CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Larry Lessig defends his view of the best copyright law for software. Lessig advocates that (1) software copyrights expire after ten years (but a new version of a program would…
-
Homeland Insecurity
Nice article by Charles Mann in the September 2002 issue of the The Atlantic, about Bruce Schneier and his opinions on homeland security. Bruce thinks insightfully about security, and is…
-
SpamCop Responses
I received 59 responses to my SpamCop narrative. Because there are so many, I cannot respond individually to each one. Instead, I summarize below the major arguments raised by the…
-
SpamCop Responses
I have gotten plenty of email from SpamCop advocates in response to my previous posts. Due to a work-related deadline, it will take me several days to sort through them…
-
Have You Seen This Man?
Washington, DC police today intensified their search for missing news.com reporter and columnist Declan McCullagh, as evidence of his disappearance mounted. Police spokesman Harvey Hoax explained, “We believed initially that…
-
Response to Declan's DMCA Piece
Declan McCullagh misses the boat at least twice in his August 19th column concerning the potential impact on computer science research of the Digital Millennium Copyright Act [“Debunking DMCA myths,”…
-
Keystone SpamKops (cont. 3)
Several people have asked me to expand upon a semi-cryptic comment I made in a previous post, saying that SpamCop’s system allows denial-of-service attacks. What I mean is that it…
-
Lawyers, Tiggers and Bears, Oh My!
That’s the title of a hilarious article in L.A. Magazine about the ongoing legal battle over the rights to Winnie-the-Pooh. It’s full of telling details about the state of “intellectual…
-
Keystone SpamKops (cont. 2)
Thomas Roessler is the person who sent the innocent email message that the Keystone SpamKops incorrectly characterized as spam, leading to my summary ejection from the net. He did nothing…
-
Washington Post: Break-Ins to Military Computers
Interesting article today in the Washington Post about some freelance consultants who apparently rummaged through a bunch of Department of Defense computers without authorization. What they found was pretty appalling.…