Privacy Part 3: Government Surveillance: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
'''March 3'''
'''March 3'''


Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system.
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We'll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.


==Assignment 2==
==Assignment 2==
Line 17: Line 17:
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]


* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 ("Mass surveillance raises issues beyond individual surveillance," "Secret and confusing law," and "Chilling Effects") only)
; Surveillance Theory and Practice
 
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58)
 
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA's Spying Powers: Reading the Statute]
 
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]
 
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection]


; Case Study - the NSA Scandal and Surveillance Policy
:* If you're interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].


* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (peruse)
* [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only)


* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (peruse)
* [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple's Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple's Dangerous Game, Part 2: The Strongest Counterargument]


* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]
; Transparency and Accountability


* [https://www.youtube.com/watch?v=h0d_QDgl3gI Bruce Schneier, The Battle for Power on the Internet] (approx. 12:30, watch all)
* [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don't Tell Us]


; Surveillance and U.S. law
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim)


* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA's Spying Powers: Reading the Statute]
* [http://icontherecord.tumblr.com/ IC on the Record] (skim)


* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection]
* [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim)


:* If you're interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim)


==Optional Readings==
==Optional Readings==
Line 44: Line 52:
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply]
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply]
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply]
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply]
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 ("Mass surveillance raises issues beyond individual surveillance," "Secret and confusing law," and "Chilling Effects") only)
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim)
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone's Data]


==Class Discussion==
==Class Discussion==


<div style="background-color:#CCCCCC;">Please remember to sign your postings by adding four tildes (<nowiki>~~~~</nowiki>) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)</div>
<div style="background-color:#CCCCCC;">Please remember to sign your postings by adding four tildes (<nowiki>~~~~</nowiki>) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)</div>

Revision as of 15:54, 24 February 2015

March 3

Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We'll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.

Assignment 2

Your final project prospectus is due today before class. Please upload your prospectus here.

Readings

Government vs. Corporate Surveillance
Surveillance Theory and Practice
  • If you're interested, the Donohue article can be found here.
Transparency and Accountability

Optional Readings

  • The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)