Main Content
47 U.S. Code § 230 - Protection for private blocking and screening of offensive material (1996)
2.1.1
http://perma.cc/J3AP-74JW
Alex Hern, “Apple Defies FBI and offers encryption by default on new operating system,” The Guardian (Oct 17, 2014)
6.3.2
http://www.theguardian.com/technology/2014/oct/17/apple-defies-fbi-encryption-mac-osx
Amy Harmon, “We the People of the Internet: Cybercitizens Debate How to Form On-Line Union, Perfect or Otherwise,” New York Times (Jun 29, 1998)
1.3.2
https://perma.cc/QVX9-YEBP?type=pdf
Barbara van Schewick and Morgan Weiland, "Evaluating the Chairman's Revised Net Neutrality Proposal," The Center for Internet and Society Blog (May 12, 2014)
3.1.5
http://perma.cc/Q6KJ-PCT2
Barbara van Schewick, "The FCC Changed Course on Net Neutrality. Here Is Why You Should Care," The Center for Internet and Society Blog (April 25, 2014)
3.1.4
http://cyberlaw.stanford.edu/blog/2014/04/fcc-changed-course-network-neutrality-here-why-you-should-care
Bruce Berkowitz and Robert Hahn, “Cybersecurity: Who’s Watching the Store?” Issues in Science and Technology (Spring 2003)
8.1.1
http://perma.cc/S8GN-YASK
Bruce Schneier, "Did North Korea Really Attack Sony?" The Atlantic (Dec. 22, 2014)
8.4.4
http://www.theatlantic.com/international/archive/2014/12/did-north-korea-really-attack-sony/383973/
Bruce Schneier, “The Internet of Things is Wildly Insecure—And Often Unpatchable,” Schneier on Security (Jan 6. 2014)
8.3.3
https://perma.cc/YT7P-2K25
Bruce Schneier, “The Trajectories of Government and Corporate Surveillance,” Schneier on Security (Oct 21, 2013)
6.6.3
https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html
Bruce Schneier, "The Value of Privacy," Schneier on Security (May 19, 2006)
5.2.1
https://www.schneier.com/blog/archives/2006/05/the_value_of_pr.html
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.