SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
5/22/2018 1
Privacy Concerns: The Clash
between Technological Capabilities
and Societal Expectations
Ernst L. Leiss
Department of Computer Science
University of Houston
coscel@cs.uh.edu
Partially funded under NSF Grant #1241772
Any opinions, findings, conclusions, or recommendations expressed herein are those
of the author and do not reflect the views of the National Science Foundation
Updated 28 Feb. 2018
5/22/2018 2
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
1. Introduction: Societal Expectations
2. Statistical databases: Inference control
3. Data aggregation
4. Monitoring the location of an individual: Cell phones, tracking devices for vehicles,
devices that read license plates of vehicles and monitor their location,
face recognition software for public monitoring cameras
5. Monitoring the behavior of an individual: Cars with devices that record speed,
acceleration and deceleration, g-forces (in turns), recording websites visited
6. Monitoring communications: Cell phones vs. landlines (US), monitoring under a court
order, monitoring international communications (Echelon)
7. Smartphones
8. Encryption: Access to encrypted communication under a court order, requiring the
divulgence of keys and passwords (self-incrimination), treating encryption algorithms as
munitions (US) or restricting/forbidding its use
9. SMS, texting, etc.: For business purposes, the lack of a central storage and monitoring
unit may be undesirable
10. Repurposing data sets collected for a different purpose
11. The use of watermarking to trace digital content
12. Implanted RFIDs for people?
13. The use of an individual’s fully sequenced genome
14. Conclusion
5/22/2018 3
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
1. Introduction: Societal Expectations
Behavior: Law, ethics
For individuals, organizations, and government
Laws should reflect ethics
Technology: Unexpected and unknown capabilities
May clash with a society’s expectations and ethics
The expectation of privacy: may be contradicted by new technological capabilities
Legal landscape: US vs. EU
This talk is concerned with the tension between what we can do and what we
should do
5/22/2018 4
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
The notion of a statistical database
Access to individual entries vs. access to statistics
Confidential data, legal requirements to maintain confidentiality:
The use of statistical queries must guarantee confidentiality
In practice, extremely difficult to achieve
Extensive literature, for many approaches, restrictions, and models of
statistical databases
5/22/2018 5
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
Example
Assume ordinary SQL queries
Each query involves a set of elements
Typical: Median, average, sum
Confidential information in statistical queries is numerical
Assume query type SUM: A query defines a set of elements and returns the
sum of the confidential information associated with the elements in the set
Can do or (union of underlying set) and not (complement of set)
Restriction: A query q is legal iff h <= NU(q) <= N-h
N is the total number of elements in the database, h is an arbitrary value,
NU(q) is the number of elements in the set underlying the query q
General tracker: Any query GT s. t. 2h <= NU(GT) <= N-2h
Illegal query qbad:
x := SUM(GT) + SUM(notGT)
SUM(qbad) = SUM(qbad or GT) + SUM(qbad or not GT) – x too small
SUM(qbad) = 2x – [SUM(not qbad or GT) + SUM(not qbad or not GT)] too large
5/22/2018 6
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
Upshot
Impossible to maintain the confidentiality of the information of
individual entries
Similar results hold for virtually all type of restrictions
that are imposed on the queries
Randomizing is a possible solution, except the responses
are falsified (slightly)
5/22/2018 7
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
3. Data aggregation
Two entirely innocuous databases may be combined to
identify uniquely an individual
Example:
US: DoB; 5-digit zip code
330M; 100 000 zip codes: on average 3 300 inhabitants per zip
365 x 80 birth dates: on average 12 000 people with same DoB
Combined: DoB plus zip code identifies uniquely many, if not most
individuals: 100 000 x 365 x 80 >> 330M
5/22/2018 8
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
4. Monitoring the location of an individual
Cell phones: Store and transmit location information, service providers may
provide this information
Tracking devices for vehicles: Can be used to locate individuals, may be
attached without the owner’s knowledge
Devices that read license plates of vehicles and monitor their location
Law enforcement, traffic restrictions (Inner City), toll booths
Face recognition software for public monitoring cameras
Ownership of data collected
5/22/2018 9
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
5. Monitoring the behavior of an individual
Cars with devices that record driving behavior
speed, acceleration and deceleration, g-forces (in turns)
Recording websites visited
websites, time, duration
Point-of-Sales information
acquisition of items, matching credit card information with purchases
Ownership of data collected
5/22/2018 10
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
6. Monitoring communications
Cell phones vs. landlines (US)
“Americans’ Cellphones Targeted in Secret U.S. Spy Program”
(Nov 14, 2014, WSJ) Devices on planes mimic cellphone towers to target criminals’
phones but also gather information from thousands of other phones
Ownership of communication systems: Employers monitoring
employees’ e-mail and surfing/downloading behavior
Monitoring under a court order
Monitoring international communications (Echelon)
5/22/2018 11
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
7. Smartphones
The danger of sensors, the abuse of apps
Motion detector app: can be used to infer “keystrokes”, e. g. to guess PINs
Gyroscope, accelerometer, light sensor, magnetism measuring
magnetometer, microphone (tapping noise)
Apps may be “overloaded” – activate one function and the camera or the
microphone are also activated
5/22/2018 12
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
8. Encryption
Encryption is dual-use: Civilian and government (law-
enforcement, military)
Access to encrypted communication under a court order
Requiring the divulgence of keys and passwords (self-
incrimination)
Treating encryption algorithms as munitions (US) or
restricting/forbidding its use
5/22/2018 13
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
9. SMS, texting, etc.
Ubiquitous technology
Private use
Business use: lack of central storage and monitoring unit undesirable
Lack of control
5/22/2018 14
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
10. Repurposing Data Sets
In much scientific research, data sets are collected.
Permissions to use such data sets must often be secured.
These permissions often define specific purposes of study and analysis.
It is frequently tempting to reuse such a data set for a different study or
analysis.
Different data sets may also be combined with the same study or analysis
objective.
It is necessary to obtain permissions for the new studies or analyses?
EU’s privacy directive vs. US sectoral legislation (related to medical, financial,
or student data)
Example: Human subjects. IRBs. Medical data sets.
5/22/2018 15
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
11. Watermarking to trace digital content
Digital watermarks
Tag digital objects imperceptibly (to the human senses)
Video and audio
Can be used to identify uniquely copies of digital objects
Precedent: The Oscars
5/22/2018 16
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
12. Implanted RFIDs for people?
Exist already for pets
Easily applied to people (e. g., children)
Monitoring requires extensive infrastructure (software
dependent)
Orwellian society
5/22/2018 17
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
13. The use of an individual’s fully sequenced
genome
An individual’s fully sequenced genome costs now under
US$1000 (2014)
Drop in cost largely due to more efficient software (and
economy of scale)
Is it desirable for many people to know their full genome?
to predict disease susceptibility [Huntingdon’s – no cure!]
for genetic screening, e. g., for jobs and for insurance purposes
for fetal testing, including to determine termination of pregnancies
for genetic counseling
5/22/2018 18
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
Use of DNA in Finding the Golden State Serial Killer (Joseph DeAngelo)
2017/8
Matches with ancestors (DeAngelo’s great-great-great grand parents!)
Huntington’s chorea: England's Court of Appeal 2017: Physicians treating patients
with it have a duty to disclose this diagnosis to the patient’s children
What about genetic testing results?
Genetic snooping: Get someone’s DNA from a discarded cup or band-aid
or tissue
5/22/2018 19
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
14. Conclusion
Raised issues of clashes between technological capabilities
and ethics
Most violate our expectation of privacy, but not all (criminals
encrypting their communications)
The problem of quality of information (e. g., toll roads vs. DMV info)
The law lags seriously behind the technology
As computer scientists, we have a greater responsibility than
ordinary citizens because we help create the technology

Mais conteúdo relacionado

Mais procurados

The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...J On The Beach
 
Ethics In DW &amp; DM
Ethics In DW &amp; DMEthics In DW &amp; DM
Ethics In DW &amp; DMabethan
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsrcorrigan
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Ted Myerson
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal InformationJonathan Bacon
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 

Mais procurados (20)

The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Ethics In DW &amp; DM
Ethics In DW &amp; DMEthics In DW &amp; DM
Ethics In DW &amp; DM
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 

Semelhante a Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsMassTLC
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackersiwhhu
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES.eu
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldTed Myerson
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docxcroysierkathey
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptxjohn6938
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersTravis Greene
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 

Semelhante a Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica (20)

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
Chapter2
Chapter2Chapter2
Chapter2
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptx
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 

Mais de Facultad de Informática UCM

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?Facultad de Informática UCM
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...Facultad de Informática UCM
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersFacultad de Informática UCM
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmFacultad de Informática UCM
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingFacultad de Informática UCM
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroFacultad de Informática UCM
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...Facultad de Informática UCM
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Facultad de Informática UCM
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFacultad de Informática UCM
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoFacultad de Informática UCM
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCFacultad de Informática UCM
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Facultad de Informática UCM
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Facultad de Informática UCM
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Facultad de Informática UCM
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windFacultad de Informática UCM
 

Mais de Facultad de Informática UCM (20)

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation Computers
 
uElectronics ongoing activities at ESA
uElectronics ongoing activities at ESAuElectronics ongoing activities at ESA
uElectronics ongoing activities at ESA
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura Arm
 
Formalizing Mathematics in Lean
Formalizing Mathematics in LeanFormalizing Mathematics in Lean
Formalizing Mathematics in Lean
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented Computing
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuro
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error Correction
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intento
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPC
 
Type and proof structures for concurrency
Type and proof structures for concurrencyType and proof structures for concurrency
Type and proof structures for concurrency
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
 
Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore wind
 

Último

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfEr. Suman Jyoti
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Último (20)

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica

  • 1. 5/22/2018 1 Privacy Concerns: The Clash between Technological Capabilities and Societal Expectations Ernst L. Leiss Department of Computer Science University of Houston coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the author and do not reflect the views of the National Science Foundation Updated 28 Feb. 2018
  • 2. 5/22/2018 2 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 1. Introduction: Societal Expectations 2. Statistical databases: Inference control 3. Data aggregation 4. Monitoring the location of an individual: Cell phones, tracking devices for vehicles, devices that read license plates of vehicles and monitor their location, face recognition software for public monitoring cameras 5. Monitoring the behavior of an individual: Cars with devices that record speed, acceleration and deceleration, g-forces (in turns), recording websites visited 6. Monitoring communications: Cell phones vs. landlines (US), monitoring under a court order, monitoring international communications (Echelon) 7. Smartphones 8. Encryption: Access to encrypted communication under a court order, requiring the divulgence of keys and passwords (self-incrimination), treating encryption algorithms as munitions (US) or restricting/forbidding its use 9. SMS, texting, etc.: For business purposes, the lack of a central storage and monitoring unit may be undesirable 10. Repurposing data sets collected for a different purpose 11. The use of watermarking to trace digital content 12. Implanted RFIDs for people? 13. The use of an individual’s fully sequenced genome 14. Conclusion
  • 3. 5/22/2018 3 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 1. Introduction: Societal Expectations Behavior: Law, ethics For individuals, organizations, and government Laws should reflect ethics Technology: Unexpected and unknown capabilities May clash with a society’s expectations and ethics The expectation of privacy: may be contradicted by new technological capabilities Legal landscape: US vs. EU This talk is concerned with the tension between what we can do and what we should do
  • 4. 5/22/2018 4 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control The notion of a statistical database Access to individual entries vs. access to statistics Confidential data, legal requirements to maintain confidentiality: The use of statistical queries must guarantee confidentiality In practice, extremely difficult to achieve Extensive literature, for many approaches, restrictions, and models of statistical databases
  • 5. 5/22/2018 5 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control Example Assume ordinary SQL queries Each query involves a set of elements Typical: Median, average, sum Confidential information in statistical queries is numerical Assume query type SUM: A query defines a set of elements and returns the sum of the confidential information associated with the elements in the set Can do or (union of underlying set) and not (complement of set) Restriction: A query q is legal iff h <= NU(q) <= N-h N is the total number of elements in the database, h is an arbitrary value, NU(q) is the number of elements in the set underlying the query q General tracker: Any query GT s. t. 2h <= NU(GT) <= N-2h Illegal query qbad: x := SUM(GT) + SUM(notGT) SUM(qbad) = SUM(qbad or GT) + SUM(qbad or not GT) – x too small SUM(qbad) = 2x – [SUM(not qbad or GT) + SUM(not qbad or not GT)] too large
  • 6. 5/22/2018 6 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control Upshot Impossible to maintain the confidentiality of the information of individual entries Similar results hold for virtually all type of restrictions that are imposed on the queries Randomizing is a possible solution, except the responses are falsified (slightly)
  • 7. 5/22/2018 7 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 3. Data aggregation Two entirely innocuous databases may be combined to identify uniquely an individual Example: US: DoB; 5-digit zip code 330M; 100 000 zip codes: on average 3 300 inhabitants per zip 365 x 80 birth dates: on average 12 000 people with same DoB Combined: DoB plus zip code identifies uniquely many, if not most individuals: 100 000 x 365 x 80 >> 330M
  • 8. 5/22/2018 8 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 4. Monitoring the location of an individual Cell phones: Store and transmit location information, service providers may provide this information Tracking devices for vehicles: Can be used to locate individuals, may be attached without the owner’s knowledge Devices that read license plates of vehicles and monitor their location Law enforcement, traffic restrictions (Inner City), toll booths Face recognition software for public monitoring cameras Ownership of data collected
  • 9. 5/22/2018 9 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 5. Monitoring the behavior of an individual Cars with devices that record driving behavior speed, acceleration and deceleration, g-forces (in turns) Recording websites visited websites, time, duration Point-of-Sales information acquisition of items, matching credit card information with purchases Ownership of data collected
  • 10. 5/22/2018 10 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 6. Monitoring communications Cell phones vs. landlines (US) “Americans’ Cellphones Targeted in Secret U.S. Spy Program” (Nov 14, 2014, WSJ) Devices on planes mimic cellphone towers to target criminals’ phones but also gather information from thousands of other phones Ownership of communication systems: Employers monitoring employees’ e-mail and surfing/downloading behavior Monitoring under a court order Monitoring international communications (Echelon)
  • 11. 5/22/2018 11 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 7. Smartphones The danger of sensors, the abuse of apps Motion detector app: can be used to infer “keystrokes”, e. g. to guess PINs Gyroscope, accelerometer, light sensor, magnetism measuring magnetometer, microphone (tapping noise) Apps may be “overloaded” – activate one function and the camera or the microphone are also activated
  • 12. 5/22/2018 12 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 8. Encryption Encryption is dual-use: Civilian and government (law- enforcement, military) Access to encrypted communication under a court order Requiring the divulgence of keys and passwords (self- incrimination) Treating encryption algorithms as munitions (US) or restricting/forbidding its use
  • 13. 5/22/2018 13 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 9. SMS, texting, etc. Ubiquitous technology Private use Business use: lack of central storage and monitoring unit undesirable Lack of control
  • 14. 5/22/2018 14 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 10. Repurposing Data Sets In much scientific research, data sets are collected. Permissions to use such data sets must often be secured. These permissions often define specific purposes of study and analysis. It is frequently tempting to reuse such a data set for a different study or analysis. Different data sets may also be combined with the same study or analysis objective. It is necessary to obtain permissions for the new studies or analyses? EU’s privacy directive vs. US sectoral legislation (related to medical, financial, or student data) Example: Human subjects. IRBs. Medical data sets.
  • 15. 5/22/2018 15 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 11. Watermarking to trace digital content Digital watermarks Tag digital objects imperceptibly (to the human senses) Video and audio Can be used to identify uniquely copies of digital objects Precedent: The Oscars
  • 16. 5/22/2018 16 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 12. Implanted RFIDs for people? Exist already for pets Easily applied to people (e. g., children) Monitoring requires extensive infrastructure (software dependent) Orwellian society
  • 17. 5/22/2018 17 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 13. The use of an individual’s fully sequenced genome An individual’s fully sequenced genome costs now under US$1000 (2014) Drop in cost largely due to more efficient software (and economy of scale) Is it desirable for many people to know their full genome? to predict disease susceptibility [Huntingdon’s – no cure!] for genetic screening, e. g., for jobs and for insurance purposes for fetal testing, including to determine termination of pregnancies for genetic counseling
  • 18. 5/22/2018 18 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations Use of DNA in Finding the Golden State Serial Killer (Joseph DeAngelo) 2017/8 Matches with ancestors (DeAngelo’s great-great-great grand parents!) Huntington’s chorea: England's Court of Appeal 2017: Physicians treating patients with it have a duty to disclose this diagnosis to the patient’s children What about genetic testing results? Genetic snooping: Get someone’s DNA from a discarded cup or band-aid or tissue
  • 19. 5/22/2018 19 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 14. Conclusion Raised issues of clashes between technological capabilities and ethics Most violate our expectation of privacy, but not all (criminals encrypting their communications) The problem of quality of information (e. g., toll roads vs. DMV info) The law lags seriously behind the technology As computer scientists, we have a greater responsibility than ordinary citizens because we help create the technology