Open Networks, Closed Regimes

From The Internet: Issues at the Frontier (course wiki)
Revision as of 23:18, 15 February 2009 by Jgruensp (talk | contribs)
Jump to navigation Jump to search

Dan Ray, Conor, Joshua

Open Network, Closed Regimes

Problem to be solved

US-based internet services are used by citizens of every regime in the world. Western-based internet companies operate these services in many countries where governments routinely request or demand sensitive information about their citizens. How should high-level officers respond when their companies receive requests to turn over information which violate privacy and anonymity expectations? How can citizens, NGOs, and government actors influence the way these companies respond?

Precis

The idea of the internet service provider as a border-defying government-regulation-free jurisdiction was already dying in the 1990s, but the large-scale movement of internet services into regimes without free speech protections has raised serious concerns about managing cross-border privacy standards over the last five years. From Yahoo turning over pro-democracy Chinese bloggers to the Chinese government, to Saudi Arabia tracking porn downloaders by pulling ISP records, to South Korea trying to arrest anonymous government critics, the problems are widespread and not restricted only to regimes that Americans are used to thinking of as "repressive." The globalization of internet services raises difficult questions: What requests for information are invasive? What kind of deference is due to local sovereignty? How can the competing demands best be balanced? How can the relevant stakeholders work toward achieving a proper balance?

Existing Proposals to be Discussed

  • GNI
  • GOFA
  • Q6/17

Potential Guests

  1. Caroline Nolan, Colin Maclay, or John Palfrey from Berkman/GNI
  2. Andrew McLaughlin from Google

Brainstorming:

  1. Rebecca MacKinnon (former CNN journalist, former Berkman Fellow, and now Assistant Professor at the University of Hong Kong's Journalism and Media Center; see fourth and fifth links below)
  2. Rep. Rick Boucher
  3. Chris Smith, Congressman and GOFA co-sponsor
  4. Mary Robertson, former President of Ireland
  5. Mark Allison, or another Amnesty International researcher on East Asian issues
  6. Nicola Wong (Google), Michael Samway (Yahoo) (see second link below), or other representatives of Google, Microsoft, or Yahoo who have dealt with China, S. Korea, Saudi Arabia, or other regimes in this context
  7. Edward J. Markey, House Subcommittee on Telecommunications and the Internet
  8. Marc Rotenberg, Executive Director of the Electronic Privacy Information Center
  9. Chris Kelly, Facebook Chief Privacy Officer (candidate for AG of California in 2010)
  10. Peter O’Kelly, Skype President [1]
  11. Representatives of Google, Microsoft, or Yahoo who have helped design GNI
  12. Perhaps a representative of the government of South Korea (see seventh link below) or, ideally, China (hey, we can dream)
  13. Perhaps also a continental civil law (French, German?) free speech scholar to talk about contrasting international ideas of free speech?

Course structure

Class:

  1. First 10-15 minutes: Exposition- background information, state problem, and introduce types of potential solutions: Law (GOFA), Market, Norms (GNI), Code
  2. Next 45 minutes: Q&A with guests, in a panel, on what the terrain looks like now, and what's left to do. (Possibly Using Live Question Tool w/ Projector)
  3. Remainder: Classwide simulation, with students in groups, defending assigned roles as various stakeholder groups.

Simulation

The class will be divided into simulation groups ahead of time (e.g., US Congressional Representatives, Bloggers, Human Rights Groups). Each group will be assigned a role in the simulation, and we will give each group a set of readings specific to their role in the simulation.

A relevant privacy/anonymity problem (that has just recently been introduced on the global stage) will be introduced in the second half of the class. Drawing upon assigned readings and the lessons and principles introduced in the first half of the class, each simulation group will devise and advocate a broad approach to for confronting this problem. Each group's approach should be based on its assigned role in the simulation.

Readings

(Some of these and additional readings will be broken down by simulation group)

Audio:

Video

Text

“Just the Facts” Reporting

Critiques

Links

http://blogs.wsj.com/chinajournal/2008/10/28/parsing-the-google-yahoo-microsoft-global-network-initiative/

http://www.nytimes.com/2008/11/30/magazine/30google-t.html?_r=1&adxnnl=1&partner=permalink&exprod=permalink&adxnnlx=1229749063-T7qNc5xv9ZLDiLcjc8AZxQ&pagewanted=print

http://blog.wired.com/27bstroke6/2008/04/republican-hous.html

http://rconversation.blogs.com/rconversation/2007/01/google_yahoo_mi.html

http://www.circleid.com/posts/print/20081028_global_network_initiative/

http://www.guardian.co.uk/technology/2008/oct/30/amnesty-global-network-initiative

http://www.economist.com/world/asia/displaystory.cfm?story_id=12783609

http://www.huffingtonpost.com/michael-a-santoro-and-wendy-goldberg/chinese-internet-censorsh_b_156212.html

http://news.cnet.com/8301-13578_3-10040152-38.html (Declan McCullagh of CNet News on Q6/17, including links to several leaked ITU documents)

Brainstorming (On earlier topic: OpenID)

All that OpenID stuff has moved to legacy support. And thank goodness for that. Dan Ray 01:19, 4 February 2009 (UTC)