Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
Explore the privacy issues of an interconnected world.
About this Course
How does cellular technology enable massive surveillance? Do users have rights against surveillance? How does surveillance affect how we use cellular and other technologies? How does it affect our democratic institutions? Do you know that the metadata collected by a cellular network speaks volumes about its users? In this course you will explore all of these questions while investigating related issues in WiFi and Internet surveillance. The issues explored in this course are at the intersection of networking technology, law, and sociology and will appeal to anyone interested in the technical, political, and moral questions inherent in the use of information networks. The course will include broad overviews for the novice, while pointing to the detailed resources needed for those engaged in the development of corporate or governmental policies.
Ways to take this edX course:
Simply Audit this Course
Audit this course for free and have complete access to all of the course material, tests, and the online discussion forum. You decide what and how much you want to do.
Try for a Certificate
Looking to test your mettle? Participate in all of the course's activities and abide by the edX Honor Code. If your work is satisfactory, you'll receive a personalized certificate to showcase your achievement.
Stephen B. Wicker
Stephen Wicker is a professor of electrical and computer engineering at Cornell University and a member of the graduate fields of computer science, information science, and applied mathematics. He teaches and conducts research in wireless information networks, cellular networks, and digital telephony. He currently focuses on the interface between information networking technology, law, and sociology, with a particular emphasis on how design choices and regulation can affect the privacy and speech rights of users. Wicker is the Cornell principal investigator for the TRUST Science and Technology Center—a National Science Foundation center dedicated to the development of technologies for securing the nation’s critical infrastructure. He is a fellow of the Institute of Electrical and Electronics Engineers, and his most recent book, Cellular Convergence and the Death of Privacy, was published in August 2013. A graduate of the University of Virginia, Wicker earned a master's in electrical engineering from Purdue University and a PhD from the University of Southern California.
No. A list of supplemental resources, including textbooks, will be provided. The textbook, Cellular Convergence and the Death of Privacy, is optional.
Expect to spend 4-8 hours per week. This depends on a number of factors, including how much you want to engage with the material and the level of understanding you desire.
No. Though there will be discussion of electrical and computer engineering (ECE) ideas, the professor will assume no prior ECE training.
I am not familiar with U.S. or European history but I am interested in how the law regarding cell phones works. Can I take this course?
Yes. I will have relevant links to helpful background material for each section that should make it possible for those with no knowledge of U.S. or European history to take the class.
This class is primarily about how historical privacy law has made it possible for current information technologies to be used to collect data and conduct surveillance rather than how to build a network. While the course will touch on important engineering developments and information technology uses, this class will focus more on the intersection of networking technology, law, and sociology. If you want to know how cell phones collect data and why this data can be used in court, this is the class for you.
Yes. If you complete the work and achieve a passing grade in the course, you can earn a Honor Code Certificate, which indicates that you have completed the course successfully. Certificates will be issued by edX under the name of CornellX, designating the institution from which the course originated.
Upon completion of this course, students will be able to:
- Explain the basic function of cellular telephone networks, WiFi, and other networking technologies.
- Explain the evolution of privacy rights through the U.S. constitution's 4th amendment, particularly as applied to content and context surveillance
- Identify types of cryptography used to secure wired and wireless networks.
- Consider the implications of different forms of surveillance and how they impact an individual's privacy in society.
- Evaluate contemporary surveillance and security decisions/ laws.
- Increase their ability to apply ethical thinking and judgment to a wide range of privacy and surveillance situations.
- Interpret how using complex and powerful technologies to collect personal data can impact individuals, corporations, markets, and societies.