Privacy Part 3: Government Surveillance: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
'''March 3''' | '''March 3''' | ||
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. | Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We'll also look at how companies are working to inform citizens about surveillance, and the issues they encounter. | ||
==Assignment 2== | ==Assignment 2== | ||
Line 17: | Line 17: | ||
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance] | * [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance] | ||
* [http:// | ; Surveillance Theory and Practice | ||
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58) | |||
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA's Spying Powers: Reading the Statute] | |||
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA] | |||
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue's Comprehensive Case Against Bulk Metadata Collection] | |||
:* If you're interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here]. | |||
* [ | * [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only) | ||
* [ | * [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple's Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple's Dangerous Game, Part 2: The Strongest Counterargument] | ||
; Transparency and Accountability | |||
* [ | * [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don't Tell Us] | ||
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim) | |||
* [http:// | * [http://icontherecord.tumblr.com/ IC on the Record] (skim) | ||
* [ | * [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim) | ||
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim) | |||
==Optional Readings== | ==Optional Readings== | ||
Line 44: | Line 52: | ||
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply] | :* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick's reply] | ||
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply] | :* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr's sur-reply] | ||
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 ("Mass surveillance raises issues beyond individual surveillance," "Secret and confusing law," and "Chilling Effects") only) | |||
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim) | |||
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone's Data] | |||
==Class Discussion== | ==Class Discussion== | ||
<div style="background-color:#CCCCCC;">Please remember to sign your postings by adding four tildes (<nowiki>~~~~</nowiki>) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)</div> | <div style="background-color:#CCCCCC;">Please remember to sign your postings by adding four tildes (<nowiki>~~~~</nowiki>) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)</div> |
Revision as of 15:54, 24 February 2015
March 3
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments') citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We'll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.
Assignment 2
Your final project prospectus is due today before class. Please upload your prospectus here.
Readings
- Government vs. Corporate Surveillance
- Surveillance Theory and Practice
- Neil Richards, The Dangers of Surveillance (pages 1934-96; 1942-45; and 1952-58)
- If you're interested, the Donohue article can be found here.
- Re/Code, An Interview with President Obama (10:50-15:25 only)
- Transparency and Accountability
- IC on the Record (skim)
- Twitter Transparency Report (skim)
Optional Readings
- The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment
- Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism (pages 9-12 ("Mass surveillance raises issues beyond individual surveillance," "Secret and confusing law," and "Chilling Effects") only)
Class Discussion
Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)