Network Privacy and Security: Ethical, Legal, and Technical
You have zero
privacy anyway. Get over it.
Scott Mcnealy, CEO Sun
Microsystems, January 1999
History will record
what we, here in the early decades of the information age, did to
foster freedom, liberty, and democracy. Did we build information
technologies that protected people’s freedoms even during times when
society tried to subvert them? Or did we build technologies that could
easily be modified to watch and control?
Computer Science 594 (Special Topics), and also a Kent IIT Law
Class: Tuesdays and Thursdays,
Prof. Richard Warner,
Kent IIT Law School and
Prof. Robert H. Sloan,
University of Illinois at Chicago Department
Kent IIT Law School Adams &
Clinton; Kent Classroom: 270
(UIC students: Walk North on Halsted, turn right at Adams; if you get
to Union Station you've overshot.)
January 15 and 17, only UIC students
will meet at UIC for a tutorial on law.
No class for UIC students week of March 24–28 (Spring break).
All other weeks: Tuesday class at Kent; Thursday class at UIC.
Prof. Sloan office hours: Mondays 11–12, and additionally both drop ins
and appointments very very welcome.
This is Prof. Sloan's course page; students definitely need to
look also at Prof.
Warner's course page. Most readings are posted only there.
Books for technological side of course:
Except for those two books, unless
otherwise indicated, all readings are available on the course websites,
mostly on Prof.
Warner's course page.
- Michael G. Solomon and Mike Chapple, Information Security Illuminated,
Jones and Bartlett, 2005. Available from amazon and also the UIC
- Ross Anderson, Security
Engineering, Wiley, 2001. Also available online via the link.
Useful links (a few may be required
or optional readings)
Facebook, The Nation,
Jan. 7, 2008. (Facebook and students' notion of privacy)
- The case of "Officer Scott": A
Hoax Most Cruel, The Courrier
Journal (Lexington, KY), Oct. 19, 2005.
- National security vs. privacy:
- Bruce Schneier, "Why
'Anonymous' Data Sometimes Isn't", Wired, December 13, 2007.
- Cory Doctorow, "SCROOGLED,"
Radar Magazine, September 2007. A more
contemporary short-story take on Asimov's "The Dead Past"?
- Public-key Cryptography Software—Gnu Privacy Guard
- Public-key Cryptography: Obtaining free peronal Certificates for
- Information Security and Economics:
- University of Illinois & UIC policies related to Info
- Illiniois Insitute of Technology (which includes Kent Law School)
policies related to Info
Signing and Encrypting email using
This will probably be easier if you send and receive email (at least
for this assignment) using one of the popular mail reading programs:
Outlook, Outlook Express (both Windows only), Apple Mail.app, or
Thunderbird (available in Windows, Linux, and Mac OS X versions).
Essentially, you need to (1) obtain a digital emaial certificate, and
(2) install it in your email program and set your email program
preferences to use S/MIME. You have two choices for getting
certificates for free from major companies:
You need a certficiate no matter what, but if you don't want to use a
mail reading program, your one other option is a
plug-in for GMail read with the Firefox browser. (This did not work
out for me in 5 minutes of fiddling on my Mac, but I have gotten email
sucessfully signed by at least one student using it, and I imagine it
would work out if I devoted 10 minutes to it.)
Academic Integrity; Plagiarism
For UIC students, this is a graduate course with much more writing than
a typical graduate course. The minimum
penalty for any acts of academic dishonesty will be a grade of F for
the course; the maximum expulsion from UIC.
Plagiarism is using another's ideas or words without proper
acknowledgment. You must cite any sources you have used. In addition to
citing a source generally in a bibliography, you must indicate any
phrases you use from sources by putting them in quotation marks (short
to medium quotes) or setting them as block quotes (longer excerpts)
with an immediately following citation.