background preloader

Digital Law and Ethics

Facebook Twitter

How Instagram Almost Ruined My Life. The World of Black-Ops Reputation Management. On November 29, 2010, federal agents in San Francisco arrested a 33-year-old New Yorker named Samuel Phineas Upham, setting in motion the chain of news reports that are responsible for Google’s auto­completing his name in the following ways: The case against Upham, who goes by “Phin,” was laid out by Preet Bharara, the financial-crime-fighting U.S.

The World of Black-Ops Reputation Management

Attorney. The indictment alleged that Phin tried to cheat the IRS by conspiring to hide over $11 ­million in Zurich at the Swiss bank UBS, and helped his mother, Sybil Nancy Upham, sneak the money into the United States. Data for the public good. Can data save the world?

Data for the public good

Not on its own. Kickstarter almost enabled a $120,000 fraud, and it’s not the first - Quartz. The Kickstarter campaign for Kobe Red beef jerky was yanked just minutes before thousands of backers lost their money Kickstarter Kickstarter just narrowly averted what would have been the biggest definitive fraud in the crowdfunding site’s history.

Kickstarter almost enabled a $120,000 fraud, and it’s not the first - Quartz

Disappointing Unsealing Decision in Aaron Swartz Case. The public lost another battle in the U.S. v.

Disappointing Unsealing Decision in Aaron Swartz Case

Aaron Swartz case, this one over transparency. On May 13, 2013, the U.S. District Court judge handling the prosecution sided with the government , the Massachusetts Institute of Technology and JSTOR and refused to make public any information in the case that any of these three entities wished to keep under seal. The ruling effectively grants the Department of Justice, MIT and JSTOR a veto over what the public gets to know about the investigation. The decision is stems from the government's controversial prosecution of Aaron Swartz, the brilliant activist and Internet pioneer, who died in January . NSA-proof encryption exists. Why doesn’t anyone use it? Computer programmers believe they know how to build cryptographic systems that are impossible for anyone, even the U.S. government, to crack.

NSA-proof encryption exists. Why doesn’t anyone use it?

So why can the NSA read your e-mail? Last week, leaks revealed that the Web sites most people use every day are sharing users' private information with the government. Companies participating in the National Security Agency's program, code-named PRISM, include Google, Facebook, Apple and Microsoft. Chicago Cubs suspend Ian Stewart 10 games for Twitter rant - ESPN Chicago. FTC Blogger Guidelines & Rules: Disclose Your Relationships. What Type of American Would You Trust to Work at the NSA? - Conor Friedersdorf. If you think of them as people, rather than abstractions, you're more likely to conclude, "no one.

What Type of American Would You Trust to Work at the NSA? - Conor Friedersdorf

" Reuters As yet, Edward Snowden is a stranger -- perhaps not to Glenn Greenwald, who has interacted with him enough to form preliminary judgments about his character, but certainly to the rest of us. All the attempts to describe him, favorably or unfavorably, are based on incomplete information. For that reason, David Brooks's attempt to understand his type should be read with skepticism. Prism and the making of our idiocracy. This is not the time for cliché or sound bite, but to paraphrase Tony Blair, I feel the hand of history (or the all-seeing electronic eye) just to the right of this keyboard.

Prism and the making of our idiocracy.

And your keyboard actually. And your webcam. Oh, and your telephone. Why we know so little about phone surveillance. By Ryan Teague Beckwith, Digital First Media Posted: 06/06/2013 09:14:39 AM PDT0 Comments|Updated: 11 months ago FILE - This Sept. 19, 2007, file photo, shows the National Security Agency building at Fort Meade, Md., during a visit by President Bush.

Why we know so little about phone surveillance

The military intelligence complex an hour outside Washington where the WikiLeaks case goes to court this week is known as a cloak-and-dagger sanctum off-limits to the rest of the world. Dark Cloud Over Academic Freedom - Commentary. By Hans Bader Recently the Education Department issued a controversial "blueprint" for dealing with sexual harassment that could expose colleges that follow it to First Amendment lawsuits and redefine every flirtation and request to go out on a date as potential sexual harassment.

Dark Cloud Over Academic Freedom - Commentary

It rejects decades of court rulings by declaring that any unwelcome speech or conduct of a sexual nature is harassment, even if it would not offend a reasonable person. The Education Department's radical new position is set forth in a May 9 letter involving the University of Montana. The department criticized the university for defining sexual harassment based on previous Supreme Court rulings, including a 1993 decision that said conduct is not harassment if it does not offend a "reasonable person," and a 1999 ruling in Davis v.

Monroe County Board of Education that emphasized that conduct must be "severe, pervasive, and objectively offensive" to constitute illegal sexual harassment under Title IX. NSA Leaks Present a Business and Ethics Crisis for Silicon Valley. The NSA’s Bluffdale, Utah, data center under construction in Nov. 2011.

NSA Leaks Present a Business and Ethics Crisis for Silicon Valley

(Photo: NSA) Late last week, as revelations about the National Security Agency’s telephone and internet data gathering programs splashed across the news, attorney Michael Overly heard from one of his clients, a consumer product company that had been looking at moving email systems to a cloud service provider. Dana Milbank: Edward Snowden’s NSA leaks are the backlash of too much secrecy. There might be a bit more sympathy for Clapper’s digestive difficulty if he hadn’t delivered a kick in the gut to the American public just three months ago. Sen. Ron Wyden (D-Ore.) asked Clapper at a Senate hearing in March, “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

“No, sir,” Clapper testified. New fair use principles show how copyright can be journalism’s friend. Fair use is an area of copyright law that’s often misunderstood — and feared. Some publishers think they have limitless rights to use any image they find on Google or social media as they wish. (They don’t.) Another common misconception is the oft-cited yet non-existent “30-second rule” — the idea that you can use up to 30 seconds of audio or video in your work without infringing on an original publisher’s copyright. Such misconceptions about fair use are all too common — and many journalists fear delving into fair use’s complexities, just wanting to know enough to keep from getting sued. Secure, Safe, and Ethical Computing. Where's the Market for Online Privacy? Why are market forces so weak in protecting users’ online privacy?

The main reason is that the online marketplace is economically structured around users being a commodity, data, to be aggregated and mined, not customers to be served and protected in a competitive marketplace. That’s because the overriding economic force that created the free and open commercial Internet – the predominant Silicon Valley venture capital/IPO value creation model – was and remains largely antithetical to protecting online privacy. The Silicon Valley venture capital/IPO driven model is laser-focused on achieving Internet audience/user scale fastest in order to gain first-mover advantage and then rapid dominance of a new product or service segment.

What is the essential critical element of achieving audience/user scale fastest? Free . Edward Snowden: The man behind the U.S. surveillance program leak. Unclear where Snowden will wind up, after leaving Hong Kong for RussiaEdward Snowden, 29, is the source of leaks over an NSA surveillance program "The public needs to decide whether these programs ... are right or wrong," he says.

Has the US become the type of nation from which you have to seek asylum? The whistleblower who disclosed classified documents regarding NSA surveillance to The Washington Post and the Guardian has gone public. He is Edward Snowden, 29, an employee of defense contractor Booz Allen Hamilton. Edward Snowden (The Guardian) Rather than face charges in the United States, Snowden has fled to Hong Kong.

'We need a Google alternative,' says Kim Dotcom. Cloud computing is a trap, warns GNU founder. Edward Snowden: the whistleblower behind the NSA surveillance revelations. The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton.

Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. The Customer's Voice. Personal Data Mining - Patent Directory, Page 1. Edge.org. Silicon Valley tech companies in uncomfortable spotlight over surveillance reports. While key details remained shrouded in secrecy Friday, this week's disclosures about a clandestine government program for tracking Internet users has placed some of Silicon Valley's biggest tech companies in an uncomfortable spotlight.

Apple, Facebook, Google and Yahoo have all denied initial reports that they gave the government wholesale access to their servers. But U.S. officials confirmed the existence of a program focused on accessing the online activity of people outside the United States, as authorized by a secretive national security court, and critics said the program could easily pull in information about U.S. users as well.

Silicon Valley tech companies in uncomfortable spotlight over surveillance reports. Where's the Market for Online Privacy? Mydex - Home. Hacking Capitalism. Personal Data Ecosystem Consortium — We connect companies that build personal control over personal data. When It Comes to Sex Trafficking, Tech Is Far From Neutral. NSA Secretly Mining Data From Google, Apple, Facebook & Others. How Lori Drew became America's most reviled mother - web - Technology.

Suicide of Megan Meier. Malwebolence - The World of Web Trolling. The Crocels Trolling Academy. The 12 Types of Internet Troller. 'Rate Your Shag' pages from Facebook after Loughborough university comment on conquests. Deadline Looms for Suspect to Decrypt Laptop, or Go Directly to Jail. Amy’s Baking Company vs. The Entire Internet.

United States v. Lori Drew. CBS Houston fires troll who attacked "fat" Thunder cheerleader. Kelsey Williams Fat Critic Claire Crawford Fired After Saying NBA Cheerleader Is ‘Too Chunky’ To Wear Oklahoma City Thunder Uniform. TOWN OF SEWALL POINT v. RHODES, No. 4D02-2184., August 27, 2003 - FL District Court of Appeal. Digital Ethics Objectives. Digital Law Objectives. State Law: Retractions. Manager loses job over Houston blogger's bashing of cheerleader. Gelflog - Who Deserves Anonymity? Harper & Row v. Nation Enterprises. SALINGER v. RANDOM HOUSE, INC., 811 F.2d 90 (2nd Cir. 1987) (LOISLAW) Harper & Row v. Nation Enterprises - 471 U.S. 539 (1985)

Online copyright infringement

Unit 3 - "Intrusion and Newsgathering" A New Bill in Florida Would Make Non-Consensual ‘Revenge Porn’ a Felony. Ex-CEO, husband face charges in U.K. phone hacking scandal. The landmark Food Lion case. Paths to justice for survivors of online harassment. The Battle Over Revenge Porn: Can Hunter Moore, the Web’s Vilest Entrepreneur, Be Stopped? A Victim Speaks: Standing Up to a Revenge Porn Tormentor. How to Fight Revenge Porn. Keynote: Chief Judge Alex Kozinski. Week 1 Module - Systems. Articulate Ethical Responsibilities. Make No Law: The Sullivan Case and the First Amendment (9780679739395): Anthony Lewis. Snyder v. Phelps. Week 2 Module - Theory of Press Law. Week 3 Module - Cases!!! Hulk Hogan loses bid for sex tape injunction. Gawker. Even for a Minute, Watching Hulk Hogan Have Sex in a Canopy Bed is Not Safe For Work but Watch it Anyway.

Week 5 Module - Technology as Liberator. U.S. accuses cyber exchange of laundering $6 billion. WikiLeaks' donations barely enough to keep the servers running. Is Strongbox the New Wikileaks? Hackers Are Spying On You: Inside the World of Digital Espionage. WikiLeaks party flirts with Oz law by taking Bitcoin gifts. We Steal Secrets: The Story of Wikileaks. Week 4 Module - Government Action Aimed at Content. Phone Records of Journalists of The Associated Press Seized by U.S. Inside the AP: Fear, determination - Dylan Byers and Katie Glueck. Gov't obtains wide AP phone records in probe. Leaks Inquiries Show How Wide a Net Is Cast. Journalists fume over DOJ raid on AP - Mackenzie Weinger.

Reporters See Chilling Effect From Justice Dept. Inquiries.