Computers, Privacy & the Constitution

CompPrivConst Web Changed By
MachineTestimonyandConfrontation 14 Jan 2015 - 22:34 IanSullivan
Last semester I was thinking about the topic of machine generated testimony and the Confrontation Clause of the Sixth Amendment. I am curious, as we wrap up the semester ...
MadhuPochaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
What Happens in Vegas, Stays in . . . a Government Hard Drive? By MadhuPocha 27 Mar 2008 Few people have heard of Jonas, a man whose work has helped transform ...
MadhuPochaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Iraqi biometric identification program and its relevance to privacy rights in the U.S. MadhuPocha 13 May 2008 Last year news organizations on the U.S. military ...
MadihaZahrahChoksiFirstPaper 17 May 2018 - 22:50 JoeBruner
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
MahaAtalFirstPaper 05 Jan 2010 - 22:30 IanSullivan
How Do You Protect That Which You Cannot Define (revised) By MahaAtal 17 May 2009 In March, a journalism listserv to which I subscribe ignited over legislation up ...
MahaAtalSecondPaper 05 Jan 2010 - 22:32 IanSullivan
The Truth is Not Enough By MahaAtal 18 May 2009 In our class on Part Four, we determined that until we can build a legal infrastructure for privacy, we should take ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
MarcelRibasFirstPaper 11 May 2018 - 16:26 EbenMoglen
Prosecutorial Discretion and the Crypto Wars By MarcelRibas 14 Apr 2018 I. Introduction The U.S. Department of Justice opened another front in the #8220;Wars ...
MargaretCaisonFirstPaper 13 Mar 2020 - 17:57 MargaretCaison
Whose DNA is it anyway? By MargaretCaison 13 Mar 2020 Subscribing to the fiction articulated in Rousseau #8217;s magnum opus, under the so called social contract ...
MargaretCaisonJournal 20 Apr 2020 - 19:24 MargaretCaison
MargaretCaison's Journal As COVID19 has forced society deeper into the digital space, we must question to what extent our current conceptions of privacy will remain ...
MariHulbuttaFirstPaper 14 Mar 2020 - 00:42 MariHulbutta
MariHulbutta 13 Mar 2020 Paying the price: Technological protection and convenience at the expense of security and Constitutional liberty This paper aims to demonstrate ...
MariHulbuttaJournal 29 Apr 2020 - 02:06 MariHulbutta
MariHulbutta's Journal 4.28.2020 entry I cannot seem to locate the page where folks were posting that their GPG keys were working (if there was such a page for ...
MariahGenisFirstPaper 10 May 2018 - 15:25 EbenMoglen
Strengthening Our Privacy By MariahGenis 03 May 2018 What is privacy? Privacy is a combination of secrecy, anonymity, and autonomy. As individuals we should ...
MarkusVonDerMarwitzFirstPaper 11 May 2018 - 22:02 EbenMoglen
Clear and Present Danger By MarkusVonDerMarwitz 25 Apr 2018 The words in the First Amendment were largely given meaning during times of excessive government overreach ...
MartinMcSherryFirstPaper 12 Mar 2020 - 21:01 MartinMcSherry
Combatting Digital Misinformation to Protect Democracy By MartinMcSherry 12 Mar 2020 I. How Social Media Threatens Democracy A: The "Post Truth" Era The English ...
MarvinGallowayFirstPaper 20 May 2021 - 12:38 MarvinGalloway
Reforming Section 230 By MarvinGalloway 11 Mar 2021 Section I (Section 230) Section 230 of the Communications Decency Act has been under much scrutiny from various ...
MarvinGallowaySecondPaper 16 Apr 2021 - 20:25 MarvinGalloway
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
MathewKenneallyFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Why Eric Holder Really Cares if Edward Snowden is a "Whistleblower". Second Draft Chelsea Manning exposes complicity in torture and the actual death toll from the ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
MattConroyFirstPaper 11 Jun 2018 - 02:18 MattConroy
Mythomoteur By MattConroy 1 Jun 2018 In 2015, Master Sergeant Roddie Edmonds became the fifth American to be named Righteous Among the Nations. Captured by the ...
MattDavisRatner-FirstPaper 05 Jan 2010 - 22:30 IanSullivan
Individual Privacy: A Social Construction? Introduction In order to change the massive trend of disappearing privacy, many aspects of our daily lives must change ...
MattDavisRatnerSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Health Insurance and the Net Individuals are risk averse. We buy insurance to mitigate our personal risks. One of the most important expenses in an individual's ...
MattKokotFirstPaper 11 Jan 2013 - 21:48 IanSullivan
United States v. Jones: A Fleeting Victory for Privacy By MattKokot 13 Mar 2012 Introduction In States v. Jones, the Supreme Court held that the Fourth Amendment ...
MatthewAmsterdamFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction : Years ago, when Facebook was still only accessible to students with registered .edu email addresses, I sat in a lecture with my other high school seniors ...
MatthewAmsterdamSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction I was troubled, if perhaps unsurprised, to read the statement from the founder of Cree.py, an application that tracks individual's locations based on ...
MatthewEckmanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Encryption, Privacy, and the Fifth Amendment By MatthewEckman 08 Mar 2009 PAPER IN PROGRESS The Electronic Frontier Foundation highly recommends that people encrypt ...
MatthewEckmanSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Correction By MatthewEckman 15 May 2009 I made a mistake in class one day. Professor Moglen, as I recall, was speaking in ominous tones about the fact that grocery ...
MatthewHurtFirstPaper 20 Mar 2020 - 19:40 MatthewHurt
Wikimedia and The Empty Promise of the Fourth Amendment Lawsuit By MatthewHurt 20 Mar 2020 Introduction The Fourth Amendment is often categorized as a "criminal ...
MatthieuWharmbyFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Draft #2 Escaping your online past: the case against a global right to be forgotten. By MatthieuWharmby 06 Mar 2015 Introduction Recently there have been many ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
MaxwellMillerFirstPaper 28 Apr 2024 - 22:39 MaxwellMiller
THE EROSION OF SECTION 8 of the CHARTER : THIRD PARTY TECH COMPANIES POISONING THE CONSTITUTIONAL ECOSYSTEM By MaxwellMiller 04 Mar 2024 INTRODUCTION Are Canadians ...
MayaWakamatsuFirstPaper 07 May 2022 - 01:03 MayaWakamatsu
Issues on the Electronic Communications Privacy Act and Possible Solutions By MayaWakamatsu 12 Mar 2022 1. Introduction It is said that the Electronic Communications ...
MayelaGarzaFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DNA Collection in the US: Where does it end? In the late 1980 #8217;s, US crime laboratories began DNA testing. Shortly, thereafter crime labs in different States ...
MayelaGarzaSecondPaper 14 Jan 2015 - 22:44 IanSullivan
MayelaGarza 13 May 2013 The Data Collectors Before coming to Columbia my doctor back in Mexico found a cyst and gave me birth pills to see if they would remove it ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
McCurley 26 Feb 2024 - 21:17 KeanuWan
McCurley v. State, 653 S.W.3d 477, 482 (Tex. App. 2022) KeanuWan 26 Feb 2024
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
MeharJagotaFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Behavioral Economics and Privacy Rights By MeharJagota 11 Apr 2012 Introduction A theme of our class has been the apparent cognitive bias which prevents people ...
MenahemGrossmanFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Hiding in Plain Sight: Alternative Approaches to Cybersecurity (Draft 2) By MenahemGrossman 14 May 2015 Introduction Much of conventional cybersecurity efforts ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MengYingLeeFirstPaper 12 May 2022 - 19:48 EbenMoglen
Digital Contact Tracing Against COVID 19 By MengYingLee 10 Mar 2022 (revised 28 April 2022) Introduction During 2020, as COVID 19 has spread across the globe ...
MichaelPanFirstPaper 10 Mar 2020 - 23:52 MichaelPan
The use of encryption is required to maintain the secrecy, anonymity, and autonomy of messages between a sender and recipient. The most obvious solution is to use ...
MichaelPanJournal 25 Mar 2020 - 18:01 MichaelPan
MichaelPan's Journal #Set ALLOWTOPICVIEW .TWikiAdminGroup, MichaelPan #Set DENYTOPICVIEW .TWikiGuest
MichaelSunSecondPaper 27 May 2024 - 14:15 MichaelSun
Digitalization of Medical Health Records Its Privacy/Data Security Concerns: U.S. South Korea By MichaelSun 07 May 2024 Introduction Medical institutions ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
MichelleJongFirstPaper 06 May 2022 - 23:58 MichelleJong
The Tech Leviathan #8220;The attaining to #8230; sovereign power is by two ways. One, by natural force #8230;The other, is when men agree amongst themselves to ...
MichelleXiaoFirstPaper 08 May 2024 - 20:16 MichelleXiao
Social Media Platforms The Loss of Autonomy By MichelleXiao 01 Mar 2024 Social Media Platforms Addiction It is no secret that businesses want to make money ...
MirelisValleFirstPaper 11 May 2022 - 22:50 MirelisValle
The Cambridge Analytica Facebook scandal, Surveillance Capitalism and the Survival of Democracy By MirelisValle May 2022 In March 2018, Cambridge Analytica, a ...
MislavMataijaFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Assessing a Regulatory Approach to Data Protection: the EU Directive By MislavMataija 01 May 2009 Can the collection of personal data be regulated by the market ...
MislavMataijaSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Flea Market and the Public Square #8211; Giving the First Amendment a Say in Copyright MislavMataija 11 May 2009 File sharing cases are based on the 1984 ...
MitchellKohlesFirstPaper 04 May 2021 - 23:34 MitchellKohles
Constitutional Obligations By MitchellKohles 08 Mar 2021 Introduction Ours is a Constitution of rights. Those rights sometimes appear in the negative #8212;freedom ...
MitchellKohlesSecondPaper 03 May 2021 - 18:47 MitchellKohles
Mass Facial Recognition and the First Amendment By MitchellKohles 13 Apr 2021 Introduction Following the Capitol riot of January 6th, 2021, law enforcement agencies ...
ModuleTest28Jun2012 28 Jun 2012 - 06:57 XmvlYzlv?
XmvlYzlv 28 Jun 2012 jlkhgvkihbloijn;oijbnoiuybjuytvuytrcvuytfvjuyg
MoneshDevireddyFirstPaper 15 May 2024 - 22:16 MoneshDevireddy
Government Usage of Facial Recognition Technology: a Threat to Privacy and Constitutional Rights By MoneshDevireddy 04 Mar 2024 Facial recognition technology ...
MorganCFirstPaper 03 May 2024 - 14:50 EbenMoglen
Evasive Maneuvers How Privacy Regulations Can Cover Government Actors in the Future By MorganC 01 May 2024 The Current Privacy Landscape The California Consumer ...
MorreaseLeftwichFirstPaper 14 May 2022 - 19:29 MorreaseLeftwich
Bitcoin could never secure the privacy of transactions anyway, but people just liked that it wasn't based on the banking system By MorreaseLeftwich 19 Mar 2022 ...
MuhammadUsmanFirstPaper 09 May 2022 - 17:47 MuhammadUsman
Cyber peace: Is Hacking back the solution? By MuhammadUsman 20 Mar 2022 Background Over the past decade, governments across the world, private companies and ...
MunKiNamFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Problems of the Adoption of the Notice and Takedown Regime by Other Countries By MunKiNam 01 May 2010 The Notice and Takedown Regime in DMCA Section 512 (c) of ...
MunKiNamSecondPaper 17 Jan 2012 - 17:48 IanSullivan
YouTube vs. South Korean Government: Real Name Verification System in South Korea and its Threat to the Freedom of Expression on the Internet By MunKiNam 01 May ...
MylsMarsinaFirstPaper 02 May 2024 - 23:42 MylsMarsina
Why Can't Strict Data Privacy and Convenience Co exist? By MylsMarsina 04 Mar 2024 Section I Intro The boom in smartphone usage has become so potent that ...
MylsMarsinaSecondPaper 07 May 2024 - 16:28 EbenMoglen
Why Can't Strict Data Privacy and Convenience Co exist? By MylsMarsina 04 May 2024 Section I Intro The boom in smartphone usage has become so potent that ...
Found 61 topics
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM