DS457/DS657/JD673: Law and Algorithms
Course Overview
This cross-cutting and interdisciplinary course, taught jointly between the School of Law, the faculty of Computing and Data Sciences, and Computer Science investigates the role that algorithms and automated decision-making systems play in law and society. The course connects legal and computational concepts of transparency, fairness, bias, trust, and privacy, though a series of case studies that present recent applications of technology to legal and regulatory situations and explore the challenges in regulating algorithms.
Legal concepts explored will include evidence and expert witnesses, anti-discrimination law concepts of disparate impact and disparate treatment, sectoral information privacy regimes, and public access and transparency laws. Computational concepts explored will include artificial intelligence and machine learning, secure multi-party computation, differential privacy, and zero-knowledge proofs.
PLEASE NOTE: DUE TO THE CROSS LISTING OF THIS COURSE, THERE ARE SOME STRANGE LOGISTICS TO BE AWARE OF! MAKE SURE TO READ THE FOLLOWING!
- THIS COURSE IS SCHEDULED FROM 2:10-4:10 in the Law Tower Room 203. Note that this is different than the listed time and location in student link for DS457/DS657
- This course follows the Law School's Academic Calendar. That means that the first class period is on Thursday, January 19.
The syllabus for this semester (Spring 2023) can be found here. Please note that the syllabus currently lists the wrong room. We will be in Room 203.
Readings
Class 1: Intro to Law and Algorithms (Jan. 19)
Required
Intro to Computational Thinking:
- Stanford Encyclopedia of Philosophy, The Philosophy of Computer Science. CS students can skim, as it will be largely familiar to you already. Law Students read Section 2 ("Intention and Specification").
- Jeannette M. Wing, Computational Thinking: What and Why? (2010) - read all.
Intro to Law and Legal Thinking
- Andrew Sellars, A Practical Introduction to United States Law for Technologists – Law students can skim, as it will be largely familiar to you already. CS students read introduction and "The 'Common Law' System in the United States" (pp. 1-14), and skim the rest.
The Opportunities of Law & Algorithms:
- Joel Reidenberg, Lex Informatica: The Formulation of Policy Rules through Technology, 76 Tex. L. Rev. 553 (1997) – read Part IV (pp. 576–86) only
The Collision of Law & Algorithms:
- Ari Ezra Waldman, Power, Process, and Automated Decision-Making, 88 Fordham L. Rev. 613 (2019) – read Section I only
- Hannah Bloch-Wehba, Access to Algorithms, 88 Fordham L. Rev. 1265 (2020) – read Part II (pp. 1290–95) only
- Edward K. Cheng, Fighting Legal Innumeracy, 17 Green Bag 2d 271 (2014) – read section II only.
What Lies Underneath Technological Governance:
- Catherine D’Ignazio and Lauren F. Klein, “The Power Chapter,” from Data Feminism (2020) – read sections on “Data Science by Whom?” and “Data Science for Whom?”
Optional
- Shannon Vallor, We Used to Get So Excited about Technology. What Happened?, MIT Tech. Review (Oct. 21, 2022)
- Kristian Lum & Rumman Chowdhury, What is an “Algorithm?” It Depends Whom You Ask, MIT Tech. Review (Feb. 26, 2021)
- Ruha Benjamin, 2020 Vision: Reimagining the Default Settings of Technology & Society (2020)
- Alan R. Wagner, Jason Borenstein, Ayanna Howard, Overtrust in the Robotic Age, Comm. of the ACM (Sept. 2018) "Overtrust in the Robotic Age"
- Tal Zarsky, The Trouble With Algorithmic Decisions, 41 Science, Technology, & Human Values 118 (2016)
- David Aurebach, The Stupidity of Computers, n+1 (2012)
- Danielle Keats Citron, Technological Due Process, 85 Wash. U.L. Rev. 1249 (2008)
- Langdon Winner, Do Artifacts Have Politics?, 109 Daedalus 121 (1980)
- Plus many, many more readings to come in subsequent classes!
Class 2 – The Development and Legal Protection of Software (Jan. 27)
Required
How Software is Built, How Software Breaks
- All About Software, How does a compiler, interpreter, and CPU work?
- James Grimmelman (with Solon Barocas), CPU, Esq: Should Law Be More Like Software?, DIMACS Workshop on Co-development of CS and Law (2020) — watch 19:30 through 27:15
Concepts of Verification and Validation
- James A. Whittaker. What Is Software Testing? And Why Is It So Hard?
How Software is Protected in Law
- If you are new to field of intellectual property, review these introductory concepts from the Digital Media Law Project:
How Software is Examined in Litigation
- Rediet Abebe, Moritz Hardt, Angela Jin, John Miller, Ludwig Schmidt, and Rebecca Wexler, Adversarial Scrutiny of Evidentiary Statistical Software, ACM FAccT (2022) – read part 2 (pp. 3–5) only
- Sergey Bratus, Ashlyn Lembree, and Anna Shubina, “Software on the Witness Stand: What Should it Take for Us to Trust It?,” in Trust and Trustworthy Computing (Alessandro Acquisti, Sean W. Smith, and Ahmad-Reza Sadeghi eds. 2010) – read Section 4 (pp. 402–07) and Section 7 (pp. 409–15)
Tensions in Intellectual Property and Software Scrutiny
- Rebecca Wexler, Life, Liberty, and Trade Secrets, 70 Stan. L. Rev. 1343 (2018) – read Part I (pp. 1356–77)
Optional
- Ken Thompson, Reflections on Trusting Trust, Turing Award Lecture (1984).
- Zeynep Tufekci, The Shameful Open Secret Behind Southwest’s Failure, N.Y. Times (Dec. 31, 2022)
- Sonia Katyal, The Paradox of Source Code Secrecy, 104 Cornell L. Rev. 1183 (2019)
- Radiolab, Bit Flip, Originally aired May 2019
Class 3 – Putting the TrueAllele Algorithm on Trial (Feb. 2)
Required
TrueAllele on Trial
- People v. Superior Court (Chubbs) (Cal. Ct. App. Jan. 9, 2015) – read excerpt
- State v. Pickett, 246 A.3d 279 (N.J. App. Div. 2021) – read excerpt
Transparency as a Solution and its Critics
- Kathleen A. Creel, Transparency in Complex Computational Systems, 87 Philosophy of Sci. 568 (2022) – read part III only (pp. 572–582) only
- Mike Annany & Kate Crawford, Seeing Without Knowing: Limitations of the Transparency Ideal and its Application to Algorithmic Accountability, 20 New Media & Society 973 (2016) – read “Limits of the transparency ideal” section, pp. 977–82
- Steven Bellovin, Matt Blaze, Susan Landau, & Brian Owsley, Seeking the Source: Criminal Defendants’ Constitutional Right to Source Code, 17 Ohio State Tech. L.J. 1 (2021) – read section II(D) only, pp. 31–40
- Joshua Kroll, Joanna Huey, Solon Barocas, Edward Felten, Joel Reidenberg, David Robinson, & Harlan Yu, Accountable Algorithms, 165 U. Penn. L. Rev. 633 (2017) – read parts II(A) and II(B) only, pp. 657–62
The Limits of Transparency Through Adversarial Litigation:
- Order on Interpretation of Protective Order, Houston Fed. of Teachers v. Houston Indep. Sch. Dist. (S.D. Tex. March 11, 2016) – read excerpt
Alternatives:
- Rediet Abebe, Moritz Hardt, Angela Jin, John Miller, Ludwig Schmidt, and Rebecca Wexler, Adversarial Scrutiny of Evidentiary Statistical Software, ACM FAccT (2022) – read parts 4 and 5 (pp. 6–15) only
Optional
- Andrea Roth, Machine Testimony, 126 Yale L.J. 1972 (2017)
- NIST Publishes Review of DNA Mixture Interpretation Methods, NIST (June 9, 2021)
- Rashida Richardson, Jason M. Schultz, and Vincent M. Sutherland, Litigating Algorithms: 2019 Report, AI Now (2019)
- Todd Feathers, Why It’s So Hard to Regulate Algorithms, The Markup (Jan. 4, 2022).
- Paul W. Grimm, Maura Grossman, and Gordon Cormack, Artificial Intelligence as Evidence, 19 Nw. J. Tech. & Intell. Prop. 9 (2021).
- Shira Schoenberg, Breathalyzer Scandal Could Reopen 27,000 Drunk Driving Cases, Commonwealth (Nov. 27, 2022).
Class 4 – Foundational Concepts in Privacy and Secrecy (Feb. 9)
Required
Introduction to Secrecy in Computing
- CIA Triad, Wikipedia -- read section labeled "Basic Principles"
- Bruce Schneier, The Security Mindset
Basic cryptography: encryption, signatures, and hashing
- EFF Surveillance Self-Defense Guide – read the following subsections:
- Glencora Borradaile, Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements. Read the following sections:
Advanced applications: secure multi-party computation and zero-knowledge proofs
- Mayank Varia, Cryptographically Secure Data Analysis for Social Good (2018).
- Amit Sahai, Computer Scientist Explains One Concept in 5 Levels of Difficulty, by WIRED (2022). Watch the full video.
- Kenneth A. Bamberger, Ran Canetti, Shafi Goldwasser, Rebecca Wexler, & Evan Zimmerman, Verification Dilemmas, Law, and The Promise of Zero-Knowledge Proofs, 37 Berkeley Tech. L. J. 101 (2023) -- Read Part III only (pp. 127–38)
Secrecy vs. Privacy
- Daniel Solove, Understanding Privacy (2008) – read introduction to Chapter 1 (pp. 1–2); “The Concept of Privacy” (pp. 6–8); and “A New Theory of Privacy” (pp. 8–11)
Who is Centered in Cryptography Policy?
- Seny Kamara, Crypto For the People (2020) – watch 7:11 to 21:14
Optional
- Philip Rogaway, The Moral Character of Cryptographic Work (2015)
- Orin S. Kerr & Bruce Schneier, Encryption Workarounds, 106 Geo. L. J. 989 (2018)
- Aloni Cohen & Sunoo Park, Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries, 32 Harv. J. L. & Tech. 169 (2018)
- Gabriel Kaptchuk, Secure Multiparty Compuation FAQ for Non-Experts (2022)