This is the webpage for a class from the PAST that
has ALREADY ENDED. Current class information is available here
- 12/14/15: Please remember to send me a note highlighting any students who helped you survive/thrive in this class, so I can factor this into their participation grades. You can send me a list of names via email or you can post a public thank you to the Assignment 3 discussion board. I will accept names until this Friday, December 18th.
- 11/30/15: I have posted some notices for the final class to the Canas site. Most importantly, please check the shared class presentation (link below) to check your order in tomorrow's presentation.
- 11/23/15: The link I included to the shared class presentation is broken. Use this link instead: https://docs.google.com/presentation/d/19ZB3hDAxe9EU8YHQE9Uv3lTus18DEPdzHTv7N3fSUMw/edit?usp=sharing
- 11/20/15: Office Hours for Thanksgiving Week:
- Monday, 11/23: 2pm - 3pm
- Tuesday, 11/24: 11am - Noon
- 11/18/15: I have uploaded a file to the "Files" section of our Canvas page summarizing instructions for our class presentations on Tuesday, December 1st. Please note that you must upload two slides to a shared Google page by Sunday, November 29th.
- 11/13/15: Posted reading for week ten, Tuesday, November 17th (see below)
- 11/2/15: I have posted the reading and administrative details for class on November 10th to the Announcements section of the Canvas page.
- 10/27/15: The three videos I created today in class are posted to Youtube: Video 1, Video 2, and Video 3 (the resolution is messed up because I was connected to the projector at the time, but I think it's still good enough.)
- 10/20/15: Here is a list of the "test subjects" that have been selected to date for graded assignment three.
- 10/15/15: I have posted reading for week seven and electronic copies of graded assignment three and the mitmproxy cheatsheet (both handed out in class last week.)
- 10/13/15: I need to cancel my office hours on Wednesday, October 14th. Let me know if you'd like to chat about anything, and we can set up an appointment.
- 10/11/15: Important updates for this week:
- We are not meeting this week, 10/13.
- If you send me your test subject for graded assignment three by Tuesday, October 20th, I will work with you to resolve conflicts with classmates.
- About graded assignment four: I will assign graded assignment four during our next class, on October 20th. It will be due the last week of classes, likely on Tuesday, December 1st. The assignment (in brief) will be to create a visualization of data related to either your graded assignment three or alternatively to some other privacy-related subject.
- For the remainder of the semester, we will not meet on the following three classes: October 13th, November 3rd, and November 24th.
- 9/26/15: I have posted some preliminary thoughts for each of you about your first graded assignments. See the Canvas announcement for instructions on how to access these.
- 9/22/15: Confirming what I decided today in class: Graded Assignment #2 is now due on Tuesday, October 6th, at 5:00 PM (i.e. I'm granting a one week extension.)
- 9/21/15: For today (Monday, Sept. 21) only, my office hours will be delayed by one hour and will run from 2:30 - 3:30 PM.
- 9/15/15: Two clarifications about the graded assignments:
- Protect the identity of your submission using the ROT13 instructions below.
- Graded assignment #2 is due on Tuesday, September 29th. The original assignment sheet (now corrected below) listed the correct date but mistakenly called it a Friday.
- 9/8/15: Posted graded assignments one and two and problem set two and the reading for week three.
- 9/6/15: I have created a Canvas discussion for problem set one. If you get stuck, try posting there before emailing me, and I or one of your classmates may post an answer. You aren't obligated to read the discussion, however.
- 9/4/15: In response to a few student questions, I have posted a few additional instructions about how to log in to the class's linux server.
- 9/2/15: My Office Hours for this semester will be Mondays and Wednesdays from 1:30 - 2:30 P.M. If you have a conflict during those hours, I am also available to meet at other times by appointment.
- 9/1/15: Posted reading for week two, problem set one (due 9/8) and syllabus (all below).
- 8/27/15: A few points of clarification:
- You do not need to install Linux on your own personal computer. I have set up a Linux server for you to use, and I will teach you how to access it on Tuesday. Installing Linux is tricky and comes with a risk of rendering your computer unbootable, so I strongly recommend you not do this unless you really know what you're doing.
- You should bring a laptop with you to every class. Email me if this is a problem for you.
- 8/25/15: Posted instructions for using ssh on your personal computer. Try to follow these instructions before our first class.
- 8/14/15: Posted class web page and first reading.
What you should know about this class
- This won't be a typical law school class. First, the class will focus a lot on technology and technology policy and not a lot on legal doctrine.
- The reading for the class is expected to be comparable in
quantity to a typical law school seminar, meaning approximately 30
to 50 pages per day. Assigned reading for the first class is posted
below. The assignments for the rest of the term will be posted
Mondays and Wednesdays, 1:30 - 2:30 PM in McDonough 480. If you have a conflict during those hours, I am also available to meet at other times by appointment.
The only required text is a book, which the author has made available online for free. It is:
William E. Shotts, Jr., The Linux Command Line (No Starch Press 2012), available for download at http://linuxcommand.org/tlcl.php or here.
You can also buy a nicely printed copy of the book from the law school bookstore or online retailers (ISBN-13: 978-1593273897).
The syllabus for the course is available in PDF or MS Word file formats.
Reading for Week One, Tuesday, September 1, 2015
For the first class, the readings fit into three categories:
(Newly added 8/25/15) In addition to the reading, follow these instructions to try to locate or install the ssh program on your personal computer.
Reading for Week Two, Tuesday, September 8, 2015
- The relationship between technological change and policy.
- Encryption: History, Technology, Famous Conflicts, and Policy.
- Tom's IT Pro, A Visual History of Cryptography and Encryption, September 26, 2012 (view all 17 slides and read captions) (optional: slightly more detailed version of similar material available here).
- Excerpt from Cryptography for Dummies (may be review for some of you)
- Susan Landau, Making Sense of Snowden, Part II: What's Significant in the NSA Revelations, IEEE Security & Privacy Web Extra, January/February 2014.
- Matthew Green, Why Can't Apple Decrypt Your iPhone?, A Few Thoughts on Cryptographic Engineering, Oct. 4, 2014.
- Introduction to Linux:
- From the required text: William E. Shotts. Jr., The Linux Command Line, Introduction and Chapters 1 and 2, pp. xxv-xxix and 3-11.
Reading for Week Three, Tuesday, September 15, 2015
Log files, and how they are parsed
Mitmproxy and TOR
- The commercial impetus
- Julia Angwin, The Web's New Gold Mine: Your Secrets, WALL ST. J., July 30, 2010, available at http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html. (If you hit the paywall, use this mirror instead.)
- Natasha Singer, Your Online Attention, Bought in an Instant, N.Y. Times, Nov. 17, 2012, at BU1, http://www.nytimes.com/2012/11/18/technology/your-online-attention-bought-in-an-instant-by-advertisers.html?pagewanted=all
- BlueKai Registry: Scroll down to see what this ad network knows about you. Try visiting this from different browsers and different computers/devices. (Update: As of 9/1, this doesn't appear to work anymore, but try to see if you can get it to work.)
- Cookie primers
- Attacks on privacy/security exploiting cookies
- Jeff Atwood, Breaking the Web's Cookie Jar, Coding Horror blog, Nov. 13, 2010, http://blog.codinghorror.com/breaking-the-webs-cookie-jar/
- Ashkan Soltani, Andrea Peterson, and Barton Gellman, NSA Uses Google Cookies to Pinpoint Targets for Hacking, Washington Post, Dec. 10, 2013, https://www.washingtonpost.com/news/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
- The Arms Race
- More from Linux Command Line
- William E. Shott, The Linux Command Line, Chapters 3 - 6 pp. 13-58
- Don't forget to attempt and submit Problem Set One (below)
Reading for Weeks Four and Five, Tuesday, September 22, 2015, and Tuesday, September 29, 2015
- Paul Ohm, An Internet X-Ray Machine for the Masses, Jotwell blog, June 12, 2015, http://cyber.jotwell.com/an-internet-x-ray-machine-for-the-masses/
- Philipp Heckel, How To: Use mitmproxy to read and modify HTTPS traffic, Philipp's Tech Blog, July 1, 2013, http://blog.philippheckel.com/2013/07/01/how-to-use-mitmproxy-to-read-and-modify-https-traffic-of-your-phone/ (link broken as of date of posting, but keep trying in case it's a temporary blip)
- Tor Project, Tor: Overview, https://www.torproject.org/about/overview
Week Six: Layers of Abstraction and the Wifi Sniffing
- Arms races and tussles
- Commentary from media watchers/players
- PageFair and Adobe, The Cost of Ad Blocking, http://downloads.pagefair.com/reports/2015_report-the_cost_of_ad_blocking.pdf
- Marco Arment, The ethics of modern web ad-blocking, August 11, 2015, http://www.marco.org/2015/08/11/ad-blocking-ethics
- Avram Piltch, Why Using an Ad Blocker is Stealing (Op-Ed), Tom's Guide, May 22, 2015, http://www.tomsguide.com/us/ad-blocking-is-stealing,news-20962.html
- The technical arms race
- Doc Searls, Apple's content blocking is chemo for the cancer of adtech, Aug. 26, 2015, https://blogs.law.harvard.edu/doc/2015/08/26/apples-content-blocking-is-chemo-for-the-cancer-of-adtech/
- Matthew Zeitlin, The Washington Post has begun blocking the ad blockers, Buzzfeed, Sept. 9, 2015, http://www.buzzfeed.com/matthewzeitlin/the-washington-post-begins-blocking-ad-blockers#.mmOPOx5er
- Syndney Ember, With Technology, Avoiding both ads and the blockers, N.Y. Times, Sept. 1, 2015 http://www.nytimes.com/2015/09/02/business/with-technology-avoiding-both-ads-and-the-blockers.html
- Opting out of cookies
Week Seven: Location Tracking and Basic Data Visualization
- Internet "Layers"
- Excerpt from Larry Solum and Ming Chung, The Layers Principle: Internet Architecture and the Law, Notre Dame L. Rev. 815 (2004).
- Brad Yale, How the Internet Works: TCP/IP, Trace Routes, and Hops, informIT, Aug. 14, 2014, http://www.informit.com/blogs/blog.aspx?uk=How-the-Internet-Works-TCPIP-Trace-Routes-and-Hops.
- Tim Berners-Lee, Levels of Abstraction: Net, Web, Graph, October 23, 2007, http://www.w3.org/DesignIssues/Abstractions.html.
- The Google Wifi Sniffing Controversy and Lawsuit
- A few more links about mitmproxy to help with Graded Assignment Three (to be assigned in Week Six)
Week Nine: Visit to Palantir Technologies
- Location Tracking
- Spend a few minutes playing with this animated visualization of data collected by a german cell phone company of one german legislator.
- Brian X. Chen, iPhone Tracks Your Every Move, and There's a Map for That, Wired.com, April 20, 2011.
- John Brownlee, This Creepy App Isn't Just Stalking Women Without Your Knowledge, It's a Wake-Up Call About Facebook Privacy, CultofMac.com, March 30, 2012.
- Mat Honan, How Trusting in Vice Led to John McAfee's Downfall, Wired.com, Dec. 6, 2012.
- Infosec Institute, StingRay Technology: How Government Tracks Cellular Devices, Nov. 10, 2014, http://resources.infosecinstitute.com/stingray-technology-government-tracks-cellular-devices/
- Skim Kevin Bankston and Ashkan Soltani, Tiny Constables and the Cost of Surveillance: Making Cents Out of United States v. Jones, 123 Yale L.J. Online, 335 (2014).
- Regular Expressions
- Read Chapter 19 on "Regular Expressions" of the Shotts book.
- Data Visualization with Google Sheets
- This week, we will be practicing some basic data visualization skills within Google Sheets, the name for the spreadsheet component of Google Drive. Be sure you have access to Google Sheets before our next class.
- Len De Groot, Tutorial: Data Visualization: Basics, Berkeley Advanced Media Institute, (Feel free to try out the exercises for yourself.) http://multimedia.journalism.berkeley.edu/tutorials/data-visualization-basics/
- Reading posted to Canvas page.
Week Ten: Privacy by Design and the "Playbook"
- For our final substative week, I am asking you to read two relatively short excerpts:
Instructions for submitting the first two graded assignments.:
- Send them to me via email at firstname.lastname@example.org.
- I will send you a confirmation of receipt.
- DO NOT PLACE YOUR NAME ANYWHERE ON THE PAPER, INCLUDING ON THE FILENAME. INSTEAD, USE THE ROT13-ENCODED VERSION OF YOUR NAME WITHOUT SPACES. FEEL FREE TO INCLUDE OTHER WORDS WITH YOUR NAME IF YOU FEEL THAT YOUR NAME LENGTH IS EASILY REIDENTIFIABLE. Here is an online form for generating ROT13.
Other Class Materials
- For class on 9/22/15:
- RSVP to the September 25, 2015, Noon, "Pizza and Privacy" event for the Center on Privacy and Technology