Recent Internet Law and IP Resources

Nice to see the open source (and free or low cost) casebook movement continue to gather steam. Even better that we are starting to see epub/mobi editions; pdf’s often present poorly on mobile devices:

> Professor Eric Goldman’s [2014 Internet Law casebook and syllabus](http://blog.ericgoldman.org/archives/2014/08/2014-internet-law-casebook-and-syllabus-now-available.htm) (pdf – $8, hard copy and kindle editions).

> Professors Rebecca Tushnet and Eric Goldman’s [2014 Advertising & Marketing Law casebook](http://blog.ericgoldman.org/archives/2014/08/announcing-the-second-edition-of-advertising-marketing-law-cases-and-materials-by-tushnet-goldman.htm) (pdf and epub editions – $11.50).

> Professor James Boyle (Duke law school) and Jennifer Jenkins’ (Director of Duke’s Center for the Study of the Public Domain) [Intellectual Property: Law & the Information Society; cases & materials (open casebook – 2014 edition)](http://www.thepublicdomain.org/2014/08/26/open-coursebook-in-intellectual-property/#more-1728) (pdf edition – free; paperback – $29.99).

> Professor Barton Beebe’s [Trademark Law: An Open Source Casebook](http://us.creativecommons.org/archives/942) (2014) [(pdf and .doc versions – free)](http://tmcasebook.org/).

> Professor James Grimmelmann’s [Internet Law: Cases and Problems 4.0](http://internetcasebook.com/) (pdf – $30 suggested price).

> The United States Copyright Office has released a public draft of its “[Compendium of U.S. Copyright Office Practices, Third Edition](http://copyright.gov/comp3/)” (1,222 page [pdf](http://copyright.gov/comp3/docs/compendium-full.pdf) – free). Pending final review, the compendium (the first since 1984’s Second Edition) will take formal effect on or around December 15, 2014.

09/2/2014: 

Executive Order 12333

[Feds call it ‘twelve triple three’ – Whistleblowers Say it’s the Heart of the Mass Spying Problem](http://arstechnica.com/tech-policy/2014/08/a-twisted-history-how-a-reagan-era-executive-order-led-to-mass-spying/) – ArsTechnica

[Text of Executive Order 12333](http://www.archives.gov/federal-register/codification/executive-order/12333.html) – National Archives

[Executive Order 12333 and the Golden Number](http://justsecurity.org/16157/executive-order-12333-golden-number/) – Alvaro Bedoya at Just Security

[Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier](http://webpolicy.org/2014/12/03/eo-12333-on-american-soil/) – Jonathan Mayer of Stanford University

08/28/2014: 

California’s Smartphone Kill Switch Bill Enacted

News Report: [The Verge](http://www.theverge.com/2014/8/25/6000095/californias-smartphone-kill-switch-bill-now-law)

Text of Bill: Text and legislative history at [leginfo.legislature.ca.gov](http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB962&search_keywords=)

Explainer: [California’s Cellphone ‘Kill Switch’ Law: What You Need to Know](http://mashable.com/2014/08/26/california-kill-switch-law/) at Mashable

Cautionary Note: [How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law](http://www.wired.com/2014/08/how-cops-and-hackers-could-abuse-californias-new-phone-kill-switch-law/) at WIRED.

08/27/2014: 

Intriguing Idea for Board of Directors Reform

> “Boards are almost exactly as they were a hundred years ago: a collection of grey eminences who meet for a few days a year to offer their wisdom. They may now include a few women and minorities. There may be a few outsiders. But the fundamentals remain the same. Board members are part-timers with neither the knowledge nor the incentives to monitor companies effectively. And they are beholden to the people they are supposed to monitor. Boards are thus showcases for capitalism’s most serious problems: they are run by insiders at a time when capitalism needs to be more inclusive and are dominated by part-timers at a time when it needs to be more vigilant about avoiding future crises. In the May edition of the Stanford Law Review Stephen Bainbridge of the University of California, Los Angeles, and Todd Henderson of the University of Chicago offer a proposal for fixing boards that goes beyond tinkering: replace individual directors with professional-services firms.” – [**The Economist**](http://www.economist.com/news/business/21612147-case-outsourcing-company-boards-replacing-board)

Professors Bainbridge and Henderson’s paper (pdf): [**Boards-R-Us: Reconceptualizing Corporate Boards**](http://www.stanfordlawreview.org/sites/default/files/66_Stan_L_Rev_1051_BainbridgeHenderson.pdf)

08/26/2014: 

My Weekend Reading:

[Vikram Chandra](http://www.vikramchandra.com/publications/mirrored-mind-geek-sublime/)’s [Geek Sublime](http://www.amazon.com/Geek-Sublime-Writing-Fiction-Software-ebook/dp/B00ER809R0). James Gleick’s [review](http://www.nytimes.com/2014/08/24/books/review/geek-sublime-by-vikram-chandra.html?rref=books/review&module=Ribbon&version=context&region=Header&action=click&contentCollection=Sunday%20Book%20Review&pgtype=article) in the New York Times Sunday Book Review.

08/23/2014: 

Should Twitter, Facebook and Google Executives be the Arbiters of What We See and Read?

> “It’s an imperfect analogy, but, given this extraordinary control over the means of global communication, Silicon Valley giants at this point are more akin to public utilities such as telephone companies than they are ordinary private companies when it comes to the dangers of suppressing ideas, groups and opinions. It’s not hard to understand the dangers of allowing, say, AT&T or Verizon to decree that its phone lines may not be used by certain groups or to transmit certain ideas, and the dangers of allowing tech companies to do so are similar. In the digital age, we are nearing the point where an idea banished by Twitter, Facebook and Google all but vanishes from public discourse entirely, and that is only going to become more true as those companies grow even further.” – **Glenn Greenwald** at [**The Intercept**](https://firstlook.org/theintercept/2014/08/21/twitter-facebook-executives-arbiters-see-read/)

> “We need, as web inventor Tim Berners-Lee has urged, to re-decentralize the Internet, and restore its promise as a medium where the action takes place at the edges of networks—where we wouldn’t need permission to communicate and innovate. The first way we users of Internet services can re-decentralize is to create—and make use of—our own home base online. In practical terms, this means getting your own domain name and creating, at a minimum, a blog where you establish your own identity. The page you think is yours at LinkedIn, Tumblr, Instagram (Facebook), or any of the other centralized services is emphatically not truly your own; it’s theirs.” – **Dan Gillmor** at [**The Atlantic**](http://www.theatlantic.com/technology/archive/2014/08/the-new-editors-of-the-internet/378983/)

Matthew Green on Email Encryption

> “The path to a proper encrypted email system isn’t that far off. At minimum, any real solution needs:

> ‘A proper approach to key management. This could be anything from centralized key management as in Apple’s iMessage — which would still be better than nothing — to a decentralized (but still usable) approach like the one offered by Signal or OTR. Whatever the solution, in order to achieve mass deployment, keys need to be made much more manageable or else submerged from the user altogether.’

> ‘Forward secrecy baked into the protocol. This should be a pre-condition to any secure messaging system.’

> ‘Cryptography that post-dates the Fresh Prince. Enough said.’

> ‘Screw backwards compatibility. Securing both encrypted and unencrypted email is too hard. We need dedicated networks that handle this from the start.'”

— Professor Matthew Green, Johns Hopkins University, writing at his blog: [A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html).

Recommended:

> #### Law, Tech and Policy

> [A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying](http://www.wired.com/2014/07/dark-mail-hides-metadata-from-nsa/) – Wired. Related: [Inside Citizen Lab, the ‘Hacker Hothouse’ Protecting You from Big Brother](http://arstechnica.com/security/2014/07/inside-citizen-lab-the-hacker-hothouse-protecting-you-from-big-brother/) — ArsTechnica.

> [Singapore is Testing Whether Mass Surveillance and Big Data can not only Protect National Security, but Actually Engineer a More Harmonious Society](http://www.foreignpolicy.com/articles/2014/07/29/the_social_laboratory_singapore_surveillance_state) — Foreign Policy.

> On the 35th anniversary of the case which introduced the 3rd party doctrine (i.e., people have no expectation of privacy in information they expose to others (e.g., telcos and other businesses)): [Smith v. Maryland Turns 35, But Its Health Is Declining](https://www.eff.org/deeplinks/2014/06/smith-v-maryland-turns-35-its-healths-declining) — Electronic Frontier Foundation.

> #### General Interest

> At Medium, Rex Sorgatz’s four part series on art and authenticity: **Part I**: [This is Not a Vermeer](https://medium.com/message/this-is-not-a-vermeer-67b752b150c0); **Part II**: [Uber for Art Forgeries](https://medium.com/message/uber-for-art-forgeries-2c9c8bf41608); **Part III**: [Forgeries Gone Wild](https://medium.com/message/d9b4c195da5); and **Part IV**: [The End of Authentication](https://medium.com/message/cbbfbcb0c49e).

> [The Scope of Ai Weiwei’s Imagination](http://hyperallergic.com/137367/the-scope-of-ai-weiweis-imagination/) – photo essay in Hyperallergic on the recent “Ai Weiwei: Evidence” exhibition at the Martin-Gropius-Bau Museum in Berlin. Also: [The Long Game: On the Repression of Ai Weiwei and Jafar Panahi](http://www.full-stop.net/2014/07/30/features/essays/tomashachard/the-long-game-on-the-repression-of-ai-weiwei-and-jafar-panahi/) — Full Stop.

> [David Foster Wallace on Writing, Self-Improvement, and How We Become Who We Are](http://www.brainpickings.org/index.php/2014/08/11/david-foster-wallace-quack-this-way/) – Maria Popova at Brain Pickings. Related: [mp3](http://theconnection.wbur.org/2001/03/30/english-language-usage) of WBUR/The Connection radio program featuring David Foster Wallace and “Modern American Usage” editor/author, Bryan Garner, discussing English language usage.

08/14/2014: 

WIRED Interviews Edward Snowden

The Interview: [The Most Wanted Man in the World](http://www.wired.com/2014/08/edward-snowden/) — James Bamford in Wired

Two Companion Pieces in WIRED: [I Left the NSA Clues, But They Couldn’t Find Them](http://www.wired.com/2014/08/snowden-breadcrumbs/) and [A Day With Edward Snowden](http://www.wired.com/2014/08/scott-dadich-snowden/)

Dan Geer: Cybersecurity as Realpolitik (video)

Dan Geer, CISO for In-Q-Tel, a not-for-profit investment firm that invests in technology that supports the missions of the CIA and broader U.S. intelligence community (i.e., the CIA’s venture arm), garnered [headlines](http://www.wired.com/2014/08/cia-0day-bounty/) this past week for the proposal that the U.S. intelligence community corner the market on security vulnerabilities and then disclose them. His presentation at Black Hat 2014, however, is well worth watching in its entirety, as he touches on policy proposals on a wider variety of topics including:
>Mandatory Vulnerability Reporting: 16:46
Net Neutrality: 22:20
Product Liability for Software: 25:31
Cyber Attack Counterstrikes: 32:12
Fallbacks/Resiliency: 33:28
Vulnerability Finding: 38:44
Right to be Forgotten: 40:15
Internet Voting: (only in [Transcript](http://geer.tinho.net/geer.blackhat.6viii14.txt))
Software Abandonment: 44:47
Convergence of Cyberspace and “Meatspace”: 47:04


08/11/2014: 

More Morozov

> “A robust privacy debate should ask who needs our data and why, while proposing institutional arrangements for resisting the path offered by Silicon Valley. Instead of bickering over interpretations of Facebook’s privacy policy as if it were the US constitution, why not ask how our sense of who we are is shaped by algorithms, databases and apps, which extend political, commercial and state efforts to make us – as the dystopian Radiohead song has it – ‘fitter, happier, more productive’? This question stands outside the privacy debate, which, in the hands of legal academics, is disconnected from broader political and economic issues. The intellectual ping pong over privacy between corporate counsels and legal academics moonlighting as radicals always avoids the most basic question: why build the ‘private spaces’ celebrated by Mr Zuckerberg if our freedom to behave there as we wish – and not as companies or states nudge us to – is so limited?” — from Evgeny Morozov’s [OpEd](http://evgenymorozov.tumblr.com/post/94364369710/my-ft-oped-on-privacy-subjectivity-and-facebook) in the Financial Times

08/11/2014: 


[Another Reminder That Anonymity Tools Aren’t Foolproof](http://motherboard.vice.com/read/your-secrets-are-only-as-secure-as-the-security-tools-you-use) – Vice’s MotherBoard: “Tails, the operating system favoured by journalists, activists, and Edward Snowden for its high degree of privacy protection, has been shown to have critical vulnerabilities in its code. By exploiting these, attackers could peal away a Tails user’s cloak of anonymity. It’s just the latest reminder that tools touted as ‘anonymous’ are not infallible.”

[Back Doors in Apple’s Mobile Platform for Law Enforcement, Bosses, Spies (Possibly)](http://boingboing.net/2014/07/23/back-doors-in-apples-mobile.html) — Cory Doctorow at BoingBoing: “Jonathan Zdziarski’s HOPE X talk, ‘Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices’, suggests that hundreds of millions of Iphone and Ipad devices ship from Apple with intentional back-doors that can be exploited by law enforcement, identity thieves, spies, and employers.”

[Tor Break Talk Axed from Black Hat Conference](http://www.zdnet.com/tor-break-talk-axed-from-black-hat-conference-7000031854/) — ZDNet: “A proposed talk by two Carnegie Mellon University researchers demonstrating how to de-anonymise Tor users on a budget of US$3,000 has been axed from the Black Hat USA 2014 conference in Las Vegas next month. The talk, ‘You don’t have to be the NSA to Break Tor: Deanonymizing Users on a Budget’ by speakers, Alexander Volynkin and Michael McCord, from Carnegie Mellon University’s Computer Emergency Response Team, had reportedly been highly anticipated by punters.”

[Visit the Wrong Website, and the FBI Could End Up in Your Computer](http://www.wired.com/2014/08/operation_torpedo/) — Wired: “Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes . . . For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”

[Putin Sets $110,000 Bounty for Cracking Tor as Anonymous Internet Usage in Russia Surges](http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html) — Bloomberg.

08/6/2014: 

Kevin Kelly: You Are Not Late

>“Can you imagine how awesome it would have been to be an entrepreneur in 1985 when almost any dot com name you wanted was available? . . . The internet was a wide open frontier then . . . Looking back now it seems as if waves of settlers have since bulldozed and developed every possible venue, leaving only the most difficult and gnarly specks for today’s newcomers . . . But, but . . here is the thing. In terms of the internet, nothing has happened yet. The internet is still at the beginning of its beginning. If we could climb into a time machine and journey 30 years into the future, and from that vantage look back to today, we’d realize that most of the greatest products running the lives of citizens in 2044 were not invented until after 2014 . . . There has never been a better time [to start something on the internet] with more opportunities, more openings, lower barriers, higher benefit/risk ratios, better returns, greater upside, than now. Right now, this minute . . . It is the best time EVER in human history to begin. You are not late.”

— [**Kevin Kelly**](http://en.wikipedia.org/wiki/Kevin_Kelly_%28editor%29) at **Medium**. [**Read the whole thing**](https://medium.com/message/you-are-not-late-b3d76f963142).

08/5/2014: 

Evgeny Morozov on “Facebook’s Gateway Drug”

> “[T]he ‘Internet’ in ‘Internet.org’ is not a natural resource that looks and costs the same everywhere based on its inherent features. It is a result of complex, controversial policy decisions over the use and ownership of communication infrastructure. These decisions follow years of lobbying and clever manipulation of national and international bodies by telecom operators, and are a direct consequence of various privatization and liberalization reforms in those countries. Facebook, because of its own long-term interest in expanding its advertising reach in the developing world, can make that Internet more accessible. But to accept its bargain is to abandon the fight to create different institutional arrangements — say, to rein in the power of telecom operators and provide cheaper, more equitable services.” — from Morozov’s [OpEd](http://www.nytimes.com/2014/08/03/opinion/sunday/evgeny-morozov-facebooks-gateway-drug.html) in The New York Times

08/5/2014: 

Microsoft’s GC on Privacy and Regulation

Brad Smith, executive vice president and general counsel at Microsoft, speaking at the Brookings Institution on [“The Future of Global Technology, Privacy and Regulation”](https://www.youtube.com/watch?v=0SaaCNcUjB0) in light of the Snowden revelations.

>”We need to recognize that we do need, in my opinion, a broad based legal and regulatory model when it comes to company use of personal information . . . . Imagine a bank that doesn’t take good care of its customers’ money. Do you think it has a bright future? What do you think of a tech company that doesn’t take good care of its customers information. I believe that over the long term the world will expect and even insist that we pay as much attention to the personal information of consumers as banks do to their money. And the sooner we get started on that, and the faster we come together to have [a] kind of broad based conversation . . . . . the more successful we will be.”


Total time: 1 hour, 30 minutes.
Brad Smith’s main presentation: 03:50 to 48:35
Moderator questions: 49:47 to 1.05:11
Audience questions: beginning 1.05:50

**Related:** [Personal Privacy Is Only One of the Costs of NSA Surveillance](http://www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/) — Wired:
>”American firms in the cloud computing sector are feeling the pressure as consumers and corporate clients reconsider using third-party storage companies in the U.S. for their data. Companies like Dropbox and Amazon Web Services reportedly have lost business to overseas competitors like Artmotion, a Swiss hosting provider. The CEO of the European firm reported that within a month after the first revelations of NSA spying went public, his company’s business jumped 45 percent. Similarly, 25 percent of respondents in a survey of 300 British and Canadian businesses earlier this year said they were moving their data outside the US as a result of NSA spying. The Information Technology and Innovation Foundation has estimated that repercussions from the spying could cost the U.S. cloud computing industry some $22 to $35 billion over the next few years in lost business.”

08/1/2014: 

Recommended:

> #### Cyber Law, Tech and Policy

> [Meet Executive Order 12333: The Reagan Rule that Lets the NSA Spy on Americans](http://m.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html) — John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor, in an OpEd at The Washington Post:

“A legal regime in which U.S. citizens’ data receives different levels of privacy and oversight, depending on whether it is collected inside or outside U.S. borders, may have made sense when most communications by U.S. persons stayed inside the United States. But today, U.S. communications increasingly travel across U.S. borders — or are stored beyond them. For example, the Google and Yahoo e-mail systems rely on networks of ‘mirror’ servers located throughout the world. An e-mail from New York to New Jersey is likely to wind up on servers in Brazil, Japan and Britain. The same is true for most purely domestic communications. Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all such communications — content as well as metadata — provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation. No warrant or court approval is required, and such collection never need be reported to Congress. None of the reforms that Obama announced earlier this year will affect such collection. Without any legal barriers to such collection, U.S. persons must increasingly rely on the affected companies to implement security measures to keep their communications private. The executive order does not require the NSA to notify or obtain consent of a company before collecting its users’ data.”

> [Network Neutrality and Quality of Service: What a Non-Discrimination Rule Should Look Like](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2459568) – a new paper [(pdf)](http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2461807_code523473.pdf?abstractid=2459568&mirid=1) by Stanford Law Professor Barbara Van Schewick.

> [Why the Security of USB Is Fundamentally Broken](http://www.wired.com/2014/07/usb-security/) — Wired:

”Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work. That’s the takeaway from findings security researchers Karsten Nohl and Jakob Lell plan to present next week, demonstrating a collection of proof-of-concept malicious software that highlights how the security of USB devices has long been fundamentally broken.”

> #### General Interest

> [40 Years on, the Barcode Has Turned Everything Into Information](http://www.wired.com/2014/06/forty-years-on-the-humble-barcode-has-turned-everything-into-information/) — Wired:

“On June 26, 1974, at 8:01 a.m., Sharon Buchanan used a barcode to ring up a 10-pack of Juicy Fruit at the Marsh Supermarket in Troy, Ohio. A tectonic shift in the underlying economics of trade in tangible, physical goods of all kinds soon followed. “

> [Stanford Team Achieves ‘Holy Grail’ of Battery Design: A Stable Lithium Anode](http://engineering.stanford.edu/news/stanford-team-achieves-holy-grail-battery-design-stable-lithium-anode).

> [Revolutionary new blood test ‘could detect ALL types of cancer’](http://www.dailymail.co.uk/health/article-2709708/Revolutionary-new-blood-test-detect-ALL-types-cancer.html) – The Daily Mail

08/1/2014: 

The Importance of Privacy

National security reporter, Barton Gellman, responding in a [Washington Post Q&A](http://live.washingtonpost.com/nsa-surveillance-bart-gellman.html) to the question of why anyone should care about U.S. government surveillance if they have nothing to hide:

> “Information is power. The US government (and US companies) now learn more about us than anyone has ever known about anyone, and secrecy prevents us from learning what they do. That puts us, in effect, behind a one way mirror. As a citizen who wants to hold my government to account, I find that troubling.
I am not saying that the government is abusing the power it has accrued. Sometimes the scandal is what’s legal, especially if lawmakers and citizens had no reasonable opportunity to learn what the executive branch believed it was authorized to do. But abuse is not far behind us in our history. Spying on enemies was one of the Articles of Impeachment against Nixon, and the FBI’s Hoover died in the lifetime of many people still living. I don’t know whether I’ve ever met someone who truly has nothing to hide. If you think that’s you, post a link to everything on your phone, your computer, your email accounts and your web browsing and purchasing history. And even if you have no secrets, you’re probably in possession of the secrets of others — the friend who is going to leave her husband, or wants to find a new job, or just got diagnosed with something she does not want people to know about. Privacy is relational. We may tell things to our friends we don’t tell our parents or our kids, and so on. I want control of my own secrets, personal and professional. That’s the bottom line.”

Also worthwhile: Barton Gellman’s 2003 lecture at Princeton on “Secrecy, Security and Self-Government: An Argument for Unauthorized Disclosures” (transcript: [Part I](http://www.tcf.org/work/foreign_policy/detail/secrecy-security-and-self-government-an-argument-for-unauthorized-disclosur/) and [Part II](http://www.tcf.org/work/foreign_policy/detail/secrecy-security-and-self-government-how-i-learn-secrets-and-why-i-print-th/)), as well as Conor Friedersdorf’s [Why the Press Can Publish Any Classified Material It Likes](http://www.theatlantic.com/politics/archive/2014/05/why-the-press-can-publish-any-classified-material-it-likes/371488/) in The Atlantic.

07/31/2014: 

A Fundamental Problem with the NSA’s Domestic Bulk Data Collection

[**NSA = J. Edgar Hoover On Steroids**](http://www.ritholtz.com/blog/2014/07/nsa-j-edgar-hoover-on-steroids/) – **The Big Picture**:

>”With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all . . . . J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C. To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans — an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet. In the Obama years, the first signs have appeared that NSA surveillance will use the information gathered to traffic in scandal, much as Hoover’s FBI once did.”

Read the whole thing. Domestic bulk data collected by the NSA conveys immense power on those with access to this information and will be prone to political (and financial) abuse. History demonstrates that the lure of such data for improper purposes likely will be irresistible. Hoover stayed in office for decades, aided in large part by the information the the FBI had collected on politicians of the day. Imagine what could be done with the data collected by the NSA.

07/16/2014: