Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog PowerPoint Presentation
Download Presentation
Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog

Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog

228 Vues Download Presentation
Télécharger la présentation

Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. The Future of Our Privacy Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog jstanley@aclu.org 202-715-0818

  2. I. THE CHALLENGE TO OUR PRIVACY

  3. The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

  4. The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

  5. Change at light speed

  6. “Disruptive technologies”

  7. Smart grid

  8. DNA

  9. Video surveillance

  10. Video Surveillance: a new era

  11. Face recognition

  12. Iris recognition

  13. Behavioral analytics

  14. License plate recognition

  15. Location-tracking

  16. The ultimate in location tracking:

  17. Drones

  18. Advanced imaging technologies

  19. The Ultimate Example: Total Information Awareness

  20. NYC/Microsoft “Domain Awareness System”

  21. Meanwhile: Moore’s Law Charts: Zoomer Magazine, Computer Measurement Group

  22. The Future of Moore’s Law Intel Core i7-2600 Processor: $294.99 on Newegg

  23. The Future of Moore’s Law Today: $294.99

  24. The Future of Moore’s Law Today: $294.99 In 20 years: $0.03

  25. The Future of Moore’s Law

  26. Also following Moore’s Law 20 years: 1,000-32,000x today’s power

  27. Faster, cheaper – and smarter

  28. Hans Moravec: 2020s

  29. In whose interest?

  30. How will AI be used?

  31. Are we ready for all this?

  32. The challenge to our privacy: Technology revolution A burgeoning security establishment

  33. The Security State NSA: 30,000 employees CIA: 20,000 employees Others: many more Overall IC: at least $57 billion Oversight? Not much. FBI: 33,000

  34. Swinging the telescope inward

  35. FISA Amendments Act of 2008 • General Warrants. No specificity required. (All US-London traffic?) • Little judicial oversight. FISA court only reviews the government’s “targeting” and “minimization.” No role overseeing actual use of surveillance power. • No limits on use of data. Huge databases, stored forever, shared with anyone, re-used for any purpose. • Domestic e-mails included. Location uncertain? Go ahead! • Immunity for lawbreakers. Don’t try this at home!

  36. Cybersecurity

  37. The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

  38. Internet advertising

  39. Internet advertising

  40. Data brokers & “big data”

  41. www.aclu.org/surveillance

  42. An emerging surveillance-industrial complex • Recruiting or pressing private companies into service • Partnerships with data companies • Lobbying by companies for more surveillance

  43. Many options for accessing private data Ask for data to be shared voluntarily Simply buy information Demand it using legal powers “Bake in” surveillance Create regularized systems for standing access to records of private activities

  44. Are we ready for all this?

  45. Jurisprudence off-track Reasonable expectation” standard Third-party doctrine

  46. Arbitrary situation