Open Networks, Closed Regimes: Difference between revisions
(→Guests) |
|||
Line 32: | Line 32: | ||
=== Course structure === | === Course structure === | ||
# First 10-15 minutes: Exposition | # First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code | ||
# Next 45 minutes: Q&A with guests on what the terrain looks like now, and what's left to do. | # Next 45 minutes: Q&A with guests, one by one, on what the terrain looks like now, and what's left to do. | ||
# Remainder: Classwide simulation, with students | # Remainder: Classwide simulation, with students in groups, defending assigned roles as various stakeholder groups. | ||
=== Readings === | === Readings === |
Revision as of 19:20, 1 February 2009
Open Network, Closed Regimes
Problem to be solved
US-based internet services are used by citizens of every regime in the world. Western-based internet companies operate these services in many countries where governments routinely request or demand sensitive information about their citizens. How should high-level officers respond when their companies receive requests to turn over information which violate privacy and anonymity expectations? How can citizens, NGOs, and government actors influence the way these companies respond?
Precis
The idea of the internet service provider as a border-defying government-regulation-free jurisdiction was already dying in the 1990s, but the large-scale movement of internet services into regimes without free speech protections has raised serious concerns about managing cross-border privacy standards over the last five years. From Yahoo turning over pro-democracy Chinese bloggers to the Chinese government, to Saudi Arabia tracking porn downloaders by pulling ISP records, to South Korea trying to arrest anonymous government critics, the problems are widespread and not restricted only to regimes that Americans are used to thinking of as "repressive." The globalization of internet services raises difficult questions: What requests for information are invasive? What kind of deference is due to local sovereignty? How can the competing demands best be balanced?
Potential Guests
- Caroline Nolan, Colin Maclay, or John Palfrey from Berkman/GNI
- Andrew McLaughlin from Google
Brainstorming:
- Rebecca MacKinnon (former CNN journalist, former Berkman Fellow, and now Assistant Professor at the University of Hong Kong's Journalism and Media Center; see fourth and fifth links below)
- Rep. Rick Boucher
- Chris Smith, Congressman and GOFA co-sponsor
- Mary Robertson, former President of Ireland
- Mark Allison, or another Amnesty International researcher on East Asian issues
- Nicola Wong (Google), Michael Samway (Yahoo) (see second link below), or other representatives of Google, Microsoft, or Yahoo who have dealt with China, S. Korea, Saudi Arabia, or other regimes in this context
- Edward J. Markey, House Subcommittee on Telecommunications and the Internet
- Marc Rotenberg, Executive Director of the Electronic Privacy Information Center
- Chris Kelly, Facebook Chief Privacy Officer (candidate for AG of California in 2010)
- Peter O’Kelly, Skype President [1]
- Representatives of Google, Microsoft, or Yahoo who have helped design GNI
- Perhaps a representative of the government of South Korea (see seventh link below) or, ideally, China (hey, we can dream)
- Perhaps also a continental civil law (French, German?) free speech scholar to talk about contrasting international ideas of free speech?
Course structure
- First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code
- Next 45 minutes: Q&A with guests, one by one, on what the terrain looks like now, and what's left to do.
- Remainder: Classwide simulation, with students in groups, defending assigned roles as various stakeholder groups.
Readings
(Will be broken down by simulation group)
Audio:
- http://rconversation.blogs.com/rconversation/2008/07/on-the-media-in.html (Episode of On The Media w/ Rebecca MacKinnon)
Video
- http://www.youtube.com/watch?v=PMorzIBHmrA (Conversation about GNI on CSPAN w/ Michael Samway and Julien Sanchez)
Text
“Just the Facts” Reporting
Critiques
- http://writ.news.findlaw.com/ramasastry/20081212.html (Anita Ramasastry, Associate Professor at University of Washington School of Law)
- http://www.rsf.org/article.php3?id_article=29117 (Reporters without Borders, an NGO that was part of the talks but didn’t sign onto the GNI at the end)
- http://www.eff.org/files/filenode/gni/signon_letter.txt (Electronic Frontier Foundation, an NGO that was part of the talks and did sign onto the GNI at the end)
Process
- Simulation (How does the GNI relate to the new Vietnamese blog code? What should a major tech company do when asked for details on violators?)
- Alternatively, or in addition, an alternating hi-tech (videos, laptops open) and low-tech (video off, laptops closed) experiment to see how the conversational dynamic changes.
Links
http://blog.wired.com/27bstroke6/2008/04/republican-hous.html
http://rconversation.blogs.com/rconversation/2007/01/google_yahoo_mi.html
http://www.circleid.com/posts/print/20081028_global_network_initiative/
http://www.guardian.co.uk/technology/2008/oct/30/amnesty-global-network-initiative
http://www.economist.com/world/asia/displaystory.cfm?story_id=12783609
Brainstorming (On earlier topic: OpenID)
Title
OpenId and Internet Governance
- One of the other groups has a fun title (all together now for great justice dot org). Can we have one too? --Dan
- Once exams end. --Joshua
Precis
- Internet Regulation (as it relates specifically to online safety and security)
- Privacy and anonymity as they relate to structures of control on the Internet
- JZ: I like the idea of a case study, because the topic is too big otherwise. Would not mind someone from openID or even 2 competing groups talk about what they offer, and identify a problem that gives one of them a headache. My guesses on headaches:
- At what layer of the internet is appropriate for identity?
- How do you achieve critical mass, do you need the help of government or the help of something that's more than just the market?
- Groups to look at, potentially:
- OpenID
- Higgins project
- Trustfuse (Auren Hoffman)
- And then see which group is most interesting and bring them in. The problem ID architecture is meant to solve - what is it? What are the new problems it creates? What are the barriers to implementing this solution?
Guest wish list (if any)
- As an academic, you couldn't do better than Daniel Solove. If we do hone in on a very specific topic, though, we could go for someone with more specialized experience. Dan Ray 22:39, 7 December 2008 (UTC)
- Although government is subject to all sorts of special legal provisos that the private sector doesn't have to manage, the privacy counsel at DHS, Hugo Teufel, is pretty on top of his game. If we're looking for practitioners, Ron Lee of Arnold & Porter does work with private industry.
- If we do OpenID, options for guests might include Bill Washburn of the OpenID Foundation and DeWitt Clinton of Google.
- Also, since Passport has foundered, Facebook Connect looks like the hot new thing on the proprietary side. Whoever runs that for Facebook would be a natural invite as well. (see Dan's links below (?))
- And I still think the potential for the mobile phone to become the heretofore mythical convergence device and thus to become a necessary adjunct to personal identity is worth talking over.
Perhaps a bloggingheads.tv-style video conference call between someone from an electronic privacy nonprofit and a representative from Microsoft or Facebook?
- The Big Think team might be able help secure some of these folks -- hit me up at peter@bigthink.com if you'd like some assistance making contact. we can also help with video teleconferencing etc. PeterH 07:11, 25 December 2008 (UTC)
Readings
James Grimmelmann, Facebook and The Social Dyanmics of Privacy
Solove, Daniel J. "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy"
Links & Articles
http://vizedu.com/2008/12/lifestreaming-what-why-and-how/
http://www.fastcompany.com/magazine/125/how-to-fix-the-web.html
http://developers.facebook.com/connect.php
http://www.readwriteweb.com/archives/facebook_connect_vs_open_id.php
http://www.readwriteweb.com/archives/facebook_connect_readies.php
http://chrissaad.wordpress.com/2008/12/01/facebook-connect-aka-hailstorm-20/
http://wiki.openid.net/Lobbying
http://www.techcrunch.com/2008/11/30/facebook-google-myspace-data/
http://blog.socialmedia.com/slowly-reprogramming-the-web-for-social-networks/
http://gigaom.com/2008/11/30/social-webs-big-question-federate-or-aggregate/
http://news.cnet.com/8301-17939_109-10110382-2.html
http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html
Concrete question(s) of the week
What specific privacy expectations should be articulated to the groups who control the future of OpenID?
Anything else material towards planning your topic
- Facebook + google people?
- another way to look at it is as a matter of cybercrime and such - new surveillence methods (also relevant in regards to child pornography, for example). i wander if these are too different topics or not. Ayelet
- I'd like to see a segment on what "privacy" actually means in law and in culture. This would probably attach well to any other, more applied segment. Dan Ray 16:38, 3 December 2008 (EST)
Creating a series of Privacy Certification Marks