NATO OSINT Intelligence Exploitation of the Internet

Total Page:16

File Type:pdf, Size:1020Kb

NATO OSINT Intelligence Exploitation of the Internet TABLE OF CONTENTS INTRODUCTION............................................................................................................. 4 CHAPTER I: INTERNET OVERVIEW ....................................................................... 6 Section A: World-Wide-Web (WWW) ........................................................................... 6 Section B: Newsgroups ..................................................................................................... 8 Section C: Email List Overview..................................................................................... 11 Section D: Chat ............................................................................................................... 13 CHAPTER II: DIRECTION ......................................................................................... 14 Section A: Mission Analysis ........................................................................................... 14 Steps in Mission Analysis......................................................................................... 14 Step 1: Sources of the Mission.............................................................................. 15 Step 2: Superior’s Mission and Intent................................................................... 15 Step 3: Derive Elements of Own Mission............................................................. 17 Step 4: Identify Assumptions................................................................................ 17 Step 5: Identify Objectives.................................................................................... 18 Section B: Primary Intelligence Requirement (PIR) Development ........................... 18 Direction Development Worksheet........................................................................... 19 CHAPTER III: COLLECTION.................................................................................... 20 Section A: Collection Planning ...................................................................................... 20 Collection Management............................................................................................ 20 Making a Collection Plan.......................................................................................... 20 An Internet Collection Plan ...................................................................................... 21 The Internet Collection Planning Steps .................................................................... 22 Step 1: Determine Searchable Information Requirements.................................... 22 Step 2: Determine Best Site or Search................................................................. 22 Step 3: Identify the Details to Access or Find Specific Information ................... 22 Step 4: Determine Search Time Constraints........................................................ 23 Using the Internet Collection Plan............................................................................ 23 Standing Requirements ............................................................................................. 23 Internet Collection Plan ............................................................................................ 24 Section B: Search Strategies .......................................................................................... 25 Search Methodology ................................................................................................. 25 Prepare Before You Search....................................................................................... 25 Step 1: Identify Key Concepts .............................................................................. 25 INTELLIGENCE EXPLOITATION OF THE INTERNET 1 Step 2: Identify Possible Search Terms ................................................................ 26 Topic Development Worksheet ............................................................................ 26 Step 3: Decide Which Method to Use To Search ................................................. 28 Step 4: Construct Your Search............................................................................. 31 Step 5. Limit Your Search ................................................................................... 36 Step 6. Refine Your Search.................................................................................. 37 Section C: Search Worksheet ........................................................................................ 39 Section D: Search Tools.................................................................................................. 41 Search Engines.......................................................................................................... 41 What are search engines?...................................................................................... 41 How do search engines work? .............................................................................. 41 What are the pros and cons of search engines?..................................................... 42 Are search engines all the same? .......................................................................... 42 How do search engines rank web pages?.............................................................. 42 When do you use search engines? ........................................................................ 42 Major Search Engine – Features Guide - 2002......................................................... 46 Search Tools.............................................................................................................. 50 Copernic................................................................................................................ 50 Deep-Web/Invisible Web.......................................................................................... 50 Searching the Invisible Web ................................................................................. 50 Deep Query Manager............................................................................................ 51 Section E: Searching Anonymously On The Web ....................................................... 53 CHAPTER IV: PROCESSING ..................................................................................... 56 Section A: Source Evaluation ........................................................................................ 56 Critically Analysing Information Sources ................................................................ 56 Determining the Source of Web Pages ..................................................................... 59 Step 1: Study the URL ......................................................................................... 59 Step 2: Do a “whois” on the domain name.......................................................... 59 Step 3: Perform a Traceroute to the host name.................................................... 61 Step 4: Read the web-page and follow-up with the point of contact (if any) ...... 61 How to Read a URL.................................................................................................. 62 Traceroute ................................................................................................................. 63 McAfee Visual Trace............................................................................................ 66 Section B: Evaluation Checklists.................................................................................. 68 Evaluation Checklist for an Advocacy Web Page .................................................... 69 Evaluation Checklist for a Business/Marketing Web Page ...................................... 70 Evaluation Checklist for a News Web Page ............................................................. 71 Evaluation Checklist for an Informational Web Page .............................................. 72 Evaluation Checklist for a Personal Web Page......................................................... 73 Section C: Validated Source Lists ................................................................................. 74 Powermarks 3.5......................................................................................................... 74 INTELLIGENCE EXPLOITATION OF THE INTERNET 2 Section D: Effective Summary....................................................................................... 77 Copernic Summarizer ............................................................................................... 77 CHAPTER V: DISSEMINATION................................................................................ 79 Section A: Report Layering ........................................................................................... 79 Section B: Dissemination with Microsoft Outlook........................................................ 80 Section C: Dissemination and Classification ................................................................ 82 ANNEXES: ...................................................................................................................... 84 Annex A: More information on Source Evaluation..................................................... 84 Searching Upstream...................................................................................................... 85 Annex B: Selected Information Sources ....................................................................... 88 a. Terrorist Threat Research (Rev 04 Mar 02)...................................................................
Recommended publications
  • Cryonics Magazine, Q1 2001
    SOURCE FEATURES PAGE Fred Chamberlain Glass Transitions: A Project Proposal 3 Mike Perry Interview with Dr. Jerry Lemler, M.D. 13 Austin Esfandiary A Tribute to FM-2030 16 Johnny Boston FM & I 18 Billy H. Seidel the ALCOR adventure 39 Natasha Vita-More Considering Aesthetics 45 Columns Book Review: Affective Computing..................................41 You Only Go Around Twice .................................................42 First Thoughts on Last Matters............................................48 TechNews.......................................................................51 Alcor update - 19 The Global Membership Challenge . 19 Letter from Steve Bridge . 26 President’s Report . 22 “Last-Minute” Calls . 27 Transitions and New Developments . 24 Alcor Membership Status . 37 1st Qtr. 2001 • Cryonics 1 Alcor: the need for a rescue team or even for ingly evident that the leadership of The Origin of Our Name cryonics itself. Symbolically then, Alcor CSC would not support or even would be a “test” of vision as regards life tolerate a rescue team concept. Less In September of 1970 Fred and extension. than one year after the 1970 dinner Linda Chamberlain (the founders of As an acronym, Alcor is a close if meeting, the Chamberlains severed all Alcor) were asked to come up with a not perfect fit with Allopathic Cryogenic ties with CSC and incorporated the name for a rescue team for the now- Rescue. The Chamberlains could have “Rocky Mountain Cryonics Society” defunct Cryonics Society of California forced a five-word string, but these three in the State of Washington. The articles (CSC). In view of our logical destiny seemed sufficient. Allopathy (as opposed and bylaws of this organization (the stars), they searched through star to Homeopathy) is a medical perspective specifically provided for “Alcor catalogs and books on astronomy, wherein any treatment that improves the Members,” who were to be the core of hoping to find a star that could serve as prognosis is valid.
    [Show full text]
  • Nonprofit Security Grant Program Threat Incident Report
    Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States.
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Fortran Resources 1
    Fortran Resources 1 Ian D Chivers Jane Sleightholme May 7, 2021 1The original basis for this document was Mike Metcalf’s Fortran Information File. The next input came from people on comp-fortran-90. Details of how to subscribe or browse this list can be found in this document. If you have any corrections, additions, suggestions etc to make please contact us and we will endeavor to include your comments in later versions. Thanks to all the people who have contributed. Revision history The most recent version can be found at https://www.fortranplus.co.uk/fortran-information/ and the files section of the comp-fortran-90 list. https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=comp-fortran-90 • May 2021. Major update to the Intel entry. Also changes to the editors and IDE section, the graphics section, and the parallel programming section. • October 2020. Added an entry for Nvidia to the compiler section. Nvidia has integrated the PGI compiler suite into their NVIDIA HPC SDK product. Nvidia are also contributing to the LLVM Flang project. Updated the ’Additional Compiler Information’ entry in the compiler section. The Polyhedron benchmarks discuss automatic parallelisation. The fortranplus entry covers the diagnostic capability of the Cray, gfortran, Intel, Nag, Oracle and Nvidia compilers. Updated one entry and removed three others from the software tools section. Added ’Fortran Discourse’ to the e-lists section. We have also made changes to the Latex style sheet. • September 2020. Added a computer arithmetic and IEEE formats section. • June 2020. Updated the compiler entry with details of standard conformance.
    [Show full text]
  • Serving the Boaters of America PROLOG P/R/C Greg Scotten, SN
    Volume 2, Issue 2 May 2012 Marketing and Public Relations, The Art and Science of Creating LINKS (Click on selected Link) a Call to Action and Causing a Change. The United States Power Squadrons PR Contest Forms Boating Safety Centennial Anniversary Articles Cabinet Serving the Boaters of America PROLOG P/R/C Greg Scotten, SN The United States Power Squadrons is Inside this issue: celebrating 100 years of community Jacksonville Sail & Power service on 1 February 2014. Your Squadron to conduct a celebratory USPS Centennial 1 squadron needs to be part of that boat parade on the St. John’s important Centennial event which is a River. national milestone. To celebrate this Bright Ideas 2 national milestone, several projects are The Power Squadrons Flag and underway and a national anniversary Etiquette Committee has designed Importance of 3 a unique boat Ensign, which Squadron Editors web page will post exciting activities and information. The Power Squadrons’ emphasizes the event, and is to be MPR Committee 3 Ship Store will be featuring items with flown on members’ vessels in 2013 Mission the 100th Anniversary Logo. An and 2014. A special new Power anniversary postal commemorative is Squadrons logo has been under discussion. All levels of the distributed and is available on line. organization are planning local 2012 Governing 4 A year long ceremonial activity is community activities. Board planned. At the 2013 Annual The precise anniversary day is Sunday, Meeting Governing Board, full sized anniversary Ensigns will be Hands-on Training 6 2 February 2014. But because the Governing Board at the Annual Meeting presented to each of the thirty- two districts.
    [Show full text]
  • Communicator's Tools
    Communicator’s Tools (II): Documentation and web resources ENGLISH FOR SCIENCE AND TECHNOLOGY ““LaLa webweb eses unun mundomundo dede aplicacionesaplicaciones textualestextuales…… hayhay unun grangran conjuntoconjunto dede imimáágenesgenes ee incontablesincontables archivosarchivos dede audio,audio, peropero elel textotexto predominapredomina nono ssóólolo enen cantidad,cantidad, sinosino enen utilizaciutilizacióónn……”” MillMilláánn (2001:(2001: 3535--36)36) Internet • Global computer network of interconnected educational, scientific, business and governmental networks for communication and data exchange. • Purpose: find and locate useful and quality information. Internet • Web acquisition. Some problems – Enormous volume of information – Fast pace of change on web information – Chaos of contents – Complexity and diversification of information – Lack of security – Silence & noise – Source for advertising and money – No assessment criteria Search engines and web directories • Differencies between search engines and directories • Search syntax (Google y Altavista) • Search strategies • Evaluation criteria Search engines • Index millions of web pages • How they work: – They work by storing information about many web pages, which they retrieve from the WWW itself. – Generally use robot crawlers to locate searchable pages on web sites (robots are also called crawlers, spiders, gatherers or harvesters) and mine data available in newsgroups, databases, or open directories. – The contents of each page are analyzed to determine how it should be indexed (for example, words are extracted from the titles, headings, or special fields called meta tags). Data about web pages are stored in an index database for use in later queries. – Some search engines, such as Google, store all or part of the source page (referred to as a cache) as well as information about the web pages.
    [Show full text]
  • ED381174.Pdf
    DOCUMENT RESUME ED 381 174 IR 055 469 AUTHOR Klatt, Edward C.; And Others TITLE Windows to the World: Utah Library Network Internet Training Manual. INSTITUTION Utah State Library, Salt Lake City. PUB DATE Mar 95 NOTE 136p. AVAILABLE FROMWorld Wide Web at http://www.state.lib.ut.us/internet.htm (available electronically) or Utah State Library Division, 2150 S. 3rd W., Suite 16, Salt Lake City, UT 84115-2579 ($10; quantity price, $5). PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Computer Software; Electronic Mail; *information Networks; *Information Systems; *Librarians; Online Catalogs; Professional Training; Telecommunications IDENTIFIERS *Internet; Utah ABSTRACT This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware), both lists including information fo: PC-compatibles and Macintosh computers. Users are introduced to and instructed in the use of the following Internet systems and services: EWAN telnet; OPACS (Online Public Access Catalogs); CARL (Colorado Alliance of Research Libraries; FirstSearch; UMI (University Microfilm Inc.); Deseret News; Pegasus E-Mail; Listservs; WinVN Newsreader; Viewers; Netscape; Mosaic; Gopher; Archie; and FTP (File Transfer Protocol). Over 100 computer screen reproductions help to illustrate the instruction. Contains 16 references and a form for ordering additional copies of this guide are provided. (MAS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • Reviving Usenet
    Reviving Usenet Required Magic advanced technology ● What is Usenet ● The Rise and Fall of Usenet Agenda ● Back from the Dead? ● Questions to be Answered ● Stories from Usenet What is Usenet? About Me ● Training Engineer at SUSE ● Board Member for B8MB ● Volunteer for Tor Project ● All around nerd What is Usenet? Usenet is a worldwide distributed discussion network. It is the original long-form messaging system that predates the Internet as we know it. How does it work? Users read and send articles (messages) on a News server. That server exchanges articles with other News servers in the network. The collection of servers is known as the Usenet. Benefits of Usenet ● Decentralized ● Owned by no one ● Simplicity ● Resilient ● Anonymous ● Resistant to censorship Organization Usenet is organized into Newsgroups. Each group is generally a topic for discussion for that group. Newsgroups are organized into hierarchies. ● alt.bitcoins is in the alt.* hierarchy ● sci.crypt is in the sci.* hiearchy The Usenet Big-8 comp.* news.* sci.* talk.* misc.* rec.* soc.* humanities.* The Big-8 Management Board ● Creates well-named, well-used newsgroups in the Big-8 Usenet hierarchies ● Makes necessary adjustments to existing groups ● Removes groups that are not well-used ● Assists and encourages the support of a canonical Big-8 newsgroup list by Usenet sites The Rise and Fall of Usenet A Little History... In 1980… There was no Internet The was only the ARPANET and few had access It was commonly accepted at the time that to join the ARPANET took political connections
    [Show full text]
  • How to Choose a Search Engine Or Directory
    How to Choose a Search Engine or Directory Fields & File Types If you want to search for... Choose... Audio/Music AllTheWeb | AltaVista | Dogpile | Fazzle | FindSounds.com | Lycos Music Downloads | Lycos Multimedia Search | Singingfish Date last modified AllTheWeb Advanced Search | AltaVista Advanced Web Search | Exalead Advanced Search | Google Advanced Search | HotBot Advanced Search | Teoma Advanced Search | Yahoo Advanced Web Search Domain/Site/URL AllTheWeb Advanced Search | AltaVista Advanced Web Search | AOL Advanced Search | Google Advanced Search | Lycos Advanced Search | MSN Search Search Builder | SearchEdu.com | Teoma Advanced Search | Yahoo Advanced Web Search File Format AllTheWeb Advanced Web Search | AltaVista Advanced Web Search | AOL Advanced Search | Exalead Advanced Search | Yahoo Advanced Web Search Geographic location Exalead Advanced Search | HotBot Advanced Search | Lycos Advanced Search | MSN Search Search Builder | Teoma Advanced Search | Yahoo Advanced Web Search Images AllTheWeb | AltaVista | The Amazing Picture Machine | Ditto | Dogpile | Fazzle | Google Image Search | IceRocket | Ixquick | Mamma | Picsearch Language AllTheWeb Advanced Web Search | AOL Advanced Search | Exalead Advanced Search | Google Language Tools | HotBot Advanced Search | iBoogie Advanced Web Search | Lycos Advanced Search | MSN Search Search Builder | Teoma Advanced Search | Yahoo Advanced Web Search Multimedia & video All TheWeb | AltaVista | Dogpile | Fazzle | IceRocket | Singingfish | Yahoo Video Search Page Title/URL AOL Advanced
    [Show full text]
  • A Zahlensysteme
    A Zahlensysteme Außer dem Dezimalsystem sind das Dual-,dasOktal- und das Hexadezimalsystem gebräuchlich. Ferner spielt das Binär codierte Dezimalsystem (BCD) bei manchen Anwendungen eine Rolle. Bei diesem sind die einzelnen Dezimalstellen für sich dual dargestellt. Die folgende Tabelle enthält die Werte von 0 bis dezimal 255. Be- quemlichkeitshalber sind auch die zugeordneten ASCII-Zeichen aufgeführt. dezimal dual oktal hex BCD ASCII 0 0 0 0 0 nul 11111soh 2102210stx 3113311etx 4 100 4 4 100 eot 5 101 5 5 101 enq 6 110 6 6 110 ack 7 111 7 7 111 bel 8 1000 10 8 1000 bs 9 1001 11 9 1001 ht 10 1010 12 a 1.0 lf 11 101 13 b 1.1 vt 12 1100 14 c 1.10 ff 13 1101 15 d 1.11 cr 14 1110 16 e 1.100 so 15 1111 17 f 1.101 si 16 10000 20 10 1.110 dle 17 10001 21 11 1.111 dc1 18 10010 22 12 1.1000 dc2 19 10011 23 13 1.1001 dc3 20 10100 24 14 10.0 dc4 21 10101 25 15 10.1 nak 22 10110 26 16 10.10 syn 430 A Zahlensysteme 23 10111 27 17 10.11 etb 24 11000 30 18 10.100 can 25 11001 31 19 10.101 em 26 11010 32 1a 10.110 sub 27 11011 33 1b 10.111 esc 28 11100 34 1c 10.1000 fs 29 11101 35 1d 10.1001 gs 30 11110 36 1e 11.0 rs 31 11111 37 1f 11.1 us 32 100000 40 20 11.10 space 33 100001 41 21 11.11 ! 34 100010 42 22 11.100 ” 35 100011 43 23 11.101 # 36 100100 44 24 11.110 $ 37 100101 45 25 11.111 % 38 100110 46 26 11.1000 & 39 100111 47 27 11.1001 ’ 40 101000 50 28 100.0 ( 41 101001 51 29 100.1 ) 42 101010 52 2a 100.10 * 43 101011 53 2b 100.11 + 44 101100 54 2c 100.100 , 45 101101 55 2d 100.101 - 46 101110 56 2e 100.110 .
    [Show full text]
  • Dean's Line Contents
    With the initiation of “Polytechnic" programs in California, DEAN’S LINE a “Learn by Doing” ethic emerged that was copied in countless high schools and junior colleges throughout the Harold B. Schleifer Dean, University Library state. To meet student needs, Cal Poly elevated the level of instruction at several stages along the way. Originally a high school, the institution was gradually transformed into the CAL POLY POMONA CAMPUS HISTORY BOOK equivalent of a junior college, and then to a four-year You probably knew that the cereal magnate W.K. Kellogg founded college, and ultimately, to a university that included our campus, but did you know that Cal Poly Pomona was the graduate-level instruction. home of Snow White’s horse, Prince Charming?” The Library is proud to make available a beautifully illustrated book California State Polytechnic University, Pomona: A Legacy documenting the history of the Cal Poly Pomona ranch and and a Mission, 1938-1989 is an heirloom-quality coffee- campus. California State Polytechnic University, table book with over 30 historical photographs, indexed, Pomona — A Legacy and a Mission 1938-1989 tells and displayed in a generous 9 x 11 inch, 294-page the story of a distinctive American university whose origins date hardcover format. Copies of the book can be obtained for back, in a limited sense, to the Gold Rush of 1849. The family of $100 through the University Library. the author, the late Donald H. Pflueger, Professor Emeritus, educator, historian, diplomat, and author, has kindly and To commemorate and honor the philanthropy of the generously pledged the proceeds of the book to the University Pflueger family, the Library will use the donations to Library.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]