Computers, Privacy & the Constitution

200 Recent Changes in CompPrivConst Web retrieved at 18:35 (GMT)

AlexanderHoffmanFirstPaper 16 Nov 2017 - 00:39 EbenMoglen
Quantum Cryptography and the False Promise of an Unhackable Future AlexanderHoffman 21 Mar 2017 Introduction Snowden has sparked a new era in which the privacy ...
SocksProxy 09 Oct 2017 - 19:35 JohnOMeara
Technology Project 2: Better Browsing Control In your first technology project you created a !GPG key and then uploaded it to the public keyservers, making it possible ...
CorinneShimSecondPaper 01 Oct 2017 - 20:14 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
LeonHuangFirstPaper 30 Sep 2017 - 19:50 EbenMoglen
Privacy and Trust By LeonHuang 29 September 2017 Protecting our privacy relies on finding someone we can trust. Our quest for privacy began with a loss of trust ...
CorinneShimSecondPaper2012 26 Sep 2017 - 15:16 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
ZebulunJohnsonFirstPaper 19 Sep 2017 - 15:21 ZebulunJohnson
ZebulunJohnson 19 Sep 2017 Introduction As a child, I often went to hidden places at quiet times to read books my parents had deemed #8220;inappropriate #8221; ...
CorinneShimFirstPaper 25 Jul 2017 - 14:21 EbenMoglen
An Introduction to how Personal Privacy and Personal Autonomy Have Changed with Technology By CorinneShim 22 Mar 2017 Introduction We currently live in a society ...
AndrewWatikerFirstPaper 22 Jul 2017 - 05:39 AndrewWatiker
Privacy in the Mobile Workplace !AirWatch By AndrewWatiker 22 Jul 2017 The Problem For many, the 21st century workplace has expanded far beyond the office. ...
AudreyAmsellemFirstPaper 30 May 2017 - 16:19 AudreyAmsellem
Who Cares If You Listen? Agency and Surveillance in Societies of Control By AudreyAmsellem May 30 2017 In 1984, George Orwell imagined a future society in which ...
TailsInstallation 14 May 2017 - 20:18 AudreyAmsellem
Tails Installation Tails (The Amnesiac Incognito Live System) is a free software operating system descended from Debian, the universal free software OS which is designed ...
EveShabtoFirstPaper 09 May 2017 - 04:40 EveShabto
I Know Where You Live and I've Seen Where you Sleep: Cell Site Location Data and the Fourth Amendment By EveShabto 04 Mar 2017 Introduction Cellular phones are ...
ShayaAfsharFirstPaper 08 May 2017 - 08:15 ShayaAfshar
The Genetic Collection Network By ShayaAfshar 05 Mar 2017 #8220;As gene tests become common, possibilities for abuse will intensify. Banks might not offer you ...
TracyRizkFirstPaper 08 May 2017 - 04:04 TracyRizk
The #8220;Right to Be Forgotten #8221; as a Protection for Freedom of Thought By TracyRizk 8 May 2017 A bill in the New York State Assembly proposes the establishment ...
ShayBanerjeeFirstPaper 08 May 2017 - 01:12 ShayBanerjee
To Understand Polarization, Look at the Software ShayBanerjee 6 May 2017 It is no coincidence that workers most affected by automation are rejecting economic ...
ChristopherPistrittoFirstPaper 05 May 2017 - 22:00 ChristopherPistritto
The Chilling Effect of Surveillance By ChristopherPistritto Introduction The #8220;chilling effect #8221; on free speech brought about by vague and overbroad ...
SunghyeOhFirstPaper 05 May 2017 - 19:49 SunghyeOh
Review of Massive Personal Information Leakage Case and Underlying Problems in South Korea By SunghyeOh 21 Mar 2017 Introduction When we talk about the protection ...
HyunKyungLeeFirstPaper 05 May 2017 - 19:24 HyunKyungLee
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
DavidHammondFirstPaper 05 May 2017 - 18:14 DavidHammond
Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment? By DavidHammond 02 Mar 2017 Introduction What if I had ...
OrBelkinFirstPaper 05 May 2017 - 16:14 OrBelkin
A Right to Keep and Bear Cryptography? By OrBelkin 21 Mar 2017 Introduction The adoption of the individual right theory has broaden the reach of the Second Amendment ...
KosukeUenoFirstPaper 04 May 2017 - 22:09 KosukeUeno
GPS investigation found illegal in Japan's Supreme Court By KosukeUeno 22 Mar 2017 Japan #8217;s Supreme Court Decision on GPS Investigation On March 15, 2017 ...
EthanThomasFirstPaper 03 May 2017 - 21:42 EthanThomas
The Campaign Against Privacy: How Propaganda is Used to Perpetuate Surveillance and State Power EthanThomas 03 May 2017 Propaganda and Power Through Subtle Influence ...
JulianWilliamsSecondPaper 03 May 2017 - 03:08 JulianWilliams
JulianWilliams 03 May 2017 Mass Surveillance and the Limitations of the First Amendment One of the key purposes of the First Amendment is to keep government accountable ...
JessicaCoreyFirstPaper 02 May 2017 - 18:56 JessicaCorey
Technology is Eroding the Fourth Amendment. Can We Stop it? By JessicaCorey 06 Mar 2017 A Radically Different Fourth Amendment The Fourth Amendment was drafted ...
ChenyeNiSecondPaper 02 May 2017 - 18:55 ChenyeNi
Cyber Space in China: What the Government can Do When we are talking about the Constitution #8217;s response to the protection over people #8217;s privacy in the Internet ...
JulianWilliamsFirstPaper 30 Apr 2017 - 22:20 EbenMoglen
Conceptualizing the National Security Exception in a New Media World Almost fifty years have passed since the Supreme Court decided New York Times Co. v. the United ...
LaurenHowardFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Social Networking, the Hyperreal and Informed Consent by Lauren Howard In just a few years, social networking sites like Facebook have become among the most popular ...
JudyWangFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
All eyes are on Apple as it takes on the US government in possibly the highest profile fight in privacy and technology. Posing as a defender of civil liberties and ...
TaehyoungKwonFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
NATIONAL SECURITY? OR FREE SOCIETY? TaehyoungKwon 23 Mar 2008 New York Gov. Eliot Spitzer resigned on March 12. amid a scandal over a $1,000 an hour prostitute ...
UdiKarklinskyFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Complementing Notice with Periodic Disclosures Introduction Privacy policies or terms of use agreements ( #8220;notices #8221;) are too long, time consuming, and ...
NicoleKimFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Privacy on Facebook: Beacon and Beyond INTRODUCTION On February 26th, the 9th Circuit denied petitions for rehearing of the $9.5 million class action settlement approved ...
HibahHussainMissplacedFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Yesterday, during a panel on #8220;Location Tracking and Fourth Amendment Concerns, #8221; lawyer Jeffrey Rosen recalled a conversation with Andrew !McLaughlin, who ...
DanielleTomsonFirstPaper 30 Apr 2017 - 20:52 EbenMoglen
Feeding Us Ourselves: How Using Voter Data to Target Readers Threatens Truth, Choice, and Journalism By DanielleTomson 22 Mar 2017 I. Introduction If you are ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
WebHome 30 Apr 2017 - 18:51 EbenMoglen
Computers, Privacy, the Constitution Office hours the week of May 1 will be held from 2 6pm, Wednesday 3 May. Graduating students' revisions to essays are due ...
ZebJohnsonFirstPaper 24 Apr 2017 - 22:51 ZebulunJohnson
ZebulunJohnson 05 Apr 2017 The Limitations of the 4th Amendment #8211; What it Can and Cannot Do As we #8217;ve discussed in class, the threat posed to individuals ...
PartsNineandFourteen 14 Apr 2017 - 20:03 ChristopherPistritto
Parts Nine and Fourteen: All Privacy and Autonomy Rights Reserved Theory Griswold v. Connecticut, 381 U.S. 479 (Goldberg, J., concurring) Laurence H. Tribe, The ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
WilliamCoombsFirstPaper 23 Mar 2017 - 02:18 WilliamCoombs
Freedom of Thought Through Credit and Creativity By WilliamCoombs 23 Mar 2017 Social norms greatly influence individual behavior. Our #8220;right to privacy ...
AmandaFerberFirstPaper 22 Mar 2017 - 12:01 AmandaFerber
The Right of the People to be Secure in their Pornography By AmandaFerber 22 Mar 2017 Once Upon a Time... In the 1970s (also known as the Age of Porn), people ...
KouroshShaffyFirstPaper 22 Mar 2017 - 06:26 KouroshShaffy
The Press, The People, And Trump: The Need For (Much, Much) More Access By KouroshShaffy 22 Mar 2017 #8220;As Americans grapple with the unreality of the new ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
GPGKeyCreate 09 Mar 2017 - 21:28 MichaelWeholt
Tech project 1: Create a GPG key and upload it to the keyservers Linux instructions There are a number of tools available to Linux users including many different plugins ...
FirstPaper 06 Mar 2017 - 01:47 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. It's your idea. The paper's task is to exposit, weigh, and prepare the reader to explore further ...
WebNotify 05 Mar 2017 - 05:01 ShayaAfshar
AmandaFerber EbenMoglen LeonHuang MalcolmEvans StephanieKato WhitneyLee .WebChangesAlert, ., .TWikiRegistration
ElizabethDoisyFirstPaper 17 Feb 2017 - 22:35 ElizabethDoisy
Seems to me a reasonably comprehensive and certainly clear summary of relatively accessible facts. The comparison between China and the US serves some ...
PartFour 25 Jan 2017 - 16:46 JohnOMeara
Part Four: Surveillance, Search and Seizure Theory Olmstead v. United States, 277 U.S. 438 (1928) Katz v. United States, 389 U.S. 347 (1967) States v. Knotts, 460 ...
ElizabethAkinyemiFirstPaper 26 Jul 2016 - 20:48 ElizabethAkinyemi
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
BriannaCummingsFirstPaper 09 Jul 2016 - 03:40 BriannaCummings
Can Freedom in Person and on the Internet Co Exist for an Activist? By BriannaCummings 09 Jul 2016 I have learned more about the how the Internet works in the ...
JakeLewisFirstPaper 08 Jul 2016 - 20:36 EbenMoglen
Influencing an Electorate of Consumers: Pop Culture Against a Police State Intro The Constitution is no longer a viable safeguard against the encroachment of a police ...
DanielShinerFirstPaper 30 Jun 2016 - 22:18 DanielShiner
Transcending Balance: Mass Surveillance and the Fourth Amendment DanielShiner 07 May 2016 Across both major political parties, the word #8220;balance #8221 ...
LeoFarbmanFirstPaper 28 Jun 2016 - 11:04 EbenMoglen
The Edible Road Back to Privacy By LeoFarbman 05 Mar 2016 Let #8217;s take a second to talk about the food industry. During World War II, the American food ...
RasheedAhmedFirstPaper 26 Jun 2016 - 20:39 EbenMoglen
Privacy vs. National Security By RasheedAhmed 24 Apr 2016 Should Americans relinquish a portion of their privacy rights in exchange for greater security? This ...
TimothyKimFirstPaper 15 May 2016 - 12:36 TimothyKim
TimothyKim 30 Apr 2016 BIG DATA, SOCIAL MEDIA, AND THE FUTURE OF AMERICAN DEMOCRACY The Rise of the Internet in Establishment Politics In the midterm elections ...
DataSelfieApp 13 May 2016 - 18:43 LizzieOShea
Take a Data Selfie Interesting app project launched by two students at Parsons. App will make predictions and personalized profiles based on our browsing history. ...
AlexanderGertenFirstPaper 12 May 2016 - 15:23 EbenMoglen
Technological Threats to Adblocking and Cultural Threats from It The primary motivation of most spying on the Internet is to send more effective advertisements to ...
BrandonNguyenFirstPaper 12 May 2016 - 14:59 EbenMoglen
LinkNYC: Leveling the Playing Field, or Business as Usual? By BrandonNguyen 11 Apr 2016 Background On February 18, New York City Mayor Bill deBlasio announced ...
AlanWongFirstPaper 12 May 2016 - 14:35 AlanWong
The Sharing Economy and Our Privacy By AlanWong 05 Mar 2016 Within recent years, consumers have witnessed and quickly adapted to the rise of the #8220;economy ...
SolomonRotsteinFirstPaper 12 May 2016 - 14:27 EbenMoglen
Transcending utility through negative rights By SolomonRotstein 21 Apr 2016 I. Introduction: #8220;Poca política, mucha administración #8221; #8211; Porfirio ...
ChristopheWassafFirstPaper 12 May 2016 - 14:14 EbenMoglen
U.S. Privacy Laws and Facial Recognition Technology By ChristopheWassaf 16 Mar 2016 The use of biometric software for facial recognition has grown in recent years ...
KarmanLuceroFirstPaper 12 May 2016 - 11:58 EbenMoglen
Serendipity in Law Enforcement By KarmanLucero 11 Mar 2016 This essay addresses the growing capabilities of law enforcement to circumvent traditional barriers ...
AlexiaBedatFirstPaper 12 May 2016 - 09:01 AlexiaBedat
Finding Privacy in the Constitution In Europe, the right to privacy and freedom of expression carry (in theory) equal weight under the Convention on Human Rights ...
DannyStempFirstPaper 12 May 2016 - 00:13 EbenMoglen
It is a poorly kept secret that big companies use consumer data without consumer knowledge or consent. Information about the items people buy, the websites they visit ...
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
PseudonymousEmail 09 May 2016 - 18:58 GreggBadichek
Creating A Pseudonymous Webmail Account Using Tails Using your Tails system, establish an email account at mailbox.org. You can have a 30 day test email account at ...
LizzieOSheaSecondPaper 09 May 2016 - 17:44 LizzieOShea
Theorizing the law of privacy The political economy of the panopticon Contemporary digital life invokes the panopticon for good reason. But there are also limits ...
LizzieOSheaFirstEssay 09 May 2016 - 17:34 LizzieOShea
Data and predictive law enforcement in the age of computing The age of computing has meant that large amounts of data are readily available together with the potential ...
PseudonymousIM 04 May 2016 - 21:50 EbenMoglen
Pseudonymous Instant Messaging and Chat Using Tails Your Tails system includes the multi protocol chat client Pidgin, through which you can use a variety of chat systems ...
TailsOsx 24 Apr 2016 - 06:50 AlexanderGerten
Figuring out how to download and boot Tails from OS X Preliminary The information on this page is based on what I did to boot Tails from a particular piece of Mac ...
PartOne 09 Apr 2016 - 22:06 AlexanderGerten
Part One: Speech, Press, Assembly Theory Lawrence Lessig, Reading the Constitution in Cyberspace (pdf) , 43 Emory L.J. (1996) Potter Stewart, "Or of the Press" ...
PersonalPrivacyTips 08 Apr 2016 - 05:28 GreggBadichek
GerryMoody 12 Feb 2008 I thought it might be helpful to create a topic for personal privacy solutions (encryption, etc.). Chris Soghoian, The day the wiretaps go ...
NewsArticles 07 Apr 2016 - 18:11 LizzieOShea
Hey Prof Moglen I cannot seem to create a new topic page? Is that the way it is suppose to be? I was just going to post article about the Panama papers which critiques ...
RahulWadwaSecondPaper 26 Jul 2015 - 20:54 EbenMoglen
Feeling Safe When Your Health Is at Risk By RahulWadwa 15 Jul 2015 Introduction Thanks to the Internet and the widespread use of smartphones, most of us are ...
BenjaminKastnerSecondPaper 26 Jul 2015 - 18:42 EbenMoglen
The Inadequacy of the Recent Congressional Review of the Patriot Act Recently, facing the expiration of several sections of the Patriot Act, Congress elected to reign ...
LuChenSecondPaper 26 Jul 2015 - 18:30 EbenMoglen
Privacy of Social Media in Litigation By LuChen 18 Jul 2015 Introduction Social media has never been regarded as a guardian of privacy, and those who share information ...
TomasHolguinSecondPaper 30 Jun 2015 - 14:26 MarkDrake
TomasHolguin 27 Apr 2015 How Colombia adopted a so detailed Data Protection Regulation that ended up protecting Facebook Introduction: Colombian Congress recently ...
OlenaSavytskaSecondPaper 30 Jun 2015 - 14:24 MarkDrake
The Trouble with Customization A New York Times headline that caught my eye today says (and I paraphrase) that you can mute the views of people you disagree with a ...
OlenaSavytskaFirstPaper 30 Jun 2015 - 14:24 MarkDrake
Navigating a Free Net The Fourth Amendment, as we discussed in class, has a place dependent quality. It is this place dependence, in part, that has defeated its application ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
JoseEnriqueFrias-SecondPaper 30 Jun 2015 - 14:23 MarkDrake
JoseEnriqueFrias 26 Apr 2015 Tucuy Ricuy Reloaded The Inca Empire: From 1438 to 1533, the Inca Empire was the most important and largest empire of America. Previous ...
EvelynPangSecondPaper 30 Jun 2015 - 14:22 MarkDrake
From the Individual to the Collective: Reconciling Retreat with Reform In Walden , Henry David Thoreau advocates for a self sufficient life of reflection away from ...
EricSantosSecondPaper 30 Jun 2015 - 14:22 MarkDrake
EricSantos 15 May 2015 Nobody Cares What You Think The central struggle presented in this course is over the fate of the One Network that connects all of humanity ...
CarolineVisentiniSecondPaper 30 Jun 2015 - 14:22 MarkDrake
Goodwill data sharing CarolineVisentini 24 Apr 2015 On March 24, 2015 Andreas Lubitz deliberately crashed a passenger jet into the French Alps. One hundred and ...
WillPalmerSecondPaper 29 Jun 2015 - 15:36 MarkDrake
Big Data and Predictive Policing By WillPalmer 15 May 2015 Section I: What is Predictive Policing policing is a method of law enforcement that relies on the use ...
UriHacohenSecondPaper 29 Jun 2015 - 15:35 MarkDrake
Surveillance at will On Surveillance in the Workplace By UriHacohen 30 April 2015 Not too long ago, it was reasonable to assume that only behavior in the net ...
UdiKarklinskySecondPaper 29 Jun 2015 - 15:35 MarkDrake
Why is it that Israelis, Despite Their #8220;Rich Experience, #8221; are Just as Negligent as Anyone Else About Their Privacy? By UdiKarklinsky 02 May 2015 Introduction ...
TomLawrenceSecondPaper 29 Jun 2015 - 15:34 MarkDrake
In 1991, Harvard Law Professor Laurence Tribe proposed a new constitutional amendment for the emerging digital era. #8220;Tribe #8217;s Amendment, #8221; as I will ...
RichardGazonSecondPaper 29 Jun 2015 - 15:33 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
RamShchorySecondPaper 29 Jun 2015 - 15:33 MarkDrake
Evolving Listening #8211; Israeli Case Study By RamShchory 01 May 2015 Concepts of privacy in general, and particularly of state listening have #8211; to use ...
OriKivitySecondPaper 29 Jun 2015 - 15:32 MarkDrake
SOME THOUGHTS CONCERNING HORIZONTAL APPLICATION OF CONSTITUTIONAL RIGHTS By OriKivity 01 May 2015 Introduction One of the underlying propositions of Professor ...
NelsonHuaSecondPaper 29 Jun 2015 - 15:31 MarkDrake
ALPR Mass Surveillance as a Matter of Privacy By NelsonHua 16 May 2015 As of 2012, approximately 71% of United States police departments utilized some form of ...
NealBurstynSecondPaper 29 Jun 2015 - 15:31 MarkDrake
BART and the Cellphone Kill Switch By NealBurstyn 08 May 2015 Kill switches are in the news again. On April 27, the Department of Justice filed its response to ...
NathanielCriderSecondPaper 29 Jun 2015 - 15:28 MarkDrake
The First Amendment Autonomy By NathanielCrider 02 May 2015 Introduction The Fourth Amendment's anachronistic focus on places is insufficient to protect the ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
LeylaHadiSecondPaper 29 Jun 2015 - 15:26 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
KevinHoungSecondPaper 29 Jun 2015 - 15:26 MarkDrake
Anarchy and Currency By KevinHoung 11 May 2015 Introduction #8220;Anarchism stands for the liberation of the human mind from the dominion of religion and liberation ...
KathrynMearesSecondPaper 29 Jun 2015 - 15:24 MarkDrake
Fear and Apathy and Surveillance Fear is the enemy of reason. It impairs judgment, distorts perceptions, and fundamentally undermines the ability to make rational ...
JoshuaDellSecondPaper 29 Jun 2015 - 15:24 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JasonRosenbaumSecondPaper 29 Jun 2015 - 15:23 MarkDrake
ACLU v. Clapper Statutory and Constitutional Limits On Mass Surveillance By JasonRosenbaum 09 May 2015 On May 7, 2015, the Second Circuit decided that the NSA ...
GrahamGodwynSecondPaper 26 Jun 2015 - 21:14 MarkDrake
Law Enforcement Behaving Like Spies By GrahamGodwyn 13 May 2015 Introduction Spooks and spies should be kept apart from domestic law enforcement. It is expected ...
EstherLukmanSecondPaper 26 Jun 2015 - 21:13 MarkDrake
Identity Ownership and the Fourth Amendment By EstherLukman 12 May 2015 Property and Privacy Rights in Our Identity The right to publicity is both a property ...
EdyGlozmanSecondPaper 26 Jun 2015 - 21:11 MarkDrake
Antitrust Is Not the Solution, Constitution Is By EdyGlozman 01 May 2015 Introduction Scholars have been debating in the recent years over whether privacy should ...
ArthurMERLEBERALSecondPaper 26 Jun 2015 - 20:49 MarkDrake
EU Data protection: A further step back Introduction On 25th January 2012, the EU Commission released a proposal for a new regulation on data protection. Yet, it ...
AriGlattSecondPaper 26 Jun 2015 - 20:48 MarkDrake
Why Are Our Device Manufacturers Harming Us and What Can Be Done To Prevent It? By AriGlatt 10 May 2015 Introduction Privacy evokes a cornucopia of concepts for ...
ArchanHazra1SecondPaper 26 Jun 2015 - 20:46 MarkDrake
The TSA's Pre #10003; #8482; Program and Security Theater By ArchanHazra1 17 May 2015 Introduction Over spring break, I had the opportunity to go to a moot court ...
AndrewChungSecondPaper 26 Jun 2015 - 20:46 MarkDrake
Stingray Technology: Do We Own Our Locations? Stingrays, a technology that can track a cellphone's location to startling accuracy, have become a staple in the arsenal ...
AndresZambranoSecondPaper 26 Jun 2015 - 20:46 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AnaCarolinaVarelaSecondPaper 26 Jun 2015 - 20:44 MarkDrake
Amici Curiae in the FISA Court By AnaCarolinaVarela 09 May 2015 ACLU v. Clapper May Mean the FREEDOM Act is Adopted The Second Circuit #8217;s in ACLU v ...
AliceBertramSecondPaper 26 Jun 2015 - 20:43 MarkDrake
AliceBertram 14 Feb 2015 The German Supreme Court on hearing Snowden in the Parliament's NSA investigation committee By AliceBertram 14 Feb 2015 Opposition's ...
AdrianNtwatwaSecondPaper 26 Jun 2015 - 20:43 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
WillPalmerFirstPaper 26 Jun 2015 - 20:27 MarkDrake
The Need for A Property Based Approach to Data Privacy By WillPalmer 06 Mar 2015 Section I: Fourth Amendment Protection Expanded from Physical Places to Include ...
UriHacohenFirstPaper 26 Jun 2015 - 20:26 MarkDrake
Once Bitten Twice Shy On The Eroding Standard for Privacy With Regard To Israel's Internal Affairs By UriHacohen 22 Feb 2015 The Israeli public has accepted over ...
TomasHolguinFirstPaper 26 Jun 2015 - 20:26 MarkDrake
The weight of videos in trials 1. Introduction Since its beginnings, photography has been the subject of several discussions. While many considered photography ...
TomLawrenceFirstPaper 26 Jun 2015 - 20:25 MarkDrake
Last week, the Supreme Court denied certiorari in Raynor v. Maryland , a case challenging the constitutionality of a conviction based on DNA evidence obtained without ...
ThomasStreinzFirstPaper 26 Jun 2015 - 20:24 MarkDrake
Fighting the NSA in the German Constitutional Court By ThomasStreinz 06 Mar 2015 In absence of any political will by the German government to take meaningful steps ...
RichardGazonFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Municipal Wi Fi: Dangers in Monitoring Municipal Wi Fi has long been discussed as the next convenience coming to a city near you. Major cities such as San ...
RamShchoryFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Informed Consent to the Use of Private Data By RamShchory The Problem #8211; Softwares #8217; Privacy Policies Do Not Actually Provide Either Notice or Choice ...
RahulWadwaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Aadhaar : Digital India's Shaky Foundation By RahulWadwa 06 Mar 2015 Introduction #8220;Digital India #8221; is the Indian government #8217;s attempt to smooth ...
OriKivityFirstPaper 26 Jun 2015 - 20:22 MarkDrake
THE CONSTITUTIONAL RIGHT TO PRIVACY IN ISRAEL: DIGNITY VERSUS LIBERTY Introduction The boundaries and content of what is considered the private domain which ought ...
NelsonHuaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Self help in the Privacy Arena By NelsonHua 06 Mar 2015 On February 28, the Obama administration proposed the Privacy Bill of Rights Act. The proposed bill, supposedly ...
NealBurstynFirstPaper 26 Jun 2015 - 20:21 MarkDrake
Riley and the Tragedy of Part Four By NealBurstyn 06 Mar 2015 February Professor Moglen has made it abundantly clear that he believes the Fourth Amendment to ...
NawalMaaloufFirstPaper 26 Jun 2015 - 20:17 MarkDrake
Revenge Porn By NawalMaalouf 08 Mar 2015 I. INTRODUCTION We #8217;ll call it #8220;revenge porn #8221; #8211; sexually graphic images of individuals distributed ...
NathanielCriderFirstPaper 26 Jun 2015 - 20:16 MarkDrake
The Revolutionary James Madison By NathanielCrider 06 Mar 2015 Introduction From the textbooks, we see James Madison as a diminutive and earnest conciliator. ...
MenahemGrossmanFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Hiding in Plain Sight: Alternative Approaches to Cybersecurity (Draft 2) By MenahemGrossman 14 May 2015 Introduction Much of conventional cybersecurity efforts ...
MatthieuWharmbyFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Draft #2 Escaping your online past: the case against a global right to be forgotten. By MatthieuWharmby 06 Mar 2015 Introduction Recently there have been many ...
MathewKenneallyFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Why Eric Holder Really Cares if Edward Snowden is a "Whistleblower". Second Draft Chelsea Manning exposes complicity in torture and the actual death toll from the ...
LuChenFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Employee Privacy and the BYOD Movement By LuChen 06 Mar 2015 No Expectations of Privacy It is no secret that little privacy is afforded to employees who use company ...
LeylaHadiFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Relying on the Constitutional Agenda By LeylaHadi 04 Mar 2015 Parts Four and One While the First Amendment prohibits the government from creating any law ...
KevinHoungFirstPaper 26 Jun 2015 - 20:14 MarkDrake
Big Data and its Intrusion Into Our Medical History: An Investigation Into Matchback Programs By KevinHoung 05 May 2015 Introduction Silently, large data companies ...
KeunjungChoFirstPaper 26 Jun 2015 - 20:13 MarkDrake
Breaking Down the Technological Panopticon: Tracing the Evolution of Surveillance as Culture and Reaching Beyond Fourth Amendment Discourse By KeunjungCho 06 Mar ...
JoseEnriqueFriasFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Minors and their Smartphones Minors and their (supposed) protection: Theoretically, minors have always been subject to special protection in every country of the world ...
JasonRosenbaumFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Snowden and Technological Civil Disobedience By JasonRosenbaum 06 Mar 2015 Ask Me Anything In an "Ask Me Anything" thread on the Internet discussion board ...
HannahZale2FirstPaper 26 Jun 2015 - 19:52 MarkDrake
Could First Amendment cases regarding #8220;buffer zones #8221; have any implications for online advertising? By HannahZale2 06 Mar 2015 Introduction In this ...
GrahamGodwynFirstPaper 26 Jun 2015 - 19:52 MarkDrake
I Have Nothing to Hide or: Why Should I Spent 10 Minutes to Encrypt My Messages? By GrahamGodwyn 06 Mar 2015 Introduction After the revelations gifted to the ...
EvelynPangFirstPaper 26 Jun 2015 - 19:52 MarkDrake
Reconstructing Autonomy in Citizenfour By EvelynPang 06 Mar 2015 Privacy is linked to a sense of personal autonomy and control, while surveillance removes an ...
EstherLukmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Information: The Cost of Access and Convenience By EstherLukman 06 Mar 2015 The Two Way Highway The Internet is often nicknamed the world #8217;s #8220;information ...
EricSantosFirstPaper 26 Jun 2015 - 19:50 MarkDrake
The First Amendment in One Net By EricSantos 06 Mar 2015 What Do You Mean by #8220;Freedom #8221;? Envisioning a world where the ideals of the First Amendment ...
EdyGlozmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
When Getting Back What You Already Had Costs You Your Privacy #8211; The Story of Software Updates By EdyGlozman 06 Mar 2015 Introduction A basic equation stands ...
CarolineVisentiniFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Prublic (second draft) CarolineVisentini 26 Apr 2015 Private public Prublic. I think that it is where our society is situated today. Over the course of the ...
BenjaminLinFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Voluntary Surveillance: Costs, Benefits, and a Way Forward Introduction Much has been made in class about the nefarious nature of iPhones and #8220;smart #8221 ...
BenjaminKastnerFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Market Approach to Digital Privacy Corporation #8217;s interests have not been aligned with consumers in the digital privacy context, but this may be changing. Corporations ...
ArthurMERLEBERALFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Surveillance in France following the terrorist attacks in Paris: Nothing new under the sun Introduction The terrorist attacks that occurred in Paris between the 7th ...
AriGlattFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Anonymity and the "Real Name Policy" Debate By AriGlatt 01 May 2015 Pseudonymity and the Internet The Nymwars While anonymity was not something invented with ...
ArchanHazra1FirstPaper 26 Jun 2015 - 19:46 MarkDrake
The Border Search Doctrine and Data By ArchanHazra1 06 Mar 2015 Introduction The search doctrine carves out an exception to the Fourth Amendment #8217;s requirement ...
AndrewChungFirstPaper 26 Jun 2015 - 19:44 MarkDrake
Automatic License Plate Reader Technology and Mass Surveillance (Second Draft) Questions Do citizens have a reasonable expectation to privacy in regards to the tracking ...
AndresZambranoFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Surveillance of La Oposición in Venezuela By AndresZambrano 06 Mar 2015 Introduction Venezuela is a country in turmoil. Since 2013, pof basic goods have skyrocketed ...
AnaCarolinaVarelaFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Generation Z By AnaCarolinaVarela 06 Mar 2015 The Profile (I acknowledge that any generalization about a group this size is naturally going to get some people ...
AliceBertramFirstPaper 26 Jun 2015 - 19:41 MarkDrake
about:black The NSA investigation committee in the German parliament By AliceBertram 13 Feb 2015 Investigating the German secret service Even though the committee ...
AdrianNtwatwaFirstPaper 25 Jun 2015 - 19:52 MarkDrake
A Zero Zero Game By AdrianNtwatwa 06 Mar 2015 Over the past weeks, a common theme in our class discussions has been the zero sum nature of the future of freedom ...
SecondPaper 11 May 2015 - 18:36 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Now Formatting 1. Log in. 2. Create Second Paper will create a page named SecondPaper ...
TWikiGuestSecondPaper 08 May 2015 - 03:00 NealBurstyn
BART and the Cellphone Kill Switch Kill switches are in the news again. On April 27, the Department of Justice filed its response brief to EPIC #8217;s petition for ...
ATTChargesNotToTrackWebBrowsing 18 Feb 2015 - 15:42 TomLawrence
Interesting article...I don't believe I've seen a web provider put an explicit price on privacy before. "AT T's gigabit fiber to the home service has just arrived ...
Classnotes19Jan2012 30 Jan 2015 - 15:55 MatthieuWharmby
MatthieuWharmby 27 Jan 2015
RobertWatkins_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
RobertW 28 Apr 2008 The Worn Out Unwelcomeness of Advertisement 989 Words Many believe advertisement bombardment in media will grow to a point at which ...
SecondPaper2012 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Archived will create a page named SecondPaper2012 ...
VanessaWSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Her Story to Tell By VanessaW 11 May 2013 Introduction I found out my junior year of high school that one of my friends was being abused at home. I pleaded with ...
RohanGreySecondPaper 14 Jan 2015 - 22:44 IanSullivan
Shipbuilding 101 Wanting to Learn is Not Enough Having cut my educator's teeth directing infants fingers to hold xylophone mallets and cover recorder holes, I wasn ...
StacyAdelmanSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Privacy: A Torrid Affair In the face of a crisis, privacy is sacrificed on the alter of public safety. People were too busy marveling at how the government was quickly ...
NicoleKimSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Our class discussion about how accumulation of personal data can predict our behavior led me to think of Report. Minority Report, of course, is famously about three ...
SamuelDostartSecondPaper 14 Jan 2015 - 22:44 IanSullivan
CISPA: Goodbye Privacy, Hello Police State By SamuelDostart 22 Apr 2013 Section I: So What is CISPA? On the feet of massive opposition to SOPA and a failed first ...
MatthewAmsterdamSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction I was troubled, if perhaps unsurprised, to read the statement from the founder of Cree.py, an application that tracks individual's locations based on ...
YulingHuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Real Name Policy: An End to Free Speech? In the U.S., real name policies have become important tools used by both Facebook and Google to create a "real world" environment ...
SecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE TWikiAdminGroup
ShakimaWellsSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Reasonable Expectation of Privacy in Emails A few days before the close of the 2013 tax season, the ACLU released an revealing documents that indicated that it ...
SeanBerensSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The NYPD Already Knows Your Phone Number (And They Might Know Every Place You Have Been in the Past Four Years) By SeanBerens 09 May 2013 Introduction Over the ...
VictorAuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
"Authorized Access" under the CFAA: An Analysis of the 9th Circuit's Opinion in U.S. v. Nosal By VictorA 01 May 2013 Two years ago, the U.S. Court of Appeals ...
MayelaGarzaSecondPaper 14 Jan 2015 - 22:44 IanSullivan
MayelaGarza 13 May 2013 The Data Collectors Before coming to Columbia my doctor back in Mexico found a cyst and gave me birth pills to see if they would remove it ...
YukoKawaiSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Online election campaign in Japan Introduction A revision to the Japanese Public Offices Election Act ( #8220;POEA #8221;) to allow online election campaigning was ...
SehwanJangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
South Korea #8217;s real name internet system: Future prospects of internet policy A policy, so called #8220;a real name internet system #8221; has brought an extraordinarily ...
XiyunYangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Transparent World By XiyunYang 22 May 2013 Almost two centuries ago, the factories churned and drew us away from our land and our communities. We left for ...
AndrewReichSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Technology in the Courts Introduction Five years ago, in the year 2007, the Ninth Circuit Court of Appeals presided over a copyright dispute that would ultimately ...
FumihiroKajikawa_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
The last day of the Internet in Japan? Introduction The eighteen years old high school student in Kobe Prefecture in Japan killed himself by jumping from the rooftop ...
EileenHutchinsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Say Cheese: Biometrics and Facial Recognition Technology By EileenHutchinson 05 May 2013 Government Use of Biometric Technology For the past few years, federal ...
AlexeySokolinSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Click Like To Share The Data From Your Home By AlexeySokolin 25 Apr 2013 Internet of Things Fifty years have passed since the airing of Jetsons in 1962. Where ...
BrittanyMorganSecondPaper 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AvaGuoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Value of Anonymity Over the past couple of weeks, my alma mater has been embroiled in a bit of a conflict. It all began with a student led protest aimed at bringing ...
JonathanKoppellSecondPaper 14 Jan 2015 - 22:44 IanSullivan
JonathanKoppell 14 May 2013 Introduction Will Genetic data help or hurt you? Probably both #8230; DNA Sequencing has become faster, more reliable, more efficient ...
AlejandroMercadoSecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JamieCrooksSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Association Isn't Free: Identities, Data Mining and the First Amendment By JamieCrooks 01 May 2013 Introduction As we discussed in class, unless we take steps ...
DarrenHaberSecondPaper 14 Jan 2015 - 22:44 IanSullivan
I recently watched "The Lives of Others", a movie set in 1984 East Berlin which follows the life of an East German writer and the agent of the secret police tasked ...
JeanLeeSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Abuse and Attempted Answers to Peer Surveillance By JeanLee 27 Apr 2013 Peer Surveillance Our discussions about how governments are benefiting from and using ...
AyaNakamuraSecondPaper 14 Jan 2015 - 22:44 IanSullivan
A perpetrator #8217;s and victim #8217;s privacy in a juvenile case in Japan 1 Introduction This Article will explain how a perpetrator #8217;s and victim #8217 ...
AmaneKawamotoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Storing Medical Data in the #8220;Cloud #8221; By AmaneKawamoto 30 Apr 2013 Introduction An increasing number of medical institutions are using online storage ...
JulianM_Paper-II 14 Jan 2015 - 22:44 IanSullivan
Extreme Porn Five years ago Jane Longhurst, a teacher from Brighton, murdered by Graham Coutts, a fan of websites such as "Club Dead" and "Rape Action" which offered ...
SecondPaper2013 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Create Second Paper will create a page named ...
CoryNelsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Cyber Intelligence Sharing and Protection Act I. Introduction This Article will explain the proposed Cyber Intelligence Sharing and Protection Act ( #8220;CISPA ...
AyaNakamuraFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Protection of Privacy in Japan By AyaNakamura 01 Mar 2013 Section I Provisions of the Constitution and Act Subsection A Constitution The right to privacy ...
YukoKawaiFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Dead Men Floating through Internet Introduction Generally, people are represented in society through everything we do, everyone we've known, everywhere we've left ...
AmaneKawamotoFirstPaper 14 Jan 2015 - 22:44 IanSullivan
ESCAPING YOUR PAST #8211; THE #8220;RIGHT TO BE FORGOTTEN #8221; By AmaneKawamoto 04 Mar 2013 INTRODUCTION As one of the solutions to privacy issues rising ...
RohanGreyFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Children and Freedom Introduction: The False Hope of the Open Society When I was in school, the common refrain of my and other progressive friends' parents was ...
Found 190 topics

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Navigation

Webs Webs

r3 - 15 Nov 2006 - 19:43:52 - TWikiContributor
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM