You are viewing a read-only archive of the Blogs.Harvard network. Learn more.

Archive for the 'trust' Category

Page 6 of 7

Homeland Security

Here are my welcoming remarks to the Data Privacy and Integrity Advisory Committee of the Department of Homeland Security, which is holding a public hearing at Harvard Law School today.

Ladies and Gentleman:

Welcome to Harvard Law School A law professor’s job is often to frame and state a question.

Our world is changing. No surprise in this. Yet the pace of change comes to many as surprise. Technology is changing the world faster than it ever changed before. A speaker at the Berkman Center yesterday, JD Lasica, said “We’re living in extraordinary times — media will change more in the next five years than it has in the past 50.” He spoke about ourmedia, an entity formed nonprofit just a few weeks ago, with now twenty two thousand members contributing their work and energy to the creation of a shared media space, grassroots expression of cooperative spirit, growth like lightning.

Success in our cyber future will come to those with the most astute conceptual technological strategy. I beleive this is true for individuals, for businesses, for universities, for nations. This is a challenge for anyone in a leadership position, clearly the challenge for you as you face the task of recommending measures for the security of our homeland. Think cyber strategy for homeland security.

Cyberspace, our future environment, is a networked space of nodes, each able to connect with any other, to send message, to receive. From the viewpoint of the user sitting at the screen pointing and clicking through the space there is no geographic boundary. Boundaries are instead passwords, boxes you have to fill or click, boundaries of language.

In cyberspace, brand is everything,for business as well as nation,. Identity is capital.The cyber power to connect with you and listen to your message is in the users hands. Who are users? All of us, not just republicans or democrats, or Americans. All the world’s a stage on which identity plays.

Consider privacy from the viewpoint of the user. Are you huddled in a room behind locked doors moving on the screen only to places that are predetermined to be safe? Do you exist in a closed world? This is one view of privacy. Privacy as prison. Prison as security.

Another is, you live in culture of trust, a neighborhood where your doors are open, your children free to run. You sit at your screen and go where ever you want to go.

Consider the necker cube. Take it as a methphor for the deepest dispute your client faces. Your client sees himself and his dispute one way. Your client’s enemy sees herself and her dispute another. Can it be seen both ways at the same time?

The logic of the equation so painfully taught to us by Osama Bin Laden dictates that our security is not merely a function of the defenses we put up. Our security is equally if not more a function of the hostility to us beyond our borders. If hostility continues to rise, our quest for security will be defeated. Privacy will become a form of that room with the locked door, security recast as privacy, and privacy a prison.

If that hostility is diminishes, then our security and our privacy will grow.

What would be a *cyber* strategy to diminish the hostility to the United States of America in the world beyond.

Avery’s Girl


Welcome to Camp Winona

Just spent fun times at Camp Winona on a Commonwealth School Retreat
Went for fifteen lattes in a little town nearby
talked in a wireless cafe until the lattes were ready
which took a time but that’s another story james milan to tell

then drove back to Camp Winona to deliver the lattes to Fern and her students learning how to do crosswords with her.

Camp Winona is incredibly beautiful place. Rain drops on the roofs of tents and cabins. Sunshine over lake and moutains creates god’s light.

The lattes were very well received and shared by kids in pairs buzzing together in the energy field of our little cabin room.

PLAYING POKER

Avery was the first student I met on this retreat. I was walking through the woods by the lake when I came across him setting up a doll and playing cards on a picnic table for a camera shot. I stopped and offered to hold the cards so that in the close-up shot the doll would appear to be looking at her cards like a poker player. He shot it, then set and took another of the doll with her cards spread out before her, royal flush. Avery, tall, wearing a blue sweatshirt with NEVADA white across his chest, nice smile. Here’s a story inspired by the episode.

I’m leading an activity this morning playing poker.
:

Trajectory — SSET

I’ve been working on slides to help me capture the trajectory of our budding cyberschool in Jamaica.

Mangabeira — Again

This morning when I went to show Roberto the entry on my blog with our audio interview, to my complete bafflement the blog entry for Mangabeira is gone! Some genie in the bottle, computer gods once again at work. In any event here again, my interview with Roberto, who is running for the presidency of Brazil.

Here’s the short video that introduced Roberto to the Brazilian electorate, and Roberto’s description of his personal commitment to Brazil.

Grokster Manifesto

We have reached an inflection point in the history of information technology. For the first time Internet allows us to aggregate and distribute a universal public information, education and entertainment domain. Our capacity as individuals to generate and share useful and amusing content is a function of the number of creative people doing it, the affirmation they get from doing it, and the cost of the equipment needed to listen, express, connect, aggregate, integrate, archive, search, and distribute.

We can do that with resources right at hand.

Napster offered model of a searchable digital library open to distributed input and exchange. Grokster a weak cousin in terms of functionality it offers users. The idea that Law should protect one but not the other is ridiculous, based on ephemera beyond the pointer on the screen.

The lesson goes far beyond law of copyright. We are talking LAW writ large. We invite judges to help shed its corporate vestiges of babylon as it applies to open knowledge libraries. Grokster is a troublemaker for the dons of p2p. Our Code is Open, don’t you see. The Open Library of Knowledge will distribute p2p torrents of information seeded in a mirrored ring data bases rooted in time and space as firmly as engineers can plant them.

Our enterprise nonprofit. Wikipedia is a model. It’s structure’s strength lies in the ring of developing connections among its nodes, not in connection of the nodes to a center.

This differs critically from a for profit corporate model.

time traveler

[email to Amal and Ike, cc to All]

Amal, Ike, permit me to introduce you.

Amal is the artist who created which you undoubtedly read about in the New York Times, May 7, 2005. He is being approached by media entities wanting footage and story. On listening to his story, I suggested that he needed an agent to represent him, and recommended you.

Ike is Boston’s leading Intellectual Property lawyer and literary agent. He understands that some times it’s best to let a talent out with minimal pecuniary impediment, sometimes even to let representation take shape and continue in the open.

Respects to Quinn

eon
Global Voices

wikipedia: philology

The philology research community is on the verge of a breakthrough in productivity facilitated by the availability of powerful research tools that can be applied to electronic versions of texts. There are literally thousands upon thousands of medieval and renaissance texts for which authorship and provenance are not known. Without this information these texts cannot be used by historians in their research. More sophisticated tools for identifying similarities and differences between texts could theoretically be used to determine the author and date of writing of many of these texts. However, there are several obstacles to realizing this goal. First, many of the texts on which philologists would like to work are not available in electronic form or are only available electronically for high license fees and through restrictive interfaces. Second, tools that allow sophisticated types of queries about the texts have yet to be developed. Although a complete electronic corpus of electronic texts with such research tools available for it is a common goal of philologists, the task of producing both the corpus and the tools appears insurmountable to any small group of researchers.

This message from Rnesson, my daughter Rebecca, who signs email

>
Rebecca Nesson
Candidate for Ph.D., Computer Science
Harvard Department of Engineering and Applied Sciences

Jamaica Voices Coming Up

The Observer reports the escape attempt and killings at Tower Street General Penitentiary, March 31, 2005. This was a galvanizing event in the history of Jamaica’s correctional services, a moment in which people on all sides of the violence between keeper and kept are paused and looking for a better way forward. I attended Maurice Whittingham’s funeral, the first correctional officer to have been shot dead in many decades, a signal event.

The Gleaner reports our partnership to respond. A rehabilitation program took root in Jamaica’s prisons back in the era of Colonel Prescod and Desmond Green. It survived through early success and burst bubble as SET, students expressing truth, inmates who preferred to stay and work in a computer lab than go out on the road to sing. Kevin Wallen leads SET, now expanded to include staff as well as prisoners. Major Richard Reese is the Commissioner of Corrections. It is our partnership to advance SSET’s Rehabilitation and ReEntry Program.

Jamaica’s Department of Corrections holds a press conference to announce its intensified Rehabilitation Re-Entry Program in partnership with Kevin Wallen and the Berkman Center. This audio is near twenty minutes long, opening with the usual Jamaican formalties acknowledging the presence and introduce persons of note, then moves to statements by Major Reese, Kevin Wallen and me, still with a lot to learn.

The Observer reports that Richard Reese has released his report on the March 31, 2005 killings at Tower Street General Penitentiary. A fair detailed report provides foundation for discussion among all concerned, and evolution of a common plan to honor those past and move ahead. This is the challenge that lies ahead

Father Reece asks a question against the visual and audio background of Tower Street, GP. This a video made years ago when we were first coming to know Kingston’s prisons. Father Reece, initially a death row inmate whose sentence was commuted to life, when told after serving 18 years that he had no possibility of parole, escaped and is still free. In this there is irony.

Back From Jamaica

Two ways to solve problems, from top down or from bottom up. Top down is organized with mission first, then task definition and so on out to execution; bottom up is distributed at base, looking for connection to come together. Here’s the Press Conference at the Jamaica Department of Corrections, leading with the Commissioner of Corrections, Major Richard Reese, then following with Kevin Wallen, leader of Students and Staff Expressing Truth, and then me, announcing the formation of our cyberschool and the building of our internal prison radio network.

Inflection Point

This morning I experienced the flash of insight, coming clear like the solution to a puzzle. With time to sink in, Signal or Noise led me to it — how Internet has changed our environment, legally speaking. Internet gave birth to the powers to aggregate the public domain and to place its immense library of knowledge and capacity for creativity in the hands of common man, any one with access to a digital recording machine and a node on the Net. Here is the audio of my rant. Let it go Charlie, lawyer for musicians without lawyers, for artists in their hearts, whatever money they may have made. Let’s raise money for health care for artists without lawyers who are without them because they don’t have the money. Let’s raise it from artists who do, by offering and inviting homage in the form of a penny or two, part to go to the old guys, like the Grateful Dead, who aren’t touring any more, seeing dwindling checks come in as their downloads compete with free. Yes, John Perry, you have a problem. Help us solve it. We are building a DME to do it, in the open, under flag of HARVARD and law of Fair Use. Digital Media Exchange and Public Library.

And while I’m at it, here’s Cary Sherman’s reaction to my Grokster post.

eon