Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
The Sunset of the Patriot Act Professor Peter P. Swire Moritz College of Law Ohio State University Winter College February 19, 2005.
Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Chapter 14.1 Protecting Individual Rights
Facial Recognition by the Government: Privacy and Civil Liberties Issues Professor Peter Swire Ohio State University & Future of Privacy Forum FBI Biometric.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Technology for Computer Forensics by Alicia Castro.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Class 11 Internet Privacy Law Government Surveillance.
Social Media Operating in the Digital Age March 5, 2010 Chapel Hill, NC Terry Bledsoe, Chief Information Officer Catawba County, NC Matures.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Internet regulation National limits of Internet Content.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
Virtual Searches Christopher Slobogin Stephen C. O’Connell Professor of Law University of Florida Fredric G. Levin College of Law.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Legal Aspects of Electronic Privacy CSCI 327. Why should I even care about Privacy? Why I should not care about privacy:  I am not doing anything wrong.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What does it all mean?! The 4th Amendment to the U.S. Constitution guarantees freedom from unreasonable search and seizure. This means that law enforcement.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.
Bill of Rights Video eo.php?video_id=45924.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Sarah Manuel Final Presentation MCO435-Social Media.
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Courts System Search Warrants.
4th and 5th Amendment issues in sport and physical activity
How Does Electronic Surveillance Work Legally?
Public Recording of Police
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
My Digital Footprint BY:CHRISTINA SATO.
Forensics Week 7.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
4th Amendment According to the Fourth Amendment, the people have a right “to be secure in their persons, houses, papers and effects, against unreasonable.
Laws Governing Police Surveillance
A Gift of Fire Third edition Sara Baase
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Right to Privacy vs. National Security
Created by Lorena Espinoza U.S History
Presentation transcript:

Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public Response to Alerts & Warnings Using Social Media February 24, 2012

Two Perspectives on Government Watching Social Media It’s Public. – People have posted on FB, Twitter, blogs, etc. – Of course the government should be situationally aware – It’s good to use modern information tools to learn and respond to crises

Second Perspective It’s creepy. Ich. – The government reading/scanning/analyzing all of that stuff on social media? – Part of my permanent record? – Creating a “Terrorist Risk Score” or “Political Opponent Risk Score”? – 1972 Democratic Convention Levi Guidelines, Privacy Act, FISA

Overview Constitution: 4 th Amendment – Public – Consent Statutes – Privacy Act, Wiretaps and Stored Records Subset of legal actions – What is good to do

My Background Moritz College of Law, Ohio State Future of Privacy Forum project now on government access to personal information , National Economic Council , Chief Counselor for Privacy, OMB

4 th Amendment Warrant, with probable cause – No unreasonable searches or seizures – Clear limits on entering an individual’s house, car, etc. – Social media, though, don’t require a search warrant to see

“In Public” Major reason that is OK for government to look at social media – Can read newspapers – Can follow an individual down the street – Not a “search” or “seizure” – A foundation of DOJ/DHS actions for years

Jones GPS Case & “In Public” Supreme Court, 9-0, said warrant needed to put a GPS tracker on a car – Car “in public” – Majority emphasized physical attachment – Four or five justices questioned whether “in public” is enough to make surveillance OK – “Mosaic” theory and what are the limits on government surveillance

“Consent” Exception to 4 th Am. Another foundation of 4 th Am: individual can consent to a search or seizure – You can agree to have the cop enter your house Social media and individuals have consented – “User generated content” posted by users! – Users have “opted in” to posting blog, Twitter, many posts on Facebook So, consent has been given!?

Was It Really Consent? Bellovin study – Vast majority of FB users did not have their settings the way they thought they were – Widespread misunderstandings More generally – Fraction of people who think posts on FB are going to the government? – Has there really been consent to that?

Statutes: The Privacy Act Privacy Act of 1974 – Agency, such as DHS, issues a System of Records Notice – DHS has done so for situational awareness – Law does place limit on sharing with other agencies – If procedures are followed, not strict constraint on data collection and use

Statutes: Wiretaps Strict limits on government interception of phone calls – Extra-strict search warrant – Content of private communications very sensitive Doesn’t literally apply to reading public posts, but shows sensitivity of reading content

Statutes: Stored Communications Stored Communications Act applies to records held by a third party – Would apply if you subpoena FB, Twitter for records Medium level of strictness to get data Shows medium level of sensitivity for content of stored records

Statutes: Pen Registers This is the to/from information – Who you called, texted, ed Pen register – the ones you sent to Trap and trace – the ones who sent to you Needs judicial order, but easy standard to get This routing information not as sensitive – But, very useful to law enforcement – Friends list on FB

Current Mystery: Location Information Split in lower courts now whether need a warrant to get a person’s cell phone location information Big battle brewing Sensitivity of location – Cell phone and track a person in unprecedented ways – Pictures posted to Net often have time/date/place

Subset of What is Legal Not everything legal is good to do – You know this – you teach it to your kids Current DHS self-restraint – Basically, monitor public officials and traditional media types on social media – Careful not to track individuals – FBI tracking words (bomb) but not people That didn’t prevent painful hearing last month

Tests for What is Good to Do Friends and family test New York Times test

Conclusion Achieve these goals – Follow the constitution and the law – Do what is good to do – Be alert to the risk of undermining a good program by creeping people out And – Use new tech effectively