Open Networks, Closed Regimes: Difference between revisions

From The Internet: Issues at the Frontier (course wiki)
Jump to navigation Jump to search
Line 32: Line 32:
=== Course structure ===
=== Course structure ===


The class will be divided into simulation groups ahead of time.  Each group will be assigned a role in the simulation, and we will give each group a set of readings specific to their role in the simulation. 
Class:
# First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code
# First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code
# Next 45 minutes: Q&A with guests, one by one, on what the terrain looks like now, and what's left to do.
# Next 45 minutes: Q&A with guests, one by one, on what the terrain looks like now, and what's left to do.

Revision as of 19:44, 1 February 2009

Dan Ray, Conor, Joshua

Open Network, Closed Regimes

Problem to be solved

US-based internet services are used by citizens of every regime in the world. Western-based internet companies operate these services in many countries where governments routinely request or demand sensitive information about their citizens. How should high-level officers respond when their companies receive requests to turn over information which violate privacy and anonymity expectations? How can citizens, NGOs, and government actors influence the way these companies respond?

Precis

The idea of the internet service provider as a border-defying government-regulation-free jurisdiction was already dying in the 1990s, but the large-scale movement of internet services into regimes without free speech protections has raised serious concerns about managing cross-border privacy standards over the last five years. From Yahoo turning over pro-democracy Chinese bloggers to the Chinese government, to Saudi Arabia tracking porn downloaders by pulling ISP records, to South Korea trying to arrest anonymous government critics, the problems are widespread and not restricted only to regimes that Americans are used to thinking of as "repressive." The globalization of internet services raises difficult questions: What requests for information are invasive? What kind of deference is due to local sovereignty? How can the competing demands best be balanced? How can the relevant stakeholders work toward achieving a proper balance?

Potential Guests

  1. Caroline Nolan, Colin Maclay, or John Palfrey from Berkman/GNI
  2. Andrew McLaughlin from Google

Brainstorming:

  1. Rebecca MacKinnon (former CNN journalist, former Berkman Fellow, and now Assistant Professor at the University of Hong Kong's Journalism and Media Center; see fourth and fifth links below)
  2. Rep. Rick Boucher
  3. Chris Smith, Congressman and GOFA co-sponsor
  4. Mary Robertson, former President of Ireland
  5. Mark Allison, or another Amnesty International researcher on East Asian issues
  6. Nicola Wong (Google), Michael Samway (Yahoo) (see second link below), or other representatives of Google, Microsoft, or Yahoo who have dealt with China, S. Korea, Saudi Arabia, or other regimes in this context
  7. Edward J. Markey, House Subcommittee on Telecommunications and the Internet
  8. Marc Rotenberg, Executive Director of the Electronic Privacy Information Center
  9. Chris Kelly, Facebook Chief Privacy Officer (candidate for AG of California in 2010)
  10. Peter O’Kelly, Skype President [1]
  11. Representatives of Google, Microsoft, or Yahoo who have helped design GNI
  12. Perhaps a representative of the government of South Korea (see seventh link below) or, ideally, China (hey, we can dream)
  13. Perhaps also a continental civil law (French, German?) free speech scholar to talk about contrasting international ideas of free speech?

Course structure

The class will be divided into simulation groups ahead of time. Each group will be assigned a role in the simulation, and we will give each group a set of readings specific to their role in the simulation.

Class:

  1. First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code
  2. Next 45 minutes: Q&A with guests, one by one, on what the terrain looks like now, and what's left to do.
  3. Remainder: Classwide simulation, with students in groups, defending assigned roles as various stakeholder groups.

Readings

(Will be broken down by simulation group)

Audio:

Video

Text

“Just the Facts” Reporting

Critiques

Links

http://blogs.wsj.com/chinajournal/2008/10/28/parsing-the-google-yahoo-microsoft-global-network-initiative/

http://www.nytimes.com/2008/11/30/magazine/30google-t.html?_r=1&adxnnl=1&partner=permalink&exprod=permalink&adxnnlx=1229749063-T7qNc5xv9ZLDiLcjc8AZxQ&pagewanted=print

http://blog.wired.com/27bstroke6/2008/04/republican-hous.html

http://rconversation.blogs.com/rconversation/2007/01/google_yahoo_mi.html

http://www.circleid.com/posts/print/20081028_global_network_initiative/

http://www.guardian.co.uk/technology/2008/oct/30/amnesty-global-network-initiative

http://www.economist.com/world/asia/displaystory.cfm?story_id=12783609

http://www.huffingtonpost.com/michael-a-santoro-and-wendy-goldberg/chinese-internet-censorsh_b_156212.html

Brainstorming (On earlier topic: OpenID)

Title

OpenId and Internet Governance

One of the other groups has a fun title (all together now for great justice dot org). Can we have one too? --Dan
Once exams end. --Joshua

Precis

  • Internet Regulation (as it relates specifically to online safety and security)
  • Privacy and anonymity as they relate to structures of control on the Internet
JZ: I like the idea of a case study, because the topic is too big otherwise. Would not mind someone from openID or even 2 competing groups talk about what they offer, and identify a problem that gives one of them a headache. My guesses on headaches:
At what layer of the internet is appropriate for identity?
How do you achieve critical mass, do you need the help of government or the help of something that's more than just the market?
Groups to look at, potentially:
OpenID
Higgins project
Trustfuse (Auren Hoffman)
And then see which group is most interesting and bring them in. The problem ID architecture is meant to solve - what is it? What are the new problems it creates? What are the barriers to implementing this solution?

Guest wish list (if any)

  • As an academic, you couldn't do better than Daniel Solove. If we do hone in on a very specific topic, though, we could go for someone with more specialized experience. Dan Ray 22:39, 7 December 2008 (UTC)
  • Although government is subject to all sorts of special legal provisos that the private sector doesn't have to manage, the privacy counsel at DHS, Hugo Teufel, is pretty on top of his game. If we're looking for practitioners, Ron Lee of Arnold & Porter does work with private industry.
  • If we do OpenID, options for guests might include Bill Washburn of the OpenID Foundation and DeWitt Clinton of Google.
  • Also, since Passport has foundered, Facebook Connect looks like the hot new thing on the proprietary side. Whoever runs that for Facebook would be a natural invite as well. (see Dan's links below (?))
  • And I still think the potential for the mobile phone to become the heretofore mythical convergence device and thus to become a necessary adjunct to personal identity is worth talking over.

Perhaps a bloggingheads.tv-style video conference call between someone from an electronic privacy nonprofit and a representative from Microsoft or Facebook?

The Big Think team might be able help secure some of these folks -- hit me up at peter@bigthink.com if you'd like some assistance making contact. we can also help with video teleconferencing etc. PeterH 07:11, 25 December 2008 (UTC)

Readings

James Grimmelmann, Facebook and The Social Dyanmics of Privacy

Solove, Daniel J. "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy"

Links & Articles

http://vizedu.com/2008/12/lifestreaming-what-why-and-how/

http://www.fastcompany.com/magazine/125/how-to-fix-the-web.html

http://developers.facebook.com/connect.php

http://www.readwriteweb.com/archives/facebook_connect_vs_open_id.php

http://www.readwriteweb.com/archives/facebook_connect_readies.php

http://chrissaad.wordpress.com/2008/12/01/facebook-connect-aka-hailstorm-20/

http://wiki.openid.net/Lobbying

http://planet.openid.net/

http://www.techcrunch.com/2008/11/30/facebook-google-myspace-data/

http://blog.socialmedia.com/slowly-reprogramming-the-web-for-social-networks/

http://www.nytimes.com/2008/12/01/technology/internet/01facebook.html?_r=1&ref=technology&pagewanted=print

http://www.youtube.com/watch?v=8XLfbos9cVocebook-connect-is-the-future-of-digg/&feature=player_embedded

http://gigaom.com/2008/11/30/social-webs-big-question-federate-or-aggregate/

http://news.cnet.com/8301-17939_109-10110382-2.html

http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html

Concrete question(s) of the week

What specific privacy expectations should be articulated to the groups who control the future of OpenID?

Anything else material towards planning your topic

  • Facebook + google people?
  • another way to look at it is as a matter of cybercrime and such - new surveillence methods (also relevant in regards to child pornography, for example). i wander if these are too different topics or not. Ayelet
  • I'd like to see a segment on what "privacy" actually means in law and in culture. This would probably attach well to any other, more applied segment. Dan Ray 16:38, 3 December 2008 (EST)
  • Creating a series of Privacy Certification Marks