[liberationtech] Stanford course: Surveillance Law

2016-01-02 Thread Yosem Companys
*From:* Richard Forno 

FYI, my Stanford CIS colleague (a securitylegalgeek rockstar) is offering a
6-week online course on surveillance law.  Well worth checking out, if
you're able and/or interested!   -- rick

Surveillance Law

Learn how police and intelligence agencies can access your data, and how
the law (might) protect you! Hackers, attorneys, and concerned citizens are
all welcome.

6 weeks of study
1-3 hours/week
English
Jonathan Mayer / Stanford University

It’s easy to be cynical about government surveillance. In recent years, a
parade of Orwellian disclosures have been making headlines. The FBI, for
example, is hacking into computers that run anonymizing software. The NSA
is vacuuming up domestic phone records. Even local police departments are
getting in on the act, tracking cellphone location history and intercepting
signals in realtime.

Perhaps 2014 is not quite 1984, though. This course explores how American
law facilitates electronic surveillance—but also substantially constrains
it. You will learn the legal procedures that police and intelligence
agencies have at their disposal, as well as the security and privacy
safeguards built into those procedures. The material also provides brief,
not-too-geeky technical explanations of some common surveillance methods.

Course Syllabus

I. Introduction
We will begin with a brief overview of how surveillance fits into the
American legal system. We will also discuss how surveillance issues can be
litigated.

II. The Basics of Surveillance Law
Next, we will review established police surveillance procedures. Using
telephone technology as a simple starting point, we will work through
various sorts of data that investigators might seek to access—and the
constitutional and statutory safeguards on that data.

III. Applying Surveillance Law to Information Technology
Having learned the basics, we will turn to more modern technologies. We
will discuss snooping on email, web browsing, and mobile phone location, as
well as hacking into devices.

IV. Compelled Assistance to Law Enforcement
What happens when data is technically protected? In this section, we will
talk about the government’s (limited) ability to mandate backdoors and to
require decryption.

V. The Structure of Foreign Intelligence Surveillance Law
The law that applies to foreign intelligence activities runs parallel to
the law that applies to police activities. We will compare the two systems
of law and review key distinctions. The section places particular emphasis
on Section 215 of the USA PATRIOT Act, Section 702 of the FISA Amendments
Act, and Executive Order 12333.

VI. Controversial NSA Programs
In the final section, we will review the conduct and legality of
controversial National Security Agency programs. We will discuss in detail
the domestic phone metadata program, PRISM, and “upstream” Internet
monitoring.

< - >

https://www.coursera.org/course/surveillance


--
It's better to burn out than fade away.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Stanford course: Surveillance Law

2016-01-02 Thread James S. Tyre
This was January 2015, not forthcoming.

--
James S. Tyre
Law Offices of James S. Tyre
10736 Jefferson Blvd., #512
Culver City, CA 90230-4969
310-839-4114/310-839-4602(fax)
jst...@jstyre.com
Special Counsel, Electronic Frontier Foundation
https://www.eff.org

From: liberationtech [mailto:liberationtech-boun...@lists.stanford.edu] On 
Behalf Of Yosem Companys
Sent: Saturday, January 02, 2016 12:17 PM
To: Liberation Technologies
Cc: Richard Forno
Subject: [liberationtech] Stanford course: Surveillance Law

From: Richard Forno 
FYI, my Stanford CIS colleague (a securitylegalgeek rockstar) is offering a 
6-week online course on surveillance law.  Well worth checking out, if you're 
able and/or interested!   -- rick

Surveillance Law

Learn how police and intelligence agencies can access your data, and how the 
law (might) protect you! Hackers, attorneys, and concerned citizens are all 
welcome.

6 weeks of study
1-3 hours/week
English
Jonathan Mayer / Stanford University

It’s easy to be cynical about government surveillance. In recent years, a 
parade of Orwellian disclosures have been making headlines. The FBI, for 
example, is hacking into computers that run anonymizing software. The NSA is 
vacuuming up domestic phone records. Even local police departments are getting 
in on the act, tracking cellphone location history and intercepting signals in 
realtime.

Perhaps 2014 is not quite 1984, though. This course explores how American law 
facilitates electronic surveillance—but also substantially constrains it. You 
will learn the legal procedures that police and intelligence agencies have at 
their disposal, as well as the security and privacy safeguards built into those 
procedures. The material also provides brief, not-too-geeky technical 
explanations of some common surveillance methods.

Course Syllabus

I. Introduction
We will begin with a brief overview of how surveillance fits into the American 
legal system. We will also discuss how surveillance issues can be litigated. 

II. The Basics of Surveillance Law
Next, we will review established police surveillance procedures. Using 
telephone technology as a simple starting point, we will work through various 
sorts of data that investigators might seek to access—and the constitutional 
and statutory safeguards on that data.

III. Applying Surveillance Law to Information Technology
Having learned the basics, we will turn to more modern technologies. We will 
discuss snooping on email, web browsing, and mobile phone location, as well as 
hacking into devices.

IV. Compelled Assistance to Law Enforcement
What happens when data is technically protected? In this section, we will talk 
about the government’s (limited) ability to mandate backdoors and to require 
decryption.

V. The Structure of Foreign Intelligence Surveillance Law
The law that applies to foreign intelligence activities runs parallel to the 
law that applies to police activities. We will compare the two systems of law 
and review key distinctions. The section places particular emphasis on Section 
215 of the USA PATRIOT Act, Section 702 of the FISA Amendments Act, and 
Executive Order 12333.

VI. Controversial NSA Programs
In the final section, we will review the conduct and legality of controversial 
National Security Agency programs. We will discuss in detail the domestic phone 
metadata program, PRISM, and “upstream” Internet monitoring.

< - >

https://www.coursera.org/course/surveillance

--
It's better to burn out than fade away.

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] DISREGARD - Re: Stanford course: Surveillance Law

2016-01-02 Thread Yosem Companys
From: Richard Forno 

Ooops, my error.  This was for LAST year.  I saw "January" and thought it
was for 2016.   Please pardon the confusion!

--
It's better to burn out than fade away.

> On Jan 2, 2016, at 12:58 PM, Richard Forno  wrote:
>
> FYI, my Stanford CIS colleague (a securitylegalgeek rockstar) is offering
a 6-week online course on surveillance law.  Well worth checking out, if
you're able and/or interested!   -- rick
>
> Surveillance Law
>
> Learn how police and intelligence agencies can access your data, and how
the law (might) protect you! Hackers, attorneys, and concerned citizens are
all welcome.
>
> 6 weeks of study
> 1-3 hours/week
> English
> Jonathan Mayer / Stanford University
>
> It’s easy to be cynical about government surveillance. In recent years, a
parade of Orwellian disclosures have been making headlines. The FBI, for
example, is hacking into computers that run anonymizing software. The NSA
is vacuuming up domestic phone records. Even local police departments are
getting in on the act, tracking cellphone location history and intercepting
signals in realtime.
>
> Perhaps 2014 is not quite 1984, though. This course explores how American
law facilitates electronic surveillance—but also substantially constrains
it. You will learn the legal procedures that police and intelligence
agencies have at their disposal, as well as the security and privacy
safeguards built into those procedures. The material also provides brief,
not-too-geeky technical explanations of some common surveillance methods.
>
> Course Syllabus
>
> I. Introduction
> We will begin with a brief overview of how surveillance fits into the
American legal system. We will also discuss how surveillance issues can be
litigated.
>
> II. The Basics of Surveillance Law
> Next, we will review established police surveillance procedures. Using
telephone technology as a simple starting point, we will work through
various sorts of data that investigators might seek to access—and the
constitutional and statutory safeguards on that data.
>
> III. Applying Surveillance Law to Information Technology
> Having learned the basics, we will turn to more modern technologies. We
will discuss snooping on email, web browsing, and mobile phone location, as
well as hacking into devices.
>
> IV. Compelled Assistance to Law Enforcement
> What happens when data is technically protected? In this section, we will
talk about the government’s (limited) ability to mandate backdoors and to
require decryption.
>
> V. The Structure of Foreign Intelligence Surveillance Law
> The law that applies to foreign intelligence activities runs parallel to
the law that applies to police activities. We will compare the two systems
of law and review key distinctions. The section places particular emphasis
on Section 215 of the USA PATRIOT Act, Section 702 of the FISA Amendments
Act, and Executive Order 12333.
>
> VI. Controversial NSA Programs
> In the final section, we will review the conduct and legality of
controversial National Security Agency programs. We will discuss in detail
the domestic phone metadata program, PRISM, and “upstream” Internet
monitoring.
>
> < - >
>
> https://www.coursera.org/course/surveillance
>
> --
> It's better to burn out than fade away.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] DISREGARD - Re: Stanford course: Surveillance Law

2016-01-02 Thread Peter Lindener
*DISREGARD* - Re: Stanford course: Surveillance Law

To explain more fully:
   During the past year we have been re-programmed to pretend
that Surveillance Law in no longer of any real concern...

That is:...
   ..Now that so many are drawing pay checks in some way related to our
emerging surveillance industry..   the study of Surveillance Law...is in
essence mostly for appearance, if necessary at all...   i.e,  lets just
repeat history..after all with the Stasi
, KGB
, and Our very own J. Edgar Hoover
 there is a great deal of
knowledge from our past as to how these kind of things can be done.

... *These are not the droids you are looking for!*

   -Peter

On Sat, Jan 2, 2016 at 1:13 PM, Yosem Companys 
wrote:

> From: Richard Forno 
>
> Ooops, my error.  This was for LAST year.  I saw "January" and thought it
> was for 2016.   Please pardon the confusion!
>
> --
> It's better to burn out than fade away.
>
> > On Jan 2, 2016, at 12:58 PM, Richard Forno 
> wrote:
> >
> > FYI, my Stanford CIS colleague (a securitylegalgeek rockstar) is
> offering a 6-week online course on surveillance law.  Well worth checking
> out, if you're able and/or interested!   -- rick
> >
> > Surveillance Law
> >
> > Learn how police and intelligence agencies can access your data, and how
> the law (might) protect you! Hackers, attorneys, and concerned citizens are
> all welcome.
> >
> > 6 weeks of study
> > 1-3 hours/week
> > English
> > Jonathan Mayer / Stanford University
> >
> > It’s easy to be cynical about government surveillance. In recent years,
> a parade of Orwellian disclosures have been making headlines. The FBI, for
> example, is hacking into computers that run anonymizing software. The NSA
> is vacuuming up domestic phone records. Even local police departments are
> getting in on the act, tracking cellphone location history and intercepting
> signals in realtime.
> >
> > Perhaps 2014 is not quite 1984, though. This course explores how
> American law facilitates electronic surveillance—but also substantially
> constrains it. You will learn the legal procedures that police and
> intelligence agencies have at their disposal, as well as the security and
> privacy safeguards built into those procedures. The material also provides
> brief, not-too-geeky technical explanations of some common surveillance
> methods.
> >
> > Course Syllabus
> >
> > I. Introduction
> > We will begin with a brief overview of how surveillance fits into the
> American legal system. We will also discuss how surveillance issues can be
> litigated.
> >
> > II. The Basics of Surveillance Law
> > Next, we will review established police surveillance procedures. Using
> telephone technology as a simple starting point, we will work through
> various sorts of data that investigators might seek to access—and the
> constitutional and statutory safeguards on that data.
> >
> > III. Applying Surveillance Law to Information Technology
> > Having learned the basics, we will turn to more modern technologies. We
> will discuss snooping on email, web browsing, and mobile phone location, as
> well as hacking into devices.
> >
> > IV. Compelled Assistance to Law Enforcement
> > What happens when data is technically protected? In this section, we
> will talk about the government’s (limited) ability to mandate backdoors and
> to require decryption.
> >
> > V. The Structure of Foreign Intelligence Surveillance Law
> > The law that applies to foreign intelligence activities runs parallel to
> the law that applies to police activities. We will compare the two systems
> of law and review key distinctions. The section places particular emphasis
> on Section 215 of the USA PATRIOT Act, Section 702 of the FISA Amendments
> Act, and Executive Order 12333.
> >
> > VI. Controversial NSA Programs
> > In the final section, we will review the conduct and legality of
> controversial National Security Agency programs. We will discuss in detail
> the domestic phone metadata program, PRISM, and “upstream” Internet
> monitoring.
> >
> > < - >
> >
> > https://www.coursera.org/course/surveillance
> >
> > --
> > It's better to burn out than fade away.
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> compa...@stanford.edu.
>
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.