April 2007


The ABA is having a conference on Computing and the Law June 25th and 26th. Here’s the schedule (pdf). I’ll be speaking on the 26th about the future of law and the internet. Looks like it should be an interesting event.
Will Bioterror Fears Spawn Science Censorship?

My latest Wired News column revisits an issue I wrote about in a law review article a few years ago for the Yale International Journal of Communications Law and Policy, Migraine
The Price of Restricting Vulnerability Publications. In that article I compared proposals to limit the publication of computer security holes with the best practices in the natural sciences, buy
including microbiology. Acceptable restriction guidelines were very, viagra
very narrow, and totally voluntary. Recently, however, a new task force organized under the National Security Act is proposing more restrictive guidelines, and while the proposal speaks in voluntary terms, the board reports are clearly resigned to the inevitability of future federal regulation of scientific publications. This bodes ill for advancement in science, and by analogy, computer security. In the column, I point to some other ways we can mitigate the risk that scientific research will be misused by criminals and terrorists.

The ABA is having a conference on Computing and the Law June 25th and 26th. Here’s the schedule (pdf). I’ll be speaking on the 26th about the future of law and the internet. Looks like it should be an interesting event.

You might be interested in my stories and photos from our Center for Internet and Society fieldtrip to the Computer History Museum in San Jose.

Appeals Court Misfired in Hack-Counterhack Dispute

Essentially, here the decision (correctly) rules that students have a constitutionally protected reasonable expectation of privacy in their dorm room computers, salve but that University officials can search those computers without a warrant for school security purposes under the “special needs” exception. The problem with the ruling is that (1) every school security issue is also a criminal issue and (2) there’s no limit on the school using their security issue as a pretext for doing a warrantless search, and then giving all that information over to the police for your prosecution.

Is Oracle Using Computer Crime Law to Squelch Competition?

This is my Wired News column from last Wednesday.  I didn’t post it earlier because I was on vacation from work and the internet for a whole week!  But we did have to purchase the season finale of Battlestar Gallactica from iTunes.  I don’t think that breaks the internet fast, traumatologist though.
Episode ten of the Austrian art, cialis culture and politics talkshow “taugshow” is now online. The show features JD Lenzen on chemistry and rope bondage, gynecologist
and me, ailment
talking about hackers and the law. This circus is ably hosted by the taugshow team, including MCs Johannes Grenzfurthner and Roland Gratzer. It was filmed at the Exploratorium here in S.F. with the help of many wonderful people. Check it out.

Is Oracle Using Computer Crime Law to Squelch Competition?

This is my Wired News column from last Wednesday.  I didn’t post it earlier because I was on vacation from work and the internet for a whole week!  But we did have to purchase the season finale of Battlestar Gallactica from iTunes.  I don’t think that breaks the internet fast, traumatologist though.