SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Open Source
     Sensing:
Can we have both
privacy and safety?
    Christine Peterson
    Foresight Institute
    www.foresight.org
"The best weapon of a
dictatorship is
secrecy,
but the best weapon
of a democracy should
be the weapon of
openness."

—Niels Bohr
No Secret
Software for
Public Voting
   Data!        The E-voting mess —
                  The Open Science
                community could have
                 nipped it in the bud.
One
molecule
Nanotech can
do it now too

 the sensors
 are coming
Nanotech-
based sensors
“The detector generates a
continuous 'spectrum' of
information about any chemical
agents in its presence...”
“easily programmable”
Sewer monitoring has begun




“The test doesn’t screen people directly but
instead seeks out evidence of illicit drug
abuse in drug residues and metabolites
excreted in urine and flushed toward
municipal sewage treatment plants.”
“We found a drug molecule —
Everybody out for a breath check!”
Things worth detecting:
  weapons of mass destruction

• Explosives, chemicals, nukes — today
• Bioweapons – in early stages — nasty, but
  delicate and hard to control)
• Nanoweapons — later — like bioweapons,
  but tougher and more controllable)
Technological Advance

          Cost of WMD comes down



$



          GDP per capita goes up

             Time
Fear + poor WMD data =




 Sudan pharmaceutical plant, August 1998
Result: more surveillance
Electronic, video, biological, chemical
Being integrated into national system
Transparency vs privacy



DC doesn’t notice our debates — they just move forward
Top-down approach to
  bottom-up problem
• Centralized
• Mandatory
• Monolithic
• Limited in participation
• Secretive
• Leads toward Surveillance State
Open Science-style
    physical security
• Decentralized
• Minimal                “Track the
• Voluntary/privatized    problem,
                           not the
• Experimental            people”
• Collaborative
• Open
• Transparent
Who can figure out
whether & how to collect
    public sensing data?
• Need a community that understands the
  relationships between:
• Security
• Privacy
• Functionality
• Freedom
Graphic: Gina Miller
Open Sensing-based Security:
  What would it be like?
 • Open source style development
 • Citizen controlled
 • Privacy oriented
 • Verifiably limited
 • Detects materials of concern
 • Does not track individuals or
   nonweapons (e.g. drugs)
What might we regard
  as worth detecting?
• Real problems
• Anthrax (NYC, DC, FL 2001)
• Sarin (Tokyo, 1995)
• Ricin (London 2002, Las Vegas 2008)
• Later: syn bio accidents or abuse
Who gets the data?
• Communities negotiate
• Mutual data exchange, e.g. anthrax within 100 km
• Agreements on how to treat the data
• “Communities” size can vary from household to
  nation, depending on what is detected (e.g., TNT
  vs nukes)
Proposed law in
                                 New York City
                                that will require
                                 people to get a
                                 license before
                                  they can buy
                                    chemical,
                                  biological, or
                                   radiological
                                attack detectors



Do we not have a “freedom to sense”?
NO SECRET
SOFTWARE FOR
PUBLIC SENSING
    DATA!
                 Open Source
                   Sensing
or
the fed way        the Open Science way
Open sensing
• OpenSourceSensing.org
• Email me:
 peterson@foresight.org



           No Secret
          Software for
         Public Sensing
             Data!

Mais conteúdo relacionado

Destaque

Destaque (7)

4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
artificial eye
artificial eyeartificial eye
artificial eye
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
4g technology
4g technology4g technology
4g technology
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 

Semelhante a 2010 opensciencepeterson

Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdflibowskymcinnisell69
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic sciencePrashant Mehta
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz neweyavagal
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...TanveerRehman4
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocationsferguspitt
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA
 
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...Levi Shapiro
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Understanding personal privacy in the age of big online data
Understanding  personal privacy  in the age of big online dataUnderstanding  personal privacy  in the age of big online data
Understanding personal privacy in the age of big online dataMathieu d'Aquin
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of SurveillanceStephen Graham
 
Philosophy of Big Data: Big Data, the Individual, and Society
Philosophy of Big Data: Big Data, the Individual, and SocietyPhilosophy of Big Data: Big Data, the Individual, and Society
Philosophy of Big Data: Big Data, the Individual, and SocietyMelanie Swan
 
Presentation Chun Tim Niels Morgan Kimberley
Presentation Chun Tim Niels Morgan KimberleyPresentation Chun Tim Niels Morgan Kimberley
Presentation Chun Tim Niels Morgan Kimberleygroep2
 
Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Michael Brodie
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 

Semelhante a 2010 opensciencepeterson (20)

Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdf
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Barbara J. Evans, "Programming Our Genomes, Programming Ourselves"
Barbara J. Evans, "Programming Our Genomes, Programming Ourselves"Barbara J. Evans, "Programming Our Genomes, Programming Ourselves"
Barbara J. Evans, "Programming Our Genomes, Programming Ourselves"
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic science
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...Developing counter strategy for Information warfare in Health Sector – siftin...
Developing counter strategy for Information warfare in Health Sector – siftin...
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...
Sharon Terry, Genetic Alliance: Advancing the goals of communities to allevia...
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Understanding personal privacy in the age of big online data
Understanding  personal privacy  in the age of big online dataUnderstanding  personal privacy  in the age of big online data
Understanding personal privacy in the age of big online data
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of Surveillance
 
Philosophy of Big Data: Big Data, the Individual, and Society
Philosophy of Big Data: Big Data, the Individual, and SocietyPhilosophy of Big Data: Big Data, the Individual, and Society
Philosophy of Big Data: Big Data, the Individual, and Society
 
Presentation Chun Tim Niels Morgan Kimberley
Presentation Chun Tim Niels Morgan KimberleyPresentation Chun Tim Niels Morgan Kimberley
Presentation Chun Tim Niels Morgan Kimberley
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
 
Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14Laws and limits of data science 11 10-14
Laws and limits of data science 11 10-14
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 

Mais de Open Science Summit

David ewing duncan open science 7-30-10
David ewing duncan   open science 7-30-10David ewing duncan   open science 7-30-10
David ewing duncan open science 7-30-10Open Science Summit
 
Barry bunin open science summit at the berkeley intl house 2010
Barry bunin   open science summit at the berkeley intl house 2010Barry bunin   open science summit at the berkeley intl house 2010
Barry bunin open science summit at the berkeley intl house 2010Open Science Summit
 
Myelin repair open science summit 07.31.10 v2
Myelin repair   open science summit 07.31.10 v2Myelin repair   open science summit 07.31.10 v2
Myelin repair open science summit 07.31.10 v2Open Science Summit
 
Aiden hollis hif presentation berkeley
Aiden hollis   hif presentation berkeleyAiden hollis   hif presentation berkeley
Aiden hollis hif presentation berkeleyOpen Science Summit
 
Cordeiro education2030berkeleyopensciencesummit2010
Cordeiro education2030berkeleyopensciencesummit2010Cordeiro education2030berkeleyopensciencesummit2010
Cordeiro education2030berkeleyopensciencesummit2010Open Science Summit
 
Carol mimura open society july 31, 2010, copy
Carol mimura   open society july 31, 2010,  copyCarol mimura   open society july 31, 2010,  copy
Carol mimura open society july 31, 2010, copyOpen Science Summit
 
Keith oss 2010 - ip-based platforms
Keith   oss 2010 - ip-based platformsKeith   oss 2010 - ip-based platforms
Keith oss 2010 - ip-based platformsOpen Science Summit
 
Vitrant fund science opensciencesummit2010presentation
Vitrant fund science opensciencesummit2010presentationVitrant fund science opensciencesummit2010presentation
Vitrant fund science opensciencesummit2010presentationOpen Science Summit
 
Fbi open science summit presentation (29 july 2010)
Fbi open science summit presentation (29 july 2010)Fbi open science summit presentation (29 july 2010)
Fbi open science summit presentation (29 july 2010)Open Science Summit
 

Mais de Open Science Summit (20)

David ewing duncan open science 7-30-10
David ewing duncan   open science 7-30-10David ewing duncan   open science 7-30-10
David ewing duncan open science 7-30-10
 
Pink army july 31
Pink army july 31Pink army july 31
Pink army july 31
 
Izant openscience
Izant openscienceIzant openscience
Izant openscience
 
Barry bunin open science summit at the berkeley intl house 2010
Barry bunin   open science summit at the berkeley intl house 2010Barry bunin   open science summit at the berkeley intl house 2010
Barry bunin open science summit at the berkeley intl house 2010
 
Batten oss 727 -bw changes
Batten oss 727 -bw changesBatten oss 727 -bw changes
Batten oss 727 -bw changes
 
Myelin repair open science summit 07.31.10 v2
Myelin repair   open science summit 07.31.10 v2Myelin repair   open science summit 07.31.10 v2
Myelin repair open science summit 07.31.10 v2
 
Beth baber oen science summit
Beth baber oen science summitBeth baber oen science summit
Beth baber oen science summit
 
Aiden hollis hif presentation berkeley
Aiden hollis   hif presentation berkeleyAiden hollis   hif presentation berkeley
Aiden hollis hif presentation berkeley
 
Delinkage oss2010 jameslove_kei
Delinkage oss2010 jameslove_keiDelinkage oss2010 jameslove_kei
Delinkage oss2010 jameslove_kei
 
Cordeiro education2030berkeleyopensciencesummit2010
Cordeiro education2030berkeleyopensciencesummit2010Cordeiro education2030berkeleyopensciencesummit2010
Cordeiro education2030berkeleyopensciencesummit2010
 
Rebecca goulding alt ip
Rebecca goulding alt ipRebecca goulding alt ip
Rebecca goulding alt ip
 
Lisa green oss deck
Lisa green   oss deckLisa green   oss deck
Lisa green oss deck
 
Carol mimura open society july 31, 2010, copy
Carol mimura   open society july 31, 2010,  copyCarol mimura   open society july 31, 2010,  copy
Carol mimura open society july 31, 2010, copy
 
Keith oss 2010 - ip-based platforms
Keith   oss 2010 - ip-based platformsKeith   oss 2010 - ip-based platforms
Keith oss 2010 - ip-based platforms
 
Bennett open access_7-31-10
Bennett open access_7-31-10Bennett open access_7-31-10
Bennett open access_7-31-10
 
4 cowell oss-07302010
4 cowell oss-073020104 cowell oss-07302010
4 cowell oss-07302010
 
1 reinhoff berkeley july 2010
1 reinhoff berkeley july 20101 reinhoff berkeley july 2010
1 reinhoff berkeley july 2010
 
Vitrant fund science opensciencesummit2010presentation
Vitrant fund science opensciencesummit2010presentationVitrant fund science opensciencesummit2010presentation
Vitrant fund science opensciencesummit2010presentation
 
Oss2010 sci flies
Oss2010 sci fliesOss2010 sci flies
Oss2010 sci flies
 
Fbi open science summit presentation (29 july 2010)
Fbi open science summit presentation (29 july 2010)Fbi open science summit presentation (29 july 2010)
Fbi open science summit presentation (29 july 2010)
 

2010 opensciencepeterson

  • 1. Open Source Sensing: Can we have both privacy and safety? Christine Peterson Foresight Institute www.foresight.org
  • 2. "The best weapon of a dictatorship is secrecy, but the best weapon of a democracy should be the weapon of openness." —Niels Bohr
  • 3. No Secret Software for Public Voting Data! The E-voting mess — The Open Science community could have nipped it in the bud.
  • 4. One molecule Nanotech can do it now too the sensors are coming
  • 5. Nanotech- based sensors “The detector generates a continuous 'spectrum' of information about any chemical agents in its presence...” “easily programmable”
  • 6. Sewer monitoring has begun “The test doesn’t screen people directly but instead seeks out evidence of illicit drug abuse in drug residues and metabolites excreted in urine and flushed toward municipal sewage treatment plants.”
  • 7. “We found a drug molecule — Everybody out for a breath check!”
  • 8. Things worth detecting: weapons of mass destruction • Explosives, chemicals, nukes — today • Bioweapons – in early stages — nasty, but delicate and hard to control) • Nanoweapons — later — like bioweapons, but tougher and more controllable)
  • 9. Technological Advance Cost of WMD comes down $ GDP per capita goes up Time
  • 10. Fear + poor WMD data = Sudan pharmaceutical plant, August 1998
  • 11. Result: more surveillance Electronic, video, biological, chemical Being integrated into national system
  • 12. Transparency vs privacy DC doesn’t notice our debates — they just move forward
  • 13. Top-down approach to bottom-up problem • Centralized • Mandatory • Monolithic • Limited in participation • Secretive • Leads toward Surveillance State
  • 14. Open Science-style physical security • Decentralized • Minimal “Track the • Voluntary/privatized problem, not the • Experimental people” • Collaborative • Open • Transparent
  • 15. Who can figure out whether & how to collect public sensing data? • Need a community that understands the relationships between: • Security • Privacy • Functionality • Freedom
  • 17. Open Sensing-based Security: What would it be like? • Open source style development • Citizen controlled • Privacy oriented • Verifiably limited • Detects materials of concern • Does not track individuals or nonweapons (e.g. drugs)
  • 18. What might we regard as worth detecting? • Real problems • Anthrax (NYC, DC, FL 2001) • Sarin (Tokyo, 1995) • Ricin (London 2002, Las Vegas 2008) • Later: syn bio accidents or abuse
  • 19. Who gets the data? • Communities negotiate • Mutual data exchange, e.g. anthrax within 100 km • Agreements on how to treat the data • “Communities” size can vary from household to nation, depending on what is detected (e.g., TNT vs nukes)
  • 20. Proposed law in New York City that will require people to get a license before they can buy chemical, biological, or radiological attack detectors Do we not have a “freedom to sense”?
  • 21. NO SECRET SOFTWARE FOR PUBLIC SENSING DATA! Open Source Sensing
  • 22. or the fed way the Open Science way
  • 23. Open sensing • OpenSourceSensing.org • Email me: peterson@foresight.org No Secret Software for Public Sensing Data!