Privacy Part 2: Government Surveillance: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
(Created page with "{{ClassCalendar}} '''April 1''' A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time...")
 
No edit summary
Line 1: Line 1:
{{ClassCalendar}}
{{ClassCalendar}}


'''April 1'''
'''April 8'''


A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, and cybersecurity.
Last week we looked at big-picture concepts of privacy and how the Internet reflects these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system.
 
Over the next two weeks we'll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we'll build on these concepts with an eye toward government surveillance and law enforcement.


<onlyinclude>
<onlyinclude>
Line 11: Line 9:
== Readings ==
== Readings ==


; Conceptualizing privacy
; Government vs. Corporate Surveillance
 
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]
 
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]
 
; Case Study - the NSA Scandal and Surveillance Policy


* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, ''Understanding Privacy'' (Chapter 1)]
* [https://www.schneier.com/blog/archives/2013/09/the_limitations.html Bruce Schneier, The Limitations of Intelligence]


; Privacy and technology
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]
 
; Surveillance and U.S. law
 
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA's Spying Powers: Reading the Statute]
 
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection]


* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)]
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)]
Line 33: Line 43:
== Optional Readings ==
== Optional Readings ==


* [http://www.access-controlled.net/wp-content/PDFs/chapter-3.pdf Hal Roberts and John Palfrey, The EU Data Retention Directive in an Era of Internet Surveillance]
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment
 
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship]
 
* [http://docs.law.gwu.edu/facweb/dsolove/Future-of-Reputation/text/futureofreputation-ch7.pdf Dan Solove, ''The Future of Reputation'' (Chapter 7)]
 
* [http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html Chris Soghoian, 8 Million Reasons for Real Surveillance Oversight]
 
* [http://arxiv.org/pdf/cs/0610105v2.pdf Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset) (''Arxiv'')]


* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (''New York Times'')]
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick's opening]
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr's response]
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply]
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply]  


</onlyinclude>
</onlyinclude>

Revision as of 19:35, 17 November 2013

April 8

Last week we looked at big-picture concepts of privacy and how the Internet reflects these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system.


Readings

Government vs. Corporate Surveillance
Case Study - the NSA Scandal and Surveillance Policy
Surveillance and U.S. law
Privacy and law

Optional Readings

  • The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)