The readings, if you go out more than a lecture or two, are almost certainly wrong.
- Paul Berg, David Baltimore, Sydney Brenner, Richard O. Roblin, and Maxine F. Singer. Summary statement of the Asilomar Conference on Recombinant DNA Molecules. 72(6):1981–1984, June 1975. [ .pdf ]
- Philip M. Boffey. Software seen as obstacle in developing `Star Wars'. New York Times, September 16, 1986. [ .html ]
- Alex Wellerstein. A “purely military” target? Truman's changing language about Hiroshima. Restricted Data, January 19th, 2018. [ http ]
- U.S. Public Health Service Syphilis Study at Tuskegee", Center for Disease Control.
- Institutional Review Board Guidebook, Introduction, Office of Human Subjects Research, Department of Health and Human Services.
- Patent GB630726, "Improvements in or relating to the transmutation of chemical elements", March 30, 1936 (optional—this is the patent on the atom bomb)
- David L. Parnas. Software aspects of strategic defense systems. Communications of the ACM, 28(12), December 1985. [ http ]
- Stanley Fish. Why we built the ivory tower. New York Times, May 21, 2004. [ http ]
- Debbie Elliot. Challenger: What went wrong? NPR, January 28, 2006. [ http ]
- Kim Zetter. A unprecedented look at Stuxnet, the world's first digital weapon. Wired, November 3, 2014. [ http ]
- Phillip Rogaway. The moral character of cryptographic work, 2015. [ .pdf ]
- David Kravets. Ethics charges filed against DOJ lawyer who exposed Bush-era surveillance. Ars Technica, January 26, 2016. [ http ]
- Howard Berkes. 30 years after disaster, challenger engineer still blames himself. NPR, January 28, 2016. [ http ]
- John Markoff. Apple's engineers, if defiant, would be in sync with ethics code. New York Times, March 18, 2016. [ .html ]
- Howard Berkes. Challenger engineer who warned of shuttle disaster dies. NPR, March 21, 2016. [ http ]
- Nicole Perlroth and Mike Isaac. Inside Uber's $100,000 payment to a hacker, and the fallout. New York Times, January 12, 2018. [ .html ]
- ACM Code of Ethics
- 2018 ACM Code of Ethics and Professional Conduct: Draft 3
- ACM Software Engineering Code of Ethics
- IEEE Code of Ethics
- SAGE/LOPSA/Usenix System Administrators' Code of Ethics
- Chloe Albanesius. HP responds to claim of `racist' webcams. PC Magazine, December 22, 2009. [ http ]
- Latanya Sweeney. Discrimination in online ad delivery. Queue, 11(3):10:10–10:29, March 2013. [ DOI | http ]
- Michael Schrage. Big data's dangerous new era of discrimination. Harvard Business Review, January 29, 2014. [ http ]
- Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, and Huang Lin. Discovering unwarranted associations in data-driven applications with the FairTest testing toolkit, 2015. [ http ]
- Jacob Brogan. Google scrambles after software ids photo of two black people as `gorillas'. Slate (Future Tense blog), June 30, 2015. [ .html ]
- Amit Datta, Michael Carl Tschantz, and Anupam Datta. Automated experiments on ad privacy settings: A tale of opacity, choice, and discrimination. In Proceedings of Privacy Enhancing Technologies Symposium,, July 2015. [ .pdf ]
- Jonathan M. Gitlin. VW says rulebreaking culture at root of emissions scandal. Ars Technica, December 10, 2015. [ http ]
- Roland L. Trope and Eugene K. Ressler. Mettle fatigue: VW's single-point-of-failure ethics. IEEE Computer, 14(1):12–30, Jan–Feb 2016. [ .pdf ]
- Danielle Ivory and Hiroko Tabuchijan. Takata emails show brash exchanges about data tampering. New York Times, January 4, 2016. [ http ]
- Nicholas Diakopoulos. Accountability in algorithmic decision-making. ACMqueue, January 25, 2016. [ http ]
- Megan Geuss. Volkswagen details what top management knew leading up to emissions revelations. Ars Technica, March 3, 2016. [ http ]
- Clare Garvie and Jonathan Frankle. Facial-recognition software might have a racial bias problem. Atlantic, April 2016. [ http ]
- Executive Office of the President. Big data: A report on algorithmic systems, May 2016. [ .pdf ]
- Roger Parloff. How VW paid $25 billion for dieselgate — and got off easy. ProPublica, February 6, 2017. [ http ]
- Chen Guangcheng. Apple can't resist playing by China's rules. New York Times, January 23, 2018. [ .html ]
- Jack Ewing. 10 monkeys and a Beetle: Inside VW's campaign for `clean diesel'. New York Times, January 25, 2018. [ .html ]
- Eric C. Rosen. Vulnerabilities of network control protocols: An example. SIGCOMM Comput. Commun. Rev., 11(3):10–16, July 1981. [ DOI | http ]
- John R. Garman. The “BUG” heard 'round the world: Discussion of the software problem which delayed the first shuttle orbital flight. SIGSOFT Softw. Eng. Notes, 6(5):3–10, October 1981. [ DOI | http ]
- J. C. Knight and N. G. Leveson. An experimental evaluation of the assumption of independence in multiversion programming. IEEE Transactions on Software Engineering, SE-12(1):96–109, Jan 1986. [ DOI ]
- S. S. Brilliant, J. C. Knight, and N. G. Leveson. Analysis of faults in an n-version software experiment. IEEE Transactions on Software Engineering, 16(2):238–247, Feb 1990. [ DOI ]
- AT&T. Technical background on AT&T's network slowdown. Risks Digest, 9(63), January 29, 1990. [ http ]
- David Hoffman. `I had a funny feeling in my gut'. Washington Post Foreign Service, February 10, 1999. [ http ]
- Phil Patton. Going ballistic! Wired, November 1, 1999. [ http ]
- Simson Garfinkel. History's worst software bugs. Wired, November 8, 2005. [ http ]
- John Schwartz. Who needs hackers? New York Times, September 12, 2007. [ .html ]
- Robert Wachter. How medical tech gave a patient a massive overdose. Medium, March 30, 2015. [ http ]
- Sean Gallagher. Google let root certificate for Gmail expire, causing e-mail hiccups. Ars Technica, April 6, 2015. [ http ]
- Sebastian Anthony. Qantas 737 “tailstrike” was caused by iPad data entry fail. November 16, 2015. [ http ]
- Jon Fingas. Google self-driving car crashes into a bus. Engadget, February 29, 2016. [ http ]
- Space Shuttle Computers and Avionics, NASA Office of Logic Design (optional)
- 20 Mishaps That Might Have Started Accidental Nuclear War, Alan F. Phillips. See #18 and #19.
- An ACM Digital Library error, which I got while working on this lecture...
- Shane Harris. Hacking the Hill. Nextgov, December 19, 2008. [ http ]
- John Markoff and David Barboza. Researchers trace data theft to intruders in China. New York Times, April 5, 2010. [ .html ]
- Kim Zetter. A unprecedented look at Stuxnet, the world's first digital weapon. Wired, November 3, 2014. [ http ]
- Angelique Chrisafis and Samuel Gibbs. French media groups to hold emergency meeting after Isis cyber-attack. Guardian, 2015. [ http ]
- Thomas Fox-Brewster. Russians hacked White House via State Department, claims report. Forbes, April 8, 2015. [ http ]
- Steve Ragan. Ransomware takes Hollywood hospital offline, $3.6m demanded by attackers. CSO Online, February 14, 2016. [ .html ]
- Dan Goodin. Failure to patch two-month-old bug led to massive Equifax breach. Ars Technica, September 14, 2017.
- Dan Goodin. A series of delays and major errors led to massive Equifax breach. Ars Technica, October 2, 2017. [ http ]
- Catalin Cimpanu. Samsam ransomware hits hospitals, city councils, ICS firms. Bleeping Computer, January 19, 2018. [ http ]
- Essay 1 (Something to do with computers and ethics)
- Filip Hrácek. Automatic Donald Trump. [ http ]
- Charles Duhigg. How companies learn your secrets. New York Times, February 16, 2012. [ .html ]
- Peter Bright. Microsoft terminates its Tay AI chatbot after she turns into a Nazi. Ars Technica, March 24, 2016.
- Peter Bright. Tay, the neo-Nazi millennial chatbot, gets autopsied. Ars Technica, March 26, 2016.
- Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. Machine bias. ProPublica, May 23, 2016. [ http ]
- Siddhartha Mukherjee. A.I. versus M.D. New Yorker, April 3, 2017. [ http ]
- Zeynep Tufekci. We're building a dystopia just to make people click on ads. TED Talk, September 2017. [ http ]
- Abder-Rahman Ali. Deep learning applications in medical imaging. TechEmergence, September 14, 2017. [ http ]
- Cliff Kuang. Can a.i. be taught to explain itself? New York Times, November 21, 2017. [ .html ]
- David Jackson and Gary Marx. Data mining program designed to predict child abuse proves unreliable, DCFS says. Chicago Tribune, December 6, 2017. [ .html ]
- Lauren Kirchner. New York City moves to create accountability for algorithms. Ars Technica, December 19, 2017. [ http ]
- Joshua Mitts. Data science for lawyers, 2018. [ http ]
- Jeanette M. Wing. Data for good: FATES, elaborated. Data Science Institute Voices Blog, January 23, 2018. [ http ]
- Paul Lewis. `Fiction is outperforming reality': how YouTube's algorithm distorts truth. Guardian, February 2, 2018. [ http ]
- Steve Lohr. Facial recognition is accurate, if you're a white guy. New York Times, February 09, 2018. [ .html ]
- Facebook patent application on how to determine user's socioeconomic status
- Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach. Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy, May 2004. [ .pdf ]
- Avi Rubin. My day at the polls. Avi Rubin's Blog, November 4, 2008. [ .html ]
- Matt Blaze. Is the e-voting honeymoon over? Exhaustive Search, March 23, 2009. [ http ]
- Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy. In Usenix Security, 2010.
- Mark Lindeman and Philip B Stark. A gentle introduction to risk-limiting audits. IEEE Security & Privacy, 10(5):42–49, 2012. [ http ]
- Kim Zetter. Virginia finally drops America's `worst voting machines'. Wired, August 17, 2015. [ http ]
- Nicole Perlroth. In election interference, it's what reporters didn't find that matters. New York Times, Sept. 1, 2017. [ .html ]
- Michael Wines Nicole Perlroth and Matthew Rosenberg. Russian election hacking efforts, wider than previously known, draw little scrutiny. New York Times, Sept. 1, 2017. [ .html ]
- Matt Blaze, Jake Braun, Harri Hursti, Joseph Lorenzo Hall, Margaret MacAlpine, and Jeff Moss. Defcon 25 voting machine hacking village, September 2017. Optional. [ .pdf ]
- Celeste Katz. Hack-vulnerable voting machines a `national security threat', experts warn. Newsweek, October 10, 2017. [ http ]
- Ann Marie Awad. Colorado launches first in the nation post-election audits. NPR, November 22, 2017. [ http ]
- Matt Blaze. Hearing on cybersecurity of voting machines, November 29, 2017. Testimony before the House Committee on Oversight and Government Reform, Subcommittee on Information Technology and Subcommittee on Intergovernmental Affairs. [ .pdf ]
- Cynthia McFadden, William M. Arkin, and Kevin Monahan. Russians penetrated U.S. voter systems, says top U.S. official. NBC News, February 8, 2018. [ http ]
- Project EVEREST Evaluation and Validation of Election Related Equipment, Standards and Testing, December 2007 (optional).
- Top-to-Bottom Review (optional)
- Hacking Democracy, HBO film (optional)
- Samuel Warren and Louis D. Brandeis. The right to privacy. Harvard Law Review, 4:193, 1890. [ .html ]
- David Brin. The transparent society. Wired, December 1, 1996. [ http ]
- Andrea Peterson. Verizon Wireless to allow customers to actually opt-out of controversial supercookie tracking. Washington Post, January 30, 2015. [ http ]
- Chris Frey. Revealed: how facial recognition has invaded shops—and your privacy. Guardian, March 3, 2016. [ http ]
- Kashmir Hill and Surya Mattu. The house that spied on me. Gizmodo, February 7, 2018. [ http ]
- Cyberspace Privacy: A Primer and Proposal, Jerry Kang, Human Rights Magazine 26:1, Winter 1999.
- The Perfect Scan
- Dr. Fun
- What's in the driver's license bar code?
- Safe Harbor Overview
- Katz v. United States, 389 U.S. 347 (1967). [ http ]
- Smith v. Maryland, 442 U.S. 735 (1979). [ http ]
- Helene Cooper. Passport files of 3 candidates were pried into. New York Times, March 22, 2008. [ .html ]
- Brian Knowlton. Obama's nominee for T.S.A. withdraws. New York Times, January 20, 2010. [ .html ]
- Declan McCullagh. FBI wants records kept of web sites visited. February 5, 2010. [ http ]
- David Robinson. Identifying John Doe: It might be easier than you think. Freedom to Tinker blog, February 8, 2010. [ http ]
- Harlan Yu. What third parties know about John Doe. Freedom to Tinker blog, February 9, 2010. [ http ]
- Harlan Yu. The traceability of an anonymous online comment. Freedom to Tinker blog, February 10, 2010. [ http ]
- Molly Wood. Google Buzz: Privacy nightmare. CNET, February 10, 2010. [ http ]
- Steven M. Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell. It's too complicated: How the Internet upends Katz, Smith, and electronic surveillance law. Harvard Journal of Law and Technology, 30(1):1–101, Fall 2016. Exceedingly optional—look at the length... [ .pdf ]
- Kelly Fiveash. Google right to be forgotten spat returns to Europe's top court. Ars Technica, July 20, 2017. [ http ]
- Ordering Pizza, ACLU. (Note: blatant propaganda piece...)
- Essay 2 (Risks to society from computers)
- B. Krishnamurthy and C. Wills. On the leakage of personally identifiable information via online social networks. In Proceedings of ACM SIGCOMM Workshop on Online Social Networks, August 2009. [ .pdf ]
- Balachander Krishnamurthy. I know what you will do next summer. ACM SIGCOMM CCR, 40(5), 2010. [ .pdf ]
- Sara Kiesler, Jane Siegel, and Timothy W. McGuire. Social psychological aspects of computer-mediated communication. American Psychologist, 39(10):1123–1134, October 1984. [ http ]
- January W. Payne. Hey, you're breaking up on me! Washington Post, February 13, 2007. [ .html ]
- Kim Zetter. Judge acquits Lori Drew in cyberbullying case, overrules jury. Wired, July 2, 2007. [ http ]
- Kevin Poulsen. Hackers assault epilepsy patients via computer. Wired, March 28, 2008. [ http ]
- Danielle Citron. Law's expressive value in combating cyber gender harassment. Michigan Law Review, 108:373–416, 2009. (Optional). [ http ]
- Charles H. Antin. The boundaries of a breakup. New York Times, November 20, 2009. [ .html ]
- Bruce Bower. Facebook users keep it real in online profiles. Science News, February 26, 2010. [ http ]
- Beth Teitell and Callum Borchers. GamerGate anger at women all too real for gamemaker. Boston Globe, October 30 2014. [ .html ]
- Jonathan Mahler. Who spewed that abuse? Anonymous Yik Yak app isn't telling. New York Times, March 8, 2015. [ http ]
- Miranda Katz. 2 Long Island teens arrested, 20 suspended over sexting incident. Gothamist, November 10, 2015. [ http ]
- Justin Jouvenal. A 12-year-old girl is facing criminal charges for using emoji, and she's not the only one. Washington Post, February 27, 2016. [ http ]
- Penelope Green. The Facebook breakup. New York Times, March 12, 2016. [ .html ]
- Caitlin Dewey. In the battle of Internet mobs vs. the law, the Internet mobs have won. Washington Post, February 17, 2017. [ http ]
- P F Syverson, D M Goldschlag, and M G Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44–54, Oakland, California, 4–7 1997. [ http ]
- Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. [ http ]
- Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2009. [ .pdf ]
- Andy Greenberg. Why Facebook just launched its own `Dark Web' site. Wired, October 31, 2014. [ http ]
- Carl Franzen. Facebook just created a new Tor link for users who wish to remain anonymous. The Verge, October 31, 2014. [ http ]
- Alec D. E. Muffett. Making connections to Facebook more secure. Facebook, October 31, 2014. [ http ]
- Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part I. Wired, April 2015. [ http ]
- Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part II. Wired, May 2015. [ http ]
- Cyrus Farivar and Sean Gallagher. Feds bust through huge Tor-hidden child porn site using questionable malware. Ars Technica, July 16, 2015. [ http ]
- Joseph Cox. The FBI's “unprecedented” hacking campaign targeted over a thousand computers. Vice, January 5, 2016. [ http ]
- Nick Hagar, Geordan Tilley, Alex Duner, and Nicolas Rivero. A wave of non-criminal users is joining the dark web and stepping into the middle of a privacy battle. Caught in the Crossfire, March 10, 2016. [ http ]
- Nathaniel Popper. A hacking of more than $50 million dashes hopes in the world of virtual currency. New York Times, June 17, 2016. [ .html ]
- Nathaniel Popper. Easiest path to riches on the web? An initial coin offering. New York Times, June 23, 2017. [ .html ]
- Timothy B. Lee. Want to really understand how bitcoin works? here's a gentle primer. Ars Technica, December 15, 2017. [ http ]
- Nellie Bowles. Cryptokitties, explained ... mostly. New York Times, December 28, 2017. [ .html ]
- John Schwartz. Blockchain or blockheads? bitcoin mania mints believers and skeptics. New York Times, January 12, 2018. [ .html ]
- Chico Harlan. `Bitcoin is my potential pension': What's driving people in Kentucky to join the craze. Washington Post, February 3, 2018. [ .html ]
- Ed Felten. Blockchain: What is it good for? Freedom to Tinker blog, February 26, 2018. [ http ]
- Kim Nilsson. Kleiman v Craig Wright: The bitcoins that never were. Wizsec blog, February 27, 2018. [ http ]
- Tor: Hidden Service Protocol
- Facebook, hidden services, and https certs.
- Tor: Overview
- Kenneth W. Dam and Herbert S. Lin, editors. Cryptography's Role in Securing the Information Society. National Academy Press, Washington, D.C., 1996. Executive summary only. [ http ]
- Wendy Grossman. Net.wars. New York University Press, New York, 1997. Optional. Chapters 4 and 5. [ .html ]
- Whitfield Diffie and Susan Landau. Privacy on the Line. MIT Press, Cambridge, MA, second edition, 2007. Preface, Introduction, Conclusions. [ http ]
- Bruce Schneier. Did NSA put a secret backdoor in new encryption standard? Wired, November 15, 2007. [ http ]
- Matt Blaze. Key escrow from a safe distance: Looking back at the Clipper Chip. In Proceedings of ACSAC '11, 2011. [ .pdf ]
- Matthew Green. Why can't Apple decrypt your iPhone? A Few Thoughts on Cryptographic Engineering, October 4, 2014. [ .html ]
- Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), September 2015. [ DOI | http ]
- Sheri Pym. In the matter of the search of an Apple iPhone seized during the execution of a search warrant on a black Lexus IS300, California license plate 35KGD203. United States District Court, Central District of California, February 16, 2016. No. ED 15-0451M. [ .pdf ]
- Kashmir Hill. Apple's battle with the FBI: All your questions answered. Fusion, February 22, 2016. [ http ]
- James Orenstein. In re order requiring Apple, Inc. to assist in the execution of a search warrant issued by this court. United States District Court, Eastern District of New York, February 29, 2016. Case 1:15-mc-01902-JO, Document 29. [ .pdf ]
- Susan Landau. Testimony for House Judiciary Committee hearing on “The Encryption Tightrope: Balancing Americans' security and privacy”, March 2016. [ .pdf ]
- Rod J. Rosenstein. Deputy Attorney General Rod J. Rosenstein delivers remarks on encryption at the United States Naval Academy, October 10, 2017. [ http ]
- Daniel Richman. Getting encryption onto the front burner. Lawfare, October 26, 2017. [ http ]
- Third report of the Manhattan District Attorney's Office on smartphone encryption and public safety, November 2017. [ .pdf ]
- Computer Science and Telecommunications Board. Decrypting the Encryption Debate: A Framework for Decision Makers. National Academies Press, 2018. Summary and Chapter 7 only. [ http ]
- Sean Gallagher. Cellebrite can unlock any iPhone (for some values of “any”). Ars Technica, March 01, 2018. [ http ]
- Amie Stepanovich and Michael Karanicolas. If you criminalize security, only criminals will be secure. March 2, 2018. [ http ]
- "My life as an international arms courier", Matt Blaze, January, 1995.
- "Notes on key escrow meeting with NSA", Matt Blaze, February 2, 1994
- Essay 3 (Privacy)
- Gregory Krieg and Tal Kopan. Is this the email that hacked John Podesta's account? CNN, October 30, 2016. [ http ]
- Eric Lipton, David E. Sanger, and Scott Shane. The perfect weapon: How Russian cyberpower invaded the U.S. New York Times, December 13, 2016. [ .html ]
- Matt Jones. The spy who pwned me. Limn, February 2017. [ http ]
- Eugene Kiely. Timeline of Russia investigation. FactChek.org, September 14, 2017. [ http ]
- Josh Dawsey. Russian-funded facebook ads backed Stein, Sanders and Trump. Politico, September 26, 2017. [ http ]
- Susan Landau. Russia's hybrid warriors got the White House. now they're coming for America's town halls. Lawfare, September 26, 2017. [ http ]
- Michael McFaul. Enough is enough: How to stop Russia's cyber-interference. Washington Post, September 28, 2017. [ http ]
- Jeff Stein. Russians still have an open path to U.S. election subversion. Newsweek, October 7, 2017. [ http ]
- Matea Gold and Elizabeth Dwoskin. Trump campaign's embrace of Facebook shows company's growing reach in elections. Washington Post, October 8, 2017. [ http ]
- Matea Gold and Elizabeth Dwoskin. Trump campaign's embrace of Facebook shows company's growing reach in elections. Washington Post, October 8, 2017. [ .html ]
- Nicholas Confessore and Daisuke Wakabayashi. How Russia harvested American rage to reshape U.S. politics. New York Times, October 9, 2017. [ .html ]
- Michael Morell and Mike Rogers. Russia never stopped its cyberattacks on the United States. Washington Post, December 25, 2017. [ .html ]
- Sarah Grant, Quinta Jurecic, Matthew Kahn, Matt Tait, and Benjamin Wittes. Russian influence campaign: What's in the latest Mueller indictment. Lawfare, February 16, 2018. [ http ]
- Cynthia McFadden, William M. Arkin, Kevin Monahan, and Ken Dilanian. U.S. intel: Russia compromised seven states prior to 2016 election. NBC News, February 27, 2018. [ http ]
- Matthew Rosenberg, Nicholas Confessore, and Carole Cadwalladr. How Trump consultants exploited the Facebook data of millions. New York Times, March 17, 2018. [ .html ]
- Amy X. Zhang, Scott Appling, Nick B. Adams, Martin Robbins, Aditya Ranganathan, Connie Moon Sehat, Emmanuel Vincent, Ed Bice, Sarah Emlen Metz, Norman Gilmore, Jennifer 8. Lee, Sandro Hawke, David Karger, and An Xiao Mina. A structured response to misinformation: Defining and annotating credibility indicators in news articles. In The Web Conference, Lyon, April 2018. To appear. [ .pdf ]
- Guccifer 2.0, Vice Motherboard, collected stories. Optional.
- Kim Zetter. Everything we know about Ukraine's power plant hack. Wired, January 20, 2016. [ http ]
- Sean Gallagher. US military launches cyber attacks on ISIS in Mosul, and announces it. Ars Technica, March 1, 2016. [ http ]
- David E. Sanger. Utilities cautioned about potential for a cyberattack after Ukraine's. New York Times, March 1, 2016. [ .html ]
- Kim Zetter. Inside the cunning, unprecedented hack of Ukraine's power grid. Wired, March 3, 2016. [ http ]
- Ellen Nakashima. Russian military was behind `NotPetya' cyberattack in Ukraine, CIA concludes. Washington Post, January 12, 2018. [ .html ]
- Alex Hern. Fitness tracking app gives away location of secret US army bases. Guardian, January 28, 2018. [ http ]
- Liz Sly. U.S. soldiers are revealing sensitive and dangerous information by jogging. Washington Post, January 28, 2018. [ .html ]
- Nicole Perlroth and Clifford Krauss. A cyberattack in Saudi Arabia had a deadly goal. Experts fear another try. New York Times, March 15, 2018. [ .html ]
- Nicole Perlroth and David E. Sanger. Cyberattacks put Russian fingers on the switch at power plants, U.S. says. New York Times, March 15, 2018. [ .html ]
- ACLU v. Reno, 929 F. Supp. 824 (1996). [ .html ]
- David Kravets. Rulings leave online student speech rights unresolved. Wired Threat Level blog, February 4, 2010. [ http ]
- Catherine Buni and Soraya Chemaly. The secret rules of the Internet. Verge, April 13, 2016. [ http ]
- Michael Nunez. Former facebook workers: We routinely suppressed conservative news. Gizmodo, May 9, 2016. [ http ]
- Kashmir Hill. Maybe the real Facebook suppression is of shoddy news, not conservative news. Fusion, May 11, 2016. [ http ]
- Farhad Manjoo. Facebook's bias is built-in, and bears watching. New York Times, May 11, 2016. [ .html ]
- Mike Isaac. Facebook, facing bias claims, shows how editors and algorithms guide news. New York Times, May 13, 2016. [ .html ]
- Zeynep Tufekci. It's the (democracy-poisoning) golden age of free speech. Wired, January 16, 2018. [ http ]
- Timothy B. Lee. House passes sex trafficking bill that could limit free speech online. Ars Technica, February 28, 2018. [ http ]
- EFF article on Sapient v. Geller
- EFF article on Online Policy Group v. Diebold
- Talley v. California, 362 U.S. 60 (1960). [ http ]
- McIntyre v. Ohio Election Commission, 514 U.S. 334 (1995). [ .html ]
- Sabine Helmers. A brief history of anon.penet.fi—the legendary anonymous remailer. CMC Magazine, September 1997. [ .html ]
- Carter Jernigan and Behram F.T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, October 5, 2009. [ http ]
- Sara Baker. Why online anonymity is critical for women. WMC Speech Project, March 11, 2016. [ http ]
- Karen Turner. Mass surveillance silences minority opinions, according to study. Washington Post, March 28, 2016. [ http ]
- Essay 4 (Computers and crime and/or national security)
- Nitasha Tiku and Casey Newton. Twitter ceo: 'we suck at dealing with abuse'. The Verge, February 4, 2015. [ http ]
- Kristen V. Brown. How Twitter treated death threats against me. March 22, 2016. [ http ]
- Joe Mullin. Prenda Law “copyright trolls” Steele and Hansmeier arrested. Ars Technica, December 16, 2016. [ http ]
Linkages for Good, blog posting, Dec 31, 2007.
- Cyber Civil Rights, Danielle Citron, 89 Boston University Law Review 61 (2009).
- Anonymity and traceability in cyberspace, Richard Clayton, PhD dissertation, University of Cambridge, November 2005, technical report UCAM-CL-TR-653—read Chapter 3.
- Aamna Mohdin. Facebook, Google, and Twitter have agreed to apply Germany's strict anti-hate speech law online. Quartz, December 16, 2015. [ http ]
- Tetyana Lokot. Twitter reports massive increase in Russian government's content removal requests. Global Voices, March 6, 2016. [ http ]
- Mark Scott. Google fined by French privacy regulator. New York Times, March 24, 2016. [ .html ]
- Robert Mackey. Turkey wants ban on mocking its leader enforced abroad too. The Intercept, March 30, 2016. [ http ]
- Colin George. Angela Wrightson murder: How the media fought to report the case. BBC News, April 7, 2016. [ http ]
- Michee Smith. Updating our “right to be forgotten” Transparency Report. Google blog, February 26, 2018. [ http ]
- Paul Mozur. China presses its internet censorship efforts across the globe. New York Times, March 02, 2018. [ .html ]
- Britain, Long a Libel Mecca, Reviews Laws, Sarah Lyall, New York Times, 10 December 2009.
- Threat to Web Freedom Seen in Italian Google Case, Rachel Donadio, New York Times, 24 Febuary 2010.
- Pretrial Publicity
- Dow Jones & Company Inc. v Gutnick (2002), HCA 56 (10 December 2002). (skim)
- Anderson J. Duff. `Let's take a #selfie,' said the monkey: A case of questionable copyrights. Wired, September 2014. [ http ]
- Ted Johnson. Sherlock Holmes to remain in public domain after Supreme Court declines case. Variety, November 3, 2014. [ http ]
- Jonathan Bailey. Peter Pan and the copyright that never grew up. Plagiarism Today, October 21, 2015. [ http ]
- Erik Stallman. A qualified win for cybersecurity researchers in DMCA triennial rulemaking. CDT Blog, October 27, 2015. [ http ]
- Camila Domonoske. Monkey can't own copyright to his selfie, federal judge says. NPR, January 7, 2016. [ http ]
- Zachary Crockett. How Mickey Mouse evades the public domain. Priceonomics, January 7, 2016. [ http ]
- Kevin Smith. Some radical thoughts about Sci-Hub. Scholarly Communications @ Duke, March 3, 2016. [ http ]
- Christopher Mele. “We Shall Overcome” is put in public domain in a copyright settlement. New York Times, January 26, 2018. [ .html ]
- Rebecca Flowers. Cloudflare terminates service to `the Pirate Bay of science'. Vice Motherboard, February 9, 2018. [ http ]
- Cyrus Farivar. Playboy says linking to playmate archive violates copyright, judge says no way. Ars Technica, February 16, 2018.
- NFL/DMCA, Wendy Seltzer's blog
- Death by DMCA, Fred von Lohmann and Wendy Seltzer, IEEE Spectrum, June 2006
- Frequently Asked Questions about Copyright (skim)
- Columbia Copyright Advisory Office
- A.V. v. iParadigms, 562 F.3d 630 (optional)
- Creative Commons
- Math of Publishing Meets the E-Book, New York Times, Feb 28, 2010.
- Entertainment Industry Asks White House for Vast New Internet Monitoring, Filtering, and Takedown Powers, Lauren Weinstein's blog, 25 March 2010.
- Method of exercising a cat, Kevin T. Amiss and Martin H. Abbott, U.S. patent 5,443,036, issued Aug 22, 1995.
- Business method protecting jokes, Timothy Wace Roberts, U.S. patent application 10/569,506, filed Aug 24, 2004. (skim).
- What is a Patent?, up to but not including the section titled "The United States Patent And Trademark Office"
- For Texas Instruments, Calculator Hackers Don't Add Up, D. Kushner, IEEE Spectrum 46:12, December 2009.
- Unintended Consequences: Sixteen Years under the DMCA, Electronic Frontier Foundation, September 2014. (optional)
- Coloring Book of Patents (optional)
- Essay 5 (Computers and free speech)
- Kathleen Day. 3 accused in theft of Coke secrets. Washington Post, July 6, 2006. [ .html ]
- Ben Lee. Twitter's surprising solution to the patent problem: Let employees control them. Wired, February 21, 2013. [ http ]
- Aarian Marshall. Waymo v. Uber's big question: What on Earth is a trade secret, anyway? Wired, February 6, 2018. [ http ]
- The Cathedral and the Bazaar, Eric S. Raymond.
- Blackberries and Barnyards: Patent Trolls and the Perils of Innovation, Gerard N. Magliocca, Notre Dame Law Review 82, no. 5 (2007): 1809-1838 (optional)
- The Oldest Algorithmic Patent?, blog post, Steven M. Bellovin, 21 May 2013.
- W3C Patent Policy, 5 February 2004 (skim)
- App developers withdraw from US as patent fears reach 'tipping point', Charles Arthur, The Guardian, 15 July 2011.
- Software patents—Obstacles to software development, Richard Stallman, 25 March 2002.
- "Trade Secret Protection for Source Code", July 17, 2001, Belinda M. Juran
- Rebecca Tushnet. Uber and out: court grants limited but still tricky injunction against Uber. Rebecca Tushnet's 43(B)log, February 18 2016. [ .html ]
- David Kravets. A spiritual successor to Aaron Swartz is angering publishers all over again. Ars Technica, April 3, 2016. [ http ]
- David Post. Stairway to (copyright) Heaven. Volokh Conspiracy, April 13, 2016. [ http ]
- David Post. Who owns “We Shall Overcome”? Volokh Conspiracy, April 15, 2016. [ http ]
- Ryan Merkley. You pay to read research you fund. that's ludicrous. Wired, April 18, 2016. [ http ]
- Justin T. Westbrook. Uzi Nissan spent 8 years fighting the car company with his name. he nearly lost everything to win. Jalopnik, February 22, 2018. [ http ]
- How to Choose a License for Your Work
- Filching a Good Name for Internet Use?, New York Times, 21 March 2010
- Billions Registered, Joshua Quittner, Wired Magazine 2:10, October 1994.
- From TedCruz.ca to TaylorSwift.porn: How the golden age of domain-trolling was born, Caitlin Dewey, Washington Post, 25 March 2015.
- Megan Geuss. Uber drivers are employees, California Labor Commission ruling suggests. Ars Technica, June 17, 2015. [ http ]
- David Kravets. Judge calls Uber algorithm “genius,” green-lights surge-pricing lawsuit. Ars Technica, 2016. [ http ]
- Sam Machkovech. Report: Robots, other advances will cost humans 5.1 million jobs by 2020. Ars Technica, January 18, 2016. [ http ]
- Cora Lewis and Johana Bhuiyan. What striking Uber drivers are up against. BuzzFeed, February 9, 2016. [ http ]
- Jed Kolko. Republican-leaning cities are at greater risk of job automation. FiveThirtyEIght, February 17, 2016. [ http ]
- David Kravets. Appeals court halts class action on whether Uber drivers are employees. Ars Technica, April 6, 2016. [ http ]
- Moshe Y. Vardi. Are robots job creators? New Republic, April 6, 2016. [ http ]
- Ángel González. Hands, heads and robots work in sync at Amazon warehouses. Seattle Times, April 9, 2016. [ http ]
- Cyrus Farivar. Uber settles class-action labor lawsuits in Massachusetts, California. Ars Technica, April 22, 2016. [ www: ]
- Erin Winick. Every study we could find on what automation will do to jobs, in one chart. MIT Technology Review, January 25, 2018. [ http ]
- Alexis C. Madrigal. Could self-driving trucks be good for truckers? Atlantic, February 2018. [ http ]
- Jarrett Walker. Apps are not transforming the urban transport business. Human Transit blog, February 2, 2018. [ .html ]
- Cyrus Farivar. Grubhub drivers are contractors—not employees—judge rules. Ars Technica, February 8, 2018.
- Will Startups Get Squeezed by a Tech Hiring Binge?, Matthew Ingram, New York Times, 16 April 2010
- Debunking the Myths of the Telecommute, Sylvia Marino, New York Times, 16 April 2010
- The Machines Are Coming, Zeynep Tufekci, New York Times, 18 April 2015.
- "What Clever Robots Mean for Jobs", Timothy Aeppel, Wall Street Journal, 24 February 2015. (On Courseworks.)
- Does innovation create or destroy jobs?, Vint Cerf, Communications of the ACM, December 2014.
- Could a lawsuit wreck Uber, Lyft?, Peter Hoge, Upstart Business Journal, 28 March 2015.
- Claire Cain Miller. Out of the loop in Silicon Valley. New York Times, April 18, 2010. [ .html ]
- Dana Liebelson and Tasneem Raja. Donglegate: How one brogrammer's sexist joke led to death threats and firings. Mother Jones, March 22, 2013. [ http ]
- Randy Olson. Percentage of Bachelor's degrees conferred to women, by major (1970-2012). Blog, June 14, 2014. [ http ]
- Beryl Nelson. The data on diversity. Communications of the ACM, 57(11):86–95, November 2014. [ http ]
- Melissa McEwan. The falsest of false equivalencies. Shakesville, February 20, 2015. [ .html ]
- Kristen V. Brown. Women are better at coding than men—if they hide their gender. Fusion, February 11, 2016. [ http ]
- Weiting Liu. These female developers explain how to recruit more female developers. Fast Company, April 6, 2016. [ http ]
- Barriers to the Advancement of Technical Women: A Review of the Literature, Caroline Simard, Anita Borg Institute for Women and Technology, 2007.
- Women in IT: The Facts, by NCWIT, Catherine Ashcraft and Sarah Blithe, National Center for Women & Information Technology (NCWIT), 2009.
- Gender: Integrated Report of Findings, Dawn Nafus, James Leach, and Bernhard Krieger, FLOSSPOLS Project, 2006.
- Essay 6 (Computers and intellectual property)
- Ravi Somaiya and John Herrman. Mashable announces personnel shifts and job cuts. New York Times, April 7, 2016. [ .html ]
- Dylan Byers. Buzzfeed buzzkill: Its stunning revenue miss goes viral. CNN Money, April 12, 2016. [ .html ]
- John Herrman. Media websites battle faltering ad revenue and traffic. New York Times, April 17, 2016. [ .html ]
- Jim Rutenberg. For news outlets squeezed from the middle, it's bend or bust. New York Times, April 17, 2016. [ .html ]
- Essay 7 (Computers and employment)
Risks of Computers
Guest lecturer: Bala Krishnamurthy
Guest lecturer: Jason Healey, SIPA
Freedom of Speech: Accountability
Patents; Trade Secrets
Guest lecturer: Prof. Kathy McKeown
Computers and the Media