The Dangers of Surveillance


Paper by Neil M. Richards in Harvard Law Review. Abstract:  “From the Fourth Amendment to George Orwell’s Nineteen Eighty-Four, our culture is full of warnings about state scrutiny of our lives. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don’t really know why surveillance is bad, and why we should be wary of it. To the extent the answer has something to do with “privacy,” we lack an understanding of what “privacy” means in this context, and why it matters. Developments in government and corporate practices have made this problem more urgent. Although we have laws that protect us against government surveillance, secret government programs cannot be challenged until they are discovered.
… I propose a set of four principles that should guide the future development of surveillance law, allowing for a more appropriate balance between the costs and benefits of government surveillance. First, we must recognize that surveillance transcends the public-private divide. Even if we are ultimately more concerned with government surveillance, any solution must grapple with the complex relationships between government and corporate watchers. Second, we must recognize that secret surveillance is illegitimate, and prohibit the creation of any domestic surveillance programs whose existence is secret. Third, we should recognize that total surveillance is illegitimate and reject the idea that it is acceptable for the government to record all Internet activity without authorization. Fourth, we must recognize that surveillance is harmful. Surveillance menaces intellectual privacy and increases the risk of blackmail, coercion, and discrimination; accordingly, we must recognize surveillance as a harm in constitutional standing doctrine.

China identified as main source behind cyber-espionage


Washington Post: “Analyses of hundreds of documented data breaches found that hackers affiliated with the Chinese government were by far the most energetic and successful cyberspies in the world last year, according to a report to be issued Tuesday by government and industry investigators.
Although hackers with financial motives are the most common source of data breaches worldwide, China dominated the category of state-affiliated cyber-espionage of intellectual property, said the 2013 Data Breach Investigations Report. The report was issued by Verizon’s RISK Team and 18 partners, including officials from the United States and several foreign governments.
Of 120 incidents of government cyber-espionage detailed in the report, 96 percent came from China; the source of the other 4 percent was unknown, it said.”

White House: Unleashing the Power of Big Data


Tom Kalil, Deputy Director for Technology and Innovation at OSTP : “As we enter the second year of the Big Data Initiative, the Obama Administration is encouraging multiple stakeholders, including federal agencies, private industry, academia, state and local government, non-profits, and foundations to develop and participate in Big Data initiatives across the country.  Of particular interest are partnerships designed to advance core Big Data technologies; harness the power of Big Data to advance national goals such as economic growth, education, health, and clean energy; use competitions and challenges; and foster regional innovation.
The National Science Foundation has issued a request for information encouraging stakeholders to identify Big Data projects they would be willing to support to achieve these goals.  And, later this year, OSTP, NSF, and other partner agencies in the Networking and Information Technology R&D (NITRD) program plan to convene an event that highlights high-impact collaborations and identifies areas for expanded collaboration between the public and private sectors.”

Newark's Cory Booker: Social Media Can Help Fix Broken Government


Internet Evolution on Cory Booker’s panel at Ad Age Digital Conference: “Social media have been a part of a transformation of the City of Newark from a butt of jokes to a community experiencing economic growth, Booker told the Ad Age conference. Newark has a population of 300,000 in a state with 9 million people, and yet, Newark has a third of the economic growth in the state. The city population is growing for the first time in 60 years.
Social media can be a big part of the cure for government that has become unresponsive to the needs of its citizens, Booker said. He quoted California Lt. Governor Gavin Newsom, who uses the phrase “vending machine government.” Citizens pay for government services, and get prepackaged offerings in return. “If you don’t like what you get, you shake the vending machine,” Booker said…
When people lean back and disengage, government becomes unresponsive. But social media provide the tools for citizens to collaborate with government.  “We have all these tools pulling government away from citizens,” Booker said. These include special interest groups and moneyed corporate lobbies. “But social media brings us closer.”
Twitter helped Newark rebuild its reputation. The city had been a butt of jokes for years. When Conan O’Brien made a joke at Newark’s expense, Booker replied with an online video that said O’Brien was now on the no-fly list at Newark Airport. The TSA got into the act, issuing a statement that Booker didn’t have that power. Then-Secretary of State Hillary Clinton followed up with a plea for Booker and O’Brien to just get along.
And it’s not just a matter of public relations; social media have helped improve Newark in concrete ways — Newark’s government is more effective. For example, its inspectors are vastly more efficient at finding violations when citizens can use social media to point up problems, Booker said.
Video can be an even more powerful tool for getting a message out than microblogging services such as Twitter, Booker said. And that led to discussion of Booker’s startup, #waywire. The beta video service, updated this week to focus on video curation, is a place where people can collect and share online video.”
 

The GovLab


Steven Johnson, author of Future Perfect : “Peer-to-Patent stands as one of my favorite examples of peer progressive thinking at work. It brings in outside minds not directly affiliated with the government to help the government solve the problems it faces, effectively making a more porous boundary between citizen and state….I say all this to explain why I’m excited to be flying to NY tonight to help Noveck with her latest project, the Governance Lab at NYU, an extended, multidisciplinary investigation in new forms of participatory governance, backed by the Knight Foundation and the MacArthur Foundation…
I wrote Future Perfect in large part to capture all the thrilling new experiments and research into peer collaboration that I saw flourishing all around me, and to give those diverse projects the umbrella name of peer progressivism so that they could be more easily conceived as a unified movement. But I also wrote the book with the explicit assumption that we had a lot to learn about these systems. For starters, peer networks take a number of different forms: crowdfunding projects like Kickstarter are quite different from crowd-authored projects like open source software or Wikipedia; prize-backed challenges are a completely different beast altogether. For movement-building, it’s important to stress the commonalities between these different networks, but for practical application, we need to study the distinctions. And we need to avoid the easy assumption that decentralized, peer-based approaches will always outperform centralized ones.

Citizen Engagement and City Budgets


Governing Magazine: “Inviting public comment early in the budget process, and doing so in multiple ways, is closely associated with better performance outcomes, according to a new study in The American Review of Public Administration.

State and local government meetings, from a state agency to a county board, are notoriously low in attendance. Some governments have reacted with experiments to spur better public involvement, especially in drafting budgets. … Despite this patchwork of efforts to involve citizens, public administrators still don’t know exactly when to seek public input and how it might affect the day-to-day work of governing. So Hai Guo and Milena Neshkova, both assistant professors in the Department of Public Administration at Florida International University, set out to study the relationship between citizen participation in budgeting and measurable performance outcomes. Their analysis relied on 2005 survey data on state transportation agencies and their civic engagement strategies (focus groups, for example) across four stages in the budget process.
Because their research focused solely on transportation agencies, they looked at transportation-related outcomes that governments value: fewer road-related fatalities and fewer poor-quality roads. They took into account external factors, such as level of funding, that might account for differences in fatality rates or road conditions. They found that not only is there an inverse relationship (more attempts at civic engagement mean fewer fatalities and low-quality roads), but that the relationship is statistically significant. In other words, the result isn’t due to chance.
More importantly, the association was strongest at the earliest stage in the process. “You need to engage them early. I think that’s the point we’re trying to make,” Prof. Guo said. Since the analysis was specific to state transportation departments, Prof. Guo says he’d like to see if the same pattern would emerge at other levels of government.”

Internet Security and Networked Governance in International Relations


Paper by M Mueller, A Schmidt, B Kuerbis in International Studies Review: “This paper asks whether the Internet’s heavy reliance on nonhierarchical, networked forms of governance is compatible with growing concerns about cyber-security from traditional state actors. Networked governance is defined as a semipermanent, voluntary negotiation system that allows interdependent actors to opt for collaboration or unilateral action in the absence of an overarching authority. Two case studies—Internet routing security and the response to a large-scale botnet known as Conficker—show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. The paper concludes that both cases raise doubts about the claim that introducing security concerns into Internet governance necessarily leads to more hierarchy and/or a greater role for governments.”