Law in the Internet Society

View   r6  >  r5  >  r4  >  r3  >  r2  >  r1
BrianSSecondPaper 6 - 06 Dec 2009 - Main.BrianS
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Not yet ready for review. Quite a bit from it!
Line: 8 to 8
 -- By BrianS - 02 Dec 2009
Changed:
<
<

Introduction, or, Something private this way comes

>
>

Introduction: Something Private this Way Comes

 We are by now well-acquainted with the exclamation that privacy is dead. In the days of yore, we are told, there was secrecy, and the secrecy was good. But the digital age promised us the greatest conveniences, services customized to our every desire, if we would simply help the vendors remember a bit about us. The stories of the sacrifice of privacy on the altar of technological advancement are now legion. And so, they say, privacy is dead.

The truth of the matter, however, is much darker, and the profession that privacy is dead or lost is only half true. The claim that we have "lost" our privacy suggests a sort of invasion of our secret places, shadowed eyes peering into our bedrooms, probing mentalists looking into our thoughts themselves. In sum, the suggestion that privacy is lost portrays an active intrusion by another that we are blameless for. The claim that privacy is dead suggests that it is gone and that we therefore have no concept of it in our lives. But neither is what has actually occurred.

Changed:
<
<
To the contrary, we have not stopped understanding what privacy is, nor have we stopped thinking that some things are private. We retain a sense that there are matters that are ours only to tell, our secrets to hold, our nakedness to conceal. Technology does not peer into our innermost sanctum, it is we who spill our darkest secrets to technology. Technology does not read our minds or peep into our windows, we instead freely confess exactly what we are thinking, why we are thinking it, and to whom we are telling it to. We do so in real time. Privacy has not been lost, it has been given; privacy has not died, we have made it into a fully-living monster. This is the New Privacy.
>
>
To the contrary, we have not stopped understanding what privacy is, nor have we stopped thinking that some things are private. We retain a sense that there are matters that are ours only to tell, our secrets to hold, our nakedness to conceal. Technology does not peer into our innermost sanctum, it is we who spill our darkest secrets to technology. Technology does not read our minds or peep into our windows, we instead freely confess exactly what we are thinking, why we are thinking it, and to whom we are telling it to. We do so in real time. Privacy has not been lost, it has been given; privacy has not died, we have made it into a fully-living monster. This is the New Privacy.
 
Changed:
<
<
The New Privacy is a clever beast with many silver-tongued maws. The Privacy tells us that no matter what we might think is personal, we must still blog about that party last weekend. The creature boldly professes that it values our secrets, but that it truly must possess them so that it can be a better companion; TWikiGuest, don't you want to be friends?
>
>
The New Privacy is a clever beast with many silver-tongued maws. The Privacy tells us that no matter what we might think is personal, we must still blog about that party last weekend. The creature boldly professes that it values our secrets, but that it truly must possess them so that it can be a better companion; TWikiGuest, don't you want to be friends?
 In sum, the New Privacy has convinced us to disrobe in public without discarding our fear of nakedness.
Changed:
<
<
Like any good creature of nightmare, we do not fully understand the New Privacy's power; we have difficulty pinning down its harms. Because the Privacy operates in shadow and mist, we cannot clearly perceive where it might next strike. And because we have allowed the beast's tendrils to so embrace our lives, the monster now surrounds us on all sides. In the light of day it beckons us to adhere to its wishes, and even in slumber the monster's dreams have power.
>
>
Like any good creature of nightmare, we do not fully understand the New Privacy's power; it is difficult to pin down its harms. Because the Privacy operates in shadow and mist, we cannot clearly perceive where it might next strike. And because we have allowed the beast's tendrils to so embrace our lives, the monster now surrounds us on all sides. In the light of day it beckons us to adhere to its wishes, and even in slumber the monster's dreams have power.
 
Changed:
<
<
Indeed, the monster draws strength from all that we do. From the heavy metal armor that we clothe ourselves in to the taverns in which we gather; from the vessels we travel the virtual seas upon to the parchment we use to exchange letters. From each of these, the creature strengthens.
>
>
Indeed, the monster draws strength from all that we do. From the heavy metal armor that we clothe ourselves in to the taverns in which we gather; from the www.internetexplorer? [vessels]] we travel the virtual seas upon to the parchment we use to exchange letters. From each of these, the creature strengthens.
 
Changed:
<
<
But not all of the villagers are without ears to hear; after whispered tales from those who have seen the beast, some have found their torches and blades. They have set out in isolation and with entourage. There is disagreement about how the beast should be met: should we capture and cage it, or should we slay it directly? Once captured, may others gaze upon it, despite the dangers, or should we banish it completely? Some have called these villagers fools; others would be glad to travel with them. And so we come to the question of which am I.
>
>
But not all of the villagers are without ears to hear; after whispered tales from those who have seen the beast, some have found their torches and blades. They have set out in isolation and with entourage. There is disagreement about how the beast should be met: should we capture and cage it, or should we slay it directly? Once captured, may others gaze upon it, despite the dangers, or should we banish it completely? Some have called the hunters fools; others would be glad to travel with them. And so we come to the question of which am I.
 
Changed:
<
<

Conclusion, or, the Way Home

>
>

Conclusion: The Way Home

 Who am I to spin this tale, what is my claim to knowledge? I have none, for never have I have met the creature face to faces and the harms it has dealt to me are as of yet few. But I have listened at the fireside, late into the evening, enough to know that something moves in the darkness. I have seen enough marks in the dirt to know of the thing's measure, and to know that it is growing. I am now one who is searching for his pitchfork in the night, and I tell this story to you because I fear to dwell in darkness alone.

How then, traveler, could we advance? What can we hope to do when we are only coming to wisdom so far down the path? The answer, I suggest, begins where all nightmares end: we must wake up. The power of the monster is its secrecy, for if it is as terrible as we claim how long would the villagers let it live once dragged into the light of day? Until the monster is revealed, we will fight it alone. For no one fears the terror not yet unmasked.

Changed:
<
<
The New Privacy is not a creature of myth, however, and sunlight alone will not dispatch it. We will require other tools as well. The monster is part of us, and many welcome its influence; I therefore reject the full murder of the beast, for to do so would be to deny the freedom of choice and thereby sacrifice part of ourselves. Still, like anything with potential to do great harm, we must limit the monster's reach. We must require it to reveal its purposes whenever it seeks to deal with us. We must require those disclosures to strike the difficult balance between entirety, brevity, and clarity. We cannot pretend that balance is easily found. But if we are to both respect the choices of those who would freely deal with the monster and yet wholly accept that those dealings are dangerous, that balance is the only viable option of which I know. And if you insist, fellow traveler, that there are better options that I have not encountered, better ways to resolve the mess that we are now within?
>
>
The New Privacy is not a creature of myth, however, and sunlight alone will not dispatch it. We will require other tools as well. First, many welcome the monster's influence; I therefore reject the full murder of the beast, for to do so would be to deny them freedom of choice, and thereby sacrifice part of ourselves.

Still, like anything with potential to do great harm, we must limit the monster's reach. We must require the Privacy's agents to reveal their purposes whenever they seek to deal with us. We must require those disclosures to strike the difficult balance between entirety, brevity, and clarity. We cannot pretend that balance is easily found. But if we are to both respect the choices of those who would freely deal with the monster and yet wholly accept that those dealings are dangerous, that balance is the only viable option of which I know. And if you insist, fellow traveler, that there are better options that I have not encountered, better ways to resolve the mess that we are now within?

 Well, TWikiGuest, then you see why I am so eager to have you along.
Line: 40 to 42
 "Like the oleander, however, the beauty is the danger. ... In effect, every consumer is like a wanderer lost in the desert, and data mining allows corporations to know the exact moment when he is so overcome by thirst that he will pay any price for a drink of water." (Brad's paper on data mining)
Deleted:
<
<
Brett's paper on opt-in for data mining

Dana's paper on Facebook dreaming

 Gavin's paper on GoogleStreet and Privacy

Heather's paper on Facebook and minors

Line: 60 to 58
 Seth's paper on the Google Voice privacy policy
Deleted:
<
<
YuShi's paper on apathy and paranoia responses to privacy concerns (people do not truly have a precise understanding of what the threat is)(This creates an almost mythical kind of fear, an amorphous fear that is always lurking, but one that can be dismissed as easily as it can be sensationalized)
 http://www.nytimes.com/2008/11/30/business/30privacy.html?pagewanted=1&partner=permalink&exprod=permalink

http://bwog.net/2008/06/10/hilarious-housing-dining-social-security-number-mishap

Line: 120 to 116
 Ando, Brian actually inserted a code % WIKIUSERNAME % (without spaces in between the % and WIKIUSERNAME) so that the reader will see his name. Pretty nifty tool.

-- AllanOng - 06 Dec 2009

Added:
>
>

That is correct, if you are logged in while reading the paper it will kick up your Wiki Name. If you are not logged in, you'll see TWikiGuest? I believe. The idea behind the %WIKIUSERNAME% code is to give the essay an aura of "that's kind of creepy." Which, given the dangers I'm trying to identify in the essay, is just what I'm going for.

So while I did read your paper carefully Ando, I didn't single you out! wink That would be mean!

-- BrianS - 06 Dec 2009

 
 
<--/commentPlugin-->
\ No newline at end of file

BrianSSecondPaper 5 - 06 Dec 2009 - Main.AllanOng
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Not yet ready for review. Quite a bit from it!
Line: 115 to 115
 Thank you, Brian, for carefully reading my paper. Your paper gives me some encouragement.

-- AndoY - 06 Dec 2009

Added:
>
>

Ando, Brian actually inserted a code % WIKIUSERNAME % (without spaces in between the % and WIKIUSERNAME) so that the reader will see his name. Pretty nifty tool.

-- AllanOng - 06 Dec 2009

 
 
<--/commentPlugin-->
\ No newline at end of file

BrianSSecondPaper 4 - 06 Dec 2009 - Main.AndoY
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Not yet ready for review. Quite a bit from it!
Line: 102 to 102
 # * Set ALLOWTOPICVIEW = TWikiAdminGroup, BrianS
Added:
>
>

Since I am called twice in your essay, please let me say a few here even though it is not yet ready for review.

First, i am impressed with your last part writing about "monster". it answers well my question in my essay ("Question is how" - i deleted that sentence in the revised version before reading your paper). I agree that it is not easy to find the optimal balance between a monopolistic power and competing insurgents.

I sometimes become pessimistic how we can improve the world. However, I believe that this nation, U.S., has power to create something new and to challenge monsters always.

Rather, I am more concerned about those societies which do not have this counter-culture or anti-mainstream mentality.

Thank you, Brian, for carefully reading my paper. Your paper gives me some encouragement.

-- AndoY - 06 Dec 2009

 
 
<--/commentPlugin-->

BrianSSecondPaper 3 - 03 Dec 2009 - Main.BrianS
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Changed:
<
<
Not yet ready for review.
>
>
Not yet ready for review. Quite a bit from it!
 
Changed:
<
<

Privacy

>
>

Lessons from the Fireside: Synthesizing the Journey Thus Far

 -- By BrianS - 02 Dec 2009
Added:
>
>

Introduction, or, Something private this way comes

We are by now well-acquainted with the exclamation that privacy is dead. In the days of yore, we are told, there was secrecy, and the secrecy was good. But the digital age promised us the greatest conveniences, services customized to our every desire, if we would simply help the vendors remember a bit about us. The stories of the sacrifice of privacy on the altar of technological advancement are now legion. And so, they say, privacy is dead.

The truth of the matter, however, is much darker, and the profession that privacy is dead or lost is only half true. The claim that we have "lost" our privacy suggests a sort of invasion of our secret places, shadowed eyes peering into our bedrooms, probing mentalists looking into our thoughts themselves. In sum, the suggestion that privacy is lost portrays an active intrusion by another that we are blameless for. The claim that privacy is dead suggests that it is gone and that we therefore have no concept of it in our lives. But neither is what has actually occurred.

To the contrary, we have not stopped understanding what privacy is, nor have we stopped thinking that some things are private. We retain a sense that there are matters that are ours only to tell, our secrets to hold, our nakedness to conceal. Technology does not peer into our innermost sanctum, it is we who spill our darkest secrets to technology. Technology does not read our minds or peep into our windows, we instead freely confess exactly what we are thinking, why we are thinking it, and to whom we are telling it to. We do so in real time. Privacy has not been lost, it has been given; privacy has not died, we have made it into a fully-living monster. This is the New Privacy.

The New Privacy is a clever beast with many silver-tongued maws. The Privacy tells us that no matter what we might think is personal, we must still blog about that party last weekend. The creature boldly professes that it values our secrets, but that it truly must possess them so that it can be a better companion; TWikiGuest, don't you want to be friends?

In sum, the New Privacy has convinced us to disrobe in public without discarding our fear of nakedness.

Like any good creature of nightmare, we do not fully understand the New Privacy's power; we have difficulty pinning down its harms. Because the Privacy operates in shadow and mist, we cannot clearly perceive where it might next strike. And because we have allowed the beast's tendrils to so embrace our lives, the monster now surrounds us on all sides. In the light of day it beckons us to adhere to its wishes, and even in slumber the monster's dreams have power.

Indeed, the monster draws strength from all that we do. From the heavy metal armor that we clothe ourselves in to the taverns in which we gather; from the vessels we travel the virtual seas upon to the parchment we use to exchange letters. From each of these, the creature strengthens.

But not all of the villagers are without ears to hear; after whispered tales from those who have seen the beast, some have found their torches and blades. They have set out in isolation and with entourage. There is disagreement about how the beast should be met: should we capture and cage it, or should we slay it directly? Once captured, may others gaze upon it, despite the dangers, or should we banish it completely? Some have called these villagers fools; others would be glad to travel with them. And so we come to the question of which am I.

Conclusion, or, the Way Home

Who am I to spin this tale, what is my claim to knowledge? I have none, for never have I have met the creature face to faces and the harms it has dealt to me are as of yet few. But I have listened at the fireside, late into the evening, enough to know that something moves in the darkness. I have seen enough marks in the dirt to know of the thing's measure, and to know that it is growing. I am now one who is searching for his pitchfork in the night, and I tell this story to you because I fear to dwell in darkness alone.

How then, traveler, could we advance? What can we hope to do when we are only coming to wisdom so far down the path? The answer, I suggest, begins where all nightmares end: we must wake up. The power of the monster is its secrecy, for if it is as terrible as we claim how long would the villagers let it live once dragged into the light of day? Until the monster is revealed, we will fight it alone. For no one fears the terror not yet unmasked.

The New Privacy is not a creature of myth, however, and sunlight alone will not dispatch it. We will require other tools as well. The monster is part of us, and many welcome its influence; I therefore reject the full murder of the beast, for to do so would be to deny the freedom of choice and thereby sacrifice part of ourselves. Still, like anything with potential to do great harm, we must limit the monster's reach. We must require it to reveal its purposes whenever it seeks to deal with us. We must require those disclosures to strike the difficult balance between entirety, brevity, and clarity. We cannot pretend that balance is easily found. But if we are to both respect the choices of those who would freely deal with the monster and yet wholly accept that those dealings are dangerous, that balance is the only viable option of which I know. And if you insist, fellow traveler, that there are better options that I have not encountered, better ways to resolve the mess that we are now within?

Well, TWikiGuest, then you see why I am so eager to have you along.

References to Integrate:

 "Like the oleander, however, the beauty is the danger. ... In effect, every consumer is like a wanderer lost in the desert, and data mining allows corporations to know the exact moment when he is so overcome by thirst that he will pay any price for a drink of water." (Brad's paper on data mining)

Brett's paper on opt-in for data mining

Line: 26 to 56
 Makalika's paper on Facebook ads and suggesting using nonprofits (soon after creating a Facebook event titled “baby shower,” the ads served to my profile page included titles like “Are you a game-loving mom?” and “Win Disney on Ice Tickets!”)
Changed:
<
<

Section I

>
>
Scott's paper on, e.g., CCTV and privacy invasions in the US and particularly abroad

Seth's paper on the Google Voice privacy policy

YuShi's paper on apathy and paranoia responses to privacy concerns (people do not truly have a precise understanding of what the threat is)(This creates an almost mythical kind of fear, an amorphous fear that is always lurking, but one that can be dismissed as easily as it can be sensationalized)

http://www.nytimes.com/2008/11/30/business/30privacy.html?pagewanted=1&partner=permalink&exprod=permalink

http://bwog.net/2008/06/10/hilarious-housing-dining-social-security-number-mishap

http://www.cdt.org/privacy/guide/surveyinfo.php

http://nymag.com/daily/intel/2009/08/facebook_status.html

http://www.smh.com.au/news/technology/facebook-friends-not-real-judge/2008/03/27/1206207279597.html

http://todayilaughed.com/?attachment_id=1118

http://atlanta.creativeloafing.com/gyrobase/life_in_the_shadows/Content?oid=98753

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565

http://www.nytimes.com/library/magazine/home/20000430mag-internetprivacy.html

http://epic.org/privacy/wiretap/ltr_pen_trap_leahy_final.pdf

http://www.justice.gov/criminal/cybercrime/pentrap3121_3127.htm

http://www.newsweek.com/id/195621

http://www.nytimes.com/2006/02/04/technology/04privacy.html?_r=1

http://files.cloudprivacy.net/verizon-price-list-letter.PDF

http://www.washingtonpost.com/wp-dyn/content/article/2007/11/22/AR2007112201444.html

 
Changed:
<
<

Section II

>
>
http://epic.org/privacy/carnivore/
 
Added:
>
>
http://www.silicon-flatirons.org/events.php?id=700
 
Added:
>
>
http://www.msnbc.msn.com/id/3078854
 

BrianSSecondPaper 2 - 03 Dec 2009 - Main.BrianS
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Not yet ready for review.

Changed:
<
<

Paper Title

>
>

Privacy

 -- By BrianS - 02 Dec 2009
Added:
>
>
"Like the oleander, however, the beauty is the danger. ... In effect, every consumer is like a wanderer lost in the desert, and data mining allows corporations to know the exact moment when he is so overcome by thirst that he will pay any price for a drink of water." (Brad's paper on data mining)
 
Changed:
<
<

Section I

Subsection A

>
>
Brett's paper on opt-in for data mining
 
Changed:
<
<

Subsub 1

>
>
Dana's paper on Facebook dreaming
 
Changed:
<
<

Subsection B

>
>
Gavin's paper on GoogleStreet and Privacy
 
Added:
>
>
Heather's paper on Facebook and minors
 
Changed:
<
<

Subsub 1

>
>
Jacobus's paper on Google and data-aggregation as a problem
 
Added:
>
>
the real power lies in us (Juvaria's paper on privacy, Google remembering everything, and )
 
Changed:
<
<

Subsub 2

>
>
Kamel's paper on right to oblivion for the deceased
 
Added:
>
>
Makalika's paper on Facebook ads and suggesting using nonprofits (soon after creating a Facebook event titled “baby shower,” the ads served to my profile page included titles like “Are you a game-loving mom?” and “Win Disney on Ice Tickets!”)
 
Added:
>
>

Section I

 

Section II

Deleted:
<
<

Subsection A

Subsection B

 



BrianSSecondPaper 1 - 02 Dec 2009 - Main.BrianS
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondPaper"
Not yet ready for review.

Paper Title

-- By BrianS - 02 Dec 2009

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


# * Set ALLOWTOPICVIEW = TWikiAdminGroup, BrianS

 
<--/commentPlugin-->

Revision 6r6 - 06 Dec 2009 - 08:22:57 - BrianS
Revision 5r5 - 06 Dec 2009 - 02:47:53 - AllanOng
Revision 4r4 - 06 Dec 2009 - 00:03:31 - AndoY
Revision 3r3 - 03 Dec 2009 - 09:27:12 - BrianS
Revision 2r2 - 03 Dec 2009 - 06:37:16 - BrianS
Revision 1r1 - 02 Dec 2009 - 05:17:58 - BrianS
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM