NOTE: Program is subject to change.
|
|
| Monday June 1
|
8:00 - 9:00
| Registration & Continental Breakfast
|
9:00 - 5:00
| Tutorials (See tutorial schedule)
|
6:00 - 9:00
| Opening Night Reception at Public Citizen
Wine, beer, soft drinks and hors d'oeuvres
1600 20th St. NW Washington, DC. 20009
|
| Tuesday June 2
|
8:00 - 9:00
| Registration & Continental Breakfast
|
9:00 - 9:15
| Welcoming remarks
|
9:15 - 10:30
| Keynote panel: Computers, Freedom and the Obama Administration
A look at the short history and future prospects for Obama Administration policies in areas involving technology and liberty.
Opening remarks:
Susan Crawford, Special Assistant to the President for Science, Technology, and Innovation Policy; member, National Economic Council
Response and discussion:
Declan McCullagh, CNET News
Caroline Fredrickson, Director, ACLU Washington Legislative Office
Peter Swire, Ohio State University, Center for American Progress; former Chief Counselor for Privacy for US Government
Moderator: Eric Lichtblau, New York Times
|
10:30 - 10:45
|
|
10:45 - 12:00
| The Future of Security vs. Privacy
Security and privacy do not need to be in conflict with each other. Yet when push comes to shove, different people and different institutions frequently place different weights on these two fundamental values. How should we think of the relationship between these two core values in order to make intelligent policy?
Bruce Schneier, CSTO, BT
Jim Harper, Director of Information Policy Studies, CATO Institute
Stewart Baker, former Assistant Secretary for Policy, DHS and former General Counsel, NSA
Valerie Caproni, General Counsel, FBI
Moderator: Ryan Singel, Wired.com
|
12:00 - 1:30
| Lunch Keynote: Craig Newmark, founder, Craigslist
Interviewer: Saul Hansell, New York Times
|
12:00-4:45
| Research Showcase (ongoing parallel presentation; lobby)
Featuring 15 researchers with posters explaining their peer-reviewed findings for a general audience. Research includes unpublished original research (including works in progress), and research that has been recently published. The authors of the best research posters will participate in a panel discussion at the end of the day.
|
2:00 - 3:15
| Concurrent Breakout Sessions
|
|
| Censorship: Can the Internet Still Route Around the Damage?
“The Internet perceives censorship as damage and routes around it," John Gilmore famously observed. But is that still true? Or has technology changed to the point where governments can not only mandate Internet filtering but make it happen? In April, Australia installed a nationwide firewall that filters the Internet based on a secret blacklist maintained by the regulator. The UK's Internet Watch Foundation examines material reported by the public and recommends ISPs remove anything the IWF thinks might be illegal; this year, it was caught censoring Wikipedia. Companies (such as the UK's Phorm) filter to help target advertising and the UK government wants it to aid with wiretapping. This panel looks at filtering for fun, profit, and surveillance.
Ian Brown, Senior Research Fellow, Oxford Internet Institute
Nicole Wong, Deputy General Counsel, Google
TJ McIntyre, Lecturer in Law, University College Dublin, Chairman of Digital Rights Ireland
Derek E. Bambauer, Assistant Professor of Law, Brooklyn Law School
Catherine Crump, Staff Attorney, American Civil Liberties Union
Moderator: Wendy M. Grossman, freelance technology writer
|
| The Computer Fraud and Abuse Act: From Robert Tappan Morris to Lori Drew and Beyond
In 1984, the United States Congress enacted the Computer Fraud and Abuse Act (CFAA), the first comprehensive anti-computer hacking law in the world. How did a once-obscure regulation for the protection of government computers become a tool for imprisoning people for violating website Terms of Service? By prosecuting Lori Drew, the Department of Justice has made the CFAA the single most important law regulating online behavior. In 2009, as we mark the twenty-fifth anniversary of this landmark legislation, four experts will gather at the Computers, Freedom, and Privacy 2009 conference in Washington, D.C., to debate the past, present, and future of the CFAA.
Orin Kerr, Professor of Law, GWU Law School
Jennifer Granick, Civil Liberties Director, Electronic Frontier Foundation
Ed Felten, Director, Center for Information Technology Policy, Princeton
Nick Akerman, Partner, co-chair of Computer Fraud and Abuse practice, Dorsey & Whitney LLP
Moderator: Paul Ohm, Associate Professor of Law and Telecommunications, University of Colorado Law School
|
| The Google Book Deal
A lawsuit over Google's online book scanning program has led to a proposed settlement with authors and book publishers, but that deal has been challenged by critics on a variety of grounds and created a great deal of controversy.
Alex Macgillivray, Google
James Grimmelman, Institute for Information Law and Policy, New York Law School
John Verdi, Staff Counsel, Electronic Privacy Information Center
Jonathan Band, lawyer, Jonathan Band, PLLC
Moderator/panelist: Sherwin Siy, Public Knowledge
|
| The Psychology of Security and Privacy
Bruce Schneier, CSTO, BT
Alessandro Acquisti, Associate Professor of Information Systems and Public Policy, Heinz College, CMU
Christine Jolls, Gordon Bradford Tweedy Professor of Law and Organization, Yale Law School
Rachna Dhamija, CEO, Usable Security Systems; Fellow, Center for Research on Computation and Society, Harvard University
|
3:15 - 3:30
|
|
3:30 - 4:45
| Cloud Computing, Privacy and Free Speech
Cloud computing is shifting tasks including the handling of personal information away from our personal computers and onto the Internet. But are individuals paying for greater access and convenience with their privacy and free speech? Representatives from the academic, technological, business, and public interest communities explore cloud computing and what steps can be taken to ensure that opportunities presented by cloud computing are not darkened by privacy invasions.
Kent Walker, VP and General Counsel, Google
Orin Kerr, Professor of Law, GWU Law School
Chris Conley, Technology and Civil Liberties Fellow, ACLU of Northern California
Robert Gellman, Privacy and Information Policy Consultant
Moderator: Nicole Ozer, Technology and Civil Liberties Policy Director, ACLU of Northern California
|
4:45 - 5:30
| Research Showcase Highlights
Five selected participants in the Research Showcase poster session explain and discuss their research.
Alissa Cooper, CDT, A Survey of Query Log Privacy-Enhancing Techniques from a Policy Perspective
Patrick Kelly, CMU, A Nutrition Label for Privacy
Heng Xu, Penn State, Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States
Janice Y. Tsai, CMU, Who's Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application
Laura Brandimarte, CMU, Privacy concerns and information disclosure:
An illusion of control hypothesis
Moderator: Lance Hoffman, GWU
|
6:00 - 7:30
| Reception at the GWU Marvin Center
|
7:30 - 10:00
| Optional Dinner Discussion BOFs (Birds of a Feather) at area restaurants
|
| Wednesday June 3
|
8:00 - 9:00
| Registration & Continental Breakfast
|
9:00 - 10:30
| Privacy, Online Advertising and the Future of the Internet
Online advertising is shaping much of the Internet's future through increasingly sophisticated systems designed to collect, analyze and then target individual users wherever they are. At its core is the Internet's ability to collect and analyze the data about what we do online. Consumers have little understanding of the various ways their data are collected, let alone how that information may be used to create sophisticated profiles that electronically shadow them as they travel online. This panel will address many of the basic elements of the online marketing system and how it affects consumer privacy.
Jeff Chester, Center for Digital Democracy
Amina Fazlullah, USPIRG
Mike Hintze, Microsoft
Jane Horvath, Google
Jessica Rich, Federal Trade Commission
Mike Zaneis, Interactive Advertising Bureau (IAB)
Representative from European Union (unconfirmed)
Moderator: Amy Schatz, Wall Street Journal
|
10:30 - 11:00
| Keynote: Join the Impact and the DREAM Activists: perspectives from the next generation
After the defeat of the DREAM Act in 2007, several undocumented students from around the country decided to come together and launch a real grassroots efforts for the DREAM Act that included both online and offline networking. In December 2008, DREAMActivist.org was appointed as the national communication center for the United We DREAM coalition of over 40 different organizations (both beltway, educators, and student groups) dedicated to the passage of the DREAM Act.
Join the Impact began in early November 2008 with two friends emailing back and forth about the California passage of Proposition 8. What grew out of this was a spirit of netroots activism that led to the 300 city international protests of Proposition 8 on November 15th, 2008. Since then, JTI has evolved into an organization that has called for specific actions every month from city leaders and organizers around the globe.
Both of these movements are founded by younger activists who have grown up with blogs, MySpace, Facebook, wikis, Twitter, and other social media technologies. What can the CFP community learn from their pespectives and experiences?
Willow Witte, co-founder, Join the Impact
Mohammed Abdol, administrator, DREAMActivist.org
|
11:00-4:45
| Geekshare
It can take hours to piece together the instructions for online or computer tasks that you can pick up in minutes just by looking over the shoulder of someone who can show you the ropes. And some concepts you just don’t “get” until you see them in action.
That is why this year’s CFP will feature the first-ever "Geekshare" session, which will allow attendees to do just that – look over your shoulder as you share great computer/Internet tips & tricks, secrets and skills that you’ve picked up. Each Geekshare volunteer will be assigned a table where they can offer one or more skills they'd like to share with conference attendees for their time slot.
To sign up please e-mail Geekshare organizer Jeremy Duffy with your contact information and the skill or skills you’d like to offer.
|
11:00 - 12:15
| Does Government Secrecy Still Make Sense In The Internet age?
The compartmentalization of information often plays a role in misleading intelligence analysts and policymakers, yet classification rules that restrict information sharing have not been amended. Meanwhile, purportedly secret operations like the CIA's rendition program are exposed by hobbyist plane-spotters that track aircraft tail numbers as they hop-scotch around the world, and the grisly results of an errant airstrike in Afghanistan are instantly uploaded to the Internet to exploit our failures. This panel will ask fundamental questions challenging assumptions about how to protect the nation's security: In the age of the Internet, does government secrecy actually help or harm national security? Are the services of a covert intelligence agency necessary or useful in an interconnected world?" What if the government posted all its intelligence on the Internet, where it could be confirmed, corrected, augmented, or refuted by a million eyeballs – would that produce more reliable information?
Steve Aftergood, Senior Research Analyst, Federation of American Scientists
Mike Levin, security consultant; former chief information policy officer, NSA
Bill Leonard, former director, U.S. Information Security Oversight Office
Eric Biel, former Staff Director, Moynihan Commission on Government Secrecy (invited)
Moderator: Mike German, ACLU Policy Counsel, former FBI agent
|
12:15 - 12:30
| Get boxed lunches
|
12:30 - 1:45
| Concurrent Breakout Sessions
|
|
| The Future of Medical Privacy
Room 308
Innovations in electronic health information sharing hold great promise for improving health care. Multiple initiatives have been launched to facilitate the electronic exchange of health data, but the growing liquidity of health information raises complex new privacy issues, and federal efforts made little progress in resolving them. Meanwhile, major Internet companies have launched personal health record products. And, significant funding for health IT -- as well as new privacy rules -- were included in the economic stimulus package in early 2009.
Panelists will discuss the state of health privacy in 2009 based on recent Congressional and Administrative action and consider what must still be done to build the future of medical care -- and medical privacy.
Deven McGraw, Director, Health Privacy Project, Center for Democracy and Technology
Ashley Katz, Executive Director, Patient Privacy Rights
Joel Slackman, Managing Director, Office of Policy and Representation, BlueCross BlueShield Association
Michael Stearns, MD, President & CEO, e-MDs, Inc.
Geoff Gerhardt (invited), House Committee on Ways and Means
Microsoft representative: Frank Torres, Director of Consumer Affairs, Microsoft Corporation, or Michael Stokes, Principal Program Manager, Microsoft Corporation’s Health Solutions Group
Moderator: Andrew Noyes, Congress Daily
|
| Litigating the Right to Remain Anonymous Online
Room 309
Civil and criminal discovery subpoenas continue to plague the blogosphere, seeking to identify anonymous Internet users and raising serious First Amendment concerns. The panel will discuss what legal tests ought to be applied when the identity of an Internet speaker or listener is sought and discuss practical implications for Internet users; what both anonymous speakers and would-be discoverers should be doing to maximize their respective interests; and how engagement in a discovery proceeding affects the subpoena recipients.
Paul Levy, Attorney, Public Citizen Litigation Group
Michael Vogel, Partner, Allegaert Berger & Vogel
Ben Smith, Reporter, Politico
|
| Future of Print
Grand Ballroom
What is the future of print? This year several newspapers closed or shuttered their print operations. Is that a threat to our democracy and freedom? In the 19th century, some feared newspapers would displace books, just as some now say the Internet is a threat to papers. Is there a parallel between the introduction of Gutenberg's printing press and the Internet? Just as the printing press enabled a new renaissance of learning, will new media empower more diverse voices? Or are we already building the biases of the past into the media marketplace of the future?
Charlotte-Anne Lucas, WilCharMedia, San Antonio, Texas, longtime journalist, expert in media convergence
Dori Maynard, president of the Maynard Institute for Journalism Education
Marcy Wheeler, aka EmptyWheel, investigative blogger at FireDogLake, and author of "Anatomy of Deceit: How the Bush Administration Used the Media to Sell the Iraq War and Out a Spy."
Elizabeth Eisenstein, historian, author of "The Printing Press as an Agent of Change."
|
| Hacking as a National Security Threat: How Real Is It?
Room 310
Much attention is being paid to cybersecurity policy issues. But how real is the threat behind these policy debates? Does hacking -- whether by foreign governments, organized crime, or lone hackers -- really pose a national security-level threat? This panel will complement the session on "Cyber-Security and the New Administration," which will focus on the policy issues involved.
Herb Lin, National Research Council
Amit Yoran, former Bush Administration cybersecurity czar
Michael Tanji, former supervisory intelligence officer, Defense Intelligence Agency
Moderator: Kevin Poulsen, Senior Editor, Wired News
|
1:45 - 2:00
|
|
2:00 - 3:15
| Concurrent Breakout Sessions
|
|
| FOIA in the Digital Age
Room 309
In his Day One orders, President Obama addressed a vision of open government that involves both free input of ideas from the public and transparency of government activities to the public. This panel will address how technology intersects with and enhances our ability to fulfill both of those goals. The panelists will address cutting edge interactive web tools that increase public participation in government decision-making; how the Freedom of Information Act has evolved to meet the challenges of technology and to harness its power; and future directions for increasing government transparency.
Meredith Fuchs, National Security Archive at George Washington University
Adina Rosenbaum, attorney, Public Citizen Litigation Group
Ellen Miller, Sunlight Foundation
Sarah Granger, PublicEdge and Personal Democracy Forum
Moderator: Margaret Kwoka, Equal Justice Works fellow, Public Citizen
|
| The Digital Fourth Amendment: Reforming ECPA
Room 310
The Electronic Communications Privacy Act (ECPA), which sets standards for government surveillance of communications, went into effect in 1986 and has been far outpaced by technology. Privacy advocates, industry representatives and a government official will examine the challenges outdated surveillance laws pose to privacy, innovation and law enforcement, and explore the tension between technological and policy development, including the difficulties of crafting legislation that will both accommodate the complexity of the technology and remain relevant to tomorrow’s breakthroughs.
Kevin Bankston, Senior Staff Attorney, Electronic Frontier Foundation
Alan Davidson, Director of Government Relations and Public Policy, Google
Richard Downing, Department of Justice Computer Crimes and Intellectual Property Section
Nicole Ozer, Technology and Civil Liberties Policy Director, ACLU of Northern California
Moderator: Greg Nojeim, Senior Counsel and Director, Project on Freedom, Security & Technology, Center for Democracy & Technology
|
| Privacy and the New Browser Wars
Room 308
As the gateway to the Web, browser software has a unique and powerful role in shaping the Internet experience. Over the past year, several of the largest Internet companies have released new Web browsers or browser features aimed at giving Internet users greater control over their privacy as they surf the Web. While this may be a new front in the Web browser wars, the privacy battle is far from over; many questions remain about how privacy-enhancing technologies will shape user experiences as the Internet continues to evolve. Are current controls sufficient to protect the privacy of less tech-savvy users? With more and more data stored remotely, how will privacy-enhancing technologies help users maintain control over their data? What new advances in privacy can be applied to the realm of authentication? And how do all of these developments translate to mobile devices and new applications platforms?
Lauren Gelman, Executive Director, Center for Internet and Society (CIS), Stanford Law School
Caspar Bowden, Chief Privacy Adviser EMEA, Microsoft EMEA Technology Office
Mike Shaver, Mozilla
Betsy Masiello, Google Economics
Moderator: Alissa Cooper, Chief Computer Scientist, Center for Democracy & Technology
|
| Airport "Behavior Detection" Programs
Grand Ballroom
Increasingly, the US and foreign government agencies are looking to behavior detection programs to attempt to divine an individual's intent, whether benign or criminal. For example, one of the programs from the US Department of Homeland Security is "Screening of Passengers by Observation Technique" ("SPOT"). The SPOT program seeks to use behavior observation and analysis techniques to attempt to identify potentially high-risk passengers. DHS says it may require additional screening for individuals who exhibit suspicious behaviors, such as physical and physiological reactions. Are these systems effective or cost-effective? What are the privacy and civil liberty implications? What happens when these programs leave the airport, when such a program is used on the general population during a demonstration or other large gathering?
Paul Ekman, Ph.D., Professor Emeritus, UCSF Manager, Paul Ekman Group LLC
Peter Pietra, Director, Privacy Policy & Compliance, Transportation Security Administration
Peter Swire, Ohio State University, Center for American Progress; former Chief Counselor for Privacy for US Government
Bruce Schneier, CSTO, BT
Moderator: Melissa Ngo, Privacy and Information Policy Consultant, PrivacyLives.com
|
3:15 - 3:30
|
|
3:30 - 4:45
| Cyber-Security and the New Administration
Grand Ballroom
Amid reports of organized hacking attacks on US government computers, cyber-security has recently become a hot topic and the Obama Administration has made it a priority. But what is the best way to improve the security of the nation's cyber-infrastructure? What policies are in place already and are being proposed, by which Government agencies can seek to monitor and protect the cyber-infrastructure? What are the privacy and civil liberties implications of such policies? This session is complemented by the session on "Hacking as a National Security Threat: How Real Is It?"
Eric T. Werner, Director for Cybersecurity, White House National Security Council, Cyberspace Directorate
Hon. Alan M. Grayson (D-FL): U.S. House of Representatives, Orlando, Florida
Prof. Ed W. Felten: Director, Center for Information Technology Policy, Princeton University
Ronald Lee, Esq.: Partner, Arnold & Porter, LLP, Washington, D.C., former General Counsel, National Security Agency, and Associate Deputy Attorney General, U.S. Department of Justice
Moderator: Andrew Grosso: Principal Attorney, Andrew Grosso & Associates, former Assistant U.S. Attorney
|
4:45 - 5:45
| Quick Takes (5 minute talks)
Grand Ballroom
Quick Takes will feature 20 back-to-back presentations STRICTLY limited to 5 minutes each. They can be on any subject related to CFP, even if very loosely. The purpose is to deliver entertaining, funny, or enlightening talks within the 5-minute stricture. The creative use of slides or other multimedia is encouraged.
To apply for one of the slots send an e-mail to cfp2009chairs@gmail.com
Master of Ceremonies: Bruce Schneier
|
|
6:00 - 8:00
| Electronic Privacy Information Center
Reception
1718 Connecticut Avenue, NW, Suite 200, Washington, DC 20009
Dupont Circle Metro Station Red Line (Q Street Exit)
|
7:00 - 10:00
| Optional Dinner Discussion BOFs (Birds of a Feather) at area restaurants
|
| Thursday June 4
|
8:30 - 9:00
| Registration & Continental Breakfast
|
9:00 - 9:20
| Keynote: Rebecca MacKinnon, "Internet and Activism: 20 years after Tiananmen"
Grand Ballroom
On June 4th, the 20th anniversary of the 1989 crackdown, Rebecca MacKinnon will address Internet freedom and control in China and the prospects for democracy. MacKinnon is a renowned expert on Internet and media issues in China. She is the Co-Founder of Global Voices (globalvoicesonline.org), and is a former Beijing Bureau Chief for CNN. She is currently on leave from her position as Assistant Professor at the University of Hong Kong's Journalism and Media Studies Centre. She is currently working on a book tentatively titled "Cybertarianism: China and the Global Internet."
|
9:20 - 10:30
| The Internet and Social Change in China
Grand Ballroom
This panel will address the role of the internet and social change in China, and will bring together perspectives from inside of China from bloggers, academics, and the private sector.
Shen Tong, President, Vfinity
Hu Yong, Associate Professor, Peking University
Michael Anti, Harvard Nieman Fellow, 2008 and independent media researcher
Moderator: Rebecca MacKinnon, Open Society Fellow, Co-founder GlobalVoicesOnline.org, Assistant Professor, Journalism and Media Studies Centre, University of Hong Kong
|
10:30 - 10:45
|
|
10:45 - 12:00
| Online Activism Around the World
Grand Ballroom
Activists from Egypt, Europe, India, and the United States discuss the challenges that activists face in these diverse places. The panelists will identify the tools that they used in their online activism campaigns, as well as the lessons that they learned from their experiences, in order to identify successful strategies as well as areas for improvement.
Nancy Scola, Associate Editor, techPresident
Ralf Bendrath, Internet governance researcher at Delft University of Technology, Netherlands and Privacy Activist
Gaurav Mishra, Yahoo! Fellow at Georgetown University
Jon Pincus, strategist/writer/activiste at achangeiscoming.net
Video, presentations, and a list of references are available on the CFP Wetpaint Wiki.
Also invited, but unable to participate in person:
Willow Witte, Executive Director, Join the Impact
Michael Bolognino, Join the Impact and Wetpaint.com
Basem Fathy, Instructor, Wadi Environmental Science Center
Evgeny Morozov, Fellow, Open Society Institute, New York
|
12:00 - 12:15
| Get boxed lunches
|
12:15 - 1:30
| Concurrent Breakout Sessions
|
|
| It Takes A Village To Be Anonymous
Room 310
Once upon a time the internet was not truly anonymous (unless you were a criminal with a botnet). In the past few years many different kinds of people have been able to take advantage of anonymity technology to protect themselves and thus each other. This panel will review some of the techniques that have been developed followed by a discussion of the emerging threats to online anonymity and some of the many way anonymity is now being used to protect community advocates, journalists, law officers, children, dissidents, intelligence agents, crime victims, bloggers, and just plain folks.
Roger Dingledine, The Tor Project
Robert Guerra, Freedom House
Andrew Lewman, The Tor Project
Paul Syverson, Naval Research Lab
John Doe, North African Blogger
|
| The Future of Privacy Oversight
Room 308
Good privacy laws are not enough to protect citizens' privacy -- good oversight institutions are also crucial. What is the state of oversight institutions in the United States and Canada and around the world, and what does the future hold? How satisfied should privacy advocates be with the work that our oversight institutions are performing?
Ann Cavoukian, Ph.D, Information and Privacy Commissioner of Ontario, Canada
Hugo Teufel, PricewaterhouseCoopers; former Chief Privacy Officer, Department of Homeland Security
Robert Gellman, Privacy and Information Policy Consultant
Marty Abrams, Executive Director Centre for Information Policy Leadership at Hunton & Williams LLP
Moderator: Stephanie Perrin
|
| Voting Over the Internet
Room 307
New technologies promise more security for Internet voting systems, but technical experts and election watchdogs continue to raise serious concerns about whether any Internet system is sufficiently trustworthy given the potential impact to elections. The panelists will discuss these tensions, current programs supporting Internet voting, the technical challenges involved, and the policy implications of expanding Internet voting. They will also discuss what role the Internet and other computing technologies can and should play in overseas and military voting.
Susan Dzieduszycka-Suinat, President and CEO, Overseas Vote Foundation
Adam Ambrogi (invited), Professional Staff, Senate Rules Committee, United States Senate
Amy Bjelland, Director of Elections, State of Arizona
Avi Rubin, Professor, Computer Science, Johns Hopkins University, Director, ACCURATE research center
Alec Yasinsac, Dean, School of Computer and Information Sciences, University of South Alabama
Moderator: Ed Felten, Director, Center for Information Technology Policy, Princeton University
|
| Deep Packet Inspection
Grand Ballroom
This panel will illuminate the technology of Deep Packet Inspection, which has been at the center of so many Internet controversies recently. What are the uses and abuses of DPI? Should it be banned outright? Or is it a crucial new avenue for technological innovation?
Chris Riley, Free Press
Ralf Bendrath, Internet governance researcher, Delft University of Technology, Netherlands
Robb Topolski, Chief Technologist, Open Technology Initiative, New America Foundation
Don Bowman, co-founder and Chief Technology Officer, Sandvine Inc.
Kyle Rosenthal, Executive Director, dPacket.org
Moderator: Colin McKay, Director of Research, Education and Outreach, Office of the Privacy Commissioner of Canada
|
1:30 - 1:45
|
|
1:45 - 3:00
| Concurrent Breakout Sessions
|
|
| Social Network Activism in the US and Beyond
Room 310
The online digital activism breakout session will bring together prominent bloggers and activists from the United States and around the world, including inside views from China, India, Russia, and Western Europe. The breakout session will provide participants with the opportunity to engage with each other and the audience, and all participants are encouraged to ask questions and share their experiences.
Amy Hamblin, Organizing for America
Phil Aroneanu, Co-coordinator, 350.org
Gaurav Mishra, Yahoo! Fellow at Georgetown University
Ralf Bendrath,Internet governance researcher at Delft University of Technology, Netherlands and Privacy Activist
Emily Jacobi, Co-Founder/Director, Digital Democracy
Katitza Rodríguez Pereda, Electronic Privacy Information Center (EPIC)
Co-moderator: Robert Guerra, Project Director, Internet Freedom,
Freedom House
Co-moderator: Katrina Neubauer, Program Officer, Internet Freedom, Freedom House
|
| The Future of the DMCA
Room 307
More than a decade ago, the Digital Millennium Copyright Act (DMCA) was enacted on the promise of giving copyright owners the power to stop online piracy. But too often the law has been used against consumers, scientists, and legitimate competitors. Lawyers in the trenches discuss recent cases clarifying the DMCA's impact on the rights of free speech, fair use, and first sale online, and discuss the future of this controversial law.
Jonathan Band, lawyer, Jonathan Band, PLLC
Ben Sheffner, Former Special Counsel for John McCain 2008
Fred von Lohmann, lawyer, Electronic Frontier Foundation
Moderator/panelist: Greg Beck, lawyer, Public Citizen
|
| Border-line ID: ‘Enhancing’ the drivers license - for security or surveillance?
Room 308
This session will examine technical and political contradictions in the development of ‘enhanced’ drivers licenses as a passport alternative for entering the US at land or sea borders. It will draw on experts in the public, private and civil society sectors with their differing perspectives on the rationales and risks of enhancing drivers licenses by incorporating radio frequency identification (RFID) technology and citizenship information.
Karl Koscher, RFID researcher, Graduate student, Computer Science & Engineering, University of Washington
Edward Hasbrouck, Author, Journalist, Blogger, Consumer advocate and Travel expert
Christopher Calabrese, Counsel, Technology & Liberty Program, American Civil Liberties Union
Moderator: Andrew Clement, Professor, Faculty of Information, University of Toronto
|
| The Politics and Technology of DNA Databases
Grand Ballroom
Although Information and Communication Technologies (ICT) are now omnipresent among the Life Science community, there is not yet a clear perception of the legal impact caused by the use of (massive) processing power in conducting genetic research. This is particularly true for the creation of DNA databases for forensics and trial use. Apart from the privacy issues, the misunderstanding of the political issues behind the topic might lead to badly injured human rights. Just to name a few of these issues, it is enough to think at the current and actual possibility to impose copyright on file formats used to handle human genome, or the dangers of creating a worldwide DNA database based on proprietary technologies or - last but not least - the cultural prejudice that lead people to think that technology is a substitute for a fair trial.
Bruce Budowle, Executive Director, Institute of Investigative Genetics, Professor, North Texas health Science Center, former Senior Scientist, Laboratory Division, FBI
Tania Simoncelli, ACLU Science Advisor
Rocco Bellanova, Researcher, Centre for Law Science, Technology & Society Studies (LSTS), Vrije Universiteit Brussel (VUB) and Centre de Recherche en Science Politique (CReSPo), Facultés universitaires Saint-Louis (FUSL)
Moderator: Jay Stanley, ACLU Technology and Liberty Program
|
3:00 - 3:15
|
|
3:15 - 4:30
| Towards a Global Information Privacy Regime
Grand Ballroom
Personal information flows seamlessly across national borders. But the rules that protect that information vary widely around the world. Some nations have laws that cut across sectors of the economy and government. Others regulate sector by sector. Do we need a global regime for protecting privacy? How would such a regime be structured? Is one approach working better than another? Experts and privacy regulators from around the world will explore those issues.
Jennifer Stoddart, Privacy Commissioner of Canada
Barry Steinhardt, privacy consultant, former director, ACLU Technology and Liberty Program
Paul Rosenzweig, Red Branch Law & Consulting PLLC, former Deputy Assistant Secretary for Policy & former Acting Assistant Secretary for International Affairs, DHS
Gloria Gonzalez Fuster, Researcher, Institute for European Studies (IES) and Centre for Law Science, Technology & Society Studies (LSTS), Vrije Universiteit Brussel (VUB)
Moderator: Melissa Ngo, Privacy and Information Policy Consultant, Privacylives.com
|
4:30 - 4:45
|
|
4:45 - 6:00
| Closing Plenary: Panopticon: Internalizing the Gaze
Grand Ballroom
Over the last seven years, the pursuit of terrorists suspects meant that several individuals and groups engaged in Free Speech or human rights activities also found themselves under government surveillance. What happens to individuals when they know that they are being watched by their government? This panel will attempt to answer this question. This is the third in a series of CFP panels on Jeremy Bentham's Panopticon and its effect on peaceful dissent. The panelists have lived these experiences and will share their insight and wisdom on fighting against "internalizing the gaze" of government surveillance.
CFP 2007: Plenary: Where People and the Surveillance Society Collide, CFP 2008: Plenary: The 21st Century Panopticon?
Pat Elder, Maryland Peace Activist
Steven Hatfill MD, physician, virologist and bio-weapons expert; former suspect in 2001 Anthrax attacks
Thomas Tamm revealed himself to be the anonymous initial whistleblower to The New York Times regarding warrantless NSA surveillance.
Rebecca MacKinnon, Open Society Fellow, Co-founder GlobalVoicesOnline.org, Assistant Professor, Journalism and Media Studies Centre, University of Hong Kong
Anne Roth, Berlin journalist and media activist who blogs about living under anti-terror surveillance since the arrest of her partner
Moderator: Lillie Coney, Associate Director, Electronic Privacy Information Center
|