This is the webpage for a class from the PAST that
has ALREADY ENDED. Current class information is available here
- 1/8/2015: Instructions for submitting your papers:
- Send them to me via email at email@example.com.
- I will send you a confirmation of receipt.
- DO NOT PLACE YOUR NAME ANYWHERE ON THE PAPER, INCLUDING ON THE FILENAME. INSTEAD, USE THE ROT13-ENCODED VERSION OF YOUR NAME WITHOUT SPACES. FEEL FREE TO INCLUDE OTHER WORDS WITH YOUR NAME IF YOU FEEL THAT YOUR NAME LENGTH IS EASILY REIDENTIFIABLE. Here is an online form for generating ROT13.
- 1/6/15: Posted reading for Thursday.
- 1/5/15: Posted reading for Wednesday.
What you should know about this class
- The class meets every day from Monday, January 5, to Thursday, January 8, 2014, from 9:00 AM to Noon.
- The class will meet in two different classrooms in two different buildings on campus. For the first class, please report to Wolf 305, our official meeting place.
- This class will be held during wintersession, the one week period immediately preceding the spring semester 2015.
- This won't be a typical law school class. First, the class will focus a lot on technology and technology policy and not a lot on legal doctrine.
- Second, half of the classes will be conducted in a computer lab in the ATLAS institute building, which is across campus, not far from the UMC. Every student will receive hands-on experience with some of the technologies we will study.
- This course is offered for a grade. Your grade will be assessed based on a combination of all of the following:
- An in-week paper, assigned Monday and due Friday night. You will be asked to write a technology primer for non-expert policymakers. A list of technologies you can choose will be distributed on the first day of class. You are welcome to write about other privacy-related technologies, but only with prior permission. Details are being worked out, but expect this to require you to write approximately four pages, double-spaced.
- A final paper, due one week after the class ends, Friday, January 16th. The paper will require you to write an advocacy document to a policymaker or decisionmaker comparing a particular technology to a technology (or more than one technology) that has come before. An important point of this exercise is to give you experience making arguments by analogy, which turns out to be a crucial skill for tech policy practitioners. Once again, you can choose a technology from a list that will be distributed on the first day of class, or youc an write about another technology-related conflict or issue, with prior permission. Expect this to require you to write approximately eight pages, double-spaced.
- In-class participation.
- The reading for the class is expected to be comparable in quantity to a typical law school seminar, meaning approximately 30 to 50 pages per day. Assigned reading for the first two classes are posted below. The assignments for the other two days will be posted later.
Advice on reading: You need not read the assignments in this class as closely as you do for your doctrinal, black-letter courses. Instead, read for close comprehension but not more. (This may be similar advice you've been given in your seminar courses.)
For the first class, the readings fit in two categories:
- The relationship between technological change and policy.
- Encryption: History, Technology, Famous Conflicts, and Policy.
- Tom's IT Pro, A Visual History of Cryptography and Encryption, September 26, 2012 (view all 17 slides and read captions) (optional: slightly more detailed version of similar material available here).
- Excerpt from Cryptography for Dummies (may be review for some of you)
- Susan Landau, Making Sense of Snowden, Part II: What's Significant in the NSA Revelations, IEEE Security & Privacy Web Extra, January/February 2014.
- Michael Nielsen, How the Bitcoin Protocol Actually Works, Data-drive Intelligence blog, Dec. 6, 2013 (skim). (Optional: If you want to better understand/explore the more-human side of bitcoin, and/or if you want a really fun read, read parts of Kashmir Hill's accounts of two weeks living only on bitcoin, collected at the top of the post here.)
- Extra Credit (mostly kidding): For a fascinating history of the most important chapter in the history of cryptography (and a star turn by Benedict Cumberbatch), see The Imitation Game.
- There and Back Again: A Packet's Tale, http://worldsciencefestival.com/videos/there_and_back_again_a_packets_tale (watch the video)
- Russ Smith, IP Address: Your Internet Identity, March 29, 1997, http://www.ntia.doc.gov/legacy/ntiahome/privacy/files/smith.htm
- Julia Angwin, The Web's New Gold Mine: Your Secrets, WALL ST. J., July 30, 2010, available at http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html. (If you hit the paywall, use this mirror instead.)
- Natasha Singer, Your Online Attention, Bought in an Instant, N.Y. Times, Nov. 17, 2012, at BU1, http://www.nytimes.com/2012/11/18/technology/your-online-attention-bought-in-an-instant-by-advertisers.html?pagewanted=all
- Technology Primers/Demos. For each of the following, visit the links and skim the text for each. You do not need to read this for deep comprehension:
- Excerpt from Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, 2009 U. Ill. L. Rev. 1417 (2009) PDF RTF
Data Persistence and Ephemerality:
The Right to be Forgotten:
Cyber Civil Rights and Revenge Porn
The Copyright Wars>
Combatting State Censorship of the Internet
Other Class Materials