| Balkinization   |
|
Balkinization
Jack Balkin: jackbalkin at yahoo.com Bruce Ackerman bruce.ackerman at yale.edu Ian Ayres ian.ayres at yale.edu Corey Brettschneider corey_brettschneider at brown.edu Mary Dudziak mary.l.dudziak at emory.edu Joey Fishkin joey.fishkin at gmail.com Heather Gerken heather.gerken at yale.edu Abbe Gluck abbe.gluck at yale.edu Mark Graber mgraber at law.umaryland.edu Stephen Griffin sgriffin at tulane.edu Jonathan Hafetz jonathan.hafetz at shu.edu Jeremy Kessler jkessler at law.columbia.edu Andrew Koppelman akoppelman at law.northwestern.edu Marty Lederman msl46 at law.georgetown.edu Sanford Levinson slevinson at law.utexas.edu David Luban david.luban at gmail.com Gerard Magliocca gmaglioc at iupui.edu Jason Mazzone mazzonej at illinois.edu Linda McClain lmcclain at bu.edu John Mikhail mikhail at law.georgetown.edu Frank Pasquale pasquale.frank at gmail.com Nate Persily npersily at gmail.com Michael Stokes Paulsen michaelstokespaulsen at gmail.com Deborah Pearlstein dpearlst at yu.edu Rick Pildes rick.pildes at nyu.edu David Pozen dpozen at law.columbia.edu Richard Primus raprimus at umich.edu K. Sabeel Rahmansabeel.rahman at brooklaw.edu Alice Ristroph alice.ristroph at shu.edu Neil Siegel siegel at law.duke.edu David Super david.super at law.georgetown.edu Brian Tamanaha btamanaha at wulaw.wustl.edu Nelson Tebbe nelson.tebbe at brooklaw.edu Mark Tushnet mtushnet at law.harvard.edu Adam Winkler winkler at ucla.edu Compendium of posts on Hobby Lobby and related cases The Anti-Torture Memos: Balkinization Posts on Torture, Interrogation, Detention, War Powers, and OLC The Anti-Torture Memos (arranged by topic) Recent Posts Data Storage and the Fourth Amendment
|
Friday, December 23, 2005
Data Storage and the Fourth Amendment
JB
This Boston Globe story contains a few quotes from a long discussion I had with Charlie Savage, a Globe reporter, about the 4th Amendment implications of Echelon style surveillance. One theory holds that if the government has a computer sift through messages and phone calls, there is no Fourth Amendment problem. (For the moment I put aside the rather important differences between phone calls and e-mails under current law. That's a big if, and I don't want the reader to overlook it). The basic idea is that having a computer sift through messages raises no constitutional problems because no human being is listening in or reading anything. Rather, all the surveillance is peformed by a computer program. I think this argument is technologically naive. The question is not whether a computer program does the initial collection of data but what happens to the data after it is collected. As storage costs decrease to zero, it makes sense to keep a copy of everything you collect so that you can index and search through it later. If you think that the amount of traffic that goes through a system like Carnivore (or like Echelon) is simply too great to collect, you are using yesterday's assumptions. Given Moore's Law with respect to decreasing cost of computing power and its rough equivalent with respect to the decreasing costs of storage space, you should assume that if the government can invest in large server farms to store data (as Google already does) it will do so. Remember that Google already keeps a cached copy of almost everything it searches for on the Internet. And Google mail keeps a copy of all of your e-mail on its servers. Storage of enormous amounts of data is part of its business model. Why do we assume this capacity is beyond the United States government? Once data in digital form (whether voice or text or video) is stored, it must be searched and analyzed to be of any use. Put another way, data mining requires both data collection and data storage that allows the data to be mined. At some point in the process, human beings will receive information from the system. Once they receive that information, they will want to know the context in which the data that the computer has spit out to them appeared. That is, they will want access to the data base. If the data has been stored, they will have access to it. Thus the key issue is not whether the data collection was done by a human being or by a computer program. The key issue is whether the results of the data collection are stored somewhere on a computer (or, more likely, a server farm) to which government agents have access. Unless there is a policy requiring automatic destruction of the data after a specified time, the data will remain on the computer because as storage costs decrease it is cheaper to keep data than to spend the time figuring out what to get rid of. (Once again, think about Google Mail, which assumes that you will keep all your e-mail messages, no matter how trival, on its servers because it takes too long to sift through and delete the messages you don't need any more.). When storage costs approach zero, data collection increasingly means permanent data storage unless there is a specific policy to counteract it. (To put some perspective on this, the Defense Department appears to have adopted a 90 day retention policy for a different database of suspicious incidents collected about American citizens, but it also seems not to have followed its own data destruction policy.) In our current imagination the paradigm case of an electronic Fourth Amendment violation is real time eavesdropping on a telephone conversation. But we all know that it should make no difference if the wiretap is recorded automatically and listened to later. In like fashion, it should make no difference if the government collects information for data mining purposes, stores it on a server farm somewhere, and then returns to search the collected information at its leisure. If the information is stored, then we have a potential Fourth Amendment problem, even if the data is not accessed immediately by any human being. Indeed, if lack of sentience allows an end run around the Fourth Amendment, then why not have robots do all the government's searching? They can collect information, store it, and allow government agents to search what the bots have found at their leisure. Moreover, since wires go into every person's home, and wireless broadcasting emanates outside every person's home, even the home should lack any special Fourth Amendment status if bots are doing all the government's dirty work. Again, the key issue is not who collects the data initially (human or robot) but whether the data is stored. None of the accounts I have read in the press tell me how long the data collected by computers is stored or who has access to the data base. That is the question that everyone should be asking.
Comments:
What is so interesting is not that the 4th amendment is out of date or antiquated, but it seemed to be pefectly written to apply and adapt to all times.
The cameras in the London subways take pictures all the time and store them on disk. It would be a violation of privacy if they were to develop a system to track the movement of ordinary citizens all the time, but this is a very useful system to track back terrorists after an attack.
If you transmit data through the public systems, some of that data will be stored electronically for a while. In transit it is stored in memory. At the destination, it is stored on the hard disk of your "Post Office" server until you decide to pick up your messages. The Fourth Amendment protects "persons, houses, papers, and effects, against unreasonable searches and seizures." Some court decisions have suggested that it is a violation of this amendment to take aerial infra-red photographs of the roofs of houses for the purpose of identifying people who may be growing marijuana. This cannot then be used to say that it is illegal to take aerial photographs for any purpose because they might later be used by the government in a way that some court finds would violate the law. This means that any policy has to be based on intent and effect rather than mechanics. The storage of data passing through the public communications infrastructure by itself should never be prohibited by law, either for the government or for those maintaining the infrastructure. What should be controlled is the access to that data and the way in which it is used. There are certainly technical solutions that can be mandated to protect the stored data. Any protection mechanism can be bypassed, but generally it would be easier to illegally tap into the original data stream than to crack a properly maintained security system. Then there would be time to sift through questions of probable cause and get judicial warrants to access the data legally. If it is possible for the Government to get a warrant to view data legally, then it should be permissible for the government to take steps to preserve the data long enough to obtain the warrant and longer if there may be a gap between the collection of the data and the circumstance leading to probable cause. Length of storage is not an issue as long as proper custody and security of the raw data is maintained. It is no more possible to claim privacy for your particular bits flowing through the Internet than it is to claim privacy for your particular infrared photons flying through the air. It is possible to legislate the end use of collected material, where intent and effect are obvious. Attempts to legislate based on intermediate processing will always produce silly results.
It seems to me that if Mustafa calls Abdullah and says "Drive the truck with the dynamite in the parking garage of the Sears Tower, set the timer for five minutes and get as far away as you can", and listening in on this is illegal, then we are goners. We do not have a constitution -- we have a suicide pact. We may as well invite Osama bin Laden to be our Caliph, convert to Islam and save everyone a lot of trouble. Although a better solution would be to slit our throats.
But seriously, is the President's Constitutional authority to defend our borders under Article II limited to assigning soldiers with keen hearing to listen for the drone of approaching planes? Telecommunications have changed the world. I propose this: If our laws prohibit listening in on any international telecommunication, then we do away with international communications. Knock down the satellites and cut the transocean cables. Let them do it all by mail. Do you argue that this is not within the power of the government to do? The sender and addressee are in plain view on a mailed envelope. If either is suspicious the government can apply for a search warrant to open the letter or package. What trade-off will you give for the convenience of instant communication across the globe? A little loss of your privacy or 1,200 degrees Fahrenheit from the aviation fuel burning in your home or office?
I used to be interested in this topic. If memory serves, what happens is that it's stored electronically for two years, and then is deleted.
That's if memory serves, though. It's been a long while since I read that. Then again, nobody reports on Carnivore/Echelon anymore.
Perhaps its just me, but is there a specific reason that things change simply because information reaches human eyes, as opposed to only being checked by a computer program? Are human eyes somehow more sinister? Is it that the human may be corruptible, more likely to be irresponsible, may have an agenda not in keeping with the constitution, or that the human may be more likely to make a mistake, or might just have old-fashoned bad intentions? Is the presence of human intention the deciding criteria? If it is, then its worth noting that the programs which do the scanning are processes designed according to criteria laid out by the same 'human eyes' that we don't want to be indiscriminately reading/listening in on the communications being scanned.
In other words, the scanning being done has the same intent as the human eyes that told the computer program what to scan for. The perhaps unwitting statement made by the WP article is that its not good to scan communications manually, but its just fine to automate scanning. Is it just me, or is the article saying that less harm is done by automating something as opposed to doing it by hand? If its potentially harmful to do something by hand, it somehow not harmful once you automate it? How is it that we believe that automating something is automatically better? Have we been duped into thinking that new is unfailingly better? Its perhaps an unreasonable statement to make, but I hope the same leap of logic isn't applied to the justice system. Food for thought, and maybe even indigestion.
Computer messages may be scanned and stored dozens of times just to get to their destination. The header must be read, then the destination must be used to find the next step in the routing. Like a postcard, every computer message carries its destination and message in the same place.
It is less common these days to find intermediate nodes that store mail for a long time, but twenty years ago that was the most common mechanism. Certainly mail is stored at the final mail server, where it is backed up to tape regularly to provide recovery from system crashes. As several administrations and white collar criminals have discovered, "deleted" mail can be restored months or even years later. So the point is that you cannot declare that it is illegal to scan or store messages. You might try to make it illegal for the government to scan messages but OK for everyone else to, but that only works if the government is never part of the intermediate delivery mechanism. Furthermore, the Internet now rests on the edge of a cliff where any group of compromised machines could be remotely triggered to launch a serious denial of service attack that would shut the entire thing down. In the event of attack, the only thing that could keep US data communications running would be some government intervention and a serious message scanning and discarding heuristic (or government approval for private entities to do the same thing). Even universities, who are terribly reluctant to do anything that appears to control content, are increasingly scanning incoming mail for well know virus payloads and disarming or discarding them. This is, however, trivial compared to what a determined enemy could do if they had people skilled enough to seriously attack the system. So in the end, the reason why it is OK for machines to scan messages is the same reason why it is OK for postal workers to read the address on a letter. If they don't, nothing works. Therefore, in the long run privacy can only be legislated by controlling access based on intent or effect and not by controlling raw access.
Email message headers only are 'scanned' for routing purposes by typically 3-6 (sometime more) SMTP routers/servers.
However, as in the case of the postal worker, the destination (and in some cases the source) is what is examined - not the content. Howard's premise is that since I've written an address on the outside of a letter, I have given the post office permission to open and read the letter. I do not think this is the case. Nor does it seem to make any sense that just because someone has implied permission to store a message they also have permission to read the message. Also, even at the inception of Internet email, it was rare for a message to stay on a server for more than four hours. In instances where the actual content of email is scanned, which is increasingly the case business and academia as Howard pointed out, it is disclosed to people that email is scanned. In fact, its as common to disclose that such scanning takes place as it is to perform such scanning. If fact, if email routers did try to read the content of messages, few of them would work at all. Email is always scanned by separate servers dedicated to scanning. Further, there is no logical association between the content and its destination - that's why there's a 'To' field in the program you use to read and send email, and why email routers don't read the content of email messages. Email is actually successfully delivered to people on the Internet for exactly the opposite reason that Howard cites - because email routers do not read the contents of entire messages.
The Post Office operates efficiently because workers only look at the right (address) part of the Post Card and don't bother to read the left (message) part. It is true that current Sendmail based mail systems only bother to look at the headers (and remember they rewrite them so that every message contains a list of intermediate processing steps).
You only need to record the from: and to: headers to do the type of traffic analysis that the newspapers are reporting the goverment is doing. There is, however, a problem when you assume that you can legislate a rule that intermediate routers can never semantically process the content of a message. The Intenet mail standards were never based on the assumption that everyone used the same language, character sets, file formats, and conventions. There are a set of RFC standards for the usual "Sendmail" internet mail protocol. However, other protocols (IBM RSCS, X.400) still exist and are in use. Internet mail is Inter-Net because it is translated at network boundaries whenever the standards change. Thus a few decades back, every message transmitted between the universities on Bitnet and those on the Internet had to be reformatted at the network boundary from EBCDIC to ASCII standards. Ten years from now we may be migrating from the current unworkable mess of SPAM, phishing, and other diseases to some new, safer, more reliable system, and messages will again have to be reformatted at the boundary. Or even better, suppose that Google does take over the world, and ten years from now I can send a mail message through the Google-enhanced Internet and have it automatically translated from English to the language preferred by the addressee. I certainly would not want some ideologically based law blocking such a service from developing. It is important not to legislate or regulate based on the assumption that the thing you know best is the only way things have ever worked,the only way they work now, and will work the same forever. If the Internet will ever be ready to protect itself against a bot attack, it will use the same kind of traffic analysis and heruistic data mining that the government is currently alleged to have used to find terrorists. You cannot legislate about the technology, but rather only about the purpose to which it is used.
I find it curious that no one has mentioned the impact of message encryption on the utility of scanning e-mail since my recollection (from 10-15 years ago) is that e-mail encryption tools offering at least a modest degree of protection were readily available even "way back then". presumably serious terrorists would use such counterintelligence methods. is there some reason this is not relevant to the discussion?
My original point was that why messages are scanned and by whom is what is relevant.
Also, to throw in a bit regarding encryption for ctw, there is good encryption for email, PGP/GPG both public/private encryption schemes. That encryption is at least theoreticaly breakable, but even with vast amount of supercomputing available, a resaonably long key with a decent cypher would take long enough to crack that the information would very likely lose its timeliness. Cyphers do get broken all the time - a Chinese cryptographer broke MD5 last year, and another Chinese cryptographer demonstrated how to break SHA1 in much less time than previously thought - 2000 times faster than before. About 96 days and 36M$ of computing power in present day CPU cost/cycles was shown as sufficient to get collisions for SHA1. Now there's just SHA256 and SHA512 that are considered to be strong enough to be considered reasonably collision-free.
bitswapper:
tnx for the update. if I interpret it correctly, it confirms my suspicion that computationally viable scanning of massive amounts of e-mail text would be ineffective against even minimally sophisticated encryption. this would appear to be an argument against this version of data mining in the tradeoff between security and privacy interests.
Absent any legislation, the inherent power of the President to employ warranless surveillane has been established law and a precident establshed by our threee greatest presdients and every one of them who succeeded FDR.The Hiouse report of l978 which supported the FISA bill, adopted the principle that the Congress had the power reasonably to restrict that power. The platoon of established constitutional experts who supported FISA in their famous letter to the Congress relied on that principle.As Judge Posner is his several writings has made clear, FISA is not reasonable. Its exclusion of warranless electronic surveillance, and only authorizing such surveillance of a target reasonably belived to be a terrorist or agent thereof is patently unreasonable. The mission of our intelligence is not to survey identified terrorists but to find them. As the Judge wrote, FISA "might as well have been enacted in l878 to rgulate the intercepton of telegams."
Try as we may, and we must try harder, we cannot rely on our physical defense of our airports, our ports, our infrastructure, our major cities, our government's offices.Our intelligenceis our most valuable defense, and to exclude the use of the enormous facilities of the NSA, with one of the world's largest assembly of comlpute power, its satellites, its foreign resources, its large staff,its experience, is itself patently unreasonable. Unless you believe the Constitution is a suicide pact, you must hold that the NSA warrant suraveillance is legal and it is FISA's exclusive clause which is unconstituional. Interestingly, critics of the NSA program have argued that the Supreme Court in Hamdan who have demolished the President's claim of warrantless surveiollance power.Read the Supreme Court opinion, and Justice Kennedy's concurring opinion joined in by Justice Stevens and you will learn that the decision was the the miiltary commission autorized by the Predident was illegal because it violated the Military Code of Justice and the Geneva Convention AND because the Government had not established that it was justified, that is, reasonable. The chances of that Court condemning warrantless surveillance are low indeed. All of this is spelled out in detail (4500 WORDS), confronting the sevral arguments made for FISA, in a blog I recently establishedat "www.aborden.typepad.Com." (NO CAP HERE)
Absent any legislation, the inherent power of the President to employ warrantless surveillance has been established law and a precedent established by our three greatest presidents and every one of them who succeeded FDR. The House report of l978 which supported the FISA bill, adopted the principle that the Congress had the power reasonably to restrict that power. The platoon of established constitutional experts who supported FISA in their famous letter to the Congress relied on that principle. As Judge Posner in his several writings has made clear, FISA is not reasonable. Its exclusion of warrantless electronic surveillance, and only authorizing such surveillance of a target reasonably believed to be a terrorist or agent thereof is patently unreasonable. The mission of our intelligence is not to survey identified terrorists but to find them. As the Judge wrote, FISA "might as well have been enacted in l878 to regulate the interception of telegrams."
Try as we may, and we must try harder, we cannot rely on our physical defense of our airports, our ports, our infrastructure, our major cities, our government's offices. Our intelligence is our most valuable defense, and to exclude the use of the enormous facilities of the NSA, with one of the world's largest assembly of computer power, its satellites, its foreign resources, its large staff, its experience, is itself patently unreasonable. Unless you believe the Constitution is a suicide pact, you must hold that the NSA warrant surveillance is legal and it is FISA's exclusive clause which is unconstitutional. Interestingly, critics of the NSA program have argued that the Supreme Court in Hamdan who have demolished the President's claim of warrantless surveillance power. Read the Supreme Court opinion, and Justice Kennedy's concurring opinion joined in by Justice Stevens and you will learn that the decision was the military commission authorized by the President was illegal because it violated the Military Code of Justice and the Geneva Convention AND because the Government had not established that it was justified, that is, reasonable. The chances of that Court condemning warrantless surveillance are low indeed. All of this is spelled out in detail (4500 WORDS), confronting the several arguments made for FISA, in a blog I recently established at www.aborden.typepad.com.
We sell cheap rechargeable dell laptop batteries for most dell latitude/inspiron/xps laptop series on the market, such as Dell Latitude D620 Battery, Dell Inspiron 1501 Battery, Dell Inspiron 1525 Battery, Dell Inspiron 8100 Battery, Dell Inspiron E1705 Battery, Dell Inspiron 6000 Battery, Dell Inspiron 1200 Battery, Dell Inspiron E1505 Battery, Dell Inspiron 1000 Battery, Dell Latitude D600 Battery, Dell Inspiron 1720 Battery. We offers a complete line of Dell batteries and compatible replacements for most laptop models, such as Dell Latitude D830 Battery, Dell Inspiron 1300 Battery, Dell Inspiron 8200 Battery, Dell XPS M1530 Battery, Dell Inspiron 6400 Battery, Dell Latitude D820 Battery, Dell Latitude D610 Battery, Dell Latitude D630 Battery, Dell Latitude D830 Battery, Dell Inspiron 5100 Battery.
nice your blog and very nice dear your blog Ranking is too Good we like its you can see our also website for online shopping......
laptop batteries
Not long came upon the clause and possess been recently meter reading on. I must expressage my personal wonderment of your written material skill as well as capability to make audience understand right from the start to the remnant. I'd really like to see new blogposts as well as plowshare my own feelings with you.
rs gold runescape gold
Obat kutil kelamin dari dalam
Obat kutil kelamin dari dalam Obat antibiotik kutil kelamin Obat kutil kelamin yang dijual di apotik Beli obat kutil kelamin di apotik Nama obat kutil kelamin di apotek Obat kutil kelamin yang tersedia di apotik Cuka apel obat kutil kelamin Obat ampuh menghilangkan kutil kelamin Obat alami menyembuhkan kutil kelamin Obat apotek untuk kutil kelamin Ace max's obat kutil kelamin Cara ampuh mengobati jengger ayam tanpa kambuh lagi Cara ampuh mengobati jengger ayam tanpa kambuh lagi obat apotik jengger ayam obat dokter jengger ayam obat herbal untuk jengger ayam obat penyakit kulit jengger ayam obat untuk menghilangkan jengger ayam obat untuk menghilangkan jengger ayam obat penyakit jengger ayam alami obat ampuh jengger ayam obat antibiotik jengger ayam obat alami untuk penyakit jengger ayam obat ampuh penyakit jengger ayam obat kutil atau jengger ayam obat dokter penyakit jengger ayam obat ampuh menyembuhkan gonore obat ampuh menyembuhkan gonore obat tetes mata gonore madu obat gonore obat tradisional untuk mengobati gonore obat mujarab gonore obat gonore paling manjur obat tradisional menyembuhkan gonore obat untuk mengobati gonore merk obat gonore di apotik macam2 obat gonore nama obat gonore
Obat sipilis atau raja singa
Obat sipilis herbal Obat sipilis murah Obat sipilis manjur Obat sipilis antibiotik Obat sipilis adalah Obat sipilis generik Obat sipilis ampuh Obat sipilis atau raja singa Obat sipilis herbal Obat sipilis murah Obat sipilis jogja Obat sipilis Yang manjur obat sipilis denature indonesia Obat sipilis resep dokter Obat sipilis paling manjur Obat sipilis pada wanita Obat sipilis paling ampuh Obat sipilis manjur Obat sipilis ampuh Obat sipilis atau raja singa Obat sipilis herbal Obat sipilis murah Obat sipilis ampuh Obat sipilis atau raja singa Obat sipilis herbal Obat sipilis murah Obat sipilis jogja Obat sipilis apotik Obat sipilis apa ya Obat sipilis akut Obat sipilis amoxilin
obat sipilis paling ampuh
obat sipilis yang ada di apotik obat sipilis jogja obat sipilis de nature obat sipilis tradisional daun sirih obat sipilis antibiotik obat sipilis kimia farma obat sipilis dokter obat sipilis murah obat sipilis thiamycin obat sipilis apotik Cara untuk menghilangkan jengger ayam obat herbal untuk jengger ayam obat penyakit kulit jengger ayam obat untuk menghilangkan jengger ayam obat penyakit jengger ayam alami obat ampuh jengger ayam obat antibiotik jengger ayam obat alami untuk penyakit jengger ayam obat ampuh penyakit jengger ayam obat kutil atau jengger ayam
Ramuan tradisional obat kencing nanah
Ramuan untuk obat kencing nanah Resep obat tradisional kencing nanah Resep obat untuk kencing nanah Obat kencing nanah surabaya Obat kencing nanah secara tradisional Obat kencing nanah super tetra Obat kencing nanah semarang Obat sakit kencing nanah Super tetra obat kencing nanah Cara mengobati jengger ayam dan kutil kelamin obat kutil kelamin obat kutil kelamin di apotik obat kutil kelamin tradisional obat kutil kelamin wanita obat kutil kelamin pada pria obat kutil kelamin apotik obat kutil kelamin murah obat kutil kelamin de nature obat kutil kelamin untuk ibu hamil obat kutil kelamin dokter
ramuan obat herpes tradisional
resep obat herpes ramuan obat herpes obat herpes kulit ringan obat herpes selain acyclovir obat herpes salep acyclovir obat herpes secara alami obat herpes sembuh total obat herpes selangkangan Obat kutil kelamin/jengger ayam Obat kutil kelamin paling murah Obat kutil kelamin dari dalam Obat antibiotik kutil kelamin Obat kutil kelamin yang dijual di apotik Beli obat kutil kelamin di apotik Nama obat kutil kelamin di apotek Obat kutil kelamin yang tersedia di apotik Cuka apel obat kutil kelamin Obat ampuh menghilangkan kutil kelamin Obat alami menyembuhkan kutil kelamin Obat apotek untuk kutil kelamin Apa obat untuk kutil kelamin Obat alami untuk mengobati kutil kelamin Obat kutil kelamin yang ada di apotik Obat kutil kelamin bandung Beli obat kutil kelamin Dimana beli obat kutil kelamin
Obat tradisional buat kutil kelamin
Obat salep buat kutil kelamin Www.obat kutil kelamin.com Obat cina kutil kelamin Cuka obat kutil kelamin Obat cina untuk kutil kelamin obat herpes secara tradisional obat herpes soster obat herpes selain asiklovir obat herpes simplex untuk ibu hamil obat herpes simplex pada anak obat herpes simplex adalah obat sakit herpes kulit obat salep herpes zoster obat salep herpes kelamin obat herpes tradisional Obat kutil kelamin yang untuk wanita hamil obat kutil di sekitar kelamin obat sakit kutil kelamin obat kutil kelamin terbaik obat kutil kelamin salep obat kutil kelamin terbaru obat tradisional kutil kelamin obat tradisional untuk kutil kelamin obat herbal untuk kutil kelamin obat tradisional untuk menyembuhkan kutil kelamin obat kutil kelamin yang tersedia di apotek
Obat wasir alami yang ampuh
Obat wasir anoral Obat wasir ambeven Obat wasir ardium hd Obat wasir berdarah di apotik Obat wasir bentuk peluru Obat wasir bengkak Obat wasir boraginol Obat wasir bagus Obat wasir paling ampuh Obat wasir ardium Obat wasir di apotik Obat wasir luar Obat wasir ampuh di apotik Obat wasir alami dari tumbuhan Obat wasir untuk ibu menyusui Obat wasir parah Obat wasir venaron Obat wasir dalam Obat wasir alami bagus Obat wasir ampuh tanpa operasi Obat wasir ambeien Obat wasir ambeclear Obat wasir akut Obat wasir atau ambeien Obat wasir aman untuk ibu hamil Obat wasir ampuh bagus Obat wasir alami untuk ibu hamil Obat wasir anak Cuka apel obat kutil kelamin Obat ampuh menghilangkan kutil kelamin Obat alami menyembuhkan kutil kelamin Obat apotek untuk kutil kelamin Apa obat untuk kutil kelamin
Obat alami untuk mengobati kutil kelamin
Obat kutil kelamin yang ada di apotik Dimana beli obat kutil kelamin Obat tradisional buat kutil kelamin Beli obat kutil kelamin Obat salep buat kutil kelamin Www.obat kutil kelamin.com Obat cina kutil kelamin Cuka obat kutil kelamin Obat cina untuk kutil kelamin Obat cina penghilang kutil kelamin Obat china untuk kutil kelamin Obat kutil di kelamin pria Obat tradisional kutil di kelamin Obat kutil di daerah kelamin Obat untuk menghilangkan kutil di kelamin Obat dokter untuk kutil kelamin Obat kutil di sekitar kelamin Obat farmasi untuk kutil kelamin Obat generik untuk kutil kelamin Obat kutil kelamin imiquimod Jual obat kutil kelamin Jual obat kutil kelamin murah Obat kutil kelamin yg di jual di apotik Jual obat penghilang kutil kelamin
Obat sipilis Obat kutil kelamin obat wasir
Obat sipilis raja singa paling ampuh obat sipilis amoxicillin obat sipilis adalah obat sipilis atau raja singa obat sipilis apa obat sipilis anjuran dokter obat sipilis apa ya obat sifilis akut obat sipilis apa namanya obat alami sipilis pada pria obat antibiotik sipilis di apotik obat sifilis ampuh apa obat sipilis obat sifilis apotek obat sifilis adalah obat sifilis atau raja singa Cara paling ampuh mengobati kutil kelamin pengobatan ampuh kutil kelamin pada wanita obat kutil kelamin yang ada di apotik obat kutil kelamin yg dijual di apotik obat kutil di kemaluan wanita pengobatan kutil kelamin pada pria pengobatan penyakit kutil kelamin pada pria obat penyakit kutil pada kelamin pria Pengobatan kutil kelamin aman dan tanpa operasi obat kutil pada alat kelamin pria pengobatan kutil kelamin Obat herpes zoster tradisional Obat herpes untuk ibu hamil Obat herpes ampuh Obat herpes untuk anak Obat herpes mulut Obat herpes tradisional yang ampuh
Obat herpes untuk balita
Obat herpes selain acyclovir Obat herpes di wajah Obat herpes alami Obat herpes di leher Obat salep buat kutil kelamin Obat cina kutil kelamin Cuka obat kutil kelamin Obat cina untuk kutil kelamin Obat cina penghilang kutil kelamin Obat china untuk kutil kelamin Obat kutil di kelamin pria Obat tradisional kutil di kelamin Obat kutil di daerah kelamin Obat untuk menghilangkan kutil di kelamin Obat sipilis Obat sipilis Yang manjur obat sipilis denature indonesia Obat sipilis resep dokter Obat sipilis paling manjur Obat sipilis pada wanita Obat sipilis paling ampuh Obat sipilis manjur Obat sipilis ampuh Obat sipilis atau raja singa Obat sipilis herbal Obat sipilis murah Obat sipilis anjuran dokter Obat sipilis apa namanya Obat sipilis dijual di apotik Obat alami sipilis pada pria Obat sifilis ampuh Obat sipilis buat wanita Obat sipilis bagi wanita Obat buat sipilis
Obat dokter untuk kutil kelamin
Obat kutil di sekitar kelamin Obat farmasi untuk kutil kelamin Obat generik untuk kutil kelamin Obat kutil kelamin imiquimod Jual obat kutil kelamin Jual obat kutil kelamin murah Obat kutil kelamin yg di jual di apotik Jual obat penghilang kutil kelamin Obat kimia kutil kelamin Obat kutil kelamin/jengger ayam Obat kutil kelamin paling murah Obat kutil kelamin dari dalam Obat antibiotik kutil kelamin Obat kutil kelamin yang dijual di apotik Beli obat kutil kelamin di apotik Nama obat kutil kelamin di apotek Obat kutil kelamin yang tersedia di apotik Obat kutil kelamin tradisional Obat kutil kelamin Obat kutil kelamin wanita Obat kutil kelamin di apotik Obat kutil kelamin mujarab http://oplosanobatkutilkelamin.blogspot.com/ http://www.smaboy.com/u/obatkutil http://tinyblogs.net/u/obatkutil/ http://tinyblogs.net/u/obatkutil/
http://obatkutil.blogszino.com/
http://obatkutil.over-blog.com/ http://obatkutilkelamin-tradisional.jimdo.com/ http://www.lautanindonesia.com/blog/obatkutilkelamindanjenggerayam/ http://obatkutilmanjur.weebly.com/ http://obatkutilampuh.livejournal.com/ http://obatkutilkelamintradisional123.blogdetik.com/ http://obatkutil12345.edublogs.org/ http://pengobatankutil.blog.planetbiru.com/ http://obatkutil.freeblog.biz/ http://batkutil.blog.com/ Pengobatan kencing nanah atau gonore manjur Obat kencing nanah pada pria Obat kencing nanah pada pria di apotik Obat kencing nanah di apotik Obat kencing nanah di apotek Obat kencing nanah herbal Obat kencing nanah yang ada di apotik Obat kencing nanah di apotik kimia farma Obat kencing nanah yang di jual di apotik Obat kencing nanah dari dokter Obat kencing nanah ampuh Obat kencing nanah kaskus Obat kencing nanah surabaya Obat kencing nanah jogja Obat kencing nanah yang tersedia di apotik Obat kencing nanah apotek Obat kencing nanah yang ada di apotek Cara mengobati sipilis atau gonore (GO) Cara pengobatan kencing nanah dan sipilis
Obat Kencing Nanah
Obat Sipilis Obat Herbal Kutil Kelamin Obat Kencing Nanah Obat Kencing Nanah Ampuh Obat Kelamin Keluar Nanah Obat Sipilis Pada Pria Obat Kencing Nanah Manjur Obat Kencing Nanah Manjur Obat Kencing Nanah Manjur Obat Kencing Nanah Manjur Obat Kencing Nanah Paling Ampuh Obat Kencing Nanah Paling Ampuh Obat Kencing Nanah Paling Ampuh Obat Kencing Nanah Paling Ampuh Obat Kencing Nanah Wanita Obat Kencing Nanah Wanita Obat Kencing Nanah Wanita Obat Kencing Nanah Wanita Obat Kencing Nanah Ibu Hamil Obat Kencing Nanah Ibu Hamil Obat Kencing Nanah Ibu Hamil Obat Kencing Nanah Ibu Hamil
You don't feel like your best self when you fall apart, but you have to fall apart to become your best self.
Agen Judi Online Terpercaya
Ferragamo Shoes Tiffany Jewelry Tiffany Outlet NFL Jerseys Cheap Jordans Oakley Outlet North Face Outlet Burberry Outlet North Face Outlet Skechers Shoes Marc Jacobs Outlet
Chan Luu Sale Toms Outlet Oakley Sunglasses Toms Shoes Sale Beats By Dr Dre Coach Outlet Christian Louboutin Shoes Oakley Sunglasses Valentino Shoes Burberry Outlet Oakley Eyeglasses Michael Kors Outlet Coach Factory Outlet Coach Outlet Online Coach Purses Kate Spade Outlet Toms Shoes North Face Outlet Coach Outlet Gucci Belt North Face Jackets Oakley Sunglasses Toms OutletLouis Vuitton Outlet North Face Outlet Nike Outlet Nike Hoodies Tory Burch Flats Marc Jacobs Handbags Jimmy Choo Shoes Jimmy Choos
Ralph Lauren Outlet
Post a Comment
Ugg Boots Sale UGGS For Women Skechers Go Walk Adidas Yeezy Boost Adidas Yeezy Adidas NMD Coach Outlet North Face Outlet Ralph Lauren Outlet Puma SneakersPolo Outlet Under Armour Outlet Under Armour Hoodies Herve Leger MCM Belt Nike Air Max Louboutin Heels Jordan Retro 11 Converse Outlet Nike Roshe Run UGGS Outlet North Face Outlet Adidas Originals Ray Ban Lebron James Shoes Sac Longchamp Air Max Pas Cher Chaussures Louboutin Keds Shoes Asics Shoes Coach Outlet Salomon Shoes True Religion Outlet New Balance Outlet Skechers Outlet Nike Outlet Adidas Outlet Red Bottom Shoes New Jordans Air Max 90 Coach Factory Outlet
|
Books by Balkinization Bloggers
Jack M. Balkin, What Obergefell v. Hodges Should Have Said: The Nation's Top Legal Experts Rewrite America's Same-Sex Marriage Decision (Yale University Press, 2020)
Frank Pasquale, New Laws of Robotics: Defending Human Expertise in the Age of AI (Belknap Press, 2020)
Jack M. Balkin, The Cycles of Constitutional Time (Oxford University Press, 2020)
Mark Tushnet, Taking Back the Constitution: Activist Judges and the Next Age of American Law (Yale University Press 2020).
Andrew Koppelman, Gay Rights vs. Religious Liberty?: The Unnecessary Conflict (Oxford University Press, 2020)
Ezekiel J Emanuel and Abbe R. Gluck, The Trillion Dollar Revolution: How the Affordable Care Act Transformed Politics, Law, and Health Care in America (PublicAffairs, 2020)
Linda C. McClain, Who's the Bigot?: Learning from Conflicts over Marriage and Civil Rights Law (Oxford University Press, 2020)
Sanford Levinson and Jack M. Balkin, Democracy and Dysfunction (University of Chicago Press, 2019)
Sanford Levinson, Written in Stone: Public Monuments in Changing Societies (Duke University Press 2018)
Mark A. Graber, Sanford Levinson, and Mark Tushnet, eds., Constitutional Democracy in Crisis? (Oxford University Press 2018)
Gerard Magliocca, The Heart of the Constitution: How the Bill of Rights became the Bill of Rights (Oxford University Press, 2018)
Cynthia Levinson and Sanford Levinson, Fault Lines in the Constitution: The Framers, Their Fights, and the Flaws that Affect Us Today (Peachtree Publishers, 2017)
Brian Z. Tamanaha, A Realistic Theory of Law (Cambridge University Press 2017)
Sanford Levinson, Nullification and Secession in Modern Constitutional Thought (University Press of Kansas 2016)
Sanford Levinson, An Argument Open to All: Reading The Federalist in the 21st Century (Yale University Press 2015)
Stephen M. Griffin, Broken Trust: Dysfunctional Government and Constitutional Reform (University Press of Kansas, 2015)
Frank Pasquale, The Black Box Society: The Secret Algorithms That Control Money and Information (Harvard University Press, 2015)
Bruce Ackerman, We the People, Volume 3: The Civil Rights Revolution (Harvard University Press, 2014) Balkinization Symposium on We the People, Volume 3: The Civil Rights Revolution
Joseph Fishkin, Bottlenecks: A New Theory of Equal Opportunity (Oxford University Press, 2014)
Mark A. Graber, A New Introduction to American Constitutionalism (Oxford University Press, 2013)
John Mikhail, Elements of Moral Cognition: Rawls' Linguistic Analogy and the Cognitive Science of Moral and Legal Judgment (Cambridge University Press, 2013)
Gerard N. Magliocca, American Founding Son: John Bingham and the Invention of the Fourteenth Amendment (New York University Press, 2013)
Stephen M. Griffin, Long Wars and the Constitution (Harvard University Press, 2013) Andrew Koppelman, The Tough Luck Constitution and the Assault on Health Care Reform (Oxford University Press, 2013)
James E. Fleming and Linda C. McClain, Ordered Liberty: Rights, Responsibilities, and Virtues (Harvard University Press, 2013) Balkinization Symposium on Ordered Liberty: Rights, Responsibilities, and Virtues Andrew Koppelman, Defending American Religious Neutrality (Harvard University Press, 2013)
Brian Z. Tamanaha, Failing Law Schools (University of Chicago Press, 2012)
Sanford Levinson, Framed: America's 51 Constitutions and the Crisis of Governance (Oxford University Press, 2012)
Linda C. McClain and Joanna L. Grossman, Gender Equality: Dimensions of Women's Equal Citizenship (Cambridge University Press, 2012)
Mary Dudziak, War Time: An Idea, Its History, Its Consequences (Oxford University Press, 2012)
Jack M. Balkin, Living Originalism (Harvard University Press, 2011)
Jason Mazzone, Copyfraud and Other Abuses of Intellectual Property Law (Stanford University Press, 2011)
Richard W. Garnett and Andrew Koppelman, First Amendment Stories, (Foundation Press 2011)
Jack M. Balkin, Constitutional Redemption: Political Faith in an Unjust World (Harvard University Press, 2011)
Gerard Magliocca, The Tragedy of William Jennings Bryan: Constitutional Law and the Politics of Backlash (Yale University Press, 2011)
Bernard Harcourt, The Illusion of Free Markets: Punishment and the Myth of Natural Order (Harvard University Press, 2010)
Bruce Ackerman, The Decline and Fall of the American Republic (Harvard University Press, 2010) Balkinization Symposium on The Decline and Fall of the American Republic
Ian Ayres. Carrots and Sticks: Unlock the Power of Incentives to Get Things Done (Bantam Books, 2010)
Mark Tushnet, Why the Constitution Matters (Yale University Press 2010) Ian Ayres and Barry Nalebuff: Lifecycle Investing: A New, Safe, and Audacious Way to Improve the Performance of Your Retirement Portfolio (Basic Books, 2010) Jack M. Balkin, The Laws of Change: I Ching and the Philosophy of Life (2d Edition, Sybil Creek Press 2009)
Brian Z. Tamanaha, Beyond the Formalist-Realist Divide: The Role of Politics in Judging (Princeton University Press 2009) Andrew Koppelman and Tobias Barrington Wolff, A Right to Discriminate?: How the Case of Boy Scouts of America v. James Dale Warped the Law of Free Association (Yale University Press 2009) Jack M. Balkin and Reva B. Siegel, The Constitution in 2020 (Oxford University Press 2009) Heather K. Gerken, The Democracy Index: Why Our Election System Is Failing and How to Fix It (Princeton University Press 2009)
Mary Dudziak, Exporting American Dreams: Thurgood Marshall's African Journey (Oxford University Press 2008)
David Luban, Legal Ethics and Human Dignity (Cambridge Univ. Press 2007)
Ian Ayres, Super Crunchers: Why Thinking-By-Numbers is the New Way to be Smart (Bantam 2007)
Jack M. Balkin, James Grimmelmann, Eddan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky, eds., Cybercrime: Digital Cops in a Networked Environment (N.Y.U. Press 2007)
Jack M. Balkin and Beth Simone Noveck, The State of Play: Law, Games, and Virtual Worlds (N.Y.U. Press 2006) Andrew Koppelman, Same Sex, Different States: When Same-Sex Marriages Cross State Lines (Yale University Press 2006) Brian Tamanaha, Law as a Means to an End (Cambridge University Press 2006) Sanford Levinson, Our Undemocratic Constitution (Oxford University Press 2006) Mark Graber, Dred Scott and the Problem of Constitutional Evil (Cambridge University Press 2006) Jack M. Balkin, ed., What Roe v. Wade Should Have Said (N.Y.U. Press 2005) Sanford Levinson, ed., Torture: A Collection (Oxford University Press 2004) Balkin.com homepage Bibliography Conlaw.net Cultural Software Writings Opeds The Information Society Project BrownvBoard.com Useful Links Syllabi and Exams |