CMPUT 300 - Winter 2012

Computers and Society

colossus-560-thumb-560xauto-28556.jpg

 

Colossus: The Forbin Project (produced in 1969 though released in 1970) is an American science fiction thriller film. It is based upon the 1966 novel Colossus, by Dennis Feltham Jones, about a massive American defence computer named Colossus becoming sentient and deciding to assume world control. See Internet Archive Version

 

Course Home

Lectures

Assignments

Submitting Homework

The lectures and readings listed here are subject to change.

 

January 11: Introduction

o   Textbook, Chapter 1

o   The power of nightmare (Adam Curtis)

o   The trap-BBC

January 18: Google versus China: Ethnical Issues

o   Google's announcement

o   Brian Krebs' summary

o   Wired Threat Level on the attacks

o   Vast Spy System Loots Computers in 103 Countries, New York Times, March 28, 2009

o   Wikipedia story

January 25: Ethics I - What is ethics?

o   Textbook, chapter 9

o   Is wikileak ethical?

o   Paul Berg, David Baltimore, Sydney Brenner, Richard O. Roblin, and Maxine F. Singer, Summary Statement of the Asilomar Conference on Recombinant DNA Molecules PNAS 72:6, June 1975.

o   David L. Parnas, "Software aspects of strategic defense systems", Comm. ACM 28:12, December 1985.

o   Philip M. Boffey, Software Seen as Obstacle in Developing 'Star Wars', New York Times, September 16, 1986.

o   Robot Wars-Drones, robots & the future of military

February 01: Ethics II - Codes of ethics

o   ACM Code of Ethics

o   ACM Software Engineering Code of Ethics

o   IEEE Code of Ethics

o   SAGE/LOPSA/Usenix System Administrators' Code of Ethics

February 08: What is Privacy?

o   The Transparent Society, David Brin, Wired Magazine 4:12, Dec. 1996.

o   Cyberspace Privacy: A Primer and Proposal, Jerry Kang, Human Rights Magazine 26:1, winter 1999.

o   The Right to Privacy, Samuel Warren and Louis D. Brandeis, 4 Harvard Law Review 193 (1890)

o   The Perfect Scan

o   Dr. Fun

o   What's in the driver's license bar code?

o   Textbook, chapter 2

February 15: Privacy-Wiretapping and Eavesdropping

o   Katz v. United States, 389 U.S. 347 (1967). Read all five opinions.

o   Smith v. Maryland, 442 U.S. 735 (1979). Wiretapping the Net", Steven M. Bellovin, The Bridge, 20(2):21-26, Summer 2000. The Athens Affair, Vassilis Prevelakis and Diomidis Spinellis, IEEE Spectrum, July 2007.

o   Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, Steven Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vinton Cerf, Whitfield Diffie, Susan Landau, Jon Peterson, and John Treichler, June 2006.

o   Carrier IQ

February 22: Reading Week

February 29: Privacy-Legal Issues

o   Ordering Pizza, ACLU. (Note: blatant propaganda piece...)

o   FBI wants records kept of Web sites visited, Declan McCullagh, CNET News, Feb 5, 2010.

o   Obama's Nominee for T.S.A. Withdraws, New York Times, Jan 20, 2010.

o   Identifying John Doe: It might be easier than you think, blog posting, Feb 8, 2010.

o   What Third Parties Know About John Doe, blog posting, Feb 9, 2010.

o   The Traceability of an Anonymous Online Comment, blog posting, Feb 10, 2010.

o   Google Buzz: Privacy nightmare, CNET blog posting, Feb 10, 2010

March 7-14: Freedom of Speech and e-Democracy

o   Textbook, chapter 3

o   ACLU v. Reno, 929 F. Supp. 824 (1996)

o   EFF article on Sapient v. Geller

o   EFF article on Online Policy Group v. Diebold

o   Rulings Leave Online Student Speech Rights Unresolved, Wired Threat Level blog, Feb. 4, 2010.

o   Tor: Overview

o   Exploiting Linkages for Good, blog posting, Dec 31, 2007.

o   Cyber Civil Rights, Danielle Citron, 89 Boston University Law Review 61 (2009). (Related article that isn't required reading: Law's Expressive Value in Combating Cyber Gender Harassment, Danielle Citron, 108 Michigan Law Review 373 (2009).)

o   The case of wikileak

o   Anonymity and traceability in cyberspace, Richard Clayton, PhD dissertation, University of Cambridge, November 2005, technical report UCAM-CL-TR-653 — read Chapter 3.

o   Britain, Long a Libel Mecca, Reviews Laws, Sarah Lyall, New York Times, 10 December 2009.

o   Threat to Web Freedom Seen in Italian Google Case, Rachel Donadio, New York Times, 24 Febuary 2010.

o   Pretrial Publicity

o   Dow Jones & Company Inc. v Gutnick [2002], HCA 56 (10 December 2002). (skim)

March 21: Social Networks

o   Hackers Assault Epilepsy Patients via Computer, Wired Magazine, 28 March 2008.

o   Judge Acquits Lori Drew in Cyberbullying Case, Overrules Jury, Wired Magazine, 2 July 2009.

o   Facebook Users Keep it Real in Online Profiles, Science News, 26 February 2010

o   Hey, You're Breaking Up on Me!, Washington Post, 13 February 2007.

o   The Boundaries of a Breakup, New York Times, 20 November 2009.

o   Israeli Raid Canceled After Facebook Leak, Robert Mackey, New York Times Lede Blog, 3 March 2010.

o   Project 'Gaydar', Carolyn Y. Johnson, Boston Globe, 20 September 2009.

o   I Am Here: One Man's Experiment With the Location-Aware Lifestyle, Mathew Honan, Wired Magazine, 19 January 2009.

o   FTC Warns of Data Breaches from P2P File Sharing, Brian Prince, eWeek, 23 February 2010.

o   S. 3027, P2P Cyber Protection and Informed User Act, 111th Congress.

o   Facebook tosses graph privacy into the bin, Joseph Bonneau, Light Blue Touchpaper blog, 11 December 2009.

o   What Does Facebook's Privacy Transition Mean For You?, ACLU.

March 28: Intellectual Property

o   Filching a Good Name for Internet Use?, New York Times, 21 March 2010

o   Billions Registered, Joshua Quittner, Wired Magazine 2:10, October 1994.

o   Textbook, chapter 4

o   NFL/DMCA, Wendy Seltzer's blog

o   Death by DMCA, Fred von Lohmann and Wendy Seltzer, IEEE Spectrum, June 2006

o   Frequently Asked Questions about Copyright (skim)

o   Math of Publishing Meets the E-Book, New York Times, Feb 28, 2010.

o   Entertainment Industry Asks White House for Vast New Internet Monitoring, Filtering, and Takedown Powers, Lauren Weinstein's blog, 25 March 2010.

o   Method of exercising a cat, Kevin T. Amiss and Martin H. Abbott, U.S. patent 5,443,036, issued Aug 22, 1995.

o   Business method protecting jokes, Timothy Wace Roberts, U.S. patent application 10/569,506, filed Aug 24, 2004.

o   What is a Patent?, up to but not including the section titled "The United States Patent And Trademark Office"

o   For Texas Instruments, Calculator Hackers Don't Add Up, D. Kushner, IEEE Spectrum 46:12, December 2009.

o   Unintended Consequences: Twelve Years under the DMCA, Electronic Frontier Foundation, March 2010.

April 4-11: Risks/Benefits of Computers

o   Textbook, chapter 8

o   An Experimental Evaluation of the Assumption of Independence in Multi-Version Programming, John Knight and Nancy Leveson, IEEE Transactions on Software Engineering SE-12:1, January 1986, pp. 96-109.

o   Analysis of faults in an N-version software experiment, S.S. Brilliant, J.C. Knight, and N.G. Leveson, IEEE Transactions on Software Engineering 16:2, February 1990. (optional)

o   The Bug Heard 'Round the World, Jack Garman, ACM Software Engineering Notes, October, 1981, pp. 3-10.

o   Vulnerabilities of network control protocols: an example, Eric C. Rosen, ACM SIGCOMM Computer Communication Review 11:3, July 1981.

o   Who Needs Hackers?, John Schwartz, New York Times, September 12, 2007.

o   Technical background on AT&T's network slowdown, January 15, 1990

o   Prius software problems? Is the Prius stopping or stalling on the Highway?, October 13, 2005.

o   Going Ballistic! A hacker tourist explores the deep recesses of fabled Air Force stronghold Cheyenne Mountain, where the Cold War never stops., Phil Patton, Wired magazine 7:11, November 1999.

o   20 Mishaps That Might Have Started Accidental Nuclear War, Alan F. Phillips. See #18 and #19.

o   'I Had A Funny Feeling in My Gut', David Hoffman, Washington Post Foreign Service, February 10, 1999.

o   History's Worst Software Bugs, Simson Garfinkel, Wired magazine, November 2005.

o   50 Plus Blue Screen of Death Displays in Public, Hiroshi, 14 June 2009.

o   An ACM Digital Library error, which I got while working on this lecture...

o   Hacking the Hill, Shane Harris, National Journal Magazine, Dec. 20, 2008.

o   Researchers Trace Data Theft to Intruders in China, John Markoff and David Barboza, New York Times, April 5, 2010.

o   Jan. 28, 2001: Hey, Don’t Tampa With My Privacy, Ryan Singel, Wired Magazine, This Day In Tech: Events That Shaped the Wired World, Jan 28, 2010.

o   Police secretly snapping up to 14m drivers a day, Times Online, April 4, 2010.

o   Analysis of an Electronic Voting System, Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Proc. IEEE Symposium on Security and Privacy (May, 2004).

o   Project EVEREST Evaluation and Validation of Election Related Equipment, Standards and Testing, December 2007 (optional).

o   Top-to-Bottom Review (optional)

o   Hacking Democracy, HBO film (optional)

o   Anatomy of an IT disaster: How the FBI blew it, InfoWorld, 21 March 2005

o   Guest View: It's Not Too Late to Learn, James Shore, Software Development Times on the Web, 15 August 2005.

o   The FBI Trilogy Information Technology Modernization Program - Summary, Computer Science and Telecommunications Board, National Academies, May 2004.

o   IRS trudges on with aging computers, CNET News, 12 April 2007.

Version March 8, 2012