MarkDrake
Breaking Down the Technological Panopticon: Tracing the Evolution of Surveillance as Culture and Reaching Beyond Fourth Amendment Discourse By KeunjungCho 06 Mar ...
JoseEnriqueFriasFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Minors and their Smartphones Minors and their (supposed) protection: Theoretically, minors have always been subject to special protection in every country of the world ...
JasonRosenbaumFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Snowden and Technological Civil Disobedience By JasonRosenbaum 06 Mar 2015 Ask Me Anything In an "Ask Me Anything" thread on the Internet discussion board ...
HannahZale2FirstPaper 26 Jun 2015 - 19:52 MarkDrake
Could First Amendment cases regarding #8220;buffer zones #8221; have any implications for online advertising? By HannahZale2 06 Mar 2015 Introduction In this ...
GrahamGodwynFirstPaper 26 Jun 2015 - 19:52 MarkDrake
I Have Nothing to Hide or: Why Should I Spent 10 Minutes to Encrypt My Messages? By GrahamGodwyn 06 Mar 2015 Introduction After the revelations gifted to the ...
EvelynPangFirstPaper 26 Jun 2015 - 19:52 MarkDrake
Reconstructing Autonomy in Citizenfour By EvelynPang 06 Mar 2015 Privacy is linked to a sense of personal autonomy and control, while surveillance removes an ...
EstherLukmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Information: The Cost of Access and Convenience By EstherLukman 06 Mar 2015 The Two Way Highway The Internet is often nicknamed the world #8217;s #8220;information ...
EricSantosFirstPaper 26 Jun 2015 - 19:50 MarkDrake
The First Amendment in One Net By EricSantos 06 Mar 2015 What Do You Mean by #8220;Freedom #8221;? Envisioning a world where the ideals of the First Amendment ...
EdyGlozmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
When Getting Back What You Already Had Costs You Your Privacy #8211; The Story of Software Updates By EdyGlozman 06 Mar 2015 Introduction A basic equation stands ...
CarolineVisentiniFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Prublic (second draft) CarolineVisentini 26 Apr 2015 Private public Prublic. I think that it is where our society is situated today. Over the course of the ...
BenjaminLinFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Voluntary Surveillance: Costs, Benefits, and a Way Forward Introduction Much has been made in class about the nefarious nature of iPhones and #8220;smart #8221 ...
BenjaminKastnerFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Market Approach to Digital Privacy Corporation #8217;s interests have not been aligned with consumers in the digital privacy context, but this may be changing. Corporations ...
ArthurMERLEBERALFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Surveillance in France following the terrorist attacks in Paris: Nothing new under the sun Introduction The terrorist attacks that occurred in Paris between the 7th ...
AriGlattFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Anonymity and the "Real Name Policy" Debate By AriGlatt 01 May 2015 Pseudonymity and the Internet The Nymwars While anonymity was not something invented with ...
ArchanHazra1FirstPaper 26 Jun 2015 - 19:46 MarkDrake
The Border Search Doctrine and Data By ArchanHazra1 06 Mar 2015 Introduction The search doctrine carves out an exception to the Fourth Amendment #8217;s requirement ...
AndrewChungFirstPaper 26 Jun 2015 - 19:44 MarkDrake
Automatic License Plate Reader Technology and Mass Surveillance (Second Draft) Questions Do citizens have a reasonable expectation to privacy in regards to the tracking ...
AndresZambranoFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Surveillance of La Oposición in Venezuela By AndresZambrano 06 Mar 2015 Introduction Venezuela is a country in turmoil. Since 2013, pof basic goods have skyrocketed ...
AnaCarolinaVarelaFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Generation Z By AnaCarolinaVarela 06 Mar 2015 The Profile (I acknowledge that any generalization about a group this size is naturally going to get some people ...
AliceBertramFirstPaper 26 Jun 2015 - 19:41 MarkDrake
about:black The NSA investigation committee in the German parliament By AliceBertram 13 Feb 2015 Investigating the German secret service Even though the committee ...
AdrianNtwatwaFirstPaper 25 Jun 2015 - 19:52 MarkDrake
A Zero Zero Game By AdrianNtwatwa 06 Mar 2015 Over the past weeks, a common theme in our class discussions has been the zero sum nature of the future of freedom ...
SecondPaper 11 May 2015 - 18:36 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Now Formatting 1. Log in. 2. Create Second Paper will create a page named SecondPaper ...
TWikiGuestSecondPaper 08 May 2015 - 03:00 NealBurstyn
BART and the Cellphone Kill Switch Kill switches are in the news again. On April 27, the Department of Justice filed its response brief to EPIC #8217;s petition for ...
ATTChargesNotToTrackWebBrowsing 18 Feb 2015 - 15:42 TomLawrence
Interesting article...I don't believe I've seen a web provider put an explicit price on privacy before. "AT T's gigabit fiber to the home service has just arrived ...
Classnotes19Jan2012 30 Jan 2015 - 15:55 MatthieuWharmby
MatthieuWharmby 27 Jan 2015
XiyunYangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Transparent World By XiyunYang 22 May 2013 Almost two centuries ago, the factories churned and drew us away from our land and our communities. We left for ...
SehwanJangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
South Korea #8217;s real name internet system: Future prospects of internet policy A policy, so called #8220;a real name internet system #8221; has brought an extraordinarily ...
YukoKawaiSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Online election campaign in Japan Introduction A revision to the Japanese Public Offices Election Act ( #8220;POEA #8221;) to allow online election campaigning was ...
MayelaGarzaSecondPaper 14 Jan 2015 - 22:44 IanSullivan
MayelaGarza 13 May 2013 The Data Collectors Before coming to Columbia my doctor back in Mexico found a cyst and gave me birth pills to see if they would remove it ...
VictorAuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
"Authorized Access" under the CFAA: An Analysis of the 9th Circuit's Opinion in U.S. v. Nosal By VictorA 01 May 2013 Two years ago, the U.S. Court of Appeals ...
SeanBerensSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The NYPD Already Knows Your Phone Number (And They Might Know Every Place You Have Been in the Past Four Years) By SeanBerens 09 May 2013 Introduction Over the ...
ShakimaWellsSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Reasonable Expectation of Privacy in Emails A few days before the close of the 2013 tax season, the ACLU released an revealing documents that indicated that it ...
SecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE TWikiAdminGroup
YulingHuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Real Name Policy: An End to Free Speech? In the U.S., real name policies have become important tools used by both Facebook and Google to create a "real world" environment ...
MatthewAmsterdamSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction I was troubled, if perhaps unsurprised, to read the statement from the founder of Cree.py, an application that tracks individual's locations based on ...
SamuelDostartSecondPaper 14 Jan 2015 - 22:44 IanSullivan
CISPA: Goodbye Privacy, Hello Police State By SamuelDostart 22 Apr 2013 Section I: So What is CISPA? On the feet of massive opposition to SOPA and a failed first ...
NicoleKimSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Our class discussion about how accumulation of personal data can predict our behavior led me to think of Report. Minority Report, of course, is famously about three ...
StacyAdelmanSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Privacy: A Torrid Affair In the face of a crisis, privacy is sacrificed on the alter of public safety. People were too busy marveling at how the government was quickly ...
RohanGreySecondPaper 14 Jan 2015 - 22:44 IanSullivan
Shipbuilding 101 Wanting to Learn is Not Enough Having cut my educator's teeth directing infants fingers to hold xylophone mallets and cover recorder holes, I wasn ...
VanessaWSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Her Story to Tell By VanessaW 11 May 2013 Introduction I found out my junior year of high school that one of my friends was being abused at home. I pleaded with ...
SecondPaper2012 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Archived will create a page named SecondPaper2012 ...
RobertWatkins_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
RobertW 28 Apr 2008 The Worn Out Unwelcomeness of Advertisement 989 Words Many believe advertisement bombardment in media will grow to a point at which ...
CoryNelsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Cyber Intelligence Sharing and Protection Act I. Introduction This Article will explain the proposed Cyber Intelligence Sharing and Protection Act ( #8220;CISPA ...
SecondPaper2013 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Create Second Paper will create a page named ...
JulianM_Paper-II 14 Jan 2015 - 22:44 IanSullivan
Extreme Porn Five years ago Jane Longhurst, a teacher from Brighton, murdered by Graham Coutts, a fan of websites such as "Club Dead" and "Rape Action" which offered ...
AmaneKawamotoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Storing Medical Data in the #8220;Cloud #8221; By AmaneKawamoto 30 Apr 2013 Introduction An increasing number of medical institutions are using online storage ...
AyaNakamuraSecondPaper 14 Jan 2015 - 22:44 IanSullivan
A perpetrator #8217;s and victim #8217;s privacy in a juvenile case in Japan 1 Introduction This Article will explain how a perpetrator #8217;s and victim #8217 ...
JeanLeeSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Abuse and Attempted Answers to Peer Surveillance By JeanLee 27 Apr 2013 Peer Surveillance Our discussions about how governments are benefiting from and using ...
DarrenHaberSecondPaper 14 Jan 2015 - 22:44 IanSullivan
I recently watched "The Lives of Others", a movie set in 1984 East Berlin which follows the life of an East German writer and the agent of the secret police tasked ...
JamieCrooksSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Association Isn't Free: Identities, Data Mining and the First Amendment By JamieCrooks 01 May 2013 Introduction As we discussed in class, unless we take steps ...
AlejandroMercadoSecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JonathanKoppellSecondPaper 14 Jan 2015 - 22:44 IanSullivan
JonathanKoppell 14 May 2013 Introduction Will Genetic data help or hurt you? Probably both #8230; DNA Sequencing has become faster, more reliable, more efficient ...
AvaGuoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Value of Anonymity Over the past couple of weeks, my alma mater has been embroiled in a bit of a conflict. It all began with a student led protest aimed at bringing ...
BrittanyMorganSecondPaper 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AlexeySokolinSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Click Like To Share The Data From Your Home By AlexeySokolin 25 Apr 2013 Internet of Things Fifty years have passed since the airing of Jetsons in 1962. Where ...
EileenHutchinsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Say Cheese: Biometrics and Facial Recognition Technology By EileenHutchinson 05 May 2013 Government Use of Biometric Technology For the past few years, federal ...
FumihiroKajikawa_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
The last day of the Internet in Japan? Introduction The eighteen years old high school student in Kobe Prefecture in Japan killed himself by jumping from the rooftop ...
AndrewReichSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Technology in the Courts Introduction Five years ago, in the year 2007, the Ninth Circuit Court of Appeals presided over a copyright dispute that would ultimately ...
MatthewAmsterdamFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction : Years ago, when Facebook was still only accessible to students with registered .edu email addresses, I sat in a lecture with my other high school seniors ...
AndrewReichFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Sharing Culture Electorate Introduction: Electability in the Internet Age We spoke in class about the governor who flippantly declared that the #8220;only ...
FirstPaper2012 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. javascript:submitEditForm('save',%20'save') Due Date TBA Formatting Log in. Clicking here: ...
SamuelDostartFirstPaper 14 Jan 2015 - 22:44 IanSullivan
A General Right to Privacy? Probably Not By SamuelDostart 16 Feb 2013 The class discussion about how the 4th Amendment went astray led me to wonder what it would ...
JulianDunn_FirstPaper 14 Jan 2015 - 22:44 IanSullivan
JulianDunn 10 Mar 2008 Julian Dunn Response Paper #1 Word Count: 999 The current battle in Washington over whether to enshrine Net Neutrality into law or not falsely ...
ElviraKrasFirstPaper 14 Jan 2015 - 22:44 IanSullivan
YuwenHuangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
YuwenHuang 04 Mar 2013 Recently, Google revealed the transparency report which shows information about requests from government s or courts around the world to hand ...
StacyAdelmanFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Let's Give Them Something to Talk About: Mobile Devices and the Privacy Policy Distraction Introduction "Tale of the Vacant Lot" is a story about a young girl, driven ...
VictorAFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Forced Decryption and the 5th Amendment On February 23, 2012, the Street Journal and Conspiracy reported that the Court of Appeals for the Eleventh Circuit decided ...
SehwanJangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Public awareness of protecting one #8217;s privacy The speed of the fast changing technology and the development of the current law system can hardly meet at the ...
JonathanKoppellFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction The consequences of a lack or breach of privacy with respect to the results of genetic testing and sequencing may be analogous to the same consequences ...
KevinMorenskiFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Social Network Effect By KevinMorenski 25 Apr 2013 Introduction Facebook's guileful beginnings as an exclusive social network for university students helped ...
JulianM_Paper-I 14 Jan 2015 - 22:44 IanSullivan
Phorm Over Function Phorm, formerly 121Media, is a technology company based in Moscow which became the subject of much scrutiny upon announcing that it was in talks ...
AlexeySokolinFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Faustian Bargain By AlexeySokolin 12 Mar 2013 Just Trust Me Many of the "free" consumer web services are not free at all. Users give up their data and the ...
YulingHuFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The New Personal Data Protection Act in Taiwan Overview Taiwan's new Personal Data Protection Act ("PDPA") became effective on October 1, 2012. Being called "the ...
RobertWatkins_FirstPaper 14 Jan 2015 - 22:44 IanSullivan
RobertW 25 Mar 2008 Word Count: 976 O #8217;Harrow #8217;s and similar works have taught us that we are quickly losing hope in maintaining privacy of our personal ...
EileenHutchinsonFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Surveillance and Control By EileenHutchinson 05 May 2013 #8220;He who is subjected to a field of visibility, and who knows it, assumes responsibility for the ...
CoryNelsonFirstPaper 14 Jan 2015 - 22:44 IanSullivan
A Lawyer's Professional Responsibility Duty of Confidentiality in a World of Technology By CoryNelson 24 Mar 2013 Introduction Lawyers are increasingly practicing ...
DanaDelgerFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DanaDelger 15 Feb 2009 I was thirteen when I killed my first deer, the shot flying forth from my hands, an incantation to crumple cities and knees. My father ...
FirstPaper2010 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE TWikiAdminGroup
VictorAuFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Forced Decryption and the 5th Amendment By VictorA 03 Mar 2013 On February 23, 2012, the Street Journal and Conspiracy reported that the Court of Appeals for ...
ShakimaWellsFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Under Attack After the events of September 11, 2001, which marked one of the largest terrorist attacks on United States soil in the country #8217;s history, it took ...
VanessaWFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The United States Electronic Postal Service By VanessaW 05 Mar 2013 Introduction Long before the internet created the possibility of an instantaneous and convenient ...
SeanBerensFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Criminal Records Without Convictions By SeanBerens 18 Apr 2013 The Problem In 3rd's New York Times, Stephanie Clifford and Jessica Silver Greenberg wrote of a ...
MayelaGarzaFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DNA Collection in the US: Where does it end? In the late 1980 #8217;s, US crime laboratories began DNA testing. Shortly, thereafter crime labs in different States ...
JamieCrooksFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Free Speech and the Marketplace of Identities The serious dangers data mining presents to our freedoms and privacy are well documented. In many ways it threatens ...
FirstPaper2013 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Create First Paper will create a page named FirstPaper2013 ...
AvaGuoFirstPaper 14 Jan 2015 - 22:44 IanSullivan
How the Fourth Amendment Could Be Revived By Ava Guo 04 Mar 2013 With the advent of computers and the internet, this Fourth Amendment right of people #8220;to ...
XiyunYangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Act V: The Decay of Privacy and the Sprouts of Chinese Democracy By XiyunYang 04 Mar 2013 Act IV Scene i: Decay The bodies are strewn, bloodied and accusatory ...
BrittanyMorganFirstPaper 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JeanLeeFirstPaper 14 Jan 2015 - 22:44 IanSullivan
SNS and Children's Privacy By JeanLee 02 Mar 2013 The Exposed Generation There were many reports in and around 2005 about concerns of social networking services ...
DarrenHaberFirstPaper 14 Jan 2015 - 22:44 IanSullivan
To say the the internet has changed how we communicate and share information would be an incredible understatement. The ability for anyone to easily communicate with ...
RohanGreyFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Children and Freedom Introduction: The False Hope of the Open Society When I was in school, the common refrain of my and other progressive friends' parents was ...
AmaneKawamotoFirstPaper 14 Jan 2015 - 22:44 IanSullivan
ESCAPING YOUR PAST #8211; THE #8220;RIGHT TO BE FORGOTTEN #8221; By AmaneKawamoto 04 Mar 2013 INTRODUCTION As one of the solutions to privacy issues rising ...
YukoKawaiFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Dead Men Floating through Internet Introduction Generally, people are represented in society through everything we do, everyone we've known, everywhere we've left ...
AyaNakamuraFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Protection of Privacy in Japan By AyaNakamura 01 Mar 2013 Section I Provisions of the Constitution and Act Subsection A Constitution The right to privacy ...
BostonIssues 14 Jan 2015 - 22:42 IanSullivan
I thought it might be useful to start a thread about the legal and privacy issues surrounding the recent events in Boston. We touched on some in class. Something ...
ClaritySoughtOnElectronicsSearches-WashingtonPost 14 Jan 2015 - 22:42 IanSullivan
ChristopherCoverdale 07 Feb 2008 This story ran today, 2/7/08 http://www.washingtonpost.com/wp dyn/content/article/2008/02/06/AR2008020604763.html?wpisrc newsletter ...
SenateSurveillanceAct 14 Jan 2015 - 22:42 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/12/AR2008021201202.html?wpisrc newsletter Senate Authorizes Broad Expansion Of Surveillance Act By Paul ...
UnderstandingSSLSecurity 14 Jan 2015 - 22:41 IanSullivan
Background Emerging Threats to Online Trust: The Role of Public Policy and Browser Certificates, Presentation, transcript, slides(pdf). October 22, 2010 Declan !McCullagh ...
BalancingPrivacyWithLegitimateGroundsToSue 14 Jan 2015 - 22:36 IanSullivan
I recently read the article of Lies, written by Jane Kirtley. Kirtley discusses one of the conflicts posed by an anonymous web that of making parties unable to ...
DeletionIllusion 14 Jan 2015 - 22:36 IanSullivan
This post on the New Yorker's website today by Matt Buchanan has some interesting observations about our generation's proclivity for sharing. Not much will be new ...
DuckDuckGo--AnAnonymousSearchEngine 14 Jan 2015 - 22:36 IanSullivan
I recently came across an advertisement for an online search engine titled DuckDuckGo that says it does not track you. In very plain english explains how your search ...
EmailPrivacy 14 Jan 2015 - 22:36 IanSullivan
FacebookHacking 14 Jan 2015 - 22:35 IanSullivan
HowStickyIsMembershipOnFacebookJustTryBreakingFree 14 Jan 2015 - 22:35 IanSullivan
http://www.nytimes.com/2008/02/11/technology/11facebook.html?th emc th February 11, 2008 How Sticky Is Membership on Facebook? Just Try Breaking Free By MARIA ASPAN ...
RethinkingSurveillance 14 Jan 2015 - 22:35 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/10/AR2008021002128.html?wpisrc newsletter Rethinking Surveillance Monday, February 11, 2008; D03 Video ...
SenateAuthorizesBroadExpansionOfSurveillanceAct 14 Jan 2015 - 22:35 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/12/AR2008021201202.html?wpisrc newsletter Senate Authorizes Broad Expansion Of Surveillance Act By Paul ...
StingraysHowtheFBIisWatchingYou 14 Jan 2015 - 22:34 IanSullivan
In this article, the author explains how for decades the FBI has used a questionably legal (I'd say illegal) tactic of creating fake cell phone networks by means of ...
TheDisappearanceofCash 14 Jan 2015 - 22:34 IanSullivan
ThoughtProvokingVideos 14 Jan 2015 - 22:34 IanSullivan
https://vimeo.com/46304267 https://www.youtube.com/watch?v Zf6C pZ3heY LandesTaylor 25 Jan 2013 Please give more information than just a URL. First, some title ...
USSpyAgenciesSpyingOnYou 14 Jan 2015 - 22:34 IanSullivan
I just came across an article about something that was mentioned in class, and wanted to add it to the Wiki. article discusses how the Obama Administration is currently ...
WhatYouDidnTPostFacebookMayStillKnow 14 Jan 2015 - 22:34 IanSullivan
What You Didn #8217;t Post, Facebook May Still Know Interesting and relevant article. The comments after the article are pretty good too. Here's an excerpt: "In ...
MachineTestimonyandConfrontation 14 Jan 2015 - 22:34 IanSullivan
Last semester I was thinking about the topic of machine generated testimony and the Confrontation Clause of the Sixth Amendment. I am curious, as we wrap up the semester ...
JessicaGuzikSecondPaper 14 Jan 2015 - 22:31 IanSullivan
This is a draft in Progress, a combination of a first paper revision/second paper If one accepts the premise that we are unlikely to revert to a pre social network ...
YuwenHuangSecondPaper 12 May 2013 - 19:25 EbenMoglen
About 3 months ago, Aaron Swartz, a 27 year old computer hacker committed suicide. Before his death, he was indicted on 13 felony counts of wire fraud and violations ...
GooglePrivacyPolicy 01 Apr 2013 - 23:00 AndrewReich
Google's New Privacy Policy: A Reading Lately, Google has begun to bombard me. I cannot watch a Youtube video, check a Google Doc, or run a web search without getting ...
FacebookLikes 01 Apr 2013 - 22:51 AndrewReich
An interesting illustration of the idea that giving up small bits of seemingly innocuous information can actually reveal more about us than we think: http://online ...
ThirdPaper 11 Jan 2013 - 21:48 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Optional paper. Formatting Log in. Clicking here: Create Second Paper will create a ...
ZhouZhouFirstPaper 11 Jan 2013 - 21:48 IanSullivan
CISPA and the Corporate Big Brother By ZhouZhou A bill called the Cyber Intelligence Sharing and Protection Act (CISPA) was recently passed in the House of Representatives ...
YinHuangFirstPaper 11 Jan 2013 - 21:48 IanSullivan
By YinHuang 23 Feb 2012 Surveillance has quietly undergone a dramatic change. Thanks to the technological developments of the past half century, governments can ...
SophieLangeFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Is electronic privacy under regulated in the U.S.? By SophieLange 26 Feb 2012 Introduction Last week President Obama outlined a #8220;consumer privacy bill of ...
WilliamCorsoFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Encryption, Common Use Assumptions, the 5th Amendment of the U.S. Constitution Section I The 5th Amendment The 5th Amendment of the United States Constitution ...
NatashaBronnSecondPaper 11 Jan 2013 - 21:48 IanSullivan
Finger Prints, Iris Scans, and a Sense of Belonging By NatashaBronn 31 May 2012 Introduction In 2009, the Government of India, through the Unique Identification ...
SamSalyerFirstPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
RoyMoranFirstPaper 11 Jan 2013 - 21:48 IanSullivan
De Democratization in Innovation's Clothing Introduction The Internet is eliminating our ability to live anonymously. Google is attempting to perfect its ability ...
RonMazorFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Wikileaks and the First Amendment By RonMazor 01 May 2012 Wikileaks as Journalism One could paint Wikileaks as an irresponsible peddler of secret gossip. Yet ...
KristenLovinSecondPaper 11 Jan 2013 - 21:48 IanSullivan
"Safarigate" and Challenges to Protecting Browser Privacy Settings By KristenLovin 19 Jul 2012 On February 17, the Wall Street Journal announced that Google purposefully ...
RichardZemskyFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Can the Law Save Us? The Search for Protection from Government Collection of Online Data By RichardZemsky 25 Apr 2012 We live in the digital age. It means technology ...
AlejandroMercadoSecondPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AustinLeachSecondPaper 11 Jan 2013 - 21:48 IanSullivan
RFID and Me By AustinLeach 19 May 2012 Introduction If the government has not done so already, it won #8217;t take long to circumvent the holding of United ...
OmarHarounFirstPaper 11 Jan 2013 - 21:48 IanSullivan
I recently read an article (http://www.salon.com/topic/sexual abuse/) about Sexually Violent Predators (SVPs) which I found intriguing and which led me to undertake ...
MeharJagotaFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Behavioral Economics and Privacy Rights By MeharJagota 11 Apr 2012 Introduction A theme of our class has been the apparent cognitive bias which prevents people ...
LeeSilverFirstPaper 11 Jan 2013 - 21:48 IanSullivan
The Administration #8217;s proposal The Obama Administration recently unveiled The Consumer Privacy Bill of Rights,{{ See We Can #8217;t Wait: Obama Administration ...
MattKokotFirstPaper 11 Jan 2013 - 21:48 IanSullivan
United States v. Jones: A Fleeting Victory for Privacy By MattKokot 13 Mar 2012 Introduction In States v. Jones, the Supreme Court held that the Fourth Amendment ...
JonathanMarcusFirstPaper 11 Jan 2013 - 21:48 IanSullivan
The Panopticon Inverted: Why Privacy Is Less Valuable In Contemporary Society By Jonathan Marcus The concept of the Panopticon initially developed as a model for ...
KristenLovinFirstPaper 11 Jan 2013 - 21:48 IanSullivan
"Safarigate" and Challenges to Protecting Browser Privacy Settings By KristenLovin 18 Mar 2012 On February 17, the Street Journal announced that Google purposefully ...
JessicaGuzikFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Insert non formatted text here Insert non formatted text here The Price of Facebook By JessicaGuzik 12 Mar 2012 Introduction The dangers of Facebook ...
HibahHussainFirstPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
FernandGodardFirstPaper 11 Jan 2013 - 21:48 IanSullivan
FernandoGodard 19 Mar 2012 Is there a real protection for our personal data? More and more we see countries all over the world adopting new laws and amending their ...
AustinLeachFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Branding and Privacy By AustinLeach 01 Mar 2012 Introduction Corporate marketing and branding have always sought to change how consumers view a corporation and ...
BahradSokhansanjFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Surveillance as Subordination Americans usually think about rights in individual terms. I have the right to express myself freely. I have the right to own my ...
AlexanderWongFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Towards a Singularity? The Web as the Global Brain By AlexanderWong 24 Feb 2012 Introduction Modern technology has been responsible for tremendous changes within ...
AjKhandakerFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Is an equality principle underlying the First Amendment a strategically desirable framework for advancing public ownership goals like birthright bandwidth? By AjKhandaker ...
AlejandroMercadoFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Technology Driven Rights By AlejandroMercado 26 Feb 2012 Introduction Even if we acknowledge that the Constitution is animated by old century thought, its efficacy ...
AlexAsenFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Through the Procedures of Corporate Democracy... By AlexAsen 08 Mar 2012 The Problem In 2010, Justice Kennedy, writing for the majority in Citizens United , ...
AaronChanFirstPaper 11 Jan 2013 - 21:48 IanSullivan
A Privacy Framework that Changes Little By AaronChan 28 Feb 2012 Introduction The Obama administration recently released its Data Privacy Framework advocating ...
PrivateSnoopsFindGpsTrailLegalToFollow 11 Jan 2013 - 21:47 IanSullivan
I thought this article of interest to our class discussion. AlejandroMercado 29 Jan 2012
ShadowFactoryReview 11 Jan 2013 - 21:47 IanSullivan
AlfianKuchit 17 Jan 2009 #8220;Probably the best place within the entire region to install a listening post is the Indian city of Mumbai, #8221; James Bamford writes ...
PublicExposure 11 Jan 2013 - 21:46 IanSullivan
Public Exposure The Yeshiva University Beacon Scandal and Facebook Linked Commentary Recently, a very small corner of the New York Jewish world was rocked by a scandal ...
CuriousBritain 11 Jan 2013 - 21:30 IanSullivan
Britain has decided that an effective way to combat terrorism is to monitor all phone calls, text messages, emails, and web browsing. With luck, Britain will find ...
EbookConversion 11 Jan 2013 - 21:30 IanSullivan
You might be interested in doing the assigned reading from No Place To Hide by Ebook reader. You will need to convert the format from djvu to do this. piece of free ...
HowCompaniesLearnOurConsumingSecrets 11 Jan 2013 - 21:30 IanSullivan
In my opinion, there is certainly no denying that this is equivalent as having a camera following me around at all times. I don't need to have my physical behavior ...
InterestingArticle 11 Jan 2013 - 21:30 IanSullivan
Your apps are watching you: http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html JessicaGuzik 30 Jan 2012
LawPracticeWorkingGroup 11 Jan 2013 - 21:30 IanSullivan
Hi everyone. I am writing to invite you to join a group I have formed, the Law Practice Working Group. First, since I know some of you, but not all of you, let me ...
ObamaNarwhal 11 Jan 2013 - 21:30 IanSullivan
I plan to expand on this in the future. For now, here's a link to a Slate article regarding a new data mining and analysis system the Obama campaign plans to use to ...
ProtectYourPrivacy 11 Jan 2013 - 21:29 IanSullivan
I refer Comp Priv Const classmates to post from LawNetSoc. You might find some of the tips there useful for your own purposes. Duck Duck Go, the most recent addition ...
TrackingStudentsOrSiblings 11 Jan 2013 - 21:29 IanSullivan
This is most interesting. Do students have a right to privacy? If so, is such right completely subordinated to parental discretion and responsibility? If it were my ...
AppleLoopholeGivesDevelopersAccessToPhotos 11 Jan 2013 - 21:25 IanSullivan
AlejandroMercado 01 Mar 2012
ModuleTest28Jun2012 28 Jun 2012 - 06:57 XmvlYzlv?
XmvlYzlv 28 Jun 2012 jlkhgvkihbloijn;oijbnoiuybjuytvuytrcvuytfvjuyg
ClassNotes2008And2009 17 Jan 2012 - 18:02 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sureyour classnotes pages have ...
ClassNotes 17 Jan 2012 - 18:01 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sure your classnotes pages have ...
OldNotes 17 Jan 2012 - 18:01 IanSullivan
Old notes:
ThirdPaper2010 17 Jan 2012 - 17:59 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Optional paper. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE ...
Classnotes6Feb2009 17 Jan 2012 - 17:49 IanSullivan
Historical 4th Amendment has vanished as a useful proposition because technological change outran the judge #8217;s enthusiasm for enforcing or expanding the protection ...
Classnotes30Jan2009 17 Jan 2012 - 17:49 IanSullivan
The Framers of the U.S. Constitution took their understanding of the problems to be solved perceived the primary goal of the protection against search, seizure and ...
Classnotes23Jan2009 17 Jan 2012 - 17:49 IanSullivan
Weekly news items coming alongside our concerns: Reports of use of location based information to assist in political protest or counter force with those who contributed ...
Classnotes20Feb2009 17 Jan 2012 - 17:49 IanSullivan
Classnotes16Jan2009 17 Jan 2012 - 17:49 IanSullivan
Lecture Notes for Jan 16, 2009 #8226; The course started in 1997, and the course has never stayed the same from year to year #8226; Intended to explain the relationship ...
Classnotes13Feb2009 17 Jan 2012 - 17:49 IanSullivan
Part 4 was the problem of constitutional rights defined as freedom from government activity from unreasonable searches and seizures in the context of technological ...
ClassNotes31Jan08 17 Jan 2012 - 17:49 IanSullivan
Misc Links CNN, Memo: Don't Use Obscene Check to Pay Parking Ticket, Jan. 12 2008 JulianM 31 Jan 2008
ClassNotes28Feb08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 29 Feb 2008 Professor Moglen continues to make the same "unpopular" argument. Next week there is no class because he will be at a Google event at Stanford ...
ClassNotes27Mar08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 28 Mar 2008 Problems in Tibet. There has been a bust up in the net. The firewall tightening inside China is a further example of a concerted attempt to ...
ClassNotes24Jan08 17 Jan 2012 - 17:49 IanSullivan
Privacy and Surveillance: (Ancient) Historical Perspective As the Supreme Court sees it in Olmstead, the common law is not open to the development of new privacies ...
ClassNotes17Jan08 17 Jan 2012 - 17:49 IanSullivan
General Course Background Note taking will be rotated and in the wiki. (I'd put in the wiki URL, but you're already here.) Course requirements/Grading two ...
ClassNotes21Feb08 17 Jan 2012 - 17:49 IanSullivan
second part of the 'of the press' argument summarizes last week as arguing that 'the press' is about publication as a mechanism of speech, rather than of a distinct ...
ClassNotes13Mar08 17 Jan 2012 - 17:49 IanSullivan
Anonymity GGM: lost 'two most fundamental rights of man: to sleep with a woman other than his wife and the right to lie about it.' Spitzer similarly keeping it secret ...
ClassNotes14Feb08 17 Jan 2012 - 17:49 IanSullivan
LuisVilla 14 Feb 2008 Or Of The Press One (of Eben's three) web servers got cut off by the university last week. So if Eben's web server gets cut off (presume a public ...
ClassNotes10Apr08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 11 Apr 2008 Could there be benefits from the technological system #8212;to expand procedure in courts in light of technology so as to derive more technological ...
ClassNotes03Apr08 17 Jan 2012 - 17:49 IanSullivan
So what about Confrontation? (aka PartSix) Does it limit what technology judges and lawyers can use in a courtroom, when they'd otherwise use lots more technology ...
WookJinRhaSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for Review Surveillance Camera Issues in Korea By WookJinRha 27 Apr 2010 Surveillance cameras secretly watching people #8217;s every move has become ...
UsmanArainSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Feedback welcome! Marketing The Privacy Right By UsmanArain 02 May 2010 Part I: Thinking About Aims and Goals #8220;A liberal is a conservative who #8217 ...
StephenClarkeSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Unreasonable Suspicion and Its Insufferable Alternatives: A Look at Legal Norms Through the Lens of NYPD Stop and Frisk Activity By StephenClarke 18 Mar 2010 On ...
StephanieTrainSecondPaper 17 Jan 2012 - 17:48 IanSullivan
The Loss of Analog Anonymity The for the right to remain anonymous on the internet has been under way for some time. Proponents of digital anonymity often point to ...
MunKiNamSecondPaper 17 Jan 2012 - 17:48 IanSullivan
YouTube vs. South Korean Government: Real Name Verification System in South Korea and its Threat to the Freedom of Expression on the Internet By MunKiNam 01 May ...
WookJinRhaFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for Review Issues Surrounding Internet #8220;Real Name #8221; System in Korea By WookJinRha 27 Apr 2010 I. Adoption of Internet #8220;Real Name #8221 ...
NikolaosVolanisSecondPaper 17 Jan 2012 - 17:48 IanSullivan
ready for review A post structuralist interpretation of facebook profiles Has the medium become the message? A. Facebook at a glance... Facebook seems to be another ...
KeeryongSongSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Data mining #8230;occurring without your consent I. Expectations and the reality II. The Korean system III. The U.S. system V. Conclusion I. Expectations and the ...
JungheeChoSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Real name Internet System: Dark Side of the Internet Power On October 2 2008, a famous Korean actress, Jinsil Choi committed suicide. After her suicide, all of the ...
JulianBaezSecondPaper 17 Jan 2012 - 17:48 IanSullivan
DRAFT Ready for comment. How Your Tweets Are Forever Searchable By JulianBaez 16 Apr 2010 What You Thought Your Twitter account is public by default. Moments ...
JonathanGuerraSecondPaper 17 Jan 2012 - 17:48 IanSullivan
JonathanGuerra 30 Oct 2010 Security cameras are ubiquitous in big cities now, and this has created vast concerns about privacy. I live six blocks away from the law ...
StephanieTrainFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Three Strikes Laws and The Human Condition: Is Access to the Internet a Right? As the internet becomes an ever larger part of daily life, the copyright industry (led ...
JonathanBoyerSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Debating Internet Law at the Speed of Light: Confounds of Relativity and Incomplete Understanding JonathanBoyer As many invested in the discussion are painfully aware ...
StephenClarkeFirstPaper 17 Jan 2012 - 17:48 IanSullivan
The Constitutionality of Zero Marginal Cost Surveillance: A Study of Recent GPS Tracking Decisions By StephenClarke 16 Mar 2010 Since the Supreme Court decided ...
GuilhermePinheiroSecondPaper 17 Jan 2012 - 17:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
NikolaosVolanisFirstPaper 17 Jan 2012 - 17:48 IanSullivan
ready for review Freedom to receive information in wired and wireless communication networks: controlling the switches and the airwaves. By NikolaosVolanis 26 ...
KeeryongSongFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Different notions of privacy #8230;Korea and the U.S. I. #8220;Find Your Friend #8221; service in Korea II. Privacy in Korean education III. Different notions of ...
EdwardBontkowskiSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Reasonability and Expectations of Internet Privacy By EdwardBontkowski 03 May 2010 The Fourth Amendment of the United States Constitution provides protection ...
EunNyungLeeSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Calls for Independent Privacy Agency Demand for Protection of Private Data The South Korean government in years past has been repeatedly chided for its ineptitude ...
MunKiNamFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Problems of the Adoption of the Notice and Takedown Regime by Other Countries By MunKiNam 01 May 2010 The Notice and Takedown Regime in DMCA Section 512 (c) of ...
KeeryongSongThirdPaperForExtraCredit 17 Jan 2012 - 17:48 IanSullivan
Korea's movements towards "perfection" I. Registration of Fingerprints II. No place to hide III. Wrongful movements towards #8220;perfection #8221; IV. Conclusion ...
JungheeChoFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Twitter and Election: Do Indigent Candidates Dream of Electric Campaigns? This is a true story of a famous IT blogger in Korea. For convenience, let's call him "Doax ...
DianaSidakisSecondPaper 17 Jan 2012 - 17:48 IanSullivan
DianaSidakis 26 May 2010 Identity: Sameness or Difference Identity is sameness; sharing its root with identical. Etymologically, the formation of the word is unclear ...
JulianBaezFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Online Voting: Easier to Participate in an Election or Easier to Steal One By JulianBaez 21 Feb 2010 Voting is Inconvenient So Some People Don #8217;t Vote Many ...
DavidMehlSecondPaper 17 Jan 2012 - 17:48 IanSullivan
The Certegy Data Misappropriation Case Introduction Created in 2001, Certegy sought to empower check users by insuring checks written to merchants. Certegy did not ...
JonathanGuerraFirstPaper 17 Jan 2012 - 17:48 IanSullivan
JonathanGuerra 14 Oct 2010 Convenience rules the day. Friend: So you don #8217;t use Easy Pass? Me: No I don #8217;t. Friend: Why not? Me: I honestly hate the idea ...
BrianSSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for review. Comments welcome. The Evolving Problem of DMCA Takedowns By BrianS 24 Mar 2010 Introduction: Section 512(c) The DMCA's takedown provision ...
BryanKimButlerSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Set ALLOWTOPICVIEW TWikiAdminGroup, BryanKimButler One recent occasion for reflection on obscenity, the internet, and art BryanKimButler The defendant in United ...
JonathanBoyerFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Dumb or Just Happy: Is There a Concept of Liberty That Respects the Pursuit of Apathetic Nirvana? JonathanBoyer "But if I no longer feel attached to property, no ...
BetreGizawSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Why the Pro Privacy Movement Isn #8217;t Working: Data Mining as Entertainment There is something about privacy that we all understand in an intimate way and yet seem ...
GuilhermePinheiroFirstPaper 17 Jan 2012 - 17:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AndrewHerinkSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Why Bobbitt is Wrong on TIA INTRODUCTION In Terror and Consent , Philip Bobbitt argues in favor of the Pentagon #8217;s Total Information Awareness (TIA) data mining ...
EdwardBontkowskiFirstPaper 17 Jan 2012 - 17:48 IanSullivan
READY FOR REVIEW The Stored Communications Act: The Ramifications of an Antique Privacy Law By EdwardBontkowski 26 Apr 2010 "Ways may some day be developed by ...
AlexUballezSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Protecting Fourth Amendment Privacy Rights in Electronic Data. The Plain View Doctrine and Electronic Data. In physical spaces, the plain view doctrine can balance ...
DianaSidakisFirstPaper 17 Jan 2012 - 17:48 IanSullivan
DianaSidakis 19 May 2010 Constructing Truth: Technology and Ritual Technology, as a product of science, has the ability to appear neutral, as if existing outside of ...
DavidMehlFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Virtual Child Pornography and The Constitution Historical Background In v. California, the Supreme Court held that obscene speech does not receive First Amendment ...
BryanKimButlerFirstPaper 17 Jan 2012 - 17:48 IanSullivan
BryanKimButler Two questions about privacy persistently concern me: first, the extent to which privacy and sexuality are linked or affect each other; second, the ...
BrianSFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for review, comments welcome. Book Worms: Privacy in Digital Libraries By BrianS 27 Feb 2010 The Spark: Google Books In 2002, Google took its steps towards ...
BetreGizawFirstPaper 17 Jan 2012 - 17:48 IanSullivan
DNA SWABBING UPON ARREST: Race, DNA and the Law #8220;It #8217;s the right thing to do. This is where the national registry becomes so important, because what you ...
AndrewHerinkFirstPaper 17 Jan 2012 - 17:48 IanSullivan
THE ICESCR AND THE HUMAN RIGHT TO INTERNET ACCESS INTRODUCTION Does international human rights law require that countries guarantee internet access to all their citizens ...
AlexUballezFirstPaper 17 Jan 2012 - 17:48 IanSullivan
The #8216;reasonable expectation #8217; test and technology. The Fourth Amendment does not explicitly protect privacy. However, the court has extrapolated an inherent ...
OldDiscussion 17 Jan 2012 - 17:44 IanSullivan
WebPreferences 15 Jun 2010 - 14:24 EbenMoglen
CompPrivConst Web Preferences The following settings are web preferences of the CompPrivConst web. These preferences overwrite the site level preferences in ...
RazaPanjwaniFirstPaper 17 May 2010 - 16:35 RazaPanjwani
Are today's news organizations sustainable on their current revenue models if you cut the cost of physical printing and distribution? I think the answer is that it ...
RazaPanjwaniSecondPaper 17 May 2010 - 16:28 RazaPanjwani
On Publishers A simple proposition: digitization of a media form changes everything. This is less a proposition about digitization itself then about the fall of ...
RicoJedrzejczykSecondPaper 11 May 2010 - 23:52 EbenMoglen
Exposing the tip of the iceberg #8211; Google begins tracking government data requests Fresh from its very public fistfight with the Chinese Communist Party, Google ...
RicoJedrzejczykFirstPaper 11 May 2010 - 23:26 EbenMoglen
Reporters #8217; privilege and personal data held by third party service providers #8211; a brief consideration of The New York Times v. Gonzales The government ...
FairInformationCode 05 Jan 2010 - 22:35 IanSullivan
Background In the last class on PartFour I proposed the idea of regulating forgetting, forcing data keepers to sunset data. Eben raised First Amendment issues with ...
WardBensonSecondPaper 05 Jan 2010 - 22:33 IanSullivan
WardBenson 27 May 2009 A Return to Calvinist America During a recent argument I had some difficulty defending the anti data mining cause. Ok says the 1L, putting ...
TheodoreSmithSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Language of Place TheodoreSmith 15 June 2009 Table of Contents Growing to Simplicity There is a point early in the growth of a network where the emergent ...
RickSchwartzSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Note: I know this paper is somewhat misplaced within the wiki, but there's no folder for second papers yet. Also, I moved the conversation that was previously occurring ...
MislavMataijaSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Flea Market and the Public Square #8211; Giving the First Amendment a Say in Copyright MislavMataija 11 May 2009 File sharing cases are based on the 1984 ...
MatthewEckmanSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Correction By MatthewEckman 15 May 2009 I made a mistake in class one day. Professor Moglen, as I recall, was speaking in ominous tones about the fact that grocery ...
MattDavisRatnerSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Health Insurance and the Net Individuals are risk averse. We buy insurance to mitigate our personal risks. One of the most important expenses in an individual's ...
MahaAtalSecondPaper 05 Jan 2010 - 22:32 IanSullivan
The Truth is Not Enough By MahaAtal 18 May 2009 In our class on Part Four, we determined that until we can build a legal infrastructure for privacy, we should take ...
KateVershovSecondPaper 05 Jan 2010 - 22:32 IanSullivan
Comments would be greatly appreciated. I will openly admit that I am anything but a technological expert. I am, however, a science fiction buff and undyingly optimistic ...
JustinColanninoSecondPaper 05 Jan 2010 - 22:32 IanSullivan
Learning New Tricks: Lessons from the Animal Rights Movement JustinColannino Collective action is a recurring theme in this class a solution to many of the discussed ...
JonathanBonillaSecondPaper 05 Jan 2010 - 22:31 IanSullivan
"purpose of voir dire questioning is to obtain a fair and impartial jury" Voir Dire and the Digital Divide By JonathanBonilla 15 May 2009 The litigation process ...
JonPenneySecondPaper 05 Jan 2010 - 22:31 IanSullivan
The Fourth Amendment #8217;s Unwelcome Journey to Canada or Canadian Lessons for American Constitutionalism By JonPenney 27 Apr 2009 How do we fix privacy ...
DanielHarrisSecondPaper 05 Jan 2010 - 22:31 IanSullivan
A second paper will be here in a while. DanielHarris 22 June 2009 Information war lessons from Iran mobile phones Internet anonymization social media ...
DanaDelgerSecondPaper 05 Jan 2010 - 22:31 IanSullivan
The Grand Inquisitor Meets Free Information the end they will lay their freedom at our feet, and say to us, #8216;Make us your slaves, but feed us. #8217; They will ...
AnnaHaapanenSecondPaper 05 Jan 2010 - 22:31 IanSullivan
Privacy in Electronic Communications is Protected #8211; At Least Presumptively The Section 10 of the Constitution of Finland affirms that #8220;The secrecy of correspondence ...
AndreiVoinigescuSecondPaper 05 Jan 2010 - 22:31 IanSullivan
Search Engines and Technological Privacy Solutions Few of us share all of our intimate thoughts, anxieties and desires with even the closest of friends. Yet we have ...
AlexLawrenceSecondPaper 05 Jan 2010 - 22:31 IanSullivan
What Can We Do? As Eben and others have mentioned throughout the term people are only too happy to give away scads of private information on the internet. No widely ...
WardBensonFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Bringing the Right on Board By WardBenson 23 Mar 2009 Even though all Americans consider freedom and privacy to be fundamental to our way of life, many on the ...
TheodoreSmithFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Digital Metaphor and the 5th Amendment TheodoreSmith 31 May 2009 Table of Contents Introduction Although ontological questions in law are by no means limited ...
SylvieRampalFirstPaper 05 Jan 2010 - 22:31 IanSullivan
The Transmogrification of Self: Surveillance, Privacy, and Personhood By SylvieRampal 03 Mar 2009 People are so obsessed with innovation and modernity that they ...
RickSchwartzFirstPaper 05 Jan 2010 - 22:31 IanSullivan
What's Left of Privacy v.2 Introduction Discarding the style to save the substance seems entirely warranted. Though I myself am not sure what my "usual project" ...
MislavMataijaFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Assessing a Regulatory Approach to Data Protection: the EU Directive By MislavMataija 01 May 2009 Can the collection of personal data be regulated by the market ...
MatthewEckmanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Encryption, Privacy, and the Fifth Amendment By MatthewEckman 08 Mar 2009 PAPER IN PROGRESS The Electronic Frontier Foundation highly recommends that people encrypt ...
MattDavisRatner-FirstPaper 05 Jan 2010 - 22:30 IanSullivan
Individual Privacy: A Social Construction? Introduction In order to change the massive trend of disappearing privacy, many aspects of our daily lives must change ...
MahaAtalFirstPaper 05 Jan 2010 - 22:30 IanSullivan
How Do You Protect That Which You Cannot Define (revised) By MahaAtal 17 May 2009 In March, a journalism listserv to which I subscribe ignited over legislation up ...
KateVershovFirstPaper 05 Jan 2010 - 22:30 IanSullivan
#8220;Voluntariness #8221; in 2009 By KateVershov 08 Mar 2009 In States v. Miller , the Supreme Court held that there is no reasonable expectation of privacy ...
JustinColanninoFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Does Copyright Neuter Social Movements? "Thats how to always get something, just get together all at once and yell and yell and yell and yell and yell and yell and ...
JonathanBonillaFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Online Behavioral Advertising By JonathanBonilla 26 Apr 2009 As seen in O #8217;Harrow #8217;s No Place to Hide, online data aggregation can pose a real problem ...
JonPenneyFirstPaper 05 Jan 2010 - 22:30 IanSullivan
The Tragedy of the Communicative Commons: Privacy, Consumerism, and Metaphor Inc. By JonPenney 08 Mar 2009 (revised) Privacy is not doing so well these days. ...
HarryLaymanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Hello, World Thousands of years ago, primitive man left colorful handprints on some cave walls in Lascaux, France. Hey, they seemed to say. I was here. The instinct ...
DanielHarrisFirstPaper 05 Jan 2010 - 22:30 IanSullivan
In Defense of RFID By DanielHarris 8 Mar 2009 Introduction RFID and related technologies in the form of the smart card have taken a beating, often literally. ...
AnnaHaapanenFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Comparison of Protection of Privacy in Finland and the United States Finnish Data Protection Regime The right to privacy is fundamental right, and protected in Finland ...
AndreiVoinigescuFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Making Microsoft Pay for Windows' Shoddy Security By AndreiVoinigescu 07 Apr 2009 Introduction is the latest in a series of malware exploiting security vulnerabilities ...
AlexLawrenceFirstPaper 05 Jan 2010 - 22:29 IanSullivan
The Eisenhower Inheritance Throughout the term so far as we have discussed the implications of the Internet Age on the US Constitution Eben has constantly reminded ...
NewYorkerArticleMcConnell 05 Jan 2010 - 21:58 IanSullivan
The New Yorker profiles DNI Michael !McConnell Hi All I confess I have never used a "wiki" before, and despite viewing the "tutorial" I still have absolutely no ...
QuestionsAndDiscussion 05 Jan 2010 - 21:58 IanSullivan
Questions and Discussion Privacy Guarding Post Office? Even though the 4th Amendment is pretty much dead because it gives no protection to identities, Eben mentioned ...
SatellitesTrevorPaglen 05 Jan 2010 - 21:56 IanSullivan
For those interested in learning more about US satellites, take a look at the article about Trevor Paglen. He did a very interesting art exhibit at the Berkeley Art ...
RickSchwartzOtherIdeas 05 Jan 2010 - 21:55 IanSullivan
I've moved this conversation here in order to preserve the wiki paper labeling system when I changed my topic for the second paper. RickSchwartz 25 Apr 2009 Undermining ...
InSearchOfJeffersonsMoose 05 Jan 2010 - 21:54 IanSullivan
So this is a pretty random question but I was wondering if anyone had heard of the new book Search of Jefferson's Moose. I stumbled across a mention to it and an ...
HarryLaymanSecondPaper 05 Jan 2010 - 21:53 IanSullivan
Who killed Trellis Photonics and is Verizon next? Death in Ft. Meade Trellis Photonics. I think it has a nice ring to it, like Astronomy. I first learned of this ...
ElizabethDoisySecondPaper 05 Jan 2010 - 21:53 IanSullivan
Introduction In mid July, Amazon remotely deleted copies of George Orwell #8217;s novels #8220;1984 #8221; and #8220;Animal Farm #8221; from its customers #8217 ...
DoWeNeedANewInternet 05 Jan 2010 - 21:52 IanSullivan
I don't know if people saw Markoff's article, "Do We Need A New Internet?" in this weekend's NY Times, but I thought it was an interesting piece. Though not completely ...
NoteTakerSignup 27 Jan 2009 - 23:21 IanSullivan
GerryMoody 28 Feb 2008 I was looking at the Law and Contemporary Society wiki, and I noticed that someone came up with a pretty good idea: a note taker sign up page ...
PartSix 24 Jan 2009 - 23:12 EbenMoglen
Part Six: Speedy and Public Trial Theory Speedy Trial Klopfer v. North Carolina, 386 U.S. 213 (1967) United States v. Marion, 404 U.S 307, (1971) Public Trial Gannett ...
AlexMiddletonFirstPaper 24 Jan 2009 - 21:51 EbenMoglen
The End of Privacy: Bang, Whimper or... Shrug? By AlexMiddleton 25 Mar 2008 Our last class closed with the lament that Eliot Spitzer's downfall was apparently ...
WebTopicList 24 Jan 2009 - 21:47 EbenMoglen
!CompPrivConst Web Topic List Topics by Hierarchical Relationship open all close all %TREEBROWSER{ theme "file" shared "tree" title "" openTo "1" ...
RobertGluntFirstPaper 23 Jan 2009 - 16:05 IanSullivan
RobertGlunt 10 Apr 2008 Large private companies are compiling databases of information about Americans without their knowledge or consent. Over the last several ...
RobertGluntSecondPaper 23 Jan 2009 - 16:04 IanSullivan
RobertGlunt 06 May 2008 A Web 2.0 Lament In college I was fairly heavily involved in parliamentary debate. It did wonderful things to my thinking, terrible things ...
RobertWatkinsFirstPaper 23 Jan 2009 - 16:04 IanSullivan
RobertW 25 Mar 2008 Word Count: 976 O #8217;Harrow #8217;s and similar works have taught us that we are quickly losing hope in maintaining privacy of our personal ...
RobertWatkinsSecondPaper 23 Jan 2009 - 16:03 IanSullivan
RobertW 28 Apr 2008 The Worn Out Unwelcomeness of Advertisement 989 Words Many believe advertisement bombardment in media will grow to a point at which ...
SarahRogersSecondPaper 23 Jan 2009 - 16:02 IanSullivan
SarahRogers 15 May 2008 Email Privacy After Councilman : Addressing the ISP Liability Loophole Enacted in 1986, the Electronic Communications Privacy Act (ECPA ...
MadhuPochaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Iraqi biometric identification program and its relevance to privacy rights in the U.S. MadhuPocha 13 May 2008 Last year news organizations on the U.S. military ...
LuisVillaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Right to Privacy is Dead; Long Live the Right To Privacy LuisVilla 21 Apr 2008 These are notes and not the final paper; having them in the history of this ...
LaurenHowarSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Sixth Amendment establishes that in #8220;all criminal prosecutions, the accused shall enjoy the right #8230; to be informed of the nature and cause of the accusation ...
JulianMPaperII 23 Jan 2009 - 15:57 IanSullivan
Extreme Porn Five years ago Jane Longhurst, a teacher from Brighton, murdered by Graham Coutts, a fan of websites such as "Club Dead" and "Rape Action" which offered ...
JulianMPaperI 23 Jan 2009 - 15:56 IanSullivan
Phorm Over Function Phorm, formerly 121Media, is a technology company based in Moscow which became the subject of much scrutiny upon announcing that it was in talks ...
GlennLortscherSecondPaper 23 Jan 2009 - 15:56 IanSullivan
Broadband Providers See a Goldmine in Terms of Service Agreements Still hung over from a brief, drunken courtship with the media giants, broadband providers have awoken ...
JulianDunnFirstPaper 23 Jan 2009 - 15:52 IanSullivan
JulianDunn 10 Mar 2008 Julian Dunn Response Paper #1 Word Count: 999 The current battle in Washington over whether to enshrine Net Neutrality into law or not falsely ...
GerryMoodySecondPaper 23 Jan 2009 - 15:51 IanSullivan
GerryMoody 23 Jun 2008 Liberty and Anonymity In On Liberty, John Stuart Mill argues that autonomous thought and action are necessary conditions for personal liberty ...
FumihiroKajikawaSecondPaper 23 Jan 2009 - 15:50 IanSullivan
The last day of the Internet in Japan? Introduction The eighteen years old high school student in Kobe Prefecture in Japan killed himself by jumping from the rooftop ...
OldIntros 23 Jan 2009 - 15:39 IanSullivan
OldPapers 23 Jan 2009 - 15:38 IanSullivan
BranwenBuckleyFirstPaper 23 Jan 2009 - 15:33 IanSullivan
BranwenBuckley 27 Mar 2008 Search Me: Google and Microsoft's foray into medical records As laid out in O'Harrow's book, recent years have led to a wide scale incursion ...
TaehyoungKwonSecondPaper 23 Jan 2009 - 15:31 IanSullivan
The Constitutional Issues of Spam Mail TaehyoungKwon 27 Apr 2008 I. Introduction In the society of information, spam mail, also known as "bulk e mail" or "junk ...
HereComesEverybody 23 Jan 2009 - 15:30 IanSullivan
Here Comes Everybody #HereComesEverybody (#HereComesEverybody) Excerpts from the by http://www.shirky.com/bio.html Clay Shirky Chapter 7: Faster and Faster #FasterAndFaster ...
SarahRogersFirstPaper 23 Jan 2009 - 15:30 IanSullivan
Determining the appropriate standard for unmasking anonymous defendants in internet defamation suits: what does the First Amendment require? By SarahRogers 28 ...
MadhuPochaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
What Happens in Vegas, Stays in . . . a Government Hard Drive? By MadhuPocha 27 Mar 2008 Few people have heard of Jonas, a man whose work has helped transform ...
LuisVillaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
Resolving the Paradox: Public Collaboration, Data Sharing, and Privacy By LuisVilla 27 Feb 2008 Collaboration in the Public Eye " W e all derive immense benefit ...
KotaroKuboSecondPaper 23 Jan 2009 - 15:29 IanSullivan
KotaroKubo 05 May 2008 Reconstruction of Public/Private Dichotomy Bernard Crick wrote in his #8220;In Defense of Politics #8221; (1964) that #8220;politics are ...
KotaroKuboFirstPaper 23 Jan 2009 - 15:29 IanSullivan
The Public/Private Dichotomy By KotaroKubo 24 Mar 2008 Understanding of the Public/Private Dichotomy The distinction between #8216;public #8217; and #8216;private ...
GlennLortscherFirstPaper 23 Jan 2009 - 15:28 IanSullivan
Your RDA of Privacy: A Nutrition Facts Label for the Web By GlennLortscher 24 Mar 2008 How much are lists of nouns worth? Quite a lot, if you can tie them to ...
GerryMoodyFirstPaper 23 Jan 2009 - 15:28 IanSullivan
Barbaric Yawp: Universal Spectrum Access and the Public Trust Doctrine By GerryMoody 27 Feb 2008 #8220;I sound my barbaric yawp over the roofs of the world ...
FumihiroKajikawaFirstPaper 23 Jan 2009 - 15:28 IanSullivan
The Japanese Spectrum Policy and collusion Introduction #8211; Soviet ministries in U.S and North Korea Monarchy in Japan Walt Mossberg, the journalist of Wall Street ...
ArchivedMaterial 23 Jan 2009 - 15:24 IanSullivan
This is where student specific materials from previous years goes once the term ends.
OldDiscussionMaterials 23 Jan 2009 - 15:21 IanSullivan
ComputerPrivacyNews 14 Feb 2008 - 21:36 LuisVilla
Some recent relevant news items: SenateAuthorizesBroadExpansionOfSurveillanceAct RethinkingSurveillance HowStickyIsMembershipOnFacebookJustTryBreakingFree ...
WebTopicEditTemplate 10 Jan 2008 - 20:26 EbenMoglen
WebChanges 15 Nov 2006 - 19:43 TWikiContributor
WebTopicCreator 15 Nov 2006 - 19:43 TWikiContributor
WebSearch 15 Nov 2006 - 19:43 TWikiContributor
WebIndex 15 Nov 2006 - 19:43 TWikiContributor
WebSearchAdvanced 15 Nov 2006 - 19:43 TWikiContributor
WebAtom 24 Jan 2006 - 06:07 TWikiContributor
TWiki's CompPrivConst web
WebLeftBar 28 Mar 2005 - 09:40 TWikiContributor
" warn "off"}%
WebRss 28 Mar 2005 - 09:40 TWikiContributor
" else "TWiki's CompPrivConst web"}% /CompPrivConst
Found 438 topics

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Navigation

Webs Webs

r3 - 15 Nov 2006 - 19:43:52 - TWikiContributor
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM