E-mail:
Jack Balkin: jackbalkin at yahoo.com
Bruce Ackerman bruce.ackerman at yale.edu
Ian Ayres ian.ayres at yale.edu
Corey Brettschneider corey_brettschneider at brown.edu
Mary Dudziak mary.l.dudziak at emory.edu
Joey Fishkin joey.fishkin at gmail.com
Heather Gerken heather.gerken at yale.edu
Abbe Gluck abbe.gluck at yale.edu
Mark Graber mgraber at law.umaryland.edu
Stephen Griffin sgriffin at tulane.edu
Jonathan Hafetz jonathan.hafetz at shu.edu
Jeremy Kessler jkessler at law.columbia.edu
Andrew Koppelman akoppelman at law.northwestern.edu
Marty Lederman msl46 at law.georgetown.edu
Sanford Levinson slevinson at law.utexas.edu
David Luban david.luban at gmail.com
Gerard Magliocca gmaglioc at iupui.edu
Jason Mazzone mazzonej at illinois.edu
Linda McClain lmcclain at bu.edu
John Mikhail mikhail at law.georgetown.edu
Frank Pasquale pasquale.frank at gmail.com
Nate Persily npersily at gmail.com
Michael Stokes Paulsen michaelstokespaulsen at gmail.com
Deborah Pearlstein dpearlst at yu.edu
Rick Pildes rick.pildes at nyu.edu
David Pozen dpozen at law.columbia.edu
Richard Primus raprimus at umich.edu
K. Sabeel Rahmansabeel.rahman at brooklaw.edu
Alice Ristroph alice.ristroph at shu.edu
Neil Siegel siegel at law.duke.edu
David Super david.super at law.georgetown.edu
Brian Tamanaha btamanaha at wulaw.wustl.edu
Nelson Tebbe nelson.tebbe at brooklaw.edu
Mark Tushnet mtushnet at law.harvard.edu
Adam Winkler winkler at ucla.edu
Nowhere to Hide: Data, Cyberspace, and the Dangers of the Digital World
Guest Blogger
Andrew Burt
For as long as software has been relied upon, officials and researchers alike have been sounding alarm bells about the vulnerability of all our data—sometimes comically, but nonetheless gravely. Here, for example, is how one Congressional report described the issue of data security: "If architects built buildings the way programmers build programs, then the first woodpecker to appear would destroy civilization." This was in 1989.
Here’s how the head of the Central Intelligence Agency described a variation of the same problem: “We are staking our future on a resource that we have not yet learned to protect.” This was in 1998.
Examples of these types of warnings are not hard to find—not because such prognostications require such foresight, but because it is not all that hard to be right about the risks of digital technologies. Their dangers are plentiful, and we use them more and more.
Yet layered underneath all our profound privacy and security vulnerabilities, there are also three much less obvious effects of these trends, which form the basis of my new whitepaper, Nowhere to Hide: Data, Cyberspace and the Dangers of the Digital World, the first of new Digital Future Whitepaper Series published by the Yale Information Society Project today. These three trends are as follows: Privacy is dead. So is trust. And you’re not who you think you are.
After I overview each trend, I make a handful of concrete suggestions about what we can and should do to address each development—as lawyers, as policymakers, and as citizens around the world. The sky may seem like it is falling in cyberspace, I will argue, and with good reason, but it need not fall as fast nor land as hard.
Andrew Burt is a Visiting Fellow of the Information Society Project, Managing Partner at bnh.ai and Chief Legal Officer at Immuta. You can reach him by e-mail at burt at aya.yale.edu