Privacy Part 2: Government Surveillance: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
No edit summary
Line 17: Line 17:
; Case Study - the NSA Scandal and Surveillance Policy
; Case Study - the NSA Scandal and Surveillance Policy


* [https://www.schneier.com/blog/archives/2013/09/the_limitations.html Bruce Schneier, The Limitations of Intelligence]
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (peruse)


* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]
Line 26: Line 26:


* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection]
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection]
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)]
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, ''Blown to Bits'' (Chapter 2)] (read pages 36-42)
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (focus on "Privacy in Public: Data")
; Privacy and law
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States] and [https://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act Children's Online Privacy Protection Act]
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]


* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair]
* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair]

Revision as of 20:54, 17 November 2013

April 8

Last week we looked at big-picture concepts of privacy and how the Internet reflects these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, and what that does to us and the Internet as a system.


Readings

Government vs. Corporate Surveillance
Case Study - the NSA Scandal and Surveillance Policy
Surveillance and U.S. law

Optional Readings

  • The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)