The readings, if you go out more than a lecture or two, are almost certainly wrong.
- Jan 21
Introduction; Administrative Issues
- Text, Chapter 1
- Jan 26
- Snow Day!
- Jan 28
- Text, chapter 9
- Paul Berg, David Baltimore, Sydney Brenner, Richard O. Roblin, and Maxine F. Singer, Summary Statement of the Asilomar Conference on Recombinant DNA Molecules PNAS 72:6, June 1975.
- David L. Parnas, "Software aspects of strategic defense systems", Comm. ACM 28:12, December 1985.
- Philip M. Boffey, Software Seen as Obstacle in Developing 'Star Wars', New York Times, September 16, 1986.
- U.S. Public Health Service Syphilis Study at Tuskegee", Center for Disease Control.
- Institutional Review Board Guidebook, Introduction, Office of Human Subjects Research, Department of Health and Human Services.
- Patent GB630726, "Improvements in or relating to the transmutation of chemical elements", March 30, 1936 (optional)
- Feb 02
- Ethics 2
- Feb 04
What is Privacy?
- The Transparent Society, David Brin, Wired Magazine 4:12, Dec. 1996. Privacy: A Primer and Proposal, Jerry Kang, Human Rights Magazine 26:1, Winter 1999.
- The Right to Privacy, Samuel Warren and Louis D. Brandeis, 4 Harvard Law Review 193 (1890)
- The Perfect Scan
- Dr. Fun
- What's in the driver's license bar code?
- Textbook, chapter 2
- Verizon Wireless to allow customers to actually opt-out of controversial supercookie tracking, Washington Post, January 30, 2015.
- Feb 09
Wiretapping and Eavesdropping
- Katz v. United States, 389 U.S. 347 (1967). Read all five opinions.
- Smith v. Maryland, 442 U.S. 735 (1979).
- Wiretapping the Net", Steven M. Bellovin, The Bridge, 20(2):21-26, Summer 2000.
- The Athens Affair, Vassilis Prevelakis and Diomidis Spinellis, IEEE Spectrum, July 2007.
- Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, Steven Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vinton Cerf, Whitfield Diffie, Susan Landau, Jon Peterson, and John Treichler, June 2006.
- Feb 11
- The Strange Story of Dual_EC_DRBG, Schneier on Security (blog), Nov. 15, 2007.
- How a Crypto 'Backdoor' Pitted the Tech World Against the NSA, Kim Zetter, Wired Threat Level, Sep 24, 2013.
- On the Practical Exploitability of Dual EC in TLS Implementations, Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, and Hovav Shacham, Usenix Security 2014
- S. Landau, Making Sense of Snowden: What's Significant in the NSA Surveillance Revelations, IEEE Security and Privacy, Vol. 11, No. 4, July/August 2013, pp. 54-63.
- S. Landau, Making Sense of Snowden Part II: What's Significant in the NSA Surveillance Revelations, IEEE Security and Privacy, Vol. 12, No. 1, January/February 2014
- Steven M. Bellovin. By any means possible: How intelligence agencies have gotten their data. IEEE Security & Privacy, 12(4), July-August 2014.
- Feb 16
- Privacy: Location-Tracking
- Feb 18
Freedom of Speech
- Text, chapter 3
- ACLU v. Reno, 929 F. Supp. 824 (1996)
- EFF article on Sapient v. Geller
- EFF article on Online Policy Group v. Diebold
- Rulings Leave Online Student Speech Rights Unresolved, Wired Threat Level blog, Feb. 4, 2010.
- Feb 23
- Freedom of Speech: Anonymity
- Feb 25
Freedom of Speech: Accountability
Linkages for Good, blog posting, Dec 31, 2007.
- Cyber Civil Rights, Danielle Citron, 89 Boston University Law Review 61 (2009). (Related article that isn't required reading: Law's Expressive Value in Combating Cyber Gender Harassment, Danielle Citron, 108 Michigan Law Review 373 (2009).)
- Anonymity and traceability in cyberspace, Richard Clayton, PhD dissertation, University of Cambridge, November 2005, technical report UCAM-CL-TR-653—read Chapter 3.
- Exploiting Linkages for Good, blog posting, Dec 31, 2007.
- Mar 02
- Freedom of Speech: Crossing Borders
- Mar 09
- Social Networks
- Mar 11
- Hackers Assault Epilepsy Patients via Computer, Wired Magazine, 28 March 2008.
- Judge Acquits Lori Drew in Cyberbullying Case, Overrules Jury, Wired Magazine, 2 July 2009.
- Facebook Users Keep it Real in Online Profiles, Science News, 26 February 2010
- Hey, You're Breaking Up on Me!, Washington Post, 13 February 2007.
- The Boundaries of a Breakup, New York Times, 20 November 2009.
- Who Spewed That Abuse? Anonymous Yik Yak App Isn’t Telling, New York Times, 9 March 2015.
- Danielle Citron, ``Law's Expressive Value in Combating Cyber Gender Harassment'', 108 Michigan Law Review 373 (2009) (optional).
- Mar 23
- Israeli Raid Canceled After Facebook Leak, Robert Mackey, New York Times Lede Blog, 3 March 2010.
- Gaydar: Facebook friendships expose sexual orientation, Carter Jernigan and Behram F.T. Mistree, First Monday, 5 October 2009.
- I Am Here: One Man's Experiment With the Location-Aware Lifestyle, Mathew Honan, Wired Magazine, 19 January 2009.
- FTC Warns of Data Breaches from P2P File Sharing, Brian Prince, eWeek, 23 February 2010.
- S. 3027, P2P Cyber Protection and Informed User Act, 111th Congress.
- Facebook tosses graph privacy into the bin, Joseph Bonneau, Light Blue Touchpaper blog, 11 December 2009.
- Web Photos That Reveal Secrets, Like Where You Live, New York Times, 11 August 2010.
- Police find wanted man in cabinet after he Snapchats he's in cabinet, New York Post, 24 March 2015
- Mar 25
Intellectual Property: Trademarks
- Filching a Good Name for Internet Use?, New York Times, 21 March 2010
- Billions Registered, Joshua Quittner, Wired Magazine 2:10, October 1994.
- From TedCruz.ca to TaylorSwift.porn: How the golden age of domain-trolling was born, Caitlin Dewey, Washington Post>, 25 March 2015.
- Mar 30
- Textbook, chapter 4
- NFL/DMCA, Wendy Seltzer's blog
- Death by DMCA, Fred von Lohmann and Wendy Seltzer, IEEE Spectrum, June 2006
- Frequently Asked Questions about Copyright (skim)
- A.V. v. iParadigms, 562 F.3d 630 (optional)
- Google Books: Fair Use and Public Benefits, Columbia University Copyright Advisory Office
- Apr 01
- Math of Publishing Meets the E-Book, New York Times, Feb 28, 2010.
- Entertainment Industry Asks White House for Vast New Internet Monitoring, Filtering, and Takedown Powers, Lauren Weinstein's blog, 25 March 2010.
- Method of exercising a cat, Kevin T. Amiss and Martin H. Abbott, U.S. patent 5,443,036, issued Aug 22, 1995.
- Business method protecting jokes, Timothy Wace Roberts, U.S. patent application 10/569,506, filed Aug 24, 2004. (skim).
- What is a Patent?, up to but not including the section titled "The United States Patent And Trademark Office"
- For Texas Instruments, Calculator Hackers Don't Add Up, D. Kushner, IEEE Spectrum 46:12, December 2009.
- Unintended Consequences: Sixteen Years under the DMCA, Electronic Frontier Foundation, September 2014. (optional)
- Apr 06
The Free Software Movement and the GPL
- The Cathedral and the Bazaar, Eric S. Raymond.
- Blackberries and Barnyards: Patent Trolls and the Perils of Innovation, Gerard N. Magliocca, Notre Dame Law Review 82, no. 5 (2007): 1809-1838 (optional)
- The Oldest Algorithmic Patent?, blog post, Steven M. Bellovin, 21 May 2013.
- W3C Patent Policy, 5 February 2004 (skim)
- App developers withdraw from US as patent fears reach 'tipping point', Charles Arthur, The Guardian, 15 July 2011.
- Software patents—Obstacles to software development, Richard Stallman, 25 March 2002.
- Apr 08
Risks of Computers
- Textbook, chapter 8
- An Experimental Evaluation of the Assumption of Independence in Multi-Version Programming, John Knight and Nancy Leveson, IEEE Transactions on Software Engineering SE-12:1, January 1986, pp. 96-109.
- Analysis of faults in an N-version software experiment, S.S. Brilliant, J.C. Knight, and N.G. Leveson, IEEE Transactions on Software Engineering 16:2, February 1990. (optional)
- The Bug Heard 'Round the World, Jack Garman, ACM Software Engineering Notes, October, 1981, pp. 3-10.
- Vulnerabilities of network control protocols: an example, Eric C. Rosen, ACM SIGCOMM Computer Communication Review 11:3, July 1981.
- Who Needs Hackers?, John Schwartz, New York Times, September 12, 2007.
- Technical background on AT&T's network slowdown, January 15, 1990
- Going Ballistic! A hacker tourist explores the deep recesses of fabled Air Force stronghold Cheyenne Mountain, where the Cold War never stops., Phil Patton, Wired magazine 7:11, November 1999.
- 20 Mishaps That Might Have Started Accidental Nuclear War, Alan F. Phillips. See #18 and #19.
- 'I Had A Funny Feeling in My Gut', David Hoffman, Washington Post Foreign Service, February 10, 1999.
- History's Worst Software Bugs, Simson Garfinkel, Wired magazine, November 2005.
- 50 Plus Blue Screen of Death Displays in Public, Hiroshi, 14 June 2009.
- An ACM Digital Library error, which I got while working on this lecture...
- Google let root certificate for Gmail expire, causing e-mail hiccups, Sam Gallagher, Ars Technica, 6 April 2015.
- How Medical Tech Gave a Patient a Massive Overdose, Bob Wachter, How Medical Tech Gave a Patient a Massive Overdose", The Medium, 30 March 2015.
- Apr 13
- Hacking the Hill, Shane Harris, National Journal Magazine, Dec. 20, 2008.
- Researchers Trace Data Theft to Intruders in China, John Markoff and David Barboza, New York Times, April 5, 2010.
- French media groups to hold emergency meeting after Isis cyber-attack, Angelique Chrisafis and Samuel Gibbs, The Guardian, 9 April 2015.
- Russians Hacked White House Via State Department, Claims Report, Thomas Fox-Brewster, Forbes, 8 April 2015. An Unprecedented Look at Stuxnet, the World’s First Digital Weapon, Kim Zetter, Wired, 3 November 2014.
- Apr 15
Risks: Electronic Voting Machines
- Analysis of an Electronic Voting System, Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Proc. IEEE Symposium on Security and Privacy (May, 2004).
- Project EVEREST Evaluation and Validation of Election Related Equipment, Standards and Testing, December 2007 (optional).
- Top-to-Bottom Review (optional)
- Hacking Democracy, HBO film (optional)
- Apr 20
Risks: What Do We Do?
- Anatomy of an IT disaster: How the FBI blew it, InfoWorld, 21 March 2005
- Guest View: It's Not Too Late to Learn, James Shore, Software Development Times on the Web, 15 August 2005.
- The FBI's Trilogy Information Technology Modernization Program — Summary, Computer Science and Telecommunications Board, National Academies, May 2004. (optional)
- "Why the FBI Can’t Build a Case Management System", Jerome W. Israel, IEEE Computer, June 2012. Uploaded to Courseworks, since the IEEE archive copy is missing.
- IRS trudges on with aging computers, CNET News, 12 April 2007.
- United's Merger Turbulence Hits Elite Frequent Fliers, Susan Carey, Wall Street Journal, 24 May 2012.
- Bloomberg Terminals Suffer Widespread Failures, Nathaniel Popper and Neil Gough, New York Times, 17 April 2015.
- Apr 22
- Textbook, chapter 6
- Will Startups Get Squeezed by a Tech Hiring Binge?, Matthew Ingram, New York Times, 16 April 2010
- Debunking the Myths of the Telecommute, Sylvia Marino, New York Times, 16 April 2010
- The Machines Are Coming, Zeynep Tufekci, New York Times, 18 April 2015.
- "What Clever Robots Mean for Jobs", Timothy Aeppel, Wall Street Journal, 24 February 2015. (On Courseworks.)
- Does innovation create or destroy jobs?, Vint Cerf, Communications of the ACM, December 2014.
- Could a lawsuit wreck Uber, Lyft?, Peter Hoge, Upstart Business Journal, 28 March 2015.
- Apr 27
- Computers and the Media
- Apr 29
- Barriers to the Advancement of Technical Women: A Review of the Literature, Caroline Simard, Anita Borg Institute for Women and Technology, 2007.
- Women in IT: The Facts, by NCWIT, Catherine Ashcraft and Sarah Blithe, National Center for Women & Information Technology (NCWIT), 2009.
- Gender: Integrated Report of Findings, Dawn Nafus, James Leach, and Bernhard Krieger, FLOSSPOLS Project, 2006.
- Out of the Loop in Silicon Valley, Claire Cain Miller, New York Times, 18 April 2010.
How One Brogrammer's Sexist Joke Led to Death Threats and Firings,
Dana Liebelson and Tasneem Raja,
Mother Jones, 22 March 2013.
- The Falsest of False Equivalencies, Melissa McEwan, Shakesville, 20 February 2015.
- May 04