1 / 58

Ch2 Privacy

Ch2 Privacy. Aspects of Privacy. Freedom from intrusion. Control of information about ones self. Freedom from surveillance. "Who's Spying on You?". Popular Mechanics (01/05) Vol. 182, No. 1, P. 56; Cooper, Simon “New technologies that enhance safety and convenience

quasim
Télécharger la présentation

Ch2 Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ch2 Privacy Miller CSC309

  2. Aspects of Privacy Freedom from intrusion. Control of information about ones self. Freedom from surveillance. Miller CSC309

  3. "Who's Spying on You?" Popular Mechanics (01/05) Vol. 182, No. 1, P. 56; Cooper, Simon “New technologies that enhance safety and convenience for users are costing them their privacy. Critics are concerned that this trend might lead to a society where people's job opportunities and other aspects of their livelihood could be determined by massive repositories of data collected by monitoring systems.” Federally mandated (GPS)-enabling cell phones “turns the phones into tracking devices”. Miller CSC309

  4. "Who's Spying on You?" Popular Mechanics (01/05) Vol. 182, No. 1, P. 56; Cooper, Simon The National Transportation Safety Board's desire to install event data recorders (EDRs) in all new vehicles has sparked fears among privacy proponents that lawyers could use EDR data as evidence in civil suits, while insurance companies could use them to justify premium hikes or cancellations. Private "data aggregators" keep files on most Americans in vast databases, and the federal government appears to be these aggregators' biggest client. Miller CSC309

  5. “Small Print” From the Prof’s user manual on his 2006 van: “Some information is stored during normal operation.” In a crash event the data recorded might include engine speed, break application, throttle position, vehicle speed, safety belt usage, airbag readiness, airbag performance, and the severity of the crash. Information concerning a crash will not be shared with others except if it is “in response to an official request of police or similar government office, required by law, or as part of GM’s defense.” Miller CSC309

  6. Radio-frequency identification An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Chipless technology now allows for tags to be printed directly on products. Wikipedia Miller CSC309

  7. Radio-frequency identification So in the brave new future you walk into Walmart (currently using RFID technology) where you are greeted by a robot that calls you by name (because it can read your ID from either your verichip or the credit cards in your wallet) and informs you that the underwear you have on needs replacing (RFID tag again) and offers directions to that section of the store. Miller CSC309

  8. Skype Established in 2003, this Luxenborg based company, provides free computer to computer “telephone service” and makes its money by charging for computer to landline or cell phone links around the world. Skype is available in 28 languages and is used in almost every country. Miller CSC309

  9. Skype Researchers have discovered a Chinese Gov. surveillance operation (estimated 30,000 employees) that is monitoring voice and text messages looking for offensive words. The Chinese servers retain personal information about the users who send such messages, and record chat conversations between local and Skype users from outside China. The system also recorded text messages and Skype caller identification. (Surveillance of Skype Messages Found in China New York Times (10/02/08) P. C1; Markoff, John) Miller CSC309

  10. Privacy Issues for Both the Private and Public Sectors What methods are used to gather data? How is the data stored? How is the data secured? How is the data validated? Who has access to the data? How is the data analyzed? How is information distributed? How is the data used? Miller CSC309

  11. Privacy Balancing Act (Alan Westin) (1) Safeguarding personal and group privacy, in order to protect individuality and freedom against unjustified intrusions by authorities. (2) Collecting relevant personal information essential for rational decision-making in social, commercial, and government life; and (3) Conducting the constitutionally limited government surveillance of people and activities necessary to protect public order and safety. Miller CSC309

  12. Privacy and the Constitution While the U.S. Constitution does not explicitly use the word "privacy," several of its provisions protect different aspects of this fundamental right. The strongest protections arise from the Fourth Amendment, which safeguards individuals in their persons, homes, papers, and effects, from unreasonable searches and seizures. Miller CSC309

  13. Privacy and the Constitution The First Amendment's freedom of expression and association clause, protects information about those with whom we associate (e.g., political groups and social organizations), and offers protections for the materials that we create, read, view, etc., in the privacy of our homes. Miller CSC309

  14. Privacy and the Constitution The Fifth Amendment's privilege against self-incrimination, protects the autonomy of our bodies, thoughts and beliefs. Miller CSC309

  15. Code of Fair Information Practices(Gov Advisory Cmt 1973) There should be no systems whose existence is secret. There should be a way for a person to find out what data about him or her are in the system and how they are used. Information obtained for one purpose should not be used for another purpose without the person's consent. Miller CSC309

  16. Code of Fair Information Practices(Gov Advisory Cmt 1973) There should be a way for a person to correct errors in his or her files. Any organization creating, maintaining, using, or distributing personal data is responsible for the reliability and security of the data. Miller CSC309

  17. Code of Fair Information Practices(Gov Advisory Cmt 1973) This set of five principles has formed the basis of privacy-related laws in the US. They have been put as part of national data protection laws in many industrial countries with the US being a major exception. They influenced the 1974 Privacy Act Miller CSC309

  18. Auto Tags In Detroit reporters were able to trace the various factions of a major crime family by recording auto license plates of autos parked around the home of a reputed mobster. Motor vehicle data sells for about $5 per name. On the web you can find folks that will look up tags for you. Miller CSC309

  19. Auto Tags According to the the US Bureau of Transit Statistics for 2006 therewere 250,851,833 registered passengervehicles in the US and over 200 million licensed drivers. There is information on where you live, what you drive, your height, weight, any physical handicaps, birth date, etc. We now have the ability (not my idea) to write an article on the ten heaviest women in the state. Miller CSC309

  20. Motor Vehicle Data It would be nice if we could say the data we give about ourselves in order to get a drivers license can be used only for making that decision but States are currently passing laws that make that impossible. Wisconsin: a drivers license can be suspended for failure to pay a fine (such as a library fine). Kentucky: A student can lose a license if he/she cuts class or fails classes. Miller CSC309

  21. Deadbeat Parents More than 300,000 parents in 42 states have lost their drivers license because of late child support payments. In Maine it can cost you a chance at a license to shoot a moose. Every state has some type of license suspension program. In at least 26 states deadbeat parents have lost professional licenses (beauticians in MS). Miller CSC309

  22. Auto Tags In Los Angeles, a man spotted an actress driving her car, hired a private investigator to look the plate number up in a data base which then gave him a home address. He then shot and killed her when she opened her front door. The death to actress Rebecca Schaeffer by a stalker led to the passage of the Driver’s Privacy Protection Act of 1994. Drivers were given the right to “Opt-out”of having their personal data sold. Miller CSC309

  23. 25 June 1999: DMV Info at Stake in Senate Legislation Miller CSC309

  24. -- 13 January 2000 Supreme Court Rules in Favor of Drivers' Data In a unanimous decision, the Supreme Court upheld the constitutionality of the 1994 Driver's Privacy Protection Act (DPPA), which restricts states from selling drivers license data without the drivers' consent. http://www.gcn.com/breaking-news/000113124350.html Miller CSC309

  25. The Rest of the Story The reason the Supreme court was reviewing the law was because South Carolina was making good money selling drivers license data and photographs without consent of the drivers and the 1999 modifications (Oct 1999) to the Driver’s Privacy Protection Act of 1994 was changing an opt-out option to one where specific permission (opt-in) had to be given before data could be sold. The Oct 1999 change had a problem in that when it eliminated the sale of information for marketing it also eliminated the sale of information to investigators for specified lawful purposes. This was corrected. Miller CSC309

  26. IRS Has scanned vehicle registrations for people who own expensive boats or cars. Examined (1993) cash transactions on two million taxpayers. Clearly has the data on everyone who has reported contributions to charitable organizations that have been alleged to support terrorism. Miller CSC309

  27. Government Files In 1982 it was estimated there were approximately 2000 federal databases containing 3.5 billion personnel files. Used to detect fraud and to recover bad debts. Serious threat to personal privacy. What about government access to bank records? Miller CSC309

  28. Data Base Privacy In the 1990’s health insurance company for Commonwealth of Massachusetts released data for research that was stripped of individual identifiers but kept date of birth, gender, and ZIP code in the records. That is enough information to uniquely identify TWO-THIRDS of the population. Greengard, “Privacy Matters” CACM, 09/08, Vol. 51, no 9, p17-18. Miller CSC309

  29. Survey Privacy USM Faculty asked to give an anonymous evaluation of the administration. For statistical studies they were asked to provide information on their gender, the college they were members of, the number of years in college teaching, and the number of years at they had worked at USM. Anonymous? How do you respond? Miller CSC309

  30. Matching/profiling Computer Matching means combining and comparing information from different databases. (Usually using SS#s to extract information on an individual from various sources.) Computer Profiling means using data in computer files to determine characteristics of people most likely to engage in certain behavior. Miller CSC309

  31. Profiling 1/28/09 In an investigative report on ABC’s Good Morning America, It was reported that at least American Express was monitoring where you shop to determine your credit limits. The argument being that people who shop at certain locations have a lower instance of staying current, so, if you do, your more of a risk. Lower limit yields higher balance/limit ratio yields higher rate. Don’t use card to pay marriage counselor. Miller CSC309

  32. Linkage Attack A linkage attack is one in which information from a database is used to compromise privacy in a different database. Miller CSC309

  33. Netflix Linkage Attack Netflix published dataset: More than 100,000,000 ratings, from 480,000 randomly- chosen anonymous customers on 18,000 movie titles. Privacy was protected by removing all personal information and by then replacing customer IDs with randomly- assigned IDs. Each movie rating contained the date of the rating and the title and year of release of the movie. Miller CSC309

  34. Netflix Linkage Attack Researchers from Univ of Texas Austin were able to identify individuals in the Netflix data base by using public reviews published in the Internet Movie Database. Eight ratings with dates provided enough information for the identifications to have 99% accuracy. Miller CSC309

  35. On being a Professional The Netflix breach of privacy was probably a surprise because it did look like they had taken reasonable precaution. The latest advance, (2006) “differential privacy” introduces random noise and assures that the database behaves the same independent of any individual or small group being either included or excluded. Miller CSC309

  36. Selective Service Bought the birthday list from a major ice cream parlor chain to find 18 year olds who had not registered. No Selective Service registration, no student aid. Miller CSC309

  37. FBI(2000) National Crime Information Center (NCIC). Criminal histories on 17 million people. 24 million records on wanted felons, missing property, etc. Can legally obtain credit reports without a court order. Database links to other databases being expanded. Miller CSC309

  38. Issues What about Fourth Amendment protection against "unreasonable search and seizure"? Requires "probable cause" for search and seizure. We can now find a suspect and look for a crime. Problem with starting with a presumption of guilt. Miller CSC309

  39. Census Bureau Mandated census every ten years. Information collected is supposed to be confidential. Marketing information collected. Information used to catch draft dodgers. Race information gathering is more complicated now because of changing attitudes and the tie to government benefits. Miller CSC309

  40. SS Numbers Extension of the Social Security Number to the status of an ID card was rejected in 1971 by the Social Security Administration task force on the SSN. 1991 report to congress "60% based on unverified information" Privacy and security experts recommend that people not give their SS# without first determining if it is legally required or that there is a valid reason for requesting it. Miller CSC309

  41. Credit Bureaus The Fair Credit Reporting Act of 1970 restricted the distribution of information to only those who needed it for legitimate business purposes. In 1993, the Federal Trade Commission ruled that the use of credit information to generate marketing lists violates law and ordered TRW (now Experian) and TransUnion to stop. Equifax the other major credit reporting firm, had stopped the practice in 1991. Miller CSC309

  42. Annualcreditreport.com In 2003 legislation was passed that required that the credit reporting agencies provide, upon request, a free credit report every twelve months to every consumer. The goal was to allow consumers a way to ensure their credit information is correct and to guard against identity theft. (Wikipedia) It also allows the consumer to see how he looks in an enquiry. Miller CSC309

  43. Annualcreditreport.com The three major credit reporting agencies, Equifax, Experian and TransUnion created a joint venture company to oversee their compliance with the legislation. This action led to annualcreditreport.com. A common strategy is to request a report every 4 months. (Good idea) Wikipedia Miller CSC309

  44. Annualcreditreport.com Annualcreditreport.com is the only federally mandated and authorized source for obtaining a free credit report. Note: You don’t find free if you make your selection of reporting agencies on first page of annualcreditreport.com Your credit score will cost you $7.95 and you will be given lots of chances to buy it. Wikipedia Miller CSC309

  45. Feds Drop Privacy Push WASHINGTON (AP) -- Federal Trade Commission chairman Timothy J. Muris is to announce Thursday that his agency will not seek stronger consumer privacy laws. His position is a reversal of Clinton-era policy that said consumer privacy laws were needed to protect personal data on the Internet. The decision carries more weight after the September 11 terrorist attacks. Since then, many companies have been sharing their consumer data with law enforcement agencies and each other in an attempt to look for suspicious coincidences. Miller CSC309

  46. National ID cards National ID cards have long been advocated as a means to enhance national security, unmask potential terrorists, and guard against illegal immigrants. Also proposed in debates on gun control, national health care, and Social Security reform. They are in use in many countries around the world including most European countries, Hong Kong, Malaysia, Singapore and Thailand. Miller CSC309

  47. History of rejection for National ID cards 1971 Social Security Administration task force. 1973 Health Education and Welfare advisory ctm. 1976 Federal advisory ctm. on False Identification. 1977 Carter Administration “no” on SSN use. 1981 Regan Administration “explicitly opposed” Clinton Administration “opposed”* 1999 Congress repeals provision of Illegal Immigration Reform and Immigrant Responsibility Act of 1996. 9/11/01+ White House “not even considering.” Miller CSC309

  48. National ID card debate after 9/11/2001 Larry Ellison, chairman and CEO of Oracle “We need a national ID card with our photograph and thumbprint digitized and imbedded in the ID card” and I’ll “provide the software for this absolutely free.” Bush Administration saying “not an option” but some members of Congress clearly tempted. Miller CSC309

  49. What’s new in National ID card proposals? Technology options are more varied and more sophisticated. In addition to the massive net- worked databases and the unbelievable computing power which is available for searching/matching we now have digital fingerprinting, handprint scans, facial recognition technologies, voice authentication devices, and retinal scans. More on chip implants later. Miller CSC309

  50. Fake ID cards Any estimate of the number of teenagers that have obtained “good enough” false ID to get by the “age” police? How difficult would it be with the support of a well financed terrorist organization or country to get a quality false ID? Does the estimated 750,000 cases of stolen identity in 2001 give some feel for how easy this might be? Miller CSC309

More Related