Recent Academic Papers and Reports of Interest

An FDA for Algorithms (pdf; 29 pages; March 15, 2016) – Andrew Tuft

The Fourth Amendment in the Information Age (April 27, 2016) – Robert Litt (General Counsel, Office of the Director of National Intelligence)

The Fourth Amendment in the Coming Drone Age (pdf; 29 pages; December 3, 2015) – Brooke Hofhenke (American University – Washington College of Law)

Norms of Computer Trespass (pdf; 42 pages; May 2, 2015) – Orin Kerr (The George Washington University Law School)

Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web (pdf; 45 pages; March 5, 2016) – Ahmed Ghappour (UC Hastings College of the Law)

International Signals Intelligence Law: Provisions and History (March 2016) – A.M. Rutkowski

Inefficiently Automated Law Enforcement (pdf; 34 pages; May 4, 2016) – Woodrow Hartzog, Gregory Conti, John Nelson and Lisa A. Shay

How Governments Can Promote Automated Driving (pdf; 46 pages; March 17, 2016) – Bryant Walker Smith (University of South Carolina – School of Law)

05/10/2016: 

Some Recent Academic Papers and Reports of Interest

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations (pdf; 12 pages) – Kristin Finklea of the Congressional Research Service

“Don’t Panic – Making Progress on the ‘Going Dark’ Debate” – Berkman Center Report (overview here; the Report pdf here (37 pages, including notes and appendices))

T-Mobile’s Binge On Violates Key Net Neutrality Principles – Barbara van Schewick (Stanford Law School; Stanford CIS)

Consenting to Computer Use – James Grimmelmann (University of Maryland Law School)

Information Fiduciaries and the First Amendment – Jack Balkin (Yale Law School)

Who Should Define Injuries for Article III Standing? – Daniel Townsend

See also:

Daedalus’ Winter 2016 issue on “The Internet” – edited by Yochai Benkler and David Clark ($, also available for kindle at Amazon)

02/1/2016: 

Some Recent Academic Papers of Interest

Constitutional Malware – Jonathan Mayer

Surveillance Duration Doesn’t Affect Privacy Expectations: An Empirical Test of the Mosaic Theory – Lior Strahilevitz and Matthew B. Kugler

Can Americans Resist Surveillance? – Ryan Calo

Investigating the Computer Security Practices and Needs of Journalists – Susan McGregor, Franziska Roesner, Polina Charters and Tobin Holliday

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services – Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas

09/15/2015: 

Interesting Cyberlaw Papers

Bulk Metadata Collection: Statutory and Constitutional Considerations (2013) by Laura K. Donohue (Georgetown University Law Center); Harvard Journal of Law and Public Policy (forthcoming). Available at SSRN: http://ssrn.com/abstract=2344774
(#metadata)

The Mosaic Theory of the Fourth Amendment (2012) by Orin S. Kerr (George Washington University Law School); Michigan Law Review, Vol. 110, Forthcoming 2012. Available at SSRN: http://ssrn.com/abstract=2032821
(#mosaic #fourth amendment)

The Path of Internet Law: An Annotated Guide to Legal Landmarks (2012) – Michael L. Rustad (Suffolk University Law School) and Diane D’Angelo (Suffolk University Law School); Duke Law & Technology Review, Vol. 2011, No. 012; Available at SSRN: http://ssrn.com/abstract=1799578

01/1/2009: