Archive | First Amendment

Drone Journalism Resource Page

FIrstBlogImageIt’s not a bird, it’s not a plane, and unfortunately it’s not Superman either. So what is this small white device with propellers? It’s a drone, and in the next few years, drones just like this one might be whizzing over your head doing everything from taking pictures to delivering a late night pizza.

News companies might use drones to film crime scenes, natural disasters, or police chases. Amazon says it wants to use drones for deliveries. With the cheapest drones costing a little less than $300, soon even your nosey neighbor down the street might be able to buy a drone to keep up on the latest gossip and sell it to TMZ. But should commercial drones by journalists or other civilians be legal? It’s a topic that is being debated in courts and by legal scholars and journalists across the country.

To help bring some clarity to these questions, we thought it would be helpful to have a one stop shop for all you need to know about drones and the law.  Accordingly, we created new page on Drone Journalism and the Law in our media law resources section.  The page categorizes the resources by issues you might want to learn about, has relevant Tweets and news stories on the side bar, and will continue to be updated as the law changes and develops. Please let us know if we’ve missed something.

(Image courtesy of Wikimedia Commons user PleClown pursuant to a Creative Commons CC by 2.0 license)

57

J-School PhD Student awarded Google Policy Fellowship

woolery_liz-150x150UNC Center for Media Law and Policy staffer Liz Woolery has been awarded a Google Policy Fellowship to work at the New America Foundation’s Open Technology Institute in Washington, D.C., this summer.  Congratulations, Liz!

Liz was one of 20 chosen to work at 20 U.S. public interest and technology policy organizations.  She is a Ph.D. student in the UNC School of Journalism and Mass Communication and has organized events for the media law center for three years.

Liz says her time this summer will be spent developing best practices for transparency reporting by tech and telecom companies. She also will examine issues related to information gathering and data collection in public places — her dissertation topic.

The New America Foundation is a non-profit, non-partisan public policy institute that invests in thinkers and ideas to address the next generation of challenges facing the United States, specifically challenges brought on by the information-age economy.

The Google Policy Fellowship program was inspired by Google’s Summer of Code with a public policy twist. The Google Policy Fellowship program offers undergraduate, graduate and law students interested in Internet and technology policy the opportunity to spend the summer contributing to the public dialogue on these issues, and exploring future academic and professional interests.

0

The Democratic Surround: New Media Technologies as Tools of Personal and Social Liberation

glimpses-1On March 27th, Fred Turner, associate professor in the Department of Communication at Stanford University, will visit the UNC Center for Media Law and Policy to talk about his new book, The Democratic Surround.

At the broadest level, in The Democratic Surround and the previously published From Counterculture to Cyberculture Fred Turner’s project is to explain how we have come to see new media technologies as tools of personal and social liberation – not tools of social control.  Indeed, the World War II generation feared that one-way media was creating authoritarian personalities and giving rise to brainwashed fascists. Meanwhile, members of the Free Speech Movement at Berkeley in the 1960s adorned themselves with computer punch cards and signs that read “I am a UC student. Please do not fold, bend, mutilate, or spindle me” to protest technocratic society.

The process of culturally revaluing media technologies spanned the 1930s through the 1990s, the period that marked the development of our current technological imaginary (see, for instance, Robin Mansell’s Imagining the Internet.) The Democratic Surround offers a prequel of sorts to From Counterculture to Cyberculture, showing that our own multimedia stylings have a deeper history than the counterculturalists of the 1960s. Turner shows that the countercultural vision of media as, in McLuhan’s terms, “extensions of man,” and tools that can be enlisted in democratic projects of new world making has startling roots in the 1930s and 1940s.  It was a time when the public, leaders, and many scholars feared that mass media propaganda produced mass men, totalitarian societies, and rendered the psyche impervious to reason.  In this world, an enterprising set of artists, intellectuals, and social and political elites turned to media as a potential tool – not of social control, but of democratic liberation.  Together they created multi-media environments suffused with image, music, and architecture. Turner calls these environments “democratic surrounds.”  These individuals believed that surrounds had the power to create democratic personalities – rational and autonomous individuals with firm commitments to racial and religious diversity and democratic solidarity. This new democratic personalities would do battle with authoritarian personalities; to fight fascism required creating new democratic citizens through media.  If propaganda created one-way communication channels that left no room for free thought and fashioned free individuals into automatons, the democratic surround’s immersive media environments fostered democratic citizens who were free to navigate their own way through media.

It was this idea of the surround that Turner tells us migrated from the Second World War to the art worlds of the Cold War.  Intellectuals, artists, and policy makers continued to see the democratic personality as something that needed to be created and nurtured through media, now in the struggle against communism.  At sites such as North Carolina’s Black Mountain College – where John Cage performed the first happening – and the Museum of Modern Art, artists worked out the cultural genres of multi-media surrounds.  By the 1950s, these multi-mediated projects of democratic personality building would make their way to the staging of the 1958 World’s Fair and 1959 American National Exhibition – where Khrushchev and Nixon had their famous “kitchen debate.”

As Turner argues, while the democratic surround was initially aimed at fighting totalitarianism, by the 1950s it quickly bled into a modeling of equally political and consumer choices. It was a particularly influential branch of the counterculture that drew on the media forms and ideas of surrounds during the 1960s. Turner tells this history in From Counterculture to Cyberculture, which traces the emergence of many of the cultural styles, modes of thought, political stances, and collaborative cultures that surround us today from the 1960s on through to the new economy of the 1990s. The “New Communalists” left politics in the streets in the late 1960s and early 1970s and went back to the land carrying commercial technologies and cold war tools to create decidedly new world communes, geodesic domes dotting the landscape.  The Whole Earth Catalog connected these back-to-the-landers, and later it was the early computer network system Whole Earth ‘Lectronic Link (WELL) that by the 1980s early adopters in Silicon Valley believed was creating new forms of community, connection, and, shared consciousness.

The WELL did so in a rapidly changing world, one that was marked by the precariousness of labor in the high tech industry of the Valley.  Turner argues that the New Communalist imagination of the computer, and networked media more broadly, as tools of personal and social liberation helped information workers see their labor as liberating and in terms of building new societies. And yet, this cultural scaffolding helped these workers elide all the ways that mediated sociality supported freelance networking for piecework in the Valley. By the early 1990s, a host of media objects such as Wired magazine and the sweeping manifesto A Declaration of the Independence of Cyberspace distilled the New Communalist vision and extended it into the emerging new economy, creating a cultural framework for the new right’s libertarianism to be wedded to computer cultures. In the 1990s it was the riot of color and font that was Wired, in our own moment it is the colorful countercultural stylings of Google. The feeling of radically new peer-to-peer collaboration present on the WELL is not far from social movements such as Occupy Wall Street that are animated by connective action, consensus-seeking, and non-hierarchical forms. Techno-libertarianism animated back-to-the-landers and underpins many remix, peer, and DIY cultures, as well as social media startups, today.

Through it all, the democratic surround persists as a powerful vision and media form, one that animated many projects to reinvent social and political forms. As Turner tells us, the surround is both a new media genre and a model of organizing societies and working out the relationship of individuals to collectives.  Turner’s book offers a rich vision of our past that sheds new light on our own contemporary media projects, from the forms of organizing and connective action that have powered numerous contemporary projects of collective liberation, to the ways that networked media are entwined with the intractability of institutions and bureaucracies. Turner’s account of the surround in the 1950s is also markedly resonant with our own time – not just for the ways that the counterculture took up the themes of personality, psychological liberation, and new community building that infused early internet imaginaries and continues to do so today, but also how commercialism sits uneasily beside these liberating ideals.

1

Obama’s New Plan for the Future of Open Government

foxfolderlargeOn this week’s episode of WNYC’s “RadioLab” podcast, the hosts interviewed Jeff Larson, data editor at ProPublica. He described his experience in June 2013 filing a Freedom of Information Act (FOIA) request with the United States National Security Agency (NSA) to find out if the agency had collected any metadata about his cell phone usage. He received a letter stating,

We cannot acknowledge the existence or non-existence of such metadata or call detail records pertaining to the telephone numbers you provided. . . .  Were we to provide positive or negative responses to requests such as yours, our adversaries’ compilation of the information provided would reasonably be expected to cause exceptionally grave damage to the national security.

The rest of the podcast episode focused on the history of the government’s common “neither confirm nor deny” response to FOIA requests, and provided some background on the ongoing battle between open government and national security concerns. The podcast hosts also interviewed Jameel Jaffer, director of the American Civil Liberties Union (ACLU) National Security Project, who outlined problems with bringing lawsuits against the government when it fails to respond to FOIA requests. One big concern is how long it takes to litigate a case. “[T]he government may ultimately lose [the lawsuit],” Jaffer said, “but it will lose at a time when the public debate has moved on to something else.” Under the Obama administration there has been a significant increase in the number of FOIA lawsuits filed against the government. Yet, it was President Obama who began his presidency with promises of transparency.

Early in his first term, President Obama promised an “unprecedented level of openness” and said he would “establish a system of transparency, public participation, and collaboration in Government.” Indeed, Obama and his tech-centric staff took steps to that end, including tapping transparency and technology advocate Beth Simone Noveck to head the administration’s newly established Open Government Initiative. According to the initiative’s website, its initial goals, as laid out in the Open Government Directive, were to create a presumption of openness in government data, to improve the quality of government information, to create and institutionalize a culture of open government, and to create an policy framework for open government. Four years later, in a 2012 TED talk, Noveck described her first day at the White House:

[B]omb-blast curtains covered my windows; we were running Windows 2000; social media were blocked at the firewall; we didn’t have a blog, let alone a dozen Twitter accounts like we have today.

Comparing Noveck’s first-day experience to the administration’s current online presence, it is clear that since Obama’s election, the federal government has increased its use of technology to disseminate messages and to allow the public to access data from its various agencies. However, the degree to which the administration has truly increased transparency is much less clear.

In the four years since the Open Government Initiative began, the federal government has created a variety of tools to increase the public’s access to government information. For example, the launch of data.gov, the self-proclaimed “home of the U.S. government’s open data,” in mid-2009, required each federal agency to begin by posting “at least three high-level data-sets” to data.gov and to establish a webpage to “serve as a gateway for agency activities.” The administration also launched We the People, a web page on which users can launch petitions and, if they gather 100,000 signatures in 30 days, receive a response from the administration.  The number of required signatures increased from 5,000 in September 2011; to 25,000 in October 2011; and again to 100,000 in January 2013. “We the People” has been utilized to create petitions on a wide range of topics, including one to make unlocking cell phones legal and another to revoke pop-star Justin Bieber’s green card and deport him to his home country of Canada. The initiative also helped create the “peer-to-patent” program, a project that leveraged public expertise about technology to streamline the application process at the U.S. Patent and Trademark Office.

Many critics argue, however, that the administration’s open government efforts, while having some potential civic value, only marginally increase the government’s level of public accountability. Harlan Yu, of Princeton University’s Center for Information and Technology Policy, and David Robinson, of Yale University’s Information Society Project, argue that the term “open government” originally was associated with politically sensitive disclosures obtained via FOIA, but now the term has merged with “open technology” so it is associated with the sharing of data over the Internet. This definitional blurring, they argue, has made “open government” less about public accountability and more about “politically neutral public sector disclosures.” At closer examination, almost all of the commitments in the initial Open Government Directive dealt with making non-sensitive data publicly available. At the time of the directive’s release, Jameel Jaffer, director of the ACLU National Security Project offered this criticism:

While the Obama administration should be commended for the issuance of this directive, we remain concerned that executive agencies are invoking national security concerns as a pretext to suppress records that relate to government misconduct. . . .While we appreciate the steps that the Obama administration has taken to increase government transparency, the administration’s stated commitment to transparency has not yet translated into real change on information relating to national security policy.

Obama is by no means the first president to struggle with secrecy in the executive branch. Balancing secrecy and transparency has been a long-time struggle for U.S. presidents. In 1967, when the initial iteration of the Freedom of Information Act was reluctantly signed by then-President Lyndon Johnson, he noted in his signing statement:

A democracy works best when the people have all the information that the security of the nation permits. No one should be able to pull curtains of secrecy around decisions which can be revealed without injury to the public interest. At the same time, the welfare of the Nation or the rights of individuals may require that some documents not be made available.

In 1971, the U.S. Supreme Court found against the Nixon administration in the landmark case, New York Times v. United States and allowed the publication of The Pentagon Papers, a 47-volume U.S. government report about the Vietnam War. In that case, President Nixon’s solicitor general, Erwin Griswold, argued that despite the Constitution’s protection of freedom of speech and of the press, there was a need to “protect the nation against publication of information whose disclosure would endanger the national security. . . .” The analyst who leaked The Pentagon Papers, Daniel Ellsberg, defended his actions, saying, “I think we cannot let the officials of the executive branch determine for us what it is that the public needs to know.” In 1974, Congress had to override President Gerald Ford’s veto to pass the Privacy Act Amendment of 1974, which strengthened FOIA in the aftermath of the Watergate and other scandals involving the Nixon administration.

In addition, there have been numerous executive orders over the last several decades changing the classification procedures for documents related to national security. In fact, starting with President Carter, each president has issued his own executive order clarifying procedures for handling classified information. In their signing statements, these presidents all claimed that their orders protected U.S. security, limited over-classification of documents, and simplified procedures for declassification of secret documents. Critics have consistently argued otherwise. In 2012, Margin Faga, the former director of the National Reconnaissance Office, lamented the current system’s complexities and tendency toward over-classification. In a blog post for the Public Interest Declassification Board, a nine-member advisory board mandated by the Public Interest Declassification Act of 2000, Faga wrote:

The system keeps too many secrets, and keeps them too long. Its practices are overly complex, and serve to obstruct desirable information sharing inside of government and with the public. There are many explanations for over-classification: much classification occurs essentially automatically; criteria and agency guidance have not kept pace with the information explosion; and despite numerous Presidential orders to refrain from unwarranted classification, a culture persists that defaults to the avoidance of risk rather than its proper management.

In December 2013, the Obama administration released its second National Action Plan for the Open Government Initiative. As did the first initiative, the new plan proposes several ways to increase public participation in government, including an expansion of the “We the People” website and the establishment of best practices for federal agencies seeking to increase public participation. However, the second National Action Plan also includes new commitments to address transparency and accountability concerns in areas related to national security. These include, but are not limited to: increasing transparency about intelligence-gathering activities conducted under the Foreign Intelligence Surveillance Act (FISA), changing the system under which documents are classified for national security purposes, and consolidating federal systems to streamline and standardize FOIA requests. In each of those areas, the Obama administration has formed, or is in the process of forming, advisory groups to make policy recommendations. Below are brief summaries of these issues as laid out in the National Action Plan and the progress that has been made on the issues since the plan’s release in December of 2013:

Increasing Transparency of Activities Conducted Under FISA

After the publication in June 2013 of information leaked by former government contractor Edward Snowden about the NSA’s domestic spying program, the Obama administration instructed the director of national intelligence to declassify and publish online documents about the nature of U.S. intelligence collection programs. Going forward, the National Action Plan calls for continued review and declassification of documents pertaining to intelligence programs as well as numerical data about the use of these programs. Since the plan was published in December 2013, Obama has proposed additional changes to the FISA Court, the judicial body where agencies like the NSA request surveillance warrants. On January 17, as part of his speech on NSA reform, Obama called on Congress to install “public advocates” to represent privacy and other civil liberty concerns at the secret FISA court. Many advocates of NSA reform, including the Electronic Frontier Foundation and the Truman National Security Project, have lauded the proposed public advocates as a step in the right direction on civil liberties, though the proposal also has been criticized by the former head of the FISA Court.

Changing the System Under Which Documents are Classified for National Security Purposes

The second National Action Plan proposes creation of a simplified system of classifying materials for national security purposes to reduce over-classification of materials and simplify the process for declassifying materials that are no longer sensitive. The plan’s recommendations range from implementing technologies to simplify and automate the declassification process to a complete overhaul of the classification process. The plan also calls for creation of a Security Classification Reform Committee to review the recommendations contained in a report, Transforming the Security Classification System, released in November 2012 by the Public Interest Declassification Board. The report recommends reducing the traditional three classification levels (Top Secret, Secret, and Confidential) to two levels and implementing procedures to help align the level of classification with the “level of harm anticipated in the event of an unauthorized release.” Classifiers would base their classification decisions on “clearly identifiable risks” linked to specific classification levels, rather than on vague estimations of “presumed damage.” Additionally, the report recommends providing “safe harbor” protection for classifiers who “adhere to rigorous risk management processes and determine in good faith to classify information at a lower level or not at all.” Some critics of this plan argue that it simply restates the decades-old ideal of protecting U.S. security, reducing over-classification, and simplifying declassification with no clear plan as to how those goals might be achieved. Critics also complain that a two-level tier of classification simply moves the lowest level of classified material to a higher level.

Consolidating Federal Systems to Streamline and Standardize FOIA Requests

The Obama administration claims that it has made FOIA processes easier by speeding up processing time, disclosing information proactively to avoid the need for individual requests, and by reducing FOIA backlogs. The National Action Plan outlines the goal of directing FOIA requests into a single online portal to reduce the confusion information-seekers experience when trying to identify the proper department for their particular need. The plan also outlines increased efficiencies and a continued reduction in FOIA backlogs by increasing staff training and sharing best practices across departments. Last, it commits to establish a FOIA Modernization Advisory Committee to oversee these improvements and foster dialogue between the government and the requester community. As of January, 2014, the National Archives and Records Administration, in cooperation with the General Services Administration, has begun recruiting members for a 20-person committee, with equal representation from both the government and the FOIA requester community.

Despite the commitments in the National Action Plan, many remain skeptical of the Obama administration’s commitment to increased transparency. The administration’s aggressive use of the Espionage Act to target whistleblowers and leakers does not inspire confidence in the administration’s ability to “to create and institutionalize a culture of open government” as promised in Obama’s first Open Government Directive. It seems more likely that political pressures created by the Snowden leaks and the public outrage over domestic spying programs motivates Obama’s recent commitments to transparency. This seems particularly likely in the case of FISA in that Obama, along with Congress, successfully renewed the Act, including the Bush-era amendments, in December of 2012. The several new review groups and committees called for in the National Action Plan to help craft and implement policy are also cause for concern. In his recent speech on NSA reforms, Obama refused some of the more sweeping recommendations made by the recent NSA review panel. It’s altogether possible that he might do the same with recommendations for FOIA and classification system reforms.

Even giving the administration the benefit of the doubt, it is unclear that the proposed changes would be effective. As the recently Radiolab episode pointed out, the most successful FOIA requesters have to find specific mentions by public officials of individual documents or files in order to be precise in their requests. And there’s the rub: FOIA was enacted as a means to increase transparency, but its effectiveness is reduced when requesters do not know exactly what they are seeking. Because there’s no index, this need for specificity combined with rampant over-classification is a major problem with the current system. The classification system for national security documents is likely the biggest roadblock to increased transparency—web portals and technological automation can provide only partial reform for issues related to access and declassification. True reform requires a cultural change in the intelligence community in favor of increased openness. Until that exists, it’s hard to imagine a government employee marking even a low-risk document as “unclassified.”

Given the Obama administration’s inconsistent record on transparency and the long history of secrecy in areas related to national security, skepticism about the second National Action Plan’s potential to enact meaningful change is understandable. That being said, the plan is a welcome admission by the executive branch of the need to reform secrecy laws. Moreover, it identifies and offers incremental solutions for specific problems in the classification and declassification processes that contribute to the tendency toward secrecy. While some of the proposed solutions may need to be reconsidered or retooled, the administration has opened a new door to dialogue and cooperation with open government advocates. Whether that door was initially opened for public relations purposes is unimportant. It would be a mistake to let pessimism and skepticism stand in the way of reform.

0

Congratulations to UNC Students: Publications and Conference Papers

What’s more fun that sharing good news about our great media law students?  Absolutely nothing!  So here it goes. . . .

UNC School of Journalism and Mass Communication Ph.D. student Karen McIntrye has had an article accepted for publication in the Newspaper Research Journal.  The title of her paper is “Drone Journalism: Exploring the Potential Privacy Invasions of Using Unmanned Aircraft to Gather News.”

Also, three other students and a University of Oklahoma student who will join the J-School faculty next fall had papers accepted for presentation in the Law and Policy Division at the Association for Education in Journalism and Mass Communication (AEJMC) Southeast Colloquium at the University of Florida in March.  The papers went through a process of blind review, with students and faculty competing in the same category.  UNC student papers will represent 25 percent of the papers to be presented at this conference.

These are the students and the titles of their papers:

Kevin Delaney:  “Rube Goldberg-Like Contrivances and Broadcasting: The Litigation Challenging Aereo and FilmOn.”  Kevin is in our dual-degree program, earning an M.A. in mass communication and a J.D.

Natasha Duarte: “I Know Whom You Called Last Summer: Government Collection of Telephony Metadata and the Freedom of Association.”  Natasha is in our dual-degree program.

Liz Woolery:  “The Element that Ate the Tort: Newsworthiness and the Public Disclosure of Private Facts.”  Liz is a Ph.D. student in the J-School.

Also, Adam Saffer, a Ph.D. student at the University of Oklahoma and a soon-to-be public relations professor in the J-School, had this paper accepted:  “Practitioners as Publishers: Examining Public Relations Practitioners’ Claims for Legal Protections Traditionally Associated with the Institutional Press” (with co-author Jared Schroeder from Augustana College).

Congratulations Tar Heel scholars!

0