THIS WILL CHANGE

The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).

The readings, if you go out more than a lecture or two, are almost certainly wrong.



Ethics

Wednesday, January 17: Introduction; Administrative Issues
Readings:
  • Text, Chapter 1
Monday, January 22: Ethics I
Readings:
  • Paul Berg, David Baltimore, Sydney Brenner, Richard O. Roblin, and Maxine F. Singer. Summary statement of the Asilomar Conference on Recombinant DNA Molecules. 72(6):1981--1984, June 1975. [ .pdf ]
  • Philip M. Boffey. Software seen as obstacle in developing `Star Wars'. New York Times, September 16, 1986. [ .html ]
  • Text, chapter 9
  • U.S. Public Health Service Syphilis Study at Tuskegee", Center for Disease Control.
  • Institutional Review Board Guidebook, Introduction, Office of Human Subjects Research, Department of Health and Human Services.
  • Patent GB630726, "Improvements in or relating to the transmutation of chemical elements", March 30, 1936 (optional)
Wednesday, January 24: Ethics 2
Readings:
  • David L. Parnas. Software aspects of strategic defense systems. Communications of the ACM, 28(12), December 1985. [ http ]
  • Stanley Fish. Why we built the ivory tower. New York Times, May 21, 2004. [ http ]
  • Kim Zetter. A unprecedented look at Stuxnet, the world's first digital weapon. Wired, November 3, 2014. [ http ]
  • Phillip Rogaway. The moral character of cryptographic work, 2015. [ .pdf ]
  • David Kravets. Ethics charges filed against DOJ lawyer who exposed Bush-era surveillance. Ars Technica, January 26, 2016. [ http ]
  • Howard Berkes. 30 years after disaster, challenger engineer still blames himself. NPR, January 28, 2016. [ http ]
  • John Markoff. Apple's engineers, if defiant, would be in sync with ethics code. New York Times, March 18, 2016. [ .html ]
  • Howard Berkes. Challenger engineer who warned of shuttle disaster dies. NPR, March 21, 2016. [ http ]
  • ACM Code of Ethis
  • ACM Software Engineering Code of Ethics
  • IEEE Code of Ethics
  • SAGE/LOPSA/Usenix System Administrators' Code of Ethics
Monday, January 29: Corporations and Ethics
Readings:
  • Chloe Albanesius. Hp responds to claim of `racist' webcams. PC Magazine, December 22, 2009. [ http ]
  • Michael Schrage. Big data's dangerous new era of discrimination. Harvard Business Review, January 29, 2014. [ http ]
  • Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, and Huang Lin. Discovering unwarranted associations in data-driven applications with the FairTest testing toolkit, 2015. [ http ]
  • Jacob Brogan. Google scrambles after software ids photo of two black people as `gorillas'. Slate (Future Tense blog), June 30, 2015. [ .html ]
  • Amit Datta, Michael Carl Tschantz, and Anupam Datta. Automated experiments on ad privacy settings: A tale of opacity, choice, and discrimination. In Proceedings of Privacy Enhancing Technologies Symposium,, July 2015. [ .pdf ]
  • Jonathan M. Gitlin. VW says rulebreaking culture at root of emissions scandal. Ars Technica, December 10, 2015. [ http ]
  • Roland L. Trope and Eugene K. Ressler. Mettle fatigue: VW's single-point-of-failure ethics. IEEE Computer, 14(1):12--30, Jan--Feb 2016. [ .pdf ]
  • Danielle Ivory and Hiroko Tabuchijan. Takata emails show brash exchanges about data tampering. New York Times, January 4, 2016. [ http ]
  • Nicholas Diakopoulos. Accountability in algorithmic decision-making. ACMqueue, January 25, 2016. [ http ]
  • Megan Geuss. Volkswagen details what top management knew leading up to emissions revelations. Ars Technica, March 3, 2016. [ http ]
  • Clare Garvie and Jonathan Frankle. Facial-recognition software might have a racial bias problem. Atlantic, April 2016. [ http ]
  • Executive Office of the President. Big data: A report on algorithmic systems, May 2016. [ .pdf ]


Risks of Computers

Wednesday, January 31: Risks of Computers
Readings:
Monday, February 05: Risks: Security
Readings:
Wednesday, February 07: Risks: Electronic Voting Machines
Readings:
Monday, February 12: Risks: What Do We Do?
Readings:
  • James C. McGroddy and Herbert S. Lin, editors. The FBI's Trilogy Information Technology Modernization Program---Summary. National Academies, May 2004. [ http ]
  • Eric Knorr. Anatomy of an IT disaster: How the FBI blew it. InfoWorld, March 21, 2005. [ .html ]
  • Susan Carey. United's merger turbulence hits elite frequent fliers. Wall Street Journal, May 24, 2012. [ http ]
  • J.W. Israel. Why the FBI can't build a case management system. Computer, 45(6):73--80, June 2012. [ http ]
  • Nathaniel Popper and Neil Goughapril. Bloomberg terminals suffer widespread failures. New York Times, April 17, 2015. [ .html ]


Privacy

Wednesday, February 14: What is Privacy?
Readings:
Monday, February 19: Social Networks
Wednesday, February 21: Machine Learning
(guest lecturer)
Monday, February 26: Online Behavior
Readings:
  • January W. Payne. Hey, you're breaking up on me! Washington Post, February 13, 2007. [ .html ]
  • Kim Zetter. Judge acquits Lori Drew in cyberbullying case, overrules jury. Wired, July 2, 2007. [ http ]
  • Kevin Poulsen. Hackers assault epilepsy patients via computer. Wired, March 28, 2008. [ http ]
  • Danielle Citron. Law's expressive value in combating cyber gender harassment. Michigan Law Review, 108:373--416, 2009. (Optional). [ http ]
  • Charles H. Antin. The boundaries of a breakup. New York Times, November 20, 2009. [ .html ]
  • Bruce Bower. Facebook users keep it real in online profiles. Science News, February 26, 2010. [ http ]
  • Beth Teitell and Callum Borchers. GamerGate anger at women all too real for gamemaker. Boston Globe, October 30 2014. [ .html ]
  • Jonathan Mahler. Who spewed that abuse? anonymous Yik Yak app isn't telling. New York Times, March 8, 2015. [ http ]
  • Miranda Katz. 2 long island teens arrested, 20 suspended over sexting incident. Gothamist, November 10, 2015. [ http ]
  • Justin Jouvenal. A 12-year-old girl is facing criminal charges for using emoji, and she's not the only one. Washington Post, February 27, 2016. [ http ]
  • Penelope Green. The Facebook breakup. New York Times, March 12, 2016. [ .html ]
  • Caitlin Dewey. In the battle of Internet mobs vs. the law, the Internet mobs have won. Washington Post, February 17, 2017. [ http ]


Crime/National Security

Wednesday, February 28: Wiretapping and Eavesdropping
Readings:
  • Steven M. Bellovin. Wiretapping the Net. The Bridge, 20(2):21--26, Summer 2000. [ .pdf ]
  • Steven M. Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vint Cerf, Whitfield Diffie, Susan Landau, Jon Peterson, and John Treichler. Security implications of applying the Communications Assistance to Law Enforcement Act to Voice over IP, 2006. [ .pdf ]
  • Vassilis Prevelakis and Diomidis Spinellis. The Athens affair. IEEE Spectrum, 44(7):26--33, July 2007. [ http ]
  • Elizabeth Weise. Hey, Siri and Alexa: Let's talk privacy practices. USA Today, March 2, 2016. [ http ]
  • Katz v. United States, 389 U.S. 347 (1967). Read all five opinions.
  • Smith v. Maryland, 442 U.S. 735 (1979).
Monday, March 05: The Crypto Wars
Readings:
  • Kenneth W. Dam and Herbert S. Lin, editors. Cryptography's Role in Securing the Information Society. National Academy Press, Washington, D.C., 1996. Executive summary only. [ http ]
  • Whitfield Diffie and Susan Landau. Privacy on the Line. MIT Press, Cambridge, MA, second edition, 2007. Preface, Introduction, Conclusions. [ .pdf ]
  • Bruce Schneier. Did NSA put a secret backdoor in new encryption standard? Wired, November 15, 2007. [ http ]
  • Matt Blaze. Key escrow from a safe distance: Looking back at the Clipper Chip. In Proceedings of ACSAC '11, 2011. [ .pdf ]
  • Matthew Green. Why can't Apple decrypt your iPhone? A Few Thoughts on Cryptographic Engineering, October 4, 2014. [ .html ]
  • Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), September 2015. [ DOI | http ]
  • Sheri Pym. In the matter of the search of an Apple iPhone seized during the execution of a search warrant on a black Lexus IS300, California license plate 35KGD203. United States District Court, Central District of California, February 16, 2016. No. ED 15-0451M. [ .pdf ]
  • Kashmir Hill. Apple's battle with the FBI: All your questions answered. Fusion, February 22, 2016. [ http ]
  • James Orenstein. In re order requiring Apple, Inc. to assist in the execution of a search warrant issued by this court. United States District Court, Eastern District of New York, February 29, 2016. Case 1:15-mc-01902-JO, Document 29. [ .pdf ]
  • Susan Landau. Testimony for House Judiciary Committee hearing on “The Encryption Tightrope: Balancing Americans' security and privacy”, March 2016. [ .pdf ]
  • "My life as an international arms courier", Matt Blaze, January, 1995.
  • "Notes on key escrow meeting with NSA", Matt Blaze, February 2, 1994
  • "Report of the Manhattan District Attorney's Office on Smartphone Encryption and Public Safety", November 2015
Wednesday, March 07: Cyber War
(guest lecturer) Readings:
  • Kim Zetter. Everything we know about ukraine's power plant hack. Wired, January 20, 2016. [ http ]
  • Sean Gallagher. US military launches cyber attacks on ISIS in Mosul, and announces it. Ars Technica, March 1, 2016. [ http ]
  • David E. Sanger. Utilities cautioned about potential for a cyberattack after Ukraine's. New York Times, March 1, 2016. [ .html ]
  • Kim Zetter. Inside the cunning, unprecedented hack of Ukraine's power grid. Wired, March 3, 2016. [ http ]
Monday, March 19: The Dark Web
Readings:
  • P F Syverson, D M Goldschlag, and M G Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44--54, Oakland, California, 4--7 1997. [ .html ]
  • Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004. [ http ]
  • Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2009. [ .pdf ]
  • Andy Greenberg. Why Facebook just launched its own `Dark Web' site. Wired, October 31, 2014. [ http ]
  • Carl Franzen. Facebook just created a new Tor link for users who wish to remain anonymous. The Verge, October 31, 2014. [ http ]
  • Alec D. E. Muffett. Making connections to Facebook more secure. Facebook, October 31, 2014. [ http ]
  • Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part I. Wired, April 2015. [ http ]
  • Joshuah Bearman and Tomer Hanuka. The rise & fall of Silk Road, Part II. Wired, May 2015. [ http ]
  • Cyrus Farivar and Sean Gallagher. Feds bust through huge Tor-hidden child porn site using questionable malware. Ars Technica, July 16, 2015. [ http ]
  • Joseph Cox. The FBI's `unprecedented” hacking campaign targeted over a thousand computers. Vice, January 5, 2016. [ http ]
  • Nick Hagar, Geordan Tilley, Alex Duner, and Nicolas Rivero. A wave of non-criminal users is joining the dark web and stepping into the middle of a privacy battle. Caught in the Crossfire, March 10, 2016. [ http ]
  • Tor: Hidden Service Protocol
  • Facebook, hidden services, and https certs.
  • Tor: Overview


Free Speech

Wednesday, March 21: Freedom of Speech
Readings:
Monday, March 26: Freedom of Speech: Anonymity
Readings:
  • Sabine Helmers. A brief history of anon.penet.fi---the legendary anonymous remailer. CMC Magazine, September 1997. [ .html ]
  • Carter Jernigan and Behram F.T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, October 5, 2009. [ http ]
  • Sara Baker. Why online anonymity is critical for women. WMC Speech Project, March 11, 2016. [ http ]
  • Karen Turner. ass surveillance silences minority opinions, according to study. Washington Post, March 28, 2016. [ http ]
  • McIntyre v. Ohio Election Commission, 514 U.S. 334 (1995)
  • TALLEY v. CALIFORNIA, 362 U.S. 60 (1960)
Wednesday, March 28: Freedom of Speech: Accountability
Readings:
Monday, April 02: Freedom of Speech: Crossing Borders
Readings:
  • Aamna Mohdin. Facebook, Google, and Twitter have agreed to apply Germany's strict anti-hate speech law online. Quartz, December 16, 2015. [ http ]
  • Tetyana Lokot. Twitter reports massive increase in Russian government's content removal requests. Global Voices, March 6, 2016. [ http ]
  • Mark Scott. Google fined by French privacy regulator. New York Times, March 24, 2016. [ .html ]
  • Robert Mackey. Turkey wants ban on mocking its leader enforced abroad too. The Intercept, March 30, 2016. [ http ]
  • Colin George. Angela Wrightson murder: How the media fought to report the case. BBC News, April 7, 2016. [ http ]
  • Britain, Long a Libel Mecca, Reviews Laws, Sarah Lyall, New York Times, 10 December 2009.
  • Threat to Web Freedom Seen in Italian Google Case, Rachel Donadio, New York Times, 24 Febuary 2010.
  • Pretrial Publicity
  • Dow Jones & Company Inc. v Gutnick (2002), HCA 56 (10 December 2002). (skim)


Intellectual Property

Wednesday, April 04: Copyrights
Readings:
  • Anderson J. Duff. `Let's take a #selfie,' said the monkey: A case of questionable copyrights. Wired, September 2014. [ http ]
  • Ted Johnson. Sherlock Holmes to remain in public domain after Supreme Court declines case. Variety, November 3, 2014. [ http ]
  • Jonathan Bailey. Peter Pan and the copyright that never grew up. Plagiarism Today, October 21, 2015. [ http ]
  • Erik Stallman. A qualified win for cybersecurity researchers in DMCA triennial rulemaking. CDT Blog, October 27, 2015. [ http ]
  • Camila Domonoske. Monkey can't own copyright to his selfie, federal judge says. NPR, January 7, 2016. [ http ]
  • Zachary Crockett. How Mickey Mouse evades the public domain. Priceonomics, January 7, 2016. [ http ]
  • Kevin Smith. Some radical thoughts about Sci-Hub. Scholarly Communications @ Duke, March 3, 2016. [ http ]
  • Textbook, chapter 4
  • NFL/DMCA, Wendy Seltzer's blog
  • Death by DMCA, Fred von Lohmann and Wendy Seltzer, IEEE Spectrum, June 2006
  • Frequently Asked Questions about Copyright (skim)
  • Columbia Copyright Advisory Office
  • A.V. v. iParadigms, 562 F.3d 630 (optional)
  • Creative Commons
Monday, April 09: Patents
(guest lecture: Eugene Goryunov) Readings:
Wednesday, April 11: Patents; Trade Secrets
Readings:
Monday, April 16: Intellectual Property: Trademarks
Readings:


Employment

Wednesday, April 18: Employment
Readings:
  • Megan Geuss. Uber drivers are employees, California Labor Commission ruling suggests. Ars Technica, June 17, 2015. [ http ]
  • David Kravets. Judge calls Uber algorithm “genius,” green-lights surge-pricing lawsuit. Ars Technica, 2016. [ http ]
  • Sam Machkovech. Report: Robots, other advances will cost humans 5.1 million jobs by 2020. Ars Technica, January 18, 2016. [ http ]
  • Cora Lewis and Johana Bhuiyan. What striking Uber drivers are up against. BuzzFeed, February 9, 2016. [ http ]
  • Jed Kolko. Republican-leaning cities are at greater risk of job automation. FiveThirtyEIght, February 17, 2016. [ http ]
  • David Kravets. Appeals court halts class action on whether Uber drivers are employees. Ars Technica, April 6, 2016. [ http ]
  • Moshe Y. Vardi. Are robots job creators? New Republic, April 6, 2016. [ http ]
  • Ángel González. Hands, heads and robots work in sync at Amazon warehouses. Seattle Times, April 9, 2016. [ http ]
  • Cyrus Farivar. Uber settles class-action labor lawsuits in Massachusetts, California. Ars Technica, April 22, 2016. [ www: ]
  • Textbook, chapter 6
  • Will Startups Get Squeezed by a Tech Hiring Binge?, Matthew Ingram, New York Times, 16 April 2010
  • Debunking the Myths of the Telecommute, Sylvia Marino, New York Times, 16 April 2010
  • The Machines Are Coming, Zeynep Tufekci, New York Times, 18 April 2015.
  • "What Clever Robots Mean for Jobs", Timothy Aeppel, Wall Street Journal, 24 February 2015. (On Courseworks.)
  • Does innovation create or destroy jobs?, Vint Cerf, Communications of the ACM, December 2014.
  • Could a lawsuit wreck Uber, Lyft?, Peter Hoge, Upstart Business Journal, 28 March 2015.
Monday, April 23: Computers and the Media
(guest lecturer) Readings:
  • Ravi Somaiya and John Herrman. Mashable announces personnel shifts and job cuts. New York Times, April 7, 2016. [ .html ]
  • Dylan Byers. Buzzfeed buzzkill: Its stunning revenue miss goes viral. CNN Money, April 12, 2016. [ .html ]
  • John Herrman. Media websites battle faltering ad revenue and traffic. New York Times, April 17, 2016. [ .html ]
  • Jim Rutenberg. For news outlets squeezed from the middle, it's bend or bust. New York Times, April 17, 2016. [ .html ]
Wednesday, April 25: Gender Issues
Guest lecturer: Prof. Kathy McKeown Readings:
  • Claire Cain Miller. Out of the loop in Silicon Valley. New York Times, April 18, 2010. [ .html ]
  • Dana Liebelson and Tasneem Raja. Donglegate: How one brogrammer's sexist joke led to death threats and firings. Mother Jones, March 22, 2013. [ http ]
  • Randy Olson. Percentage of Bachelor's degrees conferred to women, by major (1970-2012). Blog, June 14, 2014. [ http ]
  • Beryl Nelson. The data on diversity. Communications of the ACM, 57(11):86--95, November 2014. [ http ]
  • Melissa McEwan. The falsest of false equivalencies. Shakesville, February 20, 2015. [ .html ]
  • Kristen V. Brown. Women are better at coding than men---if they hide their gender. Fusion, February 11, 2016. [ http ]
  • Weiting Liu. These female developers explain how to recruit more female developers. Fast Company, April 6, 2016. [ http ]
  • Barriers to the Advancement of Technical Women: A Review of the Literature, Caroline Simard, Anita Borg Institute for Women and Technology, 2007.
  • Women in IT: The Facts, by NCWIT, Catherine Ashcraft and Sarah Blithe, National Center for Women & Information Technology (NCWIT), 2009.
  • Gender: Integrated Report of Findings, Dawn Nafus, James Leach, and Bernhard Krieger, FLOSSPOLS Project, 2006.
Monday, April 30: Wrapup