Karen Sollins Principal Scientist, MIT CSAIL October 2, 2014 The New Normal in Privacy: discussion of a dilemma 10/2/14Karen Sollins: Privacy1.

Slides:



Advertisements
Similar presentations
The New Economy – An Engineers Perspective Sir David Brown Chairman, Motorola Ltd.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
3.04 Understand the use of direct marketing to attract attention and to build a brand.
CHAPTER 4 E-ENVIRONMENT
What is a Firewall Anyway?
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Privacy Chris Kelly iLaw July 5, 2002.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
What you talk 'in bout?. Net Neutrality prevents Internet providers from blocking, speeding up or slowing down Web content based on its source, ownership.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
WELCOME! LIDA 2001 LIBRARIES IN THE DIGITAL AGE Dubrovnik, Croatia May 2001.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
What you talk 'in bout?. For instance, AT&T decided to get into the Radio business in They used the station WEAF and its affiliates as an experimental.
Customer Service In the Social Media Age. What is This Presentation About? The impacts of social media and internet review sites on business today The.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Chapter 7 – Offer and Acceptance
Chapter 5 E-environment
Natural Rights Philosophy
AEW studios Who We Are We run a small IT-based business. We've been in business for 3½ years. Essentially the business is husband/wife.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
INDECISIVENESS By:. What to do? September 23, 2009Marsh 2  When given a problem to fix, many students are left to figure out what they want to do  People.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Security and Privacy Concerns Izzat Alsmadi, Assistant Research Professor, BSU.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
COMP1321 Networks in Organisations Richard Henson March 2014.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
State and Local Government FEDERALISM. Public Policy If people do not agree on the solution to a public problem, issues arise. An issue is a point of.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Should employers have access to your social feeds?
Why You Should All Become Computer Engineers ECE 200 (Fall 2015) Saurabh Bagchi School of Electrical and Computer Engineering Purdue University.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Disruptive Technology and its Implications for University Information Services David Harrison, Cardiff University “Exploiting the Potential of Blogs &
Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Tonyfish www linkedin skype twitter facebook CEO and Founder
The Future of Whole Human Genome Data Management and Analysis, Available on the Microsoft Azure Platform Today MICROSOFT AZURE APP BUILDER PROFILE: SPIRAL.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Internet of Things – Getting Started
Surveillance around the world
The Cost of Free Lesson 4-4.
Hot Topics:Mobility in the Cloud
UNIT 4 – THE COST OF FREE LESSON 4.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
How to Grow and Enhance Your Business by Means of Digital Marketing Exltech,Pune.
UNIT 4 – THE COST OF FREE LESSON 6.
Smart Home Technologies
Ad Hoc Phase Structured Phase Enterprise Phase
Welcome to the E Safety Workshop
How does the deep web work?
Presentation transcript:

Karen Sollins Principal Scientist, MIT CSAIL October 2, 2014 The New Normal in Privacy: discussion of a dilemma 10/2/14Karen Sollins: Privacy1

► Technical issues ► NSA collecting information and analytics ► Non-governmental organizations collecting information and providing it to the government (sometimes under duress) ► Security is imperfect ► Legal issues ► Fourth amendment in US ► Treaties and other geopolitical legal bindings (or not) ► Social issues: What I found at the most recent IETF ► “Snowdon” and “NSA” were all the buzz ► Sense of always looking over one’s shoulder Consider recent examples: the Snowden case 10/2/14Karen Sollins: Privacy2

► Technical ► Analytics? Collecting for future analytical tools? ► Scalability? ► Legal ► What are the social norms for privacy? ► What are the social norms for responsibility for security/privacy? ► Each international governmental organization makes unilateral decisions. Does this scale (in Andy’s terms, not just growth)? ► Where are the stable points (in Dave’s terms) in the legal/regulatory context? ► Social: Is the new normal, watching over our shoulders? 10/2/14Karen Sollins: Privacy3 “Snowdon”: questions/issues

► Technical issue: increasing use of HTTPS ► Last spring: gmail ► August, 2014: positive ranking in search engines for encrypted websites. ► Currently, lightweight ► Will increase the weighting ► Business issues: ► Placement in search results ► Pressure to encrypt using HTTPS (SSL/TLS) ► Improve Google’s image ► Perhaps reduce Google’s risks ► Social issues: ► Appearance that Google has the user’s interest at heart Consider recent examples: Google, what they’re doing 10/2/14Karen Sollins: Privacy4

► Technical issues: ► HTTPS is about authenticated and encrypted communication ► Says nothing about content itself being encrypted at Google ► “known” to Google ► Copies of pages “known” to Google ► “Traditional” Google functions uninterruped ► Business issues ► Does this change Google’s business model? ► No: continued analysis, continued advertising and bit data functions ► Yes: Google can trust authentication and integrity. Individuals can trust threats from cleartext, unauthenticated mail sources. ► Social issue: where is the increased privacy and where not? How to value the effects of “Big Data”? (Unchanged here.) 10/2/14Karen Sollins: Privacy5 Google: questions/issues

► Technical issue: ► Apple will no longer be able to “open” an iPhone. ► Anything protected by the passcode on an iPhone will be inaccessible to Apple ► Everything in the iCloud, as well as all tracking, monitoring, meta-data collected by Apple will not be protected. ► Legal issues: ► Even with legal warrants, Apple “cannot” obtain information ► Social Issues: ► Should we be redefining what is considered “in plain view” in light of smart phone technology and use? ► If the user has protected his or her iPhone with a passcode, what responsibility does Apple have for privacy of information in their services ? Consider recent examples: Apple and iOS8 10/2/14Karen Sollins: Privacy6

► Legal issues ► If passcode locks a phone, and the police stop someone with an iPhone in use, can they look at the phone before it locks itself, and how does that interact with the requirement for a warrant? ► What is “legal search and seizure” under Fourth Amendment? ► [Orin Kerr, Volokh Conspiracy Blog/Julian Sanchez, Cato Institute] ► Is it necessary (from Fourth Amendment perspective) to support the government in what it has become accustomed to? ► Where is the boundary between privacy and public/government need for search and seizure? Is there ever too much crypto? ► Courts have balanced privacy and government (social norm) requirements repeatedly as technology has evolved. How might we rebalance now in light of smart phones? ► Social issues ► Trying to change the user’s “trust” model, but how much is this actually true? 10/2/14Karen Sollins: Privacy7 Apple: questions/issues

► Google and Apple are making business decisions about the appearance of privacy. ► In your organization, are you also finding business tradeoffs with respect to privacy? ► Which kinds of information should remain in control of customers and which in control of the service provider (whether TV/Entertainment, user service provider, communications service provider or many others)? ► How does one handle the customer perception (in contrast with the reality of what information is collected about the user and used in provision of service and business opportunities)? ► How is this changing with advances in technology? Social norms? ► How do you do the cost-benefit analysis? Some questions: business issues 10/2/14Karen Sollins: Privacy8

► The US Fourth Amendment is very US centric. ► In places where personal information is considered inalienably accrued to the subject of the information, what is the balance between that and ► The need by government to enforce laws and regulations? ► The need of companies to collect information in the operation of their businesses (consider the need for network provisioning and management, the need to determine economic interest in entertainment products, etc)? ► In other parts of the world, personal information is considered under the ownership of the government. ► How does this affect business models? Some questions: privacy and governance 10/2/14Karen Sollins: Privacy9

► If the new normal is different in different social and legal regimes, how do we reconcile these differences across those social and geopolitical boundaries? Are there business models for privacy that might transcend those boundaries? ► Are there technologies needed (or existing), that will help us to support heterogeneity in the face of the need for a global Internet, technically, socially, and legally? Questions: The Internet is global 10/2/14Karen Sollins: Privacy10

Karen Sollins /2/14Karen Sollins: Privacy11 Your questions and answers