The Electronic Silk Road: How the Web Binds the World in Commerce

Total Page:16

File Type:pdf, Size:1020Kb

The Electronic Silk Road: How the Web Binds the World in Commerce Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2013 The Electronic Silk Road: How the Web Binds the World in Commerce Anupam Chander Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/2297 https://ssrn.com/abstract=3662605 Anupam Chander, The Electronic Silk Road: How the Web Binds the World in Commerce (New Haven, Conn.: Yale University Press 2013). This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Computer Law Commons, Consumer Protection Law Commons, Internet Law Commons, and the Law and Economics Commons THE ELECTRONIC SILK ROAD THE ELECTRONIC SILK ROAD HOW THE WEB BINDS THE WORLD IN COMMERCE ANUPAM CHANDER New Haven & London Copyright © 2013 by Yale University. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the US Copyright Law and except by reviewers for the public press), without written permission from the publishers. An online version of the work is made available under a Creative Commons license for use that is both noncommercial and nonderivative. The terms of the license are set forth at http://creativecommons.org/licenses/ by-nc-nd/3.0/legalcode. For more information about the work, please see the author’s website at http://www.chander.com. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e-mail sales.press@ yale.edu (US office) or [email protected] (UK office). Designed by Lindsey Voskowsky. Set in Adobe Caslon Pro and Whitney type by IDS Infotech, Ltd. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Chander, Anupam. The electronic silk road : how the web binds the world in commerce / Anupam Chander. pages cm Includes bibliographical references and index. ISBN 978-0-300-15459-7 (clothbound : alk. paper) 1. Law and globalization—Economic aspects. 2. Electronic commerce— Law and legislation. 3. Internet—Social aspects. 4. Globalization— Economic aspects. I. Title. KZ1268.C47 2012 381'.142—dc23 2012047258 A catalogue record for this book is available from the British Library. This paper meets the requirements of ANSI/NISO Z39.48–1992 (Permanence of Paper). 10 9 8 7 6 5 4 3 2 1 For Madhavi Sunder, sine qua non, and Harish Chander and Yash Garg, who sacrificed so much to embrace the opportunities of globalization I think of the ancient Silk Road as the Internet of antiquity. —Yo-Yo Ma CONTENTS Acknowledgments ix Introduction: Tracing a Silk Road Through Cyberspace 1 1 The New Global Division of Labor 18 2 Western Entrepôt: Silicon Valley 35 3 Eastern Entrepôt: Bangalore 59 4 Pirates of Cyberspace 87 viii 5 Facebookistan 113 6 CONTENTS Freeing Trade in Cyberspace 142 7 Handshakes Across the World 158 8 Glocalization and Harmonization 166 9 Last Stop: Middle Kingdom 192 Afterword 207 Glossary: A Cheat Sheet for Global E-Commerce 213 Notes 219 Index 265 ACKNOWLEDGMENTS Before there was trade in services via cyberspace, people moved. My parents migrated to the United States right before the celebrations marking the Bicentennial, my dad arriving in 1974 and then my mother, with my brother and me in tow, the following year. We flew from New Delhi via Beirut and London to New York, a route that would soon become impossible because of war. A legal change in 1965 made this flight possible. Before immigration law revisions that year, US law had set a quota of merely a hundred Indian immigrants per year. My par- ents’ move made possible the extraordinary education I received in the United States and, such are the ironies of globalization, allowed me to study under the great Indian Nobel laureate Amartya Sen. ix x In 2003, two disparate media sources I read, the crowd-sourced technology site Slashdot and the Indian-American paper India Abroad, converged on the phenomenon of “outsourcing.” The phe- nomenon bridged my two different scholarly areas of expertise—in ENTS international economic law and cyberlaw. By examining the issue DGM E from a legal perspective, I began to see that “outsourcing” was part of WL a larger phenomenon—trade in services via electronic networks. This NO K insight helped me see the crucial link that binds together both Ban- C A galore and Silicon Valley. Invited to a cyberlaw retreat on Cape Cod by Harvard University’s innovative Berkman Center for Internet and Society, I presented my initial thoughts on the subject in August 2003 in a paper then titled “NetWork.” There, Tim Wu pressed me on the implications of the General Agreement on Trade in Services for this new kind of trade. Over the past decade, I have learned much about the subject from my colleagues at various institutions. I remain indebted to Deans Kevin Johnson and Rex Perschbacher at the University of California, Davis, for remaining unfailingly supportive at every turn. I am grateful to my colleagues Afra Afsharipour, Diane Amann, Vik Amar, Mario Biagioli, Chris Elmendorf, Tom Joo, and Peter Lee for very helpful comments on drafts. I am grateful to colleagues at other institutions, including Susan Crawford, Tino Cuéllar, Mark Lemley, Adam Muchmore, and Michael Reisman. During the writing I had the privilege of being a visiting profes- sor at Chicago, Cornell, Stanford, and Yale law schools. I am also grateful to Harold Koh, then dean at Yale Law School and currently the legal adviser of the United States Department of State, who chal- lenged me to think more about “Trade 1.0” when I was discussing “Trade 2.0.” At lunch with Jack Balkin and me, Bruce Ackerman inquired whether global law was the natural outcome of the develop- ments I describe herein. Daniel Markovits and Alec Stone Sweet led xi a brilliant dissection of my argument in a workshop that I regret not recording. I am grateful to Jed Rubenfeld for an important dialogue on tensions between democracy and globalization. A C K I thank Dean Saul Levmore of the University of Chicago Law NO School for welcoming me into the fervent intellectual environment WL E of his law school for a year. In a faculty workshop at the University DGM of Chicago, Martha Nussbaum, philosopher and thinker nonpareil, ENTS urged me to make my normative vision explicit. Professor Dr. Rolf Weber of the University of Zurich offered incisive commentary when I lectured on the subject at the World Trade Institute’s annual World Trade Forum, hosted by Thomas Cottier and Mira Burri. Mira Burri and Ted Jaenger read the entire manuscript and provided superb suggestions. I thank Harvard’s Mark Wu for his thoughtful commentary in an online symposium on my paper, “Trade 2.0,” for the Yale Journal of International Law. I learned a great deal from law faculty workshops at Chicago, Connecticut, Emory, Florida State, Illinois, Oregon, Northwestern, UC Davis, UCLA, and Washington University (Saint Louis) as well as technology law and international law workshops at Stanford and Georgetown, respectively, and the Harvard-MIT-Yale Cyberscholar Workshop. Over the years, I have learned so much from my students. I acknowledge in particular students Kuang-Cheng Chen and Taejin Kim for educating me on cyberlaw in Taiwan and South Korea, respectively. Students such as Jessica Karbowski and Janice Ta of Yale Law School and Sarah Anker, Rubina Chuang, Audrey Goodwater, Angela Ho, Jordy Hur, Uyen Le, Kathryn Lee, Johann Morri, Dimple Patel, and Louis Wai of UC Davis performed invalu- able research. Librarians extraordinaire Aaron Dailey, Margaret “Peg” Durkin, Susan Llano, Elisabeth McKechnie, Erin Murphy, and Rachael Smith helped locate all manner of legal materials. xii Special thanks to Connie Chan, James Lawrence, Stratos Pahis, for excellent editing of earlier articles. Parts of this book are adapted from earlier published articles and book chapters and are used here with the permission of the publish- ENTS ers: “Trade 2.0,” Yale Journal of International Law (2009): 281–330; DGM E “Facebookistan,” North Carolina Law Review 90 (2012): 1807–44; WL “International Trade and Internet Freedom,” Proceedings of the NO K American Society of International Law Annual Meeting 102 (2009): C A 37; and “Globalization Through Digitization,” in The Impact of Globalization on the United States, ed. Beverly Crawford, vol. 2 (New York: Praeger, 2008), 73–97. At Yale University Press, Michael O’Malley, himself a noted author, championed the book. My editor Joseph Calamia carefully shepherded the book through production and provided thoughtful recommendations on the entire manuscript. I could not have asked for an editor more deeply committed to my project. Laura Jones Dooley provided a very careful copyedit. Another book from Yale University Press, Nayan Chanda’s Bound Together, helped me think about the role of individuals in globalization. In 2012, I received a Google Research Award to support related research on the Internet and free speech. My love and thanks to my children, Anoushka and Milan, for abiding a father who might go off on a hot Saturday to work on a chapter rather than taking them to the pool. My deepest debt is to Madhavi Sunder. INTRODUCTION Tracing a Silk Road Through Cyberspace The Silk Road linking the ancient world’s civilizations wound through deserts and mountain passes, traversed by caravans laden with the world’s treasures. The modern Silk Road winds its way through undersea fiber-optic cables and satellite links, ferrying elec- trons brimming with information.
Recommended publications
  • Essays on Interlocking Directorates and Speculative Dynamics
    Essays on Interlocking Directorates and Speculative Dynamics Inaugural-Dissertation zur Erlangung des akademischen Grades eines Doktors der Wirtschafts- und Sozialwissenschaften der Wirtschafts- und Sozialwissenschaftlichen Fakult¨at der Christian-Albrechts-Universit¨atzu Kiel vorgelegt von MSc Ricardo Giglio aus S~aoPaulo, Brasilien Kiel, September 2015 Gedruckt mit Genehmigung der Wirtschafts- und Sozialwissenschaftlichen Fakult¨at der Christian-Albrechts-Universit¨atzu Kiel Dekan: Professor Dr. Achim Walter Erstberichterstattender: Professor Dr. Thomas Lux Zweitberichterstattender: Professor Dr. Martin Quaas Drittberichterstattender: Professor Dr. Johannes Br¨ocker Tag der Abgabe der Arbeit: 18.03.2015 Tag der m¨undlichen Pr¨ufung:08.09.2015 \And the woman which thou sawest is that great city, which reigneth over the kings of the earth." Revelation 17:18 CHRISTIAN-ALBRECHTS-UNIVERSITAT¨ ZU KIEL Abstract Faculty of Business, Economics and Social Sciences Department of Economics Doctor of Philosophy Essays on Interlocking Directorates and Speculative Dynamics by Ricardo Giglio This thesis is composed by four chapters which can be classified in two broad topics. The first and second chapters deal with the properties of the networks created by interlock- ing directorates, while the third and fourth chapters with the so-called Efficient Market Hypothesis. Connecting these two topics is the notion of a stylized fact (also called a universal property) which is not accounted for by the currently stablished theory. The first chapter shows that the existence of a very well connected dominant community is not explained by the traditional preferential attachment models. In addition, it is also shown that the patterns of accumulation of board positions by single individuals observed in empirical data cannot be explained by a simple random binomial procedure.
    [Show full text]
  • Virtual Currencies and Terrorist Financing : Assessing the Risks And
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc.
    [Show full text]
  • Cybercrime: Internet Driven Illicit Activities and Behavior
    Land Forces Academy Review Vol. XXV, No. 4(100), 2020 CYBERCRIME: INTERNET DRIVEN ILLICIT ACTIVITIES AND BEHAVIOR Maurice DAWSON Illinois Institute of Technology, Chicago, United States of America [email protected] ABSTRACT Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further. KEYWORDS: cybercrime, human trafficking, dark web, online marketplace, cryptocurrency, disinformation 1. Introduction name a few (Deibert, 2009). Meanwhile, The Internet has allowed for many more countries have been known to use the technological advances that have brought Internet to target political dissidents such as forth positive outcomes. In retrospect, the Cuba, Ethiopia, Eritrea, Gambia, Morocco, Internet has also allowed for criminal North Korea, Russia, and more (Committee activities to flourish. And while both to Protect Journalists, 2020). Even with this positive and negative effects are expected, mentioned censorship and oversight, illicit the use of the Internet by a criminal activities remain on the rise through the organization, nation-states, terrorists, Internet. extremists, and others finds another means In recent years, police and other law to market their illegal activity. As the enforcement organizations have shut down introduction of the technological pages that advocate prostitution.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Dark and Deep Webs-Liberty Or Abuse
    International Journal of Cyber Warfare and Terrorism Volume 9 • Issue 2 • April-June 2019 Dark and Deep Webs-Liberty or Abuse Lev Topor, Bar Ilan University, Ramat Gan, Israel https://orcid.org/0000-0002-1836-5150 ABSTRACT While the Dark Web is the safest internet platform, it is also the most dangerous platform at the same time. While users can stay secure and almost totally anonymously, they can also be exploited by other users, hackers, cyber-criminals, and even foreign governments. The purpose of this article is to explore and discuss the tremendous benefits of anonymous networks while comparing them to the hazards and risks that are also found on those platforms. In order to open this dark portal and contribute to the discussion of cyber and politics, a comparative analysis of the dark and deep web to the commonly familiar surface web (World Wide Web) is made, aiming to find and describe both the advantages and disadvantages of the platforms. KeyWoRD Cyber, DarkNet, Information, New Politics, Web, World Wide Web INTRoDUCTIoN In June 2018, the United States Department of Justice uncovered its nationwide undercover operation in which it targeted dark web vendors. This operation resulted in 35 arrests and seizure of weapons, drugs, illegal erotica material and much more. In total, the U.S. Department of Justice seized more than 23.6$ Million.1 In that same year, as in past years, the largest dark web platform, TOR (The Onion Router),2 was sponsored almost exclusively by the U.S. government and other Western allies.3 Thus, an important and even philosophical question is derived from this situation- Who is responsible for the illegal goods and cyber-crimes? Was it the criminal[s] that committed them or was it the facilitator and developer, the U.S.
    [Show full text]
  • Repaving the Ancient Silk Routes
    PwC Growth Markets Centre – Realising opportunities along the Belt and Road June 2017 Repaving the ancient Silk Routes In this report 1 Foreword 2 Chapter 1: Belt and Road – A global game changer 8 Chapter 2: China’s goals for the Belt and Road 14 Chapter 3: Key sectors and economic corridors 28 Chapter 4: Opportunities for foreign companies 34 Chapter 5: Unique Belt and Road considerations 44 Chapter 6: Strategies to evaluate and select projects 56 Chapter 7: Positioning for success 66 Chapter 8: Leveraging international platforms 72 Conclusion Foreword Belt and Road – a unique trans-national opportunity Not your typical infrastructure projects Few people could have envisaged what the Belt and Road However, despite the vast range and number of B&R (B&R) entailed when President Xi of China first announced opportunities, many of these are developed in complex the concept back in 2013. However, four years later, the B&R conditions, not least because they are located in growth initiative has amassed a huge amount of economic markets where institutional voids can prove to be hard to momentum.The B&R initiative refers to the Silk Road navigate. Inconsistencies in regulatory regimes and Economic Belt and the 21st Century Maritime Silk Road underdeveloped credit markets, together with weak existing initiatives. The network connects Asia, Europe and Africa, infrastructure and a maturing talent market all combine to and passes through more than 65 countries and regions with add further complexity for companies trying to deliver and a population of about 4.4 billion and a third of the global manage these projects.
    [Show full text]
  • Anonymity Through the Silk Road
    Anonymity Through The Silk Road In the pursuit of gaining anonymity online, there is a continuous ebb and flow that involves one party attempting to gain permanent and lasting anonymity while a second party attempts to compromise that anonymity. In this paper, I will be using The Silk Road as a means to explore this notion and as a real life example of this constant back and forth of maintaining anonymity. 1. Abstract The Silk Road is an online marketplace that allows users to anonymously buy and sell just about any good, whether it be legal or illegal. Because the goal of The Silk Road is to maintain the anonymity of users, the Tor browser is what users use to connect to the website and Bitcoins are used for transactions. Both Tor and Bitcoin, while solid ways to remain anonymous, do have some flaws and vulnerabilities that can potentially remove the necessary anonymity that a user requires in order to safely use the site. 2. Silk Road Overview 2.1 What is the Silk Road? The Silk Road is an anonymous online marketplace that was created in order to allow for the online sales of all items, legal and illegal. The entire concept is fascinating because it allows for people from around the entire world to both buy and sell any and all goods to each other without ever having their identity compromised and without having to worry about any buying or selling restrictions that may be in effect due to geographical location (country, state, province, etc.). There are many factors required for anonymity on The Silk Road that must be maintained in order for anonymity to be fully encompassing and complete.
    [Show full text]
  • 'Surfing the Silk Road': a Study of Users' Experiences
    International Journal of Drug Policy 24 (2013) 524–529 Contents lists available at ScienceDirect International Journal of Drug Policy journa l homepage: www.elsevier.com/locate/drugpo Research paper ‘Surfing the Silk Road’: A study of users’ experiences a,∗ b,1 Marie Claire Van Hout , Tim Bingham a School of Health Sciences, Waterford Institute of Technology, Waterford, Ireland b Irish Needle Exchange Forum, Ireland a r a t i c l e i n f o b s t r a c t Article history: Introduction: The online drug marketplace called ‘Silk Road’ has operated anonymously on the ‘Deep Web’ Received 12 April 2013 since 2011. It is accessible through computer encrypting software (Tor) and is supported by online trans- Received in revised form 24 July 2013 actions using peer to peer anonymous and untraceable crypto-currency (Bit Coins). The study aimed to Accepted 30 August 2013 describe user motives and realities of accessing, navigating and purchasing on the ‘Silk Road’ marketplace. Methods: Systematic online observations, monitoring of discussion threads on the site during four months Keywords: of fieldwork and analysis of anonymous online interviews (n = 20) with a convenience sample of adult Silk Road ‘Silk Road’ users was conducted. Internet Results: The majority of participants were male, in professional employment or in tertiary education. Drug Displacement patterns trajectories ranged from 18 months to 25 years, with favourite drugs including MDMA, 2C-B, mephedrone, Closed drug markets nitrous oxide, ketamine, cannabis and cocaine. Few reported prior experience of online drug sourcing. Reasons for utilizing ‘Silk Road’ included curiosity, concerns for street drug quality and personal safety, variety of products, anonymous transactioning, and ease of product delivery.
    [Show full text]
  • Union Calendar No. 499
    Union Calendar No. 499 107TH CONGRESS REPORT " ! 2d Session HOUSE OF REPRESENTATIVES 107–798 REPORT ON THE ACTIVITY OF THE COMMITTEE ON FINANCIAL SERVICES FOR THE 107TH CONGRESS JANUARY 2, 2003.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. OXLEY, from the Committee on Financial Services, submitted the following REPORT Clause 1(d) of rule XI of the Rules of the House of Representa- tives requires each standing Committee, not later than January 2 of each odd-numbered year, submit to the House a report on the activities of that committee, including separate sections summa- rizing the legislative and oversight activities of that committee dur- ing that Congress. CONTENTS Page Letter of Transmittal ............................................................................................... 2 Jurisdiction ............................................................................................................... 3 Rules of the Committee ........................................................................................... 7 Membership and Organization ............................................................................... 19 Legislative and Oversight Activities ...................................................................... 27 Full Committee ..................................................................................................... 29 Subcommittee on Capital Markets, Insurance, and Government Sponsored Enterprises .......................................................................................................
    [Show full text]
  • Nimbus Times Magazine – October 2019
    CIVIL SERVICES EXAMINATION 2019 PREFACE This booklet of Current Affairs is an attempt so as to help the Civil Services Aspirants in their process of learning, understanding and analyzing each and every aspect of the current issue in the easiest possible manner. In order to make the understanding of the current affairs a long lasting affair and to help students score good marks in the examination; a balance between factual content and analytical approach has been maintained in this booklet. The booklet has been meticulously designed to suit the needs of Civil Service Aspirants appearing in IAS and State PSC examinations. In addition, it would benefit all those who are preparing for other competitive examinations or such individuals who are knowledge starving and have a passion to learn more. Owing to nature of the booklet, the Nimbus Academy Team has prepared the material with the help of the facts and the information provided by various Ministries of Govt. of India and merging those with the concepts developed by the subject matter experts. Reader’s suggestions and feedback directed towards improvements are welcome and can be e-mailed at [email protected] Nimbus Academy for IAS CIVIL SERVICES EXAMINATION 2019 Published by Nimbus Academy For IAS CHANDIGARH: SCO 72-73, 1st Floor, SEC 15-D MOBILE – 9317442200 SHIMLA: SUSHANT BHAWAN, 1st FLOOR, NEAR CO-OPERATIVE BANK, CHHOTTA SHIMLA, PIN CODE-171002. Mobile No.-86288-68800 All rights reserved, No part of this book can be reproduced in any form, by mimeograph or any other means, without permission in writing from Nimbus Academy for IAS.
    [Show full text]
  • Pdf 1 28/02/2018 18:48
    CIES 2018 SCHEDULE CONFERENCE VENUES Site maps located in back of program Hilton Reforma Mexico City Fiesta Inn Centro Histórico Museo de Arte Popular CIES 2018 ESSENTIAL INFORMATION QUESTIONS? CIES 2018 ON SOCIAL MEDIA Questions during the conference can be directed to the CIES registration desk on the 4th Floor Foyer of the Hilton Reforma, any Indiana University Conferences staf member, CIES volunteer or Program Committee member, or sent to: [email protected]. @cies_us @cies2018 @cies2018 @cies2018 KEY LOCATIONS* OFFICIAL CONFERENCE HASHTAGS Registration #CIES2018 Hilton Reforma, 4th Floor Foyer #remapping Registration Hours: Saturday, March 24: 1:30 to 7:30 PM #SurNorte Sunday, March 25: 7:30 AM to 7:00 PM #SouthNorth Monday, March 26: 7:00 AM to 7:00 PM Tuesday, March 27: 7:00 AM to 7:00 PM Wednesday, March 28: 7:00 AM to 6:00 PM Thursday, March 29: 7:00 AM to 1:00 PM EXPERIENCE MEXICO CITY Sociedad Mexicana de Educación Comparada (SOMEC) Registration (Mexican Attendees only) Hilton Reforma, 4th Floor Foyer Book Launches, Round-Tables, and Poster Exhibits Hilton Reforma, 4th Floor, Don Alberto 4 CIES Of ce of the Executive Director Grupo Destinos Travel Agency Hilton Reforma, 4th Floor Foyer Hilton Reforma, 4th Floor Foyer University of Chicago Press Hilton Reforma, 4th Floor Foyer Exhibitors Hall Hilton Reforma, 2nd Floor Foyer Exhibit Set-Up Hours: Secretaría de Turismo de la CDMX Monday, March 26: 7:00 AM to 9:30 AM Hilton Reforma, 4th Floor Foyer Exhibit Hours: Monday, March 26: 9:30 AM to 5:00 PM Tuesday, March 27: 9:30 AM to 6:30 PM Wednesday, March 28: 9:30 AM to 6:30 PM Thursday, March 29: 9:30 AM to 5:00 PM Secretaría de Cultura de la CDMX Exhibit Dismantle Hours: Hilton Reforma, 4th Floor Foyer Thursday, March 29: 5:00 to 7:00 PM HILTON SUITE LOCATIONS *For venue and meeting room maps, please see the inside back cover of the program.
    [Show full text]
  • Chairman Mary L. Schapiro Public Calendar, 2010
    Chairman Mary L. Schapiro Public Calendar 2010 Friday, January 1, 2010 SEC closed for New Year’s Day Monday, January 4, 2010 9:30 am Meeting with staff 10:30 am Meeting with staff 12:00 pm Lunch with FDIC Chairman Sheila Bair, FDIC 2:00 pm Meeting with staff 2:30 pm Meeting with Commissioner and staff 4:00 pm Meeting with staff 5:00 pm Meeting with staff Tuesday, January 5, 2010 9:30 am Meeting with staff 11:00 am Meeting with staff 1:00 pm Meeting with staff 5:00 pm Meeting with staff Wednesday, January 6, 2010 9:30 am Meeting with Commissioner and staff 12:30 pm Press interview with Marcy Gordon, Associated Press 2:30 pm Meeting with staff 3:00 pm Meeting with Commissioner and staff Thursday, January 7, 2010 9:00 am Meeting with staff 10:30 am Meeting with staff 11:00 am Meeting with staff 1:30 pm Meeting with staff 2:00 pm Closed Commission meeting Friday, January 8, 2010 10:00 am Meeting with staff 2:00 pm Meeting with Joel Seligman, President, University of Rochester Monday, January 11, 2010 9:30 am Oral argument 2:30 pm Meeting with staff 3:30 pm Meeting with staff 1 Tuesday, January 12, 2010 10:00 am Meeting with staff 2:00 pm Meeting with staff Wednesday, January 13, 2010 10:00 am Open Commission meeting 2:00 pm Meeting with Yahoo! Inc., including: Roy Bostock, Chairman, Board of Directors; Michael Callahan, General Counsel; Mindy Heppberger, Deputy General Counsel, Corporate Governance; Margaret Stewart Nagle, Director, Government Affairs 3:00 pm Stop by the Division of Enforcement’s town hall meeting 4:00 pm Meeting with staff Thursday, January 14, 2010 9:00 am Testify before the Financial Crisis Inquiry Commission on “Causes and Current State of the Financial Crisis” 1:30 pm Meeting with staff 2:00 pm Closed Commission meeting Friday, January 15, 2010 8:30 am Meeting with Inspector General 10:00 am Photo shoot with Money 11:30 am Meeting with PCAOB Acting Chairman Daniel Goelzer 1:30 pm Meeting with Commissioner 2:30 pm Meeting with Commissioner 4:00 pm Meeting with staff Monday, January 18, 2010 SEC closed for the Birthday of Martin Luther King, Jr.
    [Show full text]