Changes between Version 1 and Version 2 of nyc_anarchist_book_fair_2008


Ignore:
Timestamp:
Mar 22, 2008, 2:37:41 PM (13 years ago)
Author:
Daniel Kahn Gillmor
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • nyc_anarchist_book_fair_2008

    v1 v2  
    2727  When i want to communicate ''without'' divulging my identity (whistleblowing, etc), how can i be sure that my identity is protected?
    2828 Reliability/Access::
    29   Is the communications mechanism i'm using something i can rely on?  Who controls the mechanism?  Can the mechanism be shut down or interrupted?
     29  Is the communications medium i'm using something i can rely on?  Who controls the medium?  Can it be shut down or interrupted?  Will it be there when i need it urgently?
    3030
    3131== Role Play ==
    3232
    3333We're going to lead a role play where each participant is issued an identity, objectives, and complicating restrictions.
     34
     35People in the room all stand in a circle, facing outward, away from each other, but with hands within reach. People do not walk around.  Each person has a pad of paper and a pen, and is issued an "e-mail address".
     36
     37One subgroup of people in the room is a group of activists, trying to select a time for their next action (a surprise picket, say).  They need to pick a time when as many of them can make it as possible, and they need to do this by writing notes on paper and handing them off around the room.
     38
     39Other scenarios/objectives?
     40
     41== Use Cases/Case Studies ==
     42
     43We're interested in discussing particular common scenarios.  We're not lawyers, so we won't get into legal advice.
     44
     45Some scenarios that we want people to think about are:
     46
     47 * Chinese dissident bloggers getting their personal info turned over to the authorities from their blog hosts
     48 * Upstream ISPs shutting down your site in response to a DMCA cease'n'desist or other thread of legal action.
     49 * Collusion between corporate e-mail providers and illegal government surveillance
     50 * E-mail encryption -- what does it mean?
     51 * IM encryption -- how does this differ from e-mail encryption?
     52 * Search engine queries and online purchases can be tracked to an individual
     53
     54== Followup ==
     55We should pass around a signup sheet asking for people to indicate interest in a followup workshop -- for example, if there's a sense that the crowd really wants to learn how to use OpenPGP, we'd like to schedule a time that interested folks can actually get trainings.
     56
     57== Materials ==
     58What materials will we need to provide?
     59
     60 * Paper, pens, identity badges (playing cards?), instructions, envelopes for role play
     61 * carbon paper for simulating a mailing list?
     62 * signup sheets for followup
     63 * posters to invite people to the workshop