Computer Ethics, Spring 2017
Comm 010, 4:15-6:45 Thursdays
Class 5
Week 5 Readings
Feb 16
Start reading chapter 2, on privacy.
News
Can it be illegal for you to read the law? (Unless you pay for it.) www.washingtonpost.com/news/volokh-conspiracy/wp/2017/02/08/can-you-hold-copyright-in-federal-law.
Note that the author of this post is David "if seven million people are
stealing, they're not stealing" Post.
Bill Binney, second-most famous NSA whistleblower, on NSA
spying: repubblica.it/esteri/2017/02/11/news/usa_nsa_bill_binney_integrale_eng-158062766/.
Published in Italy; too hot for the US press?
Can you be made to unlock your smartphone at border crossings? washingtonpost.com/news/volokh-conspiracy/wp/2017/02/13/can-federal-agents-detain-citizens-at-border-checkpoints-until-they-disclose-their-smartphone-passcodes
Police are stocking up on cellphone-spying tools: citylab.com/crime/2017/02/cellphone-spy-tools-have-flooded-local-police-departments/512543.
A slightly over-the-top story entitled The
Rise of the Weaponized AI Propaganda Machine. As used by the Trump
campaign in 2016; the idea is that the campaign could target voters on the
issues tailored not just to their concerns, but also to their personality.
The Obama campaign in 2008 established detailed maps of voter interests and
issues, though, as well.
Browser fingerprinting has moved to web-based machine
fingerprinting. That is, you can be identified as an individual even if you
use multiple browsers: arstechnica.com/security/2017/02/now-sites-can-fingerprint-you-online-even-when-you-use-multiple-browsers.
For your first paper (all of them actually, but especially the first), I
strongly recommend not submitting in .pdf format. I cannot
easily add comments to pdf files, which means you get less feedback.
If you want your papers encrypted when I return them, let me know. You'll
need to install GPG, and send me your
public key. I'll use that to encrypt your paper before
returning it.
A key is created with
gpg --gen-key. It may take some time. You'll be asked to enter your
email address as your identifier.
To export your own public key, use gpg
--export your_email_addr. Add the -a option for easier
manageability as text. You'll need to send this public key to me.
Privacy