<node id="590827">
  <nid>590827</nid>
  <type>news</type>
  <uid>
    <user id="34435"><![CDATA[34435]]></user>
  </uid>
  <created>1493059328</created>
  <changed>1493227085</changed>
  <title><![CDATA[Surveillance, Privacy and Data across Borders: Transatlantic Perspectives]]></title>
  <body><![CDATA[<p>18 April the Center for European and Transatlantic Studies, the Institute for Information Security &amp; Privacy at Georgia Tech, and the Scheller College of Business hosted a one-day conference about transatlantic mutual legal assistance. The conference featured current and former European and American government officials, representatives from Fortune 100 technology companies&nbsp;and&nbsp;internet advocacy groups, as well as leading academics (see below).&nbsp; The conference was supported by the European Union&rsquo;s Erasmus+ Program and the William and Flora Hewlett Foundation.&nbsp; A recording of the introduction and the first panel discussion is available&nbsp;<a href="https://bluejeans.com/s/qmBXp/">here</a>.&nbsp; The rest of the program will be available shortly.</p>

<p>Welcome and introduction to current MLA issues</p>

<ul>
	<li>Joseph Bankoff, Chair, School of International Affairs, Georgia Tech</li>
	<li>Peter Swire, Scheller College of Business, Georgia Tech</li>
	<li>Alasdair Young, Sam Nunn School of International Affairs, Georgia Tech</li>
</ul>

<p>Panel 1: Intersection of law enforcement, intelligence, and military for MLA</p>

<ul>
	<li>Philip Breedlove, Sam Nunn School of International Affairs, Georgia Tech&nbsp;(former Supreme Allied Commander Europe)</li>
	<li>John De Long, Berkman Klein Center, Harvard University</li>
	<li>Susan Hennessey, Brookings Institution</li>
	<li>Scarlet Kim, Privacy International</li>
</ul>

<p>Keynote lecture: &ldquo;Achieving Individual Privacy and International Security Cooperation in a Shifting Landscape&rdquo;</p>

<ul>
	<li>Bruno Gencarelli, DG Justice, European Commission</li>
</ul>

<p>Panel 2: Hacking, Attribution, Technology, and MLA</p>

<ul>
	<li>David Dagon, School of Electrical and Computer Engineering, Georgia Tech</li>
	<li>Kim Peretti, Alston &amp; Bird</li>
	<li>Dillon Reisman, Center for Information Technology Policy, Princeton University</li>
</ul>

<p>Panel 3 The US/UK Agreement as a Model for Reform</p>

<ul>
	<li>Gail Kent, Facebook</li>
	<li>Drew Mitnick, Access Now</li>
	<li>Greg Nojeim, Center for Democracy and Technology</li>
	<li>Suzanne Vergnolle, Paris II Law</li>
</ul>

<p>Panel 4 Long-term Proposals for International Data Requests</p>

<ul>
	<li>Kevin Bankston, New America</li>
	<li>Lani Cosette, Microsoft</li>
	<li>Andrew Woods, University of Kentucky</li>
</ul>

<p>&nbsp;</p>

<p>Learn more about the Sam Nunn School of International Affairs <a href="http://inta.gatech.edu">here</a>.&nbsp;</p>

<p>Learn more about the&nbsp;Center for European and Transatlantic Studies <a href="http://cets.gatech.edu">here</a>.&nbsp;</p>

<p>&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-04-18T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[The Center for European and Transatlantic Studies, the Institute for Information Security & Privacy at Georgia Tech, and the Scheller College of Business hosted a one-day conference about transatlantic mutual legal assistance. ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="590814">
            <nid>590814</nid>
            <type>image</type>
            <title><![CDATA[transatlantic discussion]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>225101</fid>
                  <filename><![CDATA[Panel3.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Panel3.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Panel3.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jessica.palacios@inta.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Jessica Palacios</p>

<p>Administrative Professional II</p>

<p>404-385-8566</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1281</item>
          <item>1285</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>https://bluejeans.com/playback/s/ZB8r4DAlwnbgC5vR7FEy67Z65VNNnhjpZsbdElE7kj4ClOUCMsNIHbAM0tAF72JJ</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1281</item>
          <item>1285</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
          <item><![CDATA[Sam Nunn School of International Affairs]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>169209</tid>
        <value><![CDATA[Ivan Allen College of Liberal Arts; Sam Nunn School of International Affairs]]></value>
      </item>
          <item>
        <tid>141341</tid>
        <value><![CDATA[Institute for Information Security & Privacy]]></value>
      </item>
          <item>
        <tid>43101</tid>
        <value><![CDATA[Georgia Tech Scheller College of Business]]></value>
      </item>
          <item>
        <tid>111421</tid>
        <value><![CDATA[MLA]]></value>
      </item>
          <item>
        <tid>167617</tid>
        <value><![CDATA[surveillance]]></value>
      </item>
          <item>
        <tid>3221</tid>
        <value><![CDATA[privacy]]></value>
      </item>
          <item>
        <tid>438</tid>
        <value><![CDATA[data]]></value>
      </item>
          <item>
        <tid>525</tid>
        <value><![CDATA[military]]></value>
      </item>
          <item>
        <tid>98601</tid>
        <value><![CDATA[hacking]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
