PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

Should the Legal Academy Be Interdisciplinary?

Legal Academy Interdisciplinary

Orin Kerr has an interesting post with excerpts from a debate between Stephen M. Feldman and Richard Seamon about the legal academy. Fedman writes that law schools ought to become even more interdisciplinary than they already are: “Interdisciplinary scholarship, done well, can generate creative methods and original insights in previously stale areas of thought.” Seamon, in contrast, observes:

Continue Reading

Can Spam and Spyware Ever Be Good?

Spam

Over at the Conglomerate, Professor Eric Goldman’s paper, A Coasean Analysis of Marketing, is being workshopped in the Conglomerate’s Second Annual Junior Scholars Workshop. Professors Peter Huang and Frank Pasquale (previously a guest blogger here at Concurring Opinions) are providing commentary.

Continue Reading

Massive Government Data Mining of Financial Records

Data Mining

Apparently, warrantless wiretapping and gathering of phone call records just aren’t enough to quench the Bush Administration’s thirst for data. Now we learn that the government has gathered massive quantities of financial records. The New York Times reports:

Continue Reading

Template for News Stories on Government Data Gathering

News

NSA warrantless wiretaps. NSA collection of phone records. CIA gathering of financial records.

The stories are endless. To help out reporters, I thought I’d just write a quick and easy template to make reporting a little bit easier. So here it is:

Continue Reading

Why Is There a Shortage of Organ Donations?

Organ Donation

I was watching a show on CNN about people in need of organ transplants going to China for organ donation tourism. China harvests organs from prisoners it executes, sometimes without their consent, and then offers them to “tourists” who come in need of transplants.

Continue Reading

More Data Lost: 1.3 Million Student Loan Recipients

Data Breach

From CNET:

About 1.3 million customers of a Texas provider of student loans are at risk of ID fraud, after a contractor lost computer equipment with sensitive information on them.

The equipment, which was not identified, contains the names and Social Security numbers of the borrowers, the Texas Guaranteed Student Loan company said in a statement Tuesday. The hardware was lost by an employee of Hummingbird, a enterprise software company hired to prepare a document management system, it said.

Continue Reading

Is There a Good Response to the “Nothing to Hide” Argument?

Nothing to Hide Argument

One of the most common attitudes of those unconcerned about government surveillance or privacy invasions is “I’ve got nothing to hide.” I was talking the issue over one day with a few colleagues in my field, and we all agreed that thus far, those emphasizing the value of privacy had not been able to articulate an answer to the “nothing to hide” argument that would really register with people in the general public. In a thoughtful essay in Wired (cross posted at his blog), Bruce Schneier seeks to develop a response to this argument:

Continue Reading