Privacy Part 2: Government Surveillance: Difference between revisions
Jump to navigation
Jump to search
(Created page with "{{ClassCalendar}} '''April 1''' A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time...") |
No edit summary |
||
Line 1: | Line 1: | ||
{{ClassCalendar}} | {{ClassCalendar}} | ||
'''April | '''April 8''' | ||
Last week we looked at big-picture concepts of privacy and how the Internet reflects these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system. | |||
<onlyinclude> | <onlyinclude> | ||
Line 11: | Line 9: | ||
== Readings == | == Readings == | ||
; | ; Government vs. Corporate Surveillance | ||
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance] | |||
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance] | |||
; Case Study - the NSA Scandal and Surveillance Policy | |||
* [https:// | * [https://www.schneier.com/blog/archives/2013/09/the_limitations.html Bruce Schneier, The Limitations of Intelligence] | ||
; | * [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA] | ||
; Surveillance and U.S. law | |||
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA's Spying Powers: Reading the Statute] | |||
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection] | |||
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)] | * [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)] | ||
Line 33: | Line 43: | ||
== Optional Readings == | == Optional Readings == | ||
* | * The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment | ||
* [ | :* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick's opening] | ||
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr's response] | |||
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply] | |||
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply] | |||
</onlyinclude> | </onlyinclude> |
Revision as of 19:35, 17 November 2013
April 8
Last week we looked at big-picture concepts of privacy and how the Internet reflects these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system.
Readings
- Government vs. Corporate Surveillance
- Case Study - the NSA Scandal and Surveillance Policy
- Surveillance and U.S. law
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (read pages 36-42)
- Lawrence Lessig, Code 2.0 (Chapter 7) (focus on "Privacy in Public: Data")
- Privacy and law
Optional Readings
- The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment
Videos Watched in Class
Links
Class Discussion
Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)