Today’s Must Read

Georgetown law professor, **Laura Donohue’s** [**Bulk Metadata Collection: Statutory and Constitutional Considerations**](http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf) (link is to the pdf; caution: it’s long – 86 pages), which is forthcoming in the Harvard Journal of Law & Public Policy. A brief overview of the topics covered in her paper appears today at [**Just Security**](http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/).

10/24/2013: 
Tags:   

Recommended:

####Cyber Law, Tech and Policy

+ [**Google Unveils Tools to Access Web From Repressive Countries and Defend Websites**](http://business.time.com/2013/10/21/google-digital-rebels/): (1) [**uProxy**](http://uproxy.org/), a browser extension that uses p2p technology to enable people to provide others with a trusted internet connection, (2) [**Project Shield**](http://projectshield.withgoogle.com/), to help human-rights activists, NGOs, and news organizations defend their websites from distributed denial of service (DDos) attacks, (3) and [**Digital Attack Map**](http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&time=15999&view=map), a live data visualization, displaying DDoS attacks in real time. In addition to those [**Google-related**](http://www.google.com/ideas/) tools, the **Freedom of the Press Foundation** [**recently launched**](https://pressfreedomfoundation.org/blog/2013/10/freedom-press-foundation-launches-securedrop) a confidential, open-source submission platform for whistleblowers: [**SecureDrop**](https://pressfreedomfoundation.org/securedrop#faq).

+ [**DOJ Argues No One Has Standing To Challenge Metadata Collection Even As It Says Government Can Legally Collect Everyone’s**](http://www.techdirt.com/articles/20131016/06414624894/doj-argues-no-one-has-standing-to-challenge-metadata-collection-even-as-it-says-govt-can-legally-collect-everyones.shtml) – **TechDirt**.

+ **But:** [**Door May Open for Challenge to Secret Wiretaps**](http://www.nytimes.com/2013/10/17/us/politics/us-legal-shift-may-open-door-for-challenge-to-secret-wiretaps.html?_r=0&pagewanted=all) – **New York Times**.

####General Interest

+ [**Taking Flight From Asia**](http://www.newgeography.com/content/004003-taking-flight-asia) – **Joel Kotkin** at [**New Geography**](http://www.newgeography.com/) on the latest wave of emigration from Asia to parts of the U.S. and Canada.

+ [**Breaking Through Cancer’s Shield**](http://www.nytimes.com/2013/10/15/health/breaking-through-cancers-shield.html) – **New York Times**. Are we seeing the dawn of a new era in cancer fighting based upon immunotherapies?

+ [**Now We are Five**](http://www.newyorker.com/reporting/2013/10/28/131028fa_fact_sedaris) – At the **New Yorker,** **David Sedaris** on the death of his youngest sister.

Surveillance: the “Sieve Theory” v. the “Mosaic Theory”

[**The Government Thinks It’s Legal to Access Your Emails. This Theory Explains Why**](http://www.newrepublic.com/article/115207/lavabit-case-sieve-theory-government-data-filtration) – **Jane Chong** at **The New Republic**:

> “[T]he “sieve theory”: the idea is that the filtration techniques the government applies to extract certain pieces of data should have implications for the legality of the initial acquisition of a much larger dataset to which the government would not otherwise be entitled. The sieve theory is kind of the converse of a much-better-understood theory of the Fourth Amendment. The “mosaic theory,” as Fourth Amendment scholar Orin Kerr has dubbed it . . . That theory posits that many otherwise-insignificant and disparate data points can be combined to yield a highly revealing—and unconstitutionally invasive—composite. Like the mosaic theory, the sieve theory is built on the idea that constitutional protections do not attach to information per se but rather hinge on how that information gets processed and used. Just as privacy proponents use the mosaic theory to argue that bits of information not individually entitled to constitutional protections might be entitled to protections when aggregated, the government is effectively using the sieve theory . . . . . to argue that a large data set comprising information to which it might normally not be entitled should be produced anyway where the government both establishes its necessity and institutes satisfactory filters to prevent its misuse. Put more simply, the mosaic theory has been used to argue the unconstitutionality of certain types of government data collection. Conversely, the sieve theory is being used to argue the lawfulness of carefully conducted government data filtration.”

**More on the mosaic theory**: Professor **Orin Kerr**’s (GW Law School) law review article, “[The Mosaic Theory of the Fourth Amendment](http://www.michiganlawreview.org/assets/pdfs/111/3/Kerr.pdf),” 111 Mich. L. Rev. 311 (2012).

10/16/2013: 

Recommended:

####Cyber Law, Tech and Policy

+ [How Much Surveillance Can Democracy Withstand?](http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/): Richard Stallman at Wired. Also recently by Stallman: [Why Free Software Is More Important Now Than Ever Before](http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before/).

+ [Want to Evade NSA Spying? Don’t Connect to the Internet](http://www.wired.com/opinion/2013/10/149481/): Bruce Schneier at Wired. Key takeaway: it’s hard to avoid the NSA (or, perhaps more accurately, it’s very, very inconvenient).

+ [Special Report: The Obama Administration and the Press – Leak Investigations and Surveillance in post-9/11 America](https://cpj.org/reports/2013/10/obama-and-the-press-us-leaks-surveillance-post-911.php): CPJ (Committee to Protect Journalists).

Three Must Reads on the NSA Revelations

[**Time to Tame the NSA Behemoth Trampling our Rights**](http://www.theguardian.com/commentisfree/2013/sep/13/nsa-behemoth-trampling-rights) by **Yochai Benkler** at **The Guardian**.

[**The Secret FISA Court Must Go**](http://www.thedailybeast.com/articles/2013/07/24/the-secret-fisa-court-must-go.html) by law professors **Christopher Sprigman** and **Jennifer Granick** at **The Daily Beast**.

[**The U.S. Government has Betrayed the Internet – We Need to Take it Back**](http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying) by **Bruce Schneier** at **The Guardian**.

“[A] structural approach, which focuses on preserving an overall balance between state control and citizen autonomy, seems to me more appropriate for evaluating mass surveillance programs such as the NSA’s … . [T]he appropriate question is whether the creation of a system of surveillance perilously alters that balance too far in the direction of government control, whether or not we have problems with the current use of that system. We might imagine a system of compulsory cameras installed in homes, activated only by warrant, being used with scrupulous respect for the law over many years. The problem is that such an architecture of surveillance, once established, would be difficult to dismantle, and prove too potent a tool of control if it ever fell into the hands of people who—whether through panic, malice, or a misguided confidence in their own ability to secretly judge the public good—would seek to use it against us.”