iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Restructuring Argentina’s Private Debt is Essential

Argentina's creditors are being asked to accept a proposal that would reduce their revenue stream but make it sustainable. A responsible resolution will set a positive precedent, not only for Argentina, but for the international financial system as a whole.




iva

Ferrari like 'a perfect Italian watch' - Arrivabene

Team principal Maurizio Arrivabene never doubted Sebastian Vettel could be a contender in Malaysia but he says Ferrari must not get carried away with one victory




iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Rosberg top again as rivals hit trouble

Mercedes continued its domination of free practice at the season-opening Australian Grand Prix as several of its rivals ran into trouble in the second practice session




iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Schumacher website to be reactivated

Michael Schumacher's personal website wil be re-launched on Thursday to mark the 20-year anniversary of his maiden F1 world championship




iva

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




iva

Privacy and Security in the Cloud Computing Age


Event Information

October 26, 2010
10:00 AM - 11:30 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Although research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?

On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.”

After the program, panelists took audience questions.

Transcript

Event Materials

     
 
 




iva

Privacy and Security in Cloud Computing


Executive Summary

Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks.

What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b).

This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009).

Downloads

Image Source: Jupiterimages
     
 
 




iva

Bridging Transatlantic Differences on Data and Privacy After Snowden


“Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships.  I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation.

The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship.  Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route.

[I]

But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S.  These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone.  The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders.  So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions.

My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago.  What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America.  The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies.  So the decision heightens the differences between the U.S. and Europe.

Nonetheless, it does not have to be so desperate.  In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction.

[I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013.


Image Source: © Yves Herman / Reuters
      
 
 




iva

Missed Connections: Talking With Europe About Data, Privacy, and Surveillance


The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year.  And both Silicon Valley and Hollywood do big business with Europe every year.  Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership.  In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations.

Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe.  He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses.

To promote transatlantic trade the United states should:

  • Not be defensive about its protection of privacy
  • Provide clear information to the worldwide community about American law enforcement surveillance
  • Strengthen its own privacy protection
  • Focus on the importance of trade to the American and European economies

Downloads

Image Source: © Francois Lenoir / Reuters
      
 
 




iva

Red Sea rivalries: The Gulf, the Horn of Africa & the new geopolitics of the Red Sea

"The following interactive map displays the acquisition of seaports and establishment of new military installations along the Red Sea coast. The mad dash for real estate by Gulf states and other foreign actors is altering dynamics in the Horn of Africa and re-shaping the geopolitics of the Red Sea region. Click on the flags in…

       




iva

Foreign aid should support private schooling, not private schools


A recent article in The Guardian caught my eye: “Report accuses government of increasing inequalities in developing countries by financing academies at the expense of state schools.” The report, conducted by the U.N. Committee on the Rights of the Child, was an attack on U.K. aid money being linked to private education providers since the rapid increase in such schools may be contributing to sub-standard education. In particular, they cited the U.K. government’s investments in the Nairobi-based and for-profit Bridge International Academies.

I’ve worked on private education extensively throughout my career and do not believe there is anything wrong with private schools, but in this particular case I couldn’t agree more. But to be clear, it’s the funding strategy that’s the problem.

Private schooling is on the rise in a number of poor countries, and Pakistan—where my education research is focused—is no exception. The majority of these schools are no longer the elite institutions of yore, but low-cost alternatives fighting for survival in a highly competitive environment. These schools have mushroomed in response to increased parental demand and poor public alternatives, but also to the greater availability of teachers in the local labor market.

More importantly, research increasingly demonstrates that there is absolutely nothing wrong with private schools. There's a summary of this research available here; specific examples on India (more here) and Pakistan are also available.

Some key are takeaways from this research are:

  • Private schools charge low fees (about $1 to$2 a month in Pakistan).
  • The quality is almost certainly higher compared to government schools in the vicinity.
  • At least in Pakistan, there is no significant segregation between public and private schools in terms of parental wealth, education, or caste.
  • The most significant barrier to attendance in low-cost private schools is not cost—it’s distance. Put simply, there just aren’t enough of them around.

If there is a cheaper and better alternative to public schooling, shouldn’t we encourage children to shift and thus improve the quality of education for all?

Perhaps. But when the rubber from these well-intentioned aid policies hits the road of rural Pakistan, Kenya, or Ethiopia, a very different sort of model emerges. Instead of supporting private schooling, donors end up supporting private schools (or at best private school chains), which is an entirely different action with little theoretical backing. In fact, economic theory screams that governments and donors should almost never do that.

Donors say the problem is that the low-cost private school market is fragmented with no central authority that can be “contracted with.” No one has a good model on how to work with a competitive schooling sector with multiple small players—ironically, the precise market structure that, according to economics, leads to efficiency.

In reality, I suspect the problem goes deeper. Most low-cost private school owners don’t do well at donor conferences. They don’t know how to tell compelling human-interest stories about the good they do. But what they are excellent at is using local resources to ensure that their schools meet the expectations of demanding parents.

The problems with foreign aid financing private schools

The first is a problem of accountability. Public schools are accountable, through a democratic system, to citizens of the country. Private schools are accountable to the parents. And donor-funded private school chains are account to the donors. While both citizen-led accountability and direct accountability to parents have problems, they are grounded in centuries of experience. It’s unlikely that donors in a foreign land, some of whom can’t visit the schools they fund for security reasons, can do better than either citizens or parents.

The second is a problem of market structure. When one private school or private school chain receives preferential treatment and funding, without allowing other private schools to apply for the same funds, the donor is picking winners (remember Solyndra?). The need for private schools as an alternative to government schools is insufficient justification for donors to put their thumbs on the scale and tilt the balance of power towards a pre-identified entity.

Adjusting the strategy

In a recent experiment, my colleagues and I gathered direct proof for this assertion. We gave untied grants to low-cost private schools with a twist. In certain villages, we randomly selected a single private school for the grant. In others, we gave the grant to every private school in the village. Our preliminary results show that in villages where we gave the grant to a single school, the school benefitted enormously from an increase in enrollment. Where we gave the grant to multiple private schools, the enrollment increase was split among schools. But only in the villages where we gave the grant to every school did test-scores for children increase.

What happened? When a single private school receives the grant, knowing that the other schools cannot react due to a lack of funds, they engage in “customer poaching” to increase their profits at the expense of others. Some have argued that Uber’s recent fundraising is precisely such an effort to starve competitors of funding.

When you equally support all private schools, customer poaching does not work, and the only way to increase profits and generate returns is to increase the size of the market, either through higher overall enrollments or through new quality offerings.

The first strategy supports pre-identified private schools and concentrates market power. The second, by providing opportunities for all private schools, improves education for children.

Sure, some private school chains and schools are making positive impact and deserve the support they can get. But funding such schools creates the wrong institutional structures and are more likely to lead to disasters than successes (Greg Mortensen and 3 cups of tea, anyone?).

In general, the Government’s responsibility towards the education of children is two-fold:

  • Alleviate the market constraints that hold back private schooling without favoring one school over the other—letting parents decide who succeeds and who does not.
  • Support and improve public schools to provide an alternative because there will always be children who cannot enroll in private schools, either because they are too expensive or because they are too far away, or because they don’t offer the instruction “basket” that some parents want.

In short, foreign aid should play no part in supporting private schools rather than private schooling.

Authors

  • Jishnu Das
      
 
 




iva

USAID's public-private partnerships: A data picture and review of business engagement


In the past decade, a remarkable shift has occurred in the development landscape. Specifically, acknowledgment of the central role of the private sector in contributing to, even driving, economic growth and global development has grown rapidly. The data on financial flows are dramatic, indicating reversal of the relative roles of official development assistance and private financial flows. This shift is also reflected in the way development is framed and discussed, never more starkly than in the Addis Abba Action Agenda and the new set of Sustainable Development Goals (SDGs). The Millennium Development Goals (MDGs), which the SDGs follow, focused on official development assistance. In contrast, while the new set of global goals does not ignore the role of official development assistance, they reorient attention to the role of the business sector (and mobilizing host country resources).

The U.S. Agency for International Development (USAID) has been in the vanguard of donors in recognizing the important role of the private sector to development, most notably via the agency’s launch in 2001 of a program targeted on public-private partnerships (PPPs) and the estimated 1,600 USAID PPPs initiated since then. This paper provides a quantitative and qualitative presentation of USAID’s public-private partnerships and business sector participation in those PPPs. The analysis offered here is based on USAID’s PPP data set covering 2001-2014 and interviews with executives of 17 U.S. corporations that have engaged in PPPs with USAID.

The genesis of this paper is the considerable discussion by USAID and the international development community about USAID’s PPPs, but the dearth of information on what these partnerships entail. USAID’s 2014 release (updated in 2015) of a data set describing nearly 1,500 USAID PPPs since 2001 offers an opportunity to analyze the nature of those PPPs.

On a conceptual level, public-private partnerships are a win-win, even a win-win-win, as they often involve three types of organizations: a public agency, a for-profit business, and a nonprofit entity. PPPs use public resources to leverage private resources and expertise to advance a public purpose. In turn, non-public sectors—both businesses and nongovernmental organizations (NGOs)—use their funds and expertise to leverage government resources, clout, and experience to advance their own objectives, consistent with a PPP’s overall public purpose. The data from the USAID data set confirm this conceptual mutual reinforcement of public and private goals.

The goal is to utilize USAID’s recently released data set to draw conclusions on the nature of PPPs, the level of business sector engagement, and, utilizing interviews, to describe corporate perspectives on partnership with USAID.

The arguments regarding “why” PPPs are an important instrument of development are well established. This paper presents data on the “what”: what kinds of PPPs have been implemented and in what countries, sectors, and income contexts. There are other research and publications on the “how” of partnership construction and implementation. What remains missing are hard data and analysis, beyond the anecdotal, as to whether PPPs make a difference—in short, is the trouble of forming these sometimes complex alliances worth the impact that results from them?

The goal of this paper is not to provide commentary on impact since those data are not currently available on a broad scale. Similarly, this paper does not recommend replicable models or case studies (which can be found elsewhere), though these are important and can help new entrants to join and grow the field. Rather, the goal is to utilize USAID’s recently released data set to draw conclusions on the nature of PPPs, the level of business sector engagement, and, utilizing interviews, to describe corporate perspectives on partnership with USAID.

The decision to target this research on business sector partners’ engagement in PPPs—rather than on the civil society, foundation, or public partners—is based on several factors. First, USAID’s references to its PPPs tend to focus on the business sector partners, sometimes to the exclusion of other types of partners; we want to understand the role of the partners that USAID identifies as so important to PPP composition. Second, in recent years much has been written and discussed about corporate shared value, and we want to assess the extent to which shared value plays a role in USAID’s PPPs in practice.

The paper is divided into five sections. Section I is a consolidation of the principal data and findings of the research. Section II provides an in-depth “data picture” of USAID PPPs drawn from quantitative analysis of the USAID PPP data set and is primarily descriptive of PPPs to date. Section III moves beyond description and provides analysis of PPPs and business sector alignment. It contains the results of coding certain relevant fields in the data set to mine for information on the presence of business partners, commercial interests (i.e., shared value), and business sector partner expertise in PPPs. Section IV summarizes findings from a series of interviews of corporate executives on partnering with USAID. Section V presents recommendations for USAID’s partnership-making.

Downloads

Authors

     
 
 




iva

USAID’s public-private partnerships and corporate engagement


Brookings today releases a report USAID’s Public-Private Partnerships: A Data Picture and Review of Business Engagement, which will be the subject of a public discussion on March 8 featuring a panel of Jane Nelson (Harvard University), Ann Mei Chang (U.S. Agency for International Development (USAID)), Johanna Nesseth Tuttle (Chevron Corp.), and Sarah Thorn (Wal-Mart Stores Inc.).

The report is based on USAID’s database of 1,481 public-private partnerships (PPPs) from 2001 to 2014 and a series of corporate interviews.

The value of those partnerships totals $16.5 billion, two-thirds from non-U.S. government sources – private companies, nongovernmental organizations (NGOs), foundations, and non-U.S. public institutions. Over 4000 organizations have served as resource partners in these PPPs.  Fifty-three percent are business entities, 32 percent are from the non-profit world, and 25 percent are public institutions. Eighty-five organizations have participated in five or more PPPs, led by Microsoft (62), Coca Cola (36), and Chevron (33).

The partnerships are relatively evenly distributed among three major regions—Africa, Latin American/Caribbean, and Asia—but 36 percent of the value of all PPPs is from partnerships that are global in reach.

In analyzing the data, the researchers found that 77 percent of PPPs included one or more business partner, and that 83 percent of these partnerships are connected to a business partner’s commercial interest (either shared value or more indirect strategic interest). In almost 80 percent of those PPPs, the business partner contributes some form of corporate expertise to the partnership.

The purpose of the March 8 panel discussion is to examine the report but also to go beyond by addressing outstanding questions like: how should the impact of public-private partnerships be identified, measured, and evaluated? Is shared value the Holy Grail linking corporate interest to public goods and achieving sustainable results? Where do public-private partnerships fit in USAID’s strategy for engaging the private sector in development, particularly in light of the emphasis on the role of business in advancing the new set of Sustainable Development Goals?

We hope you can join us for what should prove to be an engaging discussion.

Authors

     
 
 




iva

Foreign aid should support private schooling, not private schools


A recent article in The Guardian caught my eye: “Report accuses government of increasing inequalities in developing countries by financing academies at the expense of state schools.” The report, conducted by the U.N. Committee on the Rights of the Child, was an attack on U.K. aid money being linked to private education providers since the rapid increase in such schools may be contributing to sub-standard education. In particular, they cited the U.K. government’s investments in the Nairobi-based and for-profit Bridge International Academies.

I’ve worked on private education extensively throughout my career and do not believe there is anything wrong with private schools, but in this particular case I couldn’t agree more. But to be clear, it’s the funding strategy that’s the problem.

Private schooling is on the rise in a number of poor countries, and Pakistan—where my education research is focused—is no exception. The majority of these schools are no longer the elite institutions of yore, but low-cost alternatives fighting for survival in a highly competitive environment. These schools have mushroomed in response to increased parental demand and poor public alternatives, but also to the greater availability of teachers in the local labor market.

More importantly, research increasingly demonstrates that there is absolutely nothing wrong with private schools. There's a summary of this research available here; specific examples on India (more here) and Pakistan are also available.

Some key are takeaways from this research are:

  • Private schools charge low fees (about $1 to$2 a month in Pakistan).
  • The quality is almost certainly higher compared to government schools in the vicinity.
  • At least in Pakistan, there is no significant segregation between public and private schools in terms of parental wealth, education, or caste.
  • The most significant barrier to attendance in low-cost private schools is not cost—it’s distance. Put simply, there just aren’t enough of them around.

If there is a cheaper and better alternative to public schooling, shouldn’t we encourage children to shift and thus improve the quality of education for all?

Perhaps. But when the rubber from these well-intentioned aid policies hits the road of rural Pakistan, Kenya, or Ethiopia, a very different sort of model emerges. Instead of supporting private schooling, donors end up supporting private schools (or at best private school chains), which is an entirely different action with little theoretical backing. In fact, economic theory screams that governments and donors should almost never do that.

Donors say the problem is that the low-cost private school market is fragmented with no central authority that can be “contracted with.” No one has a good model on how to work with a competitive schooling sector with multiple small players—ironically, the precise market structure that, according to economics, leads to efficiency.

In reality, I suspect the problem goes deeper. Most low-cost private school owners don’t do well at donor conferences. They don’t know how to tell compelling human-interest stories about the good they do. But what they are excellent at is using local resources to ensure that their schools meet the expectations of demanding parents.

The problems with foreign aid financing private schools

The first is a problem of accountability. Public schools are accountable, through a democratic system, to citizens of the country. Private schools are accountable to the parents. And donor-funded private school chains are account to the donors. While both citizen-led accountability and direct accountability to parents have problems, they are grounded in centuries of experience. It’s unlikely that donors in a foreign land, some of whom can’t visit the schools they fund for security reasons, can do better than either citizens or parents.

The second is a problem of market structure. When one private school or private school chain receives preferential treatment and funding, without allowing other private schools to apply for the same funds, the donor is picking winners (remember Solyndra?). The need for private schools as an alternative to government schools is insufficient justification for donors to put their thumbs on the scale and tilt the balance of power towards a pre-identified entity.

Adjusting the strategy

In a recent experiment, my colleagues and I gathered direct proof for this assertion. We gave untied grants to low-cost private schools with a twist. In certain villages, we randomly selected a single private school for the grant. In others, we gave the grant to every private school in the village. Our preliminary results show that in villages where we gave the grant to a single school, the school benefitted enormously from an increase in enrollment. Where we gave the grant to multiple private schools, the enrollment increase was split among schools. But only in the villages where we gave the grant to every school did test-scores for children increase.

What happened? When a single private school receives the grant, knowing that the other schools cannot react due to a lack of funds, they engage in “customer poaching” to increase their profits at the expense of others. Some have argued that Uber’s recent fundraising is precisely such an effort to starve competitors of funding.

When you equally support all private schools, customer poaching does not work, and the only way to increase profits and generate returns is to increase the size of the market, either through higher overall enrollments or through new quality offerings.

The first strategy supports pre-identified private schools and concentrates market power. The second, by providing opportunities for all private schools, improves education for children.

Sure, some private school chains and schools are making positive impact and deserve the support they can get. But funding such schools creates the wrong institutional structures and are more likely to lead to disasters than successes (Greg Mortensen and 3 cups of tea, anyone?).

In general, the Government’s responsibility towards the education of children is two-fold:

  • Alleviate the market constraints that hold back private schooling without favoring one school over the other—letting parents decide who succeeds and who does not.
  • Support and improve public schools to provide an alternative because there will always be children who cannot enroll in private schools, either because they are too expensive or because they are too far away, or because they don’t offer the instruction “basket” that some parents want.

In short, foreign aid should play no part in supporting private schools rather than private schooling.

Authors

  • Jishnu Das
      
 
 




iva

What’s holding back the Kyrgyz Republic private sector?

The Kyrgyz Republic could be Central Asia’s Switzerland. It neighbors important global economies, it has maintained democracy since 1991, it has improved its business environment, and it has beautiful mountains. So, why hasn’t the economy taken off? Why hasn’t an $8 billion economy with 6.3 million smart people been able to create dynamic medium- and…

       




iva

Chicago’s Multi-Family Energy Retrofit Program: Expanding Retrofits With Private Financing

The city of Chicago is increasing retrofits by using stimulus dollars to expand the opportunity for energy efficient living to low-income residents of large multi-family rental buildings. To aid this target demographic, often left underserved by existing programs, the city’s new Multi-Family Energy Retrofit Program introduces an innovative model for retrofit delivery that relies on private sector financing and energy service companies.

Chicago’s new Multi-Family Energy Retrofit Program draws on multi-sector collaboration, with an emphasis on private sector involvement supported by public and nonprofit resources. Essentially, the program applies the model of private energy service companies (ESCOs), long-used in the public sector, to the affordable, multi-family housing market. In this framework, ESCOs conduct assessments of building energy performance, identify and oversee implementation of cost-effective retrofit measures, and guarantee energy savings to use as a source of loan repayment.

Downloads

      
 
 




iva

Iran’s regional rivals aren’t likely to get nuclear weapons—here’s why

In last summer’s congressional debate over the Iran nuclear deal, one of the more hotly debated issues was whether the deal would decrease or increase the likelihood that countries in the Middle East would pursue nuclear weapons. Bob Einhorn strongly believes the JCPOA will significantly reduce prospects for proliferation in the Middle East

      
 
 




iva

Iran’s regional rivals aren’t likely to get nuclear weapons—here’s why


In last summer’s congressional debate over the Iran nuclear deal—the Joint Comprehensive Plan of Action (JCPOA)—one of the more hotly debated issues was whether the deal would decrease or increase the likelihood that countries in the Middle East would pursue nuclear weapons.

Supporters of the JCPOA argued that, by removing the risk of a nuclear-armed Iran, it will reduce incentives for countries of the region to acquire nuclear arms. Opponents of the deal—not just in the United States but also abroad, especially Israel—claimed that the JCPOA would increase those incentives because it would legitimize enrichment in Iran, allow Iran to ramp up its nuclear capacity when key restrictions expire after 10 and 15 years, and boost the Iranian economy and the resources Iran could devote to a weapons program.

I strongly believe the JCPOA will significantly reduce prospects for proliferation in the Middle East (and as my colleague Richard Nephew explains in another post out today, there are things the United States and other powers can do to help reduce that prospect further). But uncertainties about the future of the JCPOA and the region will persist for quite some time—and these uncertainties could motivate regional countries to keep their nuclear options open. They may ask themselves a variety of questions in the years ahead: Will the JCPOA be sustainable over time? Will it unravel over concerns about compliance? Will it withstand challenges by opponents in Tehran and Washington? Will it survive leadership transitions in the United States and Iran? Will Iran ramp up its fissile material production capacities when key restrictions expire? Will it then break out of the JCPOA and seek to build nuclear weapons? Will Iran continue to threaten the security of its neighbors in the years ahead? And will the United States maintain a strong regional military presence and be seen by its partners as a reliable guarantor of their security?

I strongly believe the JCPOA will significantly reduce prospects for proliferation in the Middle East.

Richard and I studied how these and other questions might affect nuclear decision-making in the Middle East. In particular, we evaluated the likelihood that key states will pursue nuclear weapons, or at least enrichment or reprocessing programs that could give them a latent nuclear weapons capability. We focused on four states often regarded as potential candidates to join the nuclear club: Saudi Arabia, the United Arab Emirates, Egypt, and Turkey.

Saudi Arabia

Of the four, Saudi Arabia is the most highly motivated to pursue nuclear weapons. It sees Iran as an implacable foe that is intent on destabilizing its neighbors, achieving regional hegemony, and upending the Kingdom’s internal order. At the same time, the Saudis have lost much confidence in the U.S. commitment to the security of its regional partners. In part as a result, the new Saudi leadership has taken a more assertive, independent role in regional conflicts, especially in Yemen. But despite their reservations about the United States, the Saudis know they have no choice but to rely heavily on Washington for their security—and they know they would place that vital relationship in jeopardy if they pursued nuclear weapons.

The Saudis clearly have sufficient financial resources to make a run at nuclear weapons. But acquiring the necessary human and physical infrastructure to pursue an indigenous nuclear program would take many years.

Given the Kingdom’s difficulty in developing an indigenous nuclear weapons capability, speculation has turned to the possibility that it would receive support from a foreign power, usually Pakistan, which received generous financial support from Saudi Arabia in acquiring its own nuclear arsenal. But while rumors abound about a Pakistani commitment to help Saudi Arabia acquire nuclear weapons, the truth is hard to pin down. If such a Saudi-Pakistani agreement was ever reached, it was probably a vague, unwritten assurance long ago between a Pakistani leader and Saudi king, without operational details or the circumstances in which it would be activated. In any event, the Saudis would find it hard to rely on such an assurance today, when Pakistanis are trying to put the legacy of A.Q. Khan behind them and join the international nonproliferation mainstream. 

United Arab Emirates (UAE)

Like Saudi Arabia, the UAE believes Iran poses a severe threat to regional security and has become more aggressive since the completion of the JCPOA. And like the Saudis, the Emiratis have lost considerable confidence in the reliability of the United States as a security guarantor. But also like the Saudis, the Emiratis are reluctant to put their vital security ties to the United States in jeopardy.

[L]ike the Saudis, the Emiratis have lost considerable confidence in the reliability of the United States as a security guarantor.

Moreover, the Emiratis are heavily invested in their ambitious nuclear energy program—with efforts currently underway, with the help of a South Korean-led consortium, to construct four nuclear power reactors—and they know this project would be dead in the water if they opted for nuclear weapons.

The Emiratis have also been a leading regional supporter of nonproliferation. In their bilateral agreement for civil nuclear cooperation with the United States, they formally renounced the acquisition of enrichment or reprocessing capabilities (the so-called “gold standard”), effectively precluding the pursuit of nuclear weapons. After the JCPOA permitted Iran to retain its enrichment program, the UAE, faced with criticism domestically and from some Arab governments for having given up its nuclear “rights,” said it may reconsider its formal renunciation of enrichment. But subsequently, Emirati officials have made clear that their nuclear energy plans have not changed and that they have no intention to pursue enrichment or reprocessing.

Egypt

Egypt is on everyone’s short list of potential nuclear aspirants—in part because of its former role as leader of the Arab world and its flirtation with nuclear weapons in the Gamal Abdel Nasser years. But while Egypt and Iran have often been regional rivals, Egypt does not view Iran as a direct military threat. Instead, Egypt’s main concerns include extremist activities in the Sinai, the fragmentation of Iraq and Syria, disarray in Libya—and the adverse impact of these developments on Egypt’s internal security. The Egyptians recognize that none of these threats can be addressed by the possession of nuclear weapons.

Although Russia is committed to work with Egypt on its first nuclear power reactor, Cairo’s nuclear energy plans have experienced many false starts before, and there is little reason to believe the outcome will be different this time around, especially given the severe economic challenges the Egyptian government currently faces. Moreover, although Egypt trained a substantial number of nuclear scientists in the 1950s and 1960s, its human nuclear infrastructure atrophied when ambitious nuclear energy plans never materialized.

Turkey

Because of its emergence in the last decade as a rising power, its large and growing scientific and industrial basis, and its ambition to be an influential regional player, Turkey is also on everyone’s short list of potential nuclear-armed states. But Turkey has maintained reasonably good relations with Tehran, even during the height of the sanctions campaign against Iran. Although the two countries have taken opposing sides in the Syria civil war, Turkey, like Egypt, does not regard Iran as a direct military threat. Indeed, Ankara sees instability and terrorism emanating from the Syrian conflict as its main security concerns—and nuclear weapons are not viewed as relevant to dealing with those concerns.

Current tensions with Russia over Turkey’s November 2015 shoot-down of a Russian fighter jet are another source of concern in Ankara. But the best means of addressing that concern is to rely on the security guarantee Turkey enjoys as a member of NATO. While Turkish confidence in NATO has waxed and waned in recent decades, most Turks, especially in the military, believe they can count on NATO in a crisis, and they would be reluctant to put their relationship with NATO at risk by pursuing nuclear weapons.

Former nuclear aspirants

For the sake of completeness, our study also looked at regional countries that once actively pursued nuclear weapons but were forced to abandon their programs: Iraq, Libya, and Syria. But we concluded that, given the civil strife tearing those countries apart, none of them was in a position to pursue a sustained, disciplined nuclear weapons effort.

Bottom line

Our study found that the Iran nuclear deal has significantly reduced incentives for countries of the Middle East to reconsider their nuclear options. At least for the foreseeable future, none of them is likely to pursue nuclear weapons or even latent nuclear weapons capabilities—or to succeed if they do. 

Editors’ Note: Bob Einhorn and Richard Nephew spoke about their new report at a recent Brookings event. You can see the video from the event here.

Authors

     
 
 




iva

Pennsylvania Economic Revival Lies in its Metro Assets

In the long run-up to the Pennsylvania primary, there's been a good deal of candidate discussion of the state's economy and how to fix it.

But missing from the prescriptions of what the federal government would do and how it would do it has been a discussion of where it will happen.

That needs to change because place matters. For all the ink spilled on the declining fortunes of the commonwealth, there are many bright spots around the state that could be catalysts to growth and prosperity.

Recent Brookings research shows strength in varied fields across the state:

Advanced health care, pharmaceuticals, and information technology in Greater Philadelphia.

Health care, architecture and engineering, and banking in Pittsburgh.

Heavy construction, machinery and food processing in Lancaster.

Industrial gases, health care and higher education in the Lehigh Valley.

The state's economy is an amalgam of its 16 metropolitan areas that generate 92 percent of its economic output.

The top six metropolitan areas alone - Philadelphia, Pittsburgh, Harrisburg-Carlisle, Allentown-Bethlehem-Easton, Scranton/Wilkes-Barre, and Lancaster - constitute 68.4 percent of the state's population and produce 80.5 percent of the state's economic output.

The research underscores that four key assets overwhelmingly located in metropolitan areas - innovation, modern infrastructure, strong human capital, and quality places - are needed today to drive productivity of firms and workers, improve the wealth and opportunities of families, and ensure sustainable growth. America's metropolitan assets - the universities, the health-care concentrations, and the skilled-labor pools - are the drivers of our national economy and the key to future American competitiveness and success.

So what does this mean for Greater Philadelphia? And what would a more thoughtful federal role look like?

Two realms with extensive current federal involvement are transportation infrastructure and innovation. Cogent efforts from Washington in both these areas could significantly leverage state and local efforts.

Rather than thinly spreading transportation-infrastructure dollars across the country, the federal government should spend strategically.

For Greater Philadelphia, supporting its competitive advantage as the linchpin of Amtrak's Northeast Corridor with federal dollars for more frequent and reliable service would strengthen the region as a rail hub, as has been championed by the Greater Philadelphia Chamber of Commerce.

Additionally, federal transportation policy should empower metropolitan areas with the discretion to spend funds flexibly, whether that's improving the aging SEPTA system, beginning the work of reinventing and burying Interstate 95 to increase access to the Delaware waterfront, or increasing transit access of city residents to suburban jobs.

Regarding innovation, unfortunately, the federal government currently has no unified national strategy to maximize high-quality jobs and spread their benefits throughout the Philadelphia region. Instead, it has a series of highly fragmented investments and programs.

Current programs put strong emphasis on research, but are insufficiently attentive to the commercialization of that research and blind to how innovation and jobs arise from the intense interaction of firms, industry associations, workers, universities and investors - a nexus ready to be capitalized on in Greater Philadelphia as documented by the Economy League of Philadelphia in a report for the CEO Council for Growth.

To this end, the federal government should reorganize its efforts and create a National Innovation Foundation, a nimble, lean organization whose sole purpose would be to work with industries, universities, business chambers, and local and state governments to spur innovation. Similar, successful national agencies are already up and running in competing nations, such as Britain, France, Sweden and Japan.

This effort should include R&D and support for technology-intensive industries such as information technology and pharmaceuticals, but it also must make small and medium-size manufacturers more competitive and train workers in manufacturing and low-tech services to work smarter.

Looking forward, our federal government must realize this is a "Metro Nation" and value and strengthen economic juggernauts such as Philadelphia.

Only by organizing our currently fragmented investments in transportation and innovation - and targeting them where they will provide the greatest return, metropolitan America - will the United States continue not only to compete, but also to lead.

Authors

Publication: The Philadelphia Inquirer
     
 
 




iva

Managing health privacy and bias in COVID-19 public surveillance

Most Americans are currently under a stay-at-home order to mitigate the spread of the novel coronavirus, or COVID-19. But in a matter of days and weeks, some U.S. governors will decide if residents can return to their workplaces, churches, beaches, commercial shopping centers, and other areas deemed non-essential over the last few months. Re-opening states…

       




iva

Private capital flows, official development assistance, and remittances to Africa: Who gets what?


Strong Growth and Changing Composition 

External financial flows to sub-Saharan Africa (defined as the sum of gross private capital flows, official development assistance (ODA), and remittances to the region) have not only grown rapidly since 1990, but their composition has also changed significantly. The volume of external flows to the region increased from $20 billion in 1990 to above $120 billion in 2012. Most of this increase in external flows to sub-Saharan Africa can be attributed to the increase in private capital flows and the growth of remittances, especially since 2005 (see Figure 1).

Figure 1. Sub-Saharan Africa: External Flows (1990-2012, in USD billions)

As also displayed in Figure 1, in 1990 the composition of external flows to sub-Saharan Africa was about 62 percent ODA, 31 percent gross inflows from the private sector, and about 7 percent remittances. However, by 2012, ODA accounted for about 22 percent of external flows to Africa, a share comparable to that of remittances (24 percent) and less than half the share of gross private capital flows (54 percent). Also notably, in 1990, FDI flows were greater than ODA flows in only two countries (Liberia and Nigeria) in sub-Saharan Africa excluding South Africa, but 22 years later, 17 countries received more FDI than ODA in 2012—suggesting that sub-Saharan African countries are increasingly becoming less aid dependent (see Figure 2).

Figure 2. Sub-Saharan Africa: Number of Countries Where FDI is Greater than ODA (1990-2012)

But to what extent have these changes in the scale and composition of external flows to sub-Saharan Africa equally benefited countries in the region? Did the rising tide lift all boats? Is aid really dying? Are all countries attracting private capital flows and benefiting from remittances to the same degree? Finally, how does external finance compare with domestic finance? 

The False Demise of ODA

A closer look at the data indicates that, clearly, ODA is not dead, though its role is changing. For instance, middle-income countries (MICs) are experiencing the sharpest decline in ODA as a share of total external flows to the region, while aid flows account for more than half of external flows in fragile as well as low-income countries (LICs) and resource-poor landlocked countries (see Figure 3 and Appendix).

Download the full paper »

Authors

      
 
 




iva

Red Sea rivalries: The Gulf, the Horn of Africa & the new geopolitics of the Red Sea

"The following interactive map displays the acquisition of seaports and establishment of new military installations along the Red Sea coast. The mad dash for real estate by Gulf states and other foreign actors is altering dynamics in the Horn of Africa and re-shaping the geopolitics of the Red Sea region. Click on the flags in…

       




iva

2005 Brookings Blum Roundtable: The Private Sector in the Fight Against Global Poverty


Event Information

August 3-6, 2005

From August 3 to 6, 2005, fifty preeminent international leaders from the public, private, and nonprofit sectors came together at the Aspen Institute for a roundtable, "The Private Sector in the Fight against Global Poverty."

The roundtable was hosted by Richard C. Blum of Blum Capital Partners and Strobe Talbott and Lael Brainard of the Brookings Institution, with the active support of honorary cochairs Walter Isaacson of the Aspen Institute and Mary Robinson of Realizing Rights: The Ethical Globalization Initiative. By highlighting the power of the market to help achieve social and economic progress in the world's poorest nations, the roundtable's organizers hoped to galvanize the private, public, and nonprofit sectors to move beyond argument and analysis to action. Put simply, as Brookings president Strobe Talbott explained, the roundtable's work was "brainstorming with a purpose."

With experts hailing from around the world and representing diverse sectors and approaches, the dialogue was as multilayered as the challenge of poverty itself. Rather than summarize the conference proceedings, this essay weaves together the thoughtful observations, fresh insights, and innovative ideas that characterized the discussion. A companion volume, Transforming the Development Landscape: The Role of the Private Sector, contains papers by conference participants, providing in-depth analysis of each conference topic.

View the 2005 report » (PDF)
View the conference agenda »
View the list participants »

     
 
 




iva

2013 Brookings Blum Roundtable: The Private Sector in the New Global Development Agenda


Event Information

August 4-6, 2013

Aspen, Colorado

Lifting an estimated 1.2 billion people from extreme poverty over the next generation will require robust and broadly-shared economic growth throughout the developing world that is sufficient to generate decent jobs for an ever-expanding global labor force. Innovative but affordable solutions must also be found to meet people’s demand for basic needs like food, housing, a quality education and access to energy resources. And major investments will still be required to effectively address global development challenges, such as climate change and child and maternal health.  On all these fronts, the private sector, from small- and medium-sized enterprises to major global corporations, must play a significant and expanded role.

On August 4-6, 2013, Brookings Global Economy and Development is hosting the tenth annual Brookings Blum Roundtable on Global Poverty in Aspen, Colorado. This year’s roundtable theme, “The Private Sector in the New Global Development Agenda,” brings together global leaders, entrepreneurs, practitioners and public intellectuals to discuss how the contribution of the private sector be enhanced in the push to end poverty over the next generation and how government work more effectively with the private sector to leverage its investments in developing countries. 

Roundtable Agenda

Sunday, August 4, 2013

Welcome: 8:40AM - 9:00AM MST
Brookings Welcome
Strobe Talbott, Brookings

Opening Remarks
Richard C. Blum, Blum Capital Partners, LP and Founder of 
the Blum Center for Developing Economies at UC Berkeley
Julie Sunderland, Bill and Melinda Gates Foundation
Kemal Derviş, Global Economy and Development, Brookings

Session I: 9:00AM - 10:30AM MST
Framing Session: Reimagining the Role of the Private Sector
In this opening discussion, participants will explore the overarching questions for the roundtable: How can the contribution of the private sector be enhanced in the push to end poverty over the next generation? What are the most effective mechanisms for strengthening private sector accountability? How can business practices and norms be encouraged that support sustainable development and job creation? How can business build trust in its contributions to sustainable development?

Moderator
Nancy Birdsall, Center for Global Development

Introductory Remarks
• Homi Kharas, Brookings Institution
Viswanathan Shankar, Standard Chartered Bank
Shannon May, Bridge International Academies


Session II: 10:50AM - 12:20PM MST
Private Equity
Participants will explore the following questions for the roundtable: What are the constraints to higher levels of private equity in the developing world, including in non-traditional sectors? How can early-stage investments be promoted to improve deal flow? How can transaction costs and technical assistance costs be lowered?

Moderator
Laura Tyson, University of California, Berkeley

Introductory Remarks
Robert van Zwieten, Emerging Markets Private Equity Association
Runa Alam, Development Partners International
Vineet Rai, Aavishkaar

Dinner Program: 6:45PM - 9:15PM MST
Aspen Institute Madeleine K. Albright Global Development Lecture


Featuring
Dr. Paul Farmer, Chief Strategist and Co-Founder, Partners in Health


Monday, August 5, 2013

Session III: 9:00AM - 10:30AM MST
Goods, Services and Jobs for the Poor
Participants will explore the following questions for the roundtable: In what areas are the most promising emerging business models that serve the poor arising? What are the major obstacles in creating and selling profitable, quality, and beneficial products to the poor and how can they be overcome? What common features distinguish successful and replicable solutions?

Moderator
Mary Robinson, Mary Robinson Foundation

Introductory Remarks
• Ashish Karamchandani, Monitor Deloitte
• Chris Locke, GSMA
• Ajaita Shah, Frontier Markets
• Hubertus van der Vaart, SEAF


Session IV: 10:50AM - 12:20PM MST
Blended Finance
Participants will explore the following questions for the roundtable: Can standard models of blended finance deliver projects at a large enough scale? How can leverage be measured and incorporated into aid effectiveness measures? Should governments have explicit leverage targets to force change more rapidly and systematically?

Moderator
Henrietta Fore, Holsman International

Introductory Remarks
Elizabeth Littlefield, OPIC
• Ewen McDonald, AusAID
Laurie Spengler, ShoreBank International 

Tuesday, August 6, 2013 

Session V: 9:00AM - 10:30AM MST
Unlocking Female Entrepreneurship
Participants will explore the following questions for the roundtable: How is the global landscape for female entrepreneurship changing? What types of interventions have the greatest ability to overturn barriers to female entrepreneurship in the developing world? Who, or what institutions, should lead efforts to advance this agenda? Can progress be made without a broader effort to end economic discrimination against women?

Moderator
• Smita Singh, Independent

Introductory Remarks
Dina Powell, Goldman Sachs
Carmen Niethammer, IFC
Randall Kempner, ANDE

Session VI: 10:50AM - 12:20PM MST
U.S. Leadership and Resources to Engage The Private Sector
Participants will explore the following questions for the roundtable: How can U.S. foreign assistance be strengthened to more effectively promote the role of the private sector? How can U.S. diplomacy support private sector development in the emerging economies and multinational enterprises investing in the developing world? What can the US do to promote open innovation platforms?

Moderator
George Ingram, Brookings

Introductory Remarks
• Sam Worthington, InterAction
John Podesta, Center for American Progress
Rajiv Shah, USAID

Closing Remarks
 Richard C. Blum, Blum Capital Partners, LP and Founder of the Blum Center for Developing Economies at Berkeley
Kemal Derviş, Global Economy and Development, Brookings

Public Event: 4:30PM - 6:00PM MST
Brookings and the Aspen Institute Present: "America's Fiscal Health and its Implications for International Engagement"
Global Economy and Development at Brookings and the Aspen Institute will host the 66th U.S. Secretary of State Condoleezza Rice and Administrator of the U.S. Agency for International Development Rajiv Shah for a discussion on the current state of the U.S.'s fiscal health and its impact on American diplomatic and development priorities. Moderated by Ambassador Nicholas Burns, Director, Aspen Strategy Group.

Moderator
Nicholas Burns, Director, Aspen Strategy Group

Panelists
Condoleezza Rice, 66th United States Secretary of State
Rajiv Shah, Administrator of the United States Agency for International Development

 

Event Materials

      
 
 




iva

In Israel, Benny Gantz decides to join with rival Netanyahu

After three national elections, a worldwide pandemic, months of a government operating with no new budget, a prime minister indicted in three criminal cases, and a genuine constitutional crisis between the parliament and the supreme court, Israel has landed bruised and damaged where it could have been a year ago. This week, Israeli opposition leader…

       




iva

Civilian Drones, Privacy, and the Federal-State Balance


     
 
 




iva

Unmanned aircraft systems: Key considerations regarding safety, innovation, economic impact, and privacy


Good afternoon Chair Ayotte, Ranking Member Cantwell, and Members of the Subcommittee. Thank you very much for the opportunity to testify today on the important topic of domestic unmanned aircraft systems (UAS).

I am a nonresident senior fellow in Governance Studies and the Center for Technology Innovation at the Brookings Institution. I am also a National Fellow at the Hoover Institution at Stanford, and a professor at UCLA, where I hold appointments in the Electrical Engineering Department and the Department of Public Policy. The views I am expressing here are my own, and do not necessarily represent those of the Brookings Institution, Stanford University or the University of California.

Downloads

Authors

Image Source: © Mike Segar / Reuters
     
 
 




iva

Cuba moves backwards: New regulations likely to impede private sector growth

In a leap backwards, the Cuban government has published a massive compendium of tough new regulations governing the island’s struggling private enterprises. The new regulations—the first major policy pronouncement during the administration of President Miguel Díaz-Canel—appear more focused on controlling and restricting the emerging private sector than on stimulating investment and job creation, more concerned…

       




iva

@ Brookings Podcast: Eye-Tracking Technology and Digital Privacy


Eye-tracking technology now makes it possible for computers to gather staggering amounts of information about individuals as they use the Internet, and draw hyper-accurate conclusions about our behavior as consumers. As the technology becomes more practical, Senior Fellow John Villasenor discusses its benefits and risks.

Video

Audio

Image Source: © Scanpix Sweden / Reuters
     
 
 




iva

Iran’s regional rivals aren’t likely to get nuclear weapons—here’s why

In last summer’s congressional debate over the Iran nuclear deal, one of the more hotly debated issues was whether the deal would decrease or increase the likelihood that countries in the Middle East would pursue nuclear weapons. Bob Einhorn strongly believes the JCPOA will significantly reduce prospects for proliferation in the Middle East

      
 
 




iva

Jihadi rivalry: The Islamic State challenges al-Qaida


International jihad has undergone a wholesale internal revolution in recent years. The dramatic emergence of the Islamic State (IS) and its proclamation of a Caliphate means that the world no longer faces one Sunni jihadi threat, but two, as IS and al-Qaida compete on the global stage. What is the relationship between the groups and how do their models differ? Is IS’s rapid organizational expansion sustainable? Can al-Qaida adapt and respond?

Read "Jihadi Rivalry: The Islamic State Challenges al-Qaida"

In a new Brookings Doha Center Analysis Paper, Charles Lister explores al-Qaida and IS’s respective evolutions and strategies. He argues that al-Qaida and its affiliates are now playing a long game by seeking to build alliances and develop deep roots within unstable and repressed societies. IS, on the other hand, looks to destabilize local dynamics so it can quickly seize control over territory.

Lister finds that the competition between IS and al-Qaida for jihadi supremacy will continue, and will likely include more terrorist attacks on the West. Accordingly, he calls for the continued targeting of al-Qaida leaders, the disruption of jihadi financial activities, and greater domestic intelligence and counter-radicalization efforts. Lister concludes, however, that state instability across the Muslim world must be addressed or jihadis will continue to thrive.

Downloads

Authors

  • Charles Lister
Publication: The Brookings Doha Center
Image Source: © Hosam Katan / Reuters
      
 
 




iva

A conversation with the CIA’s privacy and civil liberties officer: Balancing transparency and secrecy in a digital age

The modern age poses many questions about the nature of privacy and civil liberties. Data flows across borders and through the hands of private companies, governments, and non-state actors. For the U.S. intelligence community, what do civil liberties protections look like in this digital age? These kinds of questions are on top of longstanding ones…

       




iva

The Global Compact on Migration: Dead on arrival?

At a conference in Marrakech, Morocco this week, 164 of the 193 members of the United Nations adopted the Global Compact for Safe, Orderly, and Regular Migration. Negotiations to create the ambitious agreement began two years ago, but the Trump Administration withdrew at the end of 2017, declaring that the Compact would “undermine the sovereign…

       




iva

An Integrated Scientific Framework for Child Survival and Early Childhood Development

Editor's Note: This article was originally published in Pediatrics, a subscription-only journal. To obtain a subscription or log in to access the full article, click here.

ABSTRACT

Building a strong foundation for healthy development in the early years of life is a prerequisite for individual well-being, economic productivity, and harmonious societies around the world. Growing scientific evidence also demonstrates that social and physical environments that threaten human development (because of scarcity, stress, or instability) can lead to short-term physiologic and psychological adjustments that are necessary for immediate survival and adaptation, but which may come at a significant cost to long-term outcomes in learning, behavior, health, and longevity. Generally speaking, ministries of health prioritize child survival and physical well-being, ministries of education focus on schooling, ministries of finance promote economic development, and ministries of welfare address breakdowns across multiple domains of function. Advances in the biological and social sciences offer a unifying framework for generating significant societal benefits by catalyzing greater synergy across these policy sectors. This synergy could inform more effective and efficient investments both to increase the survival of children born under adverse circumstances and to improve life outcomes for those who live beyond the early childhood period yet face high risks for diminished life prospects.

Read the full article at Pediatrics »

Authors

Publication: Pediatrics
      
 
 




iva

The Private Sector and Sustainable Development: Market-Based Solutions for Addressing Global Challenges

The private sector is an important player in sustainable global development. Corporations are finding that they can help encourage economic growth and development in the poorest of countries. Most importantly, the private sector can tackle development differently by taking a market-based approach. The private sector is providing new ideas in the fight to end global…

       




iva

The role of the private sector in global sustainable development

In 2015, all 193 countries signed on to the United Nations Sustainable Development Goals (SDGs) for 2030, setting a broad and bold agenda for reducing poverty, promoting inclusive prosperity, and sustaining the environment. On April 6, the Global Economy and Development program at Brookings co-hosted a panel discussion along with the United Nations Foundation on…

       




iva

Ambivalence About Davutoğlu


Ahmet Davutoğlu, Turkey's new Prime Minister, is a familiar name in Western capitals. It is also a name that generates mixed feelings among his peers.

What most agree is that he is was an incredibly ambitious and hardworking foreign minister, always willing to travel wherever necessary, even when the outcome of such visits generated little concrete results. There is also consensus about his willingness to lecture his counterparts. He probably believed that his academic background and the relative ignorance of his counterparts entitled him to do so. But in most cases he had a tendency to forget that he was dealing with fellow foreign ministers and not students of history. This tendency generated only a begrudging sense of respect, even among his most graceful and objective peers.

It is also clear for people who knew him when he was an academic that politics has changed him. In the eyes of most his students, he was a reluctant policymaker when he began his political life. He often mentioned that his real goal was to go back to academia, where he could once again enjoy the intellectual life of an analytical thinker who can keep a healthy distance from events. Yet, in a matter of few years he discovered the irresistible pull of power. It was maybe "Kissinger syndrome" — realizing that power is the ultimate aphrodisiac.

Perhaps most important is the question of Davutoğlu's ideology. There are numerous articles written about this question, and the emerging consensus is that he is an incurable idealist. It may be reductionist to argue that he is an Islamist, but it is undeniably true that he has focused on parts of the world where Muslims are facing injustice with much enthusiasm. Although he rejects being labeled neo-Ottoman, it is also undeniably true that he speaks of Ottoman tradition, tolerance and governance with great nostalgia. As most of his students, he is very critical of the West and its Orientalism. His years in Malaysia as a professor bring a colorful interpretation to his critic of colonialism and imperialism. Yet, what he often fails to realize is that in his criticisms of the West, he often repeats the methodological fallacy of Orientalism. The result is what can be best labeled "Occidentalism" — a tendency to generalize and construct a Western civilization with a prejudice similar to the one displayed by Orientalists.

Finally, there is the issue of missing modesty. Although Davutoğlu appears to be very modest and unpretentious, he often displays a stubborn resistance in admitting mistakes. This is perhaps a defense mechanism in dealing with the press. But combined with his unabashed sense of idealism, his reluctance to recognize failure and to see the world as it is rather than how it should be is very troubling for a policymaker. The reluctance to admit policy failures creates two major problems: a disconnect from reality and an inability for course-correction.

In short, there is a lot of ambivalence towards Davutoğlu in the West. He is coming to his new position with a lot of baggage and the looming shadow of a powerful president. Newly elected President Recep Tayyip Erdoğan wanted someone who would follow his lead without hesitation. His choice speaks volumes about Davutoğlu's new persona and about how much he has changed since the early days of his political career.

This article was originally published in Today's Zaman.

Publication: Today's Zaman
Image Source: © Umit Bektas / Reuters
     
 
 




iva

How well-intentioned privacy laws can contribute to wrongful convictions

In 2019, an innocent man was jailed in New York City after the complaining witness showed police screenshots of harassing text messages and recordings of threatening voicemails that the man allegedly sent in violation of a protective order. The man’s Legal Aid Society defense attorney subpoenaed records from SpoofCard, a company that lets people send…

       




iva

The Green Climate Fund’s Private Sector Facility: The Case for Private Sector Participation on the Board

EXECUTIVE SUMMARY The Green Climate Fund’s (GCF) Private Sector Facility can enhance the likelihood of achieving its’ goals of scale-up, transformation and leverage by including individual voting members in its board who bring private sector skills and experience. This would build on growing precedent in the boards of other global funds, as well as in…

       




iva

The Impact of Domestic Drones on Privacy, Safety and National Security

Legal and technology experts hosted a policy discussion on how drones and forthcoming Federal Aviation Agency regulations into unmanned aerial vehicles will affect Americans’ privacy, safety and the country’s overall security on April 4, 2012 at Brookings. The event followed a new aviation bill, signed in February, which will open domestic skies to “unmanned aircraft…

       




iva

In Israel, Benny Gantz decides to join with rival Netanyahu

After three national elections, a worldwide pandemic, months of a government operating with no new budget, a prime minister indicted in three criminal cases, and a genuine constitutional crisis between the parliament and the supreme court, Israel has landed bruised and damaged where it could have been a year ago. This week, Israeli opposition leader…

       




iva

Facebook, Google, and the Future of Privacy and Free Speech


Introduction

It was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud.

Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.”

Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond?

If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution.

At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms.

Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1]  As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook.

The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble.  These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person.

Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8]

The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring.  Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation.

Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable.

The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10]

Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy.

The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking.

Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband.

It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion.  And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12]

It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept.

The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure.

But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure.

This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15]

When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact.

Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month.

Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition.

The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech:  Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17]

In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights.

From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech.

A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18]

Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever.

Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users.

So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said.

It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market.

The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict.

Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21]

At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet.

At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad.

For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?”

Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes.

It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.”

That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct.

Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does.

I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action.

In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.”


[1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring).
[2] See United States v. Miller, 425 U.S. 435 (1976).
[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983).
[4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010).
[5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010).
[6] 615 F.3d at 558.  
[7] Id. at 562.
[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html
[9] Lawrence v. Texas, 539 U.S. 558, 562 (2003).
[10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010.
[11] United States v. Place, 462 U.S. 696 (1983).
[12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).
[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009).
[14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010.
[15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008).
[16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).
[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y.  Times, August 20, 2010, B4.
[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html
[19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php
[20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/
[21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008.

Downloads

Authors

Image Source: David Malan
      
 
 




iva

Wretched Excess: Private yachts are so yesterday, now it's private floating islands.

But, we ask, are they green and sustainable?




iva

Davos meeting entails 1,700 private jet flights...and a few new bikes

At the World Economic Forum, the elite of the global economy arrive in the least sustainable mode of travel - a private jet. Yet a few of them will walk a few kilometers to donate bikes to school kids.




iva

International Bicycle Film Festival Comes Down Under

By some oversight we’ve missed the opportunity to alert readers to the International Bicycle Film Festival of 2007 until now. After it has already blitzed 13 cities worldwide, it finds itself skidding to a halt for a few weeks in Australia.