Harvard Law & MIT Media Lab Course Syllabus on Internet Governance and Technology
The document is a course syllabus listing topics, readings, and instructor contacts. It contains no specific allegations, financial transactions, or actionable leads linking powerful individuals or ag Course taught by Jonathan Zittrain (Harvard) and Joi Ito (MIT Media Lab). Topics cover right to be forgotten, cryptocurrency, surveillance, net neutrality, AI, etc. Includes references to public read
Summary
The document is a course syllabus listing topics, readings, and instructor contacts. It contains no specific allegations, financial transactions, or actionable leads linking powerful individuals or ag Course taught by Jonathan Zittrain (Harvard) and Joi Ito (MIT Media Lab). Topics cover right to be forgotten, cryptocurrency, surveillance, net neutrality, AI, etc. Includes references to public read
Persons Referenced (2)
“...ety: The Technologies and Politics of Control Professor Jonathan Zittrain co-taught with Professor Joi Ito, Director of the MIT Media Lab Harvard Law School Winter 2017 Mon-Fri 10:30am-noon; 12:45pm-2pm...”
Donald Trump“...WID archived at https://perma.cc/SB2G-9XUM. • Caitlin Dewey, "Facebook fake-news writer: 'I think Donald Trump is in the White House because of me,- The Washington Post (November 17, 2016) https://www.washing...”
Tags
Ask AI About This Document
Extracted Text (OCR)
Technical Artifacts (158)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
sbates@law.harvard.edu25518382746447277397343145281844455262N2EXhttp://archive.wired.com/wired/archive/2.03/economy.ideas.html?topic=&topichttp://arstechnica.com/business/2013/05/drm-in-htm15-is-a-victory-for-the-open-web-nothttp://arstechnica.com/gadgets/2013/10/googles-iron-grip-on-android-controlling-open-sohttp://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-ohttp://coincenter.org/wp-content/uploads/2015/05/cryptocurrency-article.pdfhttp://commonstransition.org/the-revolution-will-not-be-decentralised-blockchainshttp://curia.europa.eu/juris/document/documenthttp://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2003-03.pdfhttp://dx.doi.org/10.2139/ssrn.388863http://foreignpolicy.com/2013/06/06/why-the-nsa-needs-your-phone-callshttp://homepages.law.asu.edu/—dkarjala/OpposingCopyrightExtension/commentary/Lesshttp://idlewords.com/talks/internethttp://moritzlaw.osu.edu/students/groups/oslyfiles/2012/03/63.2.greenhttp://newclues.cluetrain.comhttp://nymag.com/daily/intelligencer/2016/09/the-sandy-hook-hoax.htmlhttp://papers.ssrn.com/sol3/papers.cfm?abstracthttp://philosophicaldisquisitions.blogspot.com/2015/07/is-effective-regulation-of-ai-possibhttp://philosophicaldisquisitions.blogspot.ie/2015/11/is-anyone-competent-to-regulate.hthttp://pubpub.ito.com/pub/dmca-drm-aml-kyc-backdoorshttp://randomwalker.info/publications/crypto-dream-part1.pdfhttp://randomwalker.info/publications/crypto-dream-part2.pdfhttp://s-f-walker.org.uk/pubsebooks/2cultures/Rede-lecture-2-cultures.pdfhttp://whatisnetneutrality.org/timelinehttp://www.benkler.org/Benklerhttp://www.cluetrain.com/book/95-theses.htmlhttp://www.coindesk.com/blockchain-application-stackhttp://www.gnu.org/philosophy/free-sw.htmlhttp://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-workshttp://www.nature.com/news/there-is-a-blind-spot-in-ai-research-1.20805http://www.newyorker.com/news/john-cassidy/lessons-from-apple-versus-the-f-b-ihttp://www.newyorker.com/tech/elements/the-internets-telltale-heartbleedhttp://www.nytimes.com/2015/02/15/magazine/how-one-stupid-tweet-ruined-justine-sacchttp://www.nytimes.com/2015/06/07/magazine/the-agency.htmlhttp://www.nytimes.com/2016/10/22/business/internet-problems-attack.htmlhttp://www.nytimes.com/2016/11/06/opinion/sunday/whose-life-should-your-car-save.htmhttp://www.pubpub.org/pub/extended-intelligencehttp://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-originhttp://www.theatlantic.com/technology/archive/2016/04/bitcoin-hype/477141http://www.theatlantic.com/technology/archive/2016/10/information-fiduciary/502346https://blog.codinghorror.com/tivoization-and-the-gplhttps://coincenter.org/entry/what-are-smart-contracts-and-what-can-we-do-with-themhttps://coincenter.org/entry/what-is-ethereumhttps://coincenter.org/learnhttps://cyber.law.harvard.edu/pubrelease/dont-panic/Donthttps://dash.harvard.edu/bitstream/handle/1/4455262/Zittrainhttps://h2o.law.harvard.edu/collages/42536https://h2o.law.harvard.edu/playlists/51511https://internet-society2017.slack.com/signuphttps://joi.ito.com/weblog/2015/01/23/why-bitcoin-is-.htmlhttps://joi.ito.com/weblog/2016/06/23/society-in-the-.htmlhttps://judiciary.house.gov/wp-content/uploads/2016/02/Landau-Written-Testimony.pdfhttps://newrepublic.com/article/117878/information-fiduciary-solution-facebook-digital-gerhttps://papers.ssrn.com/sol3/papers.cfm?abstracthttps://perma.cc/282P-A7MShttps://perma.cc/2BLT-6ZELhttps://perma.cc/2CMH-UP4Ghttps://perma.cc/2GBN-FVMMhttps://perma.cc/2L3U-QST8https://perma.cc/2V5W-89P3https://perma.cc/3AHS-Z9EUhttps://perma.cc/3ARS-3X04https://perma.cc/3JE9-GM3Rhttps://perma.cc/3YFE-QS5Phttps://perma.cc/4E3V-SCALhttps://perma.cc/4ZPR-DXTAhttps://perma.cc/5EZ5-HWQJhttps://perma.cc/7884-5ZURhttps://perma.cc/7NUL-W5YJhttps://perma.cc/7T7T-UPJKhttps://perma.cc/98RS-L876https://perma.cc/9Z28-X6A4https://perma.cc/A5ES-HMQEhttps://perma.cc/AC9L-HW34https://perma.cc/AU7Y-BABZhttps://perma.cc/B3FK-FJVXhttps://perma.cc/B3SF-YJ3Whttps://perma.cc/B6S4-UBJChttps://perma.cc/B7RL-JRKKhttps://perma.cc/BC4A-96KPhttps://perma.cc/BER2-TD6Ehttps://perma.cc/BH6T-J6S7https://perma.cc/C2QJ-YFEYhttps://perma.cc/C7D5-754L?type=imagehttps://perma.cc/C8DE-2PJBhttps://perma.cc/CA2Y-3T58https://perma.cc/CBE8-2UXQhttps://perma.cc/DX8U-QJ5Ahttps://perma.cc/ED8B-C7YLhttps://perma.cc/F482-84AYhttps://perma.cc/FHE3-XUEDhttps://perma.cc/FTC3-M6EFhttps://perma.cc/H2CZ-N2EXhttps://perma.cc/H77J-TN43https://perma.cc/HH79-6YVXhttps://perma.cc/JC7F-XDUMhttps://perma.cc/K56R-MGBXhttps://perma.cc/L8JE-QYP8https://perma.cc/LZ9L-HZJYhttps://perma.cc/M2TZ-B9YXhttps://perma.cc/MEU4-W5N9https://perma.cc/MNP7-JZZLhttps://perma.cc/N9D9-JTYQhttps://perma.cc/NM9D-7Y2Vhttps://perma.cc/NT9M-ELAGhttps://perma.cc/P7K9-UXXPhttps://perma.cc/P82S-RZP3https://perma.cc/QKW2-3EQHhttps://perma.cc/QXX4-VASMhttps://perma.cc/R8LZ-MULJhttps://perma.cc/SB2G-9XUMhttps://perma.cc/T7UD-JHYZhttps://perma.cc/T9YD-U8Z9https://perma.cc/UM8C-NFPVhttps://perma.cc/V94Q-CCP3https://perma.cc/VH2T-7S7Vhttps://perma.cc/W4RK-Q6QJhttps://perma.cc/W9EX-5AGZhttps://perma.cc/WKN4-33XFhttps://perma.cc/X856-RWSChttps://perma.cc/XB6F-N9K8https://perma.cc/YE3N-TSWUhttps://perma.cc/YFQ5-42XWhttps://perma.cc/YK3D-3BQGhttps://perma.ccN6TW-2QAGhttps://points.datasociety.net/fake-news-is-not-the-problem-f0Oec8cdfcb#.kwtO1pk4hhttps://ssrn.com/abstract=2746447https://ssrn.com/abstract=2773973https://ssrn.com/abstract=388863https://www.buzzfeed.com/craigsilverman/how-macedonia-became-a-global-hub-for-prohttps://www.eff.org/cyberspace-independencehttps://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassmenthttps://www.eff.org/deeplinks/2016/02/zero-rating-what-it-is-why-you-should-carehttps://www.engadget.com/2013/04/29/the-itunes-influence-part-onehttps://www.gnu.org/gnu/initial-announcement.htmlhttps://www.gnu.org/philosophy/categories.htmlhttps://www.lawfareblog.com/google-france-forget-you-%E2%80%93-update-right-be-forhttps://www.schneier.com/academic/paperfiles/paper-keys-under-doormats-CSAIL.pdfhttps://www.schneier.com/essays/archives/2016/03/datahttps://www.softwarefreedom.org/resources/2008/foss-primer.pdfhttps://www.techdirt.com/articles/20140812/04314528184/can-we-kill-this-ridiculous-shhttps://www.theguardian.com/technology/2016/dec/04/google-democracy-truth-internet-shttps://www.w3.org/2016/03/EME-factsheet.htmlhttps://www.washingtonpost.com/news/the-intersect/wp/2016/11/17/facebook-fake-newshttps://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/07/no-theres-no-hhttps://www.wired.com/2008/10/ten-years-laterhttps://www.wired.com/2014/10/future-of-artificial-intelligencehttps://www.wired.com/2015/02/fcc-chairman-wheeler-net-neutralityhttps://www.wired.com/2015/09/epa-opposes-rules-couldve-exposed-vws-cheatinghttps://www.wired.com/2016/09/inside-googles-internet-justice-league-ai-powered-war-trhttps://www.youtube.com/watch?v=pcYJTIbhYFOREFERENCERelated Documents (6)
EFTA02677625
List of political figures and a Deutsche Bank contact with no context
The passage is merely a roster of former and current politicians, a professor, and a Deutsche Bank public‑affairs contact without any narrative, allegation, transaction details, dates, or actionable c Names of numerous U.S. political figures from both parties are listed together. A Deutsche Bank public‑affairs representative (Francis J. Kelly) is mentioned with an email address. No specific allega
FD-302(Itev.5-S-I0)
EFTA Document EFTA01655731
House Oversight Committee Epstein Documents - Request No. 1
THE FIRST FIFTY YEARS I | HOUSE_OVERSIGHT_000001 i HOUSE_OVERSIGHT_000002 Ban Feren Hey Jarecki Nick Leese Pees Mandelson George Mitchel Nthan Myhrvold Joc Pashcow Jo Pagano ‘Alberto Pinto Stan Par Donald Trump frie i Mon Zuckerman Unknown SCIENCE Gory Edelman Marta Gelman Steve Kossyn Marin Nowak Lox Smolin | SPECIAL ASSISTANTS I BUISNESS Ace Greater HOUSE_OVERSIGHT_000003 Jimmy Cayne Ted Serure Elliot Wolk Ir Zicherman THENEXT 50 YEARS = HOUSE_OVERSIGHT_000004 Ue fprea—g Ne d= a Ei b
EFTA Document EFTA01658887
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.