Ch2 Privacy - University of Southern Mississippi

Download Report

Transcript Ch2 Privacy - University of Southern Mississippi

Ch2 Privacy
8/26/01
Miller CSC309
1
Aspects of Privacy
Freedom from intrusion.
Control of information about ones self.
Freedom from surveillance.
8/26/01
Miller CSC309
2
"Who's Spying on You?"
Popular Mechanics (01/05) Vol. 182, No. 1, P. 56; Cooper, Simon
“New technologies that enhance safety and convenience
for users are costing them their privacy. Critics are
concerned that this trend might lead to a society where
people's job opportunities and other aspects of their
livelihood could be determined by massive repositories
of data collected by monitoring systems.”
Federally mandated (GPS)-enabling cell phones
“turns the phones into tracking devices”.
1/14/09
Miller CSC309
3
"Who's Spying on You?"
Popular Mechanics (01/05) Vol. 182, No. 1, P. 56; Cooper, Simon
The National Transportation Safety Board's desire to
install event data recorders (EDRs) in all new vehicles
has sparked fears among privacy proponents that
lawyers could use EDR data as evidence in civil suits,
while insurance companies could use them to justify
premium hikes or cancellations. Private "data
aggregators" keep files on most Americans in vast
databases, and the federal government appears to be
these aggregators' biggest client.
1/14/09
Miller CSC309
4
“Small Print”
From the Prof’s user manual on his 2006 van:
“Some information is stored during normal operation.”
In a crash event the data recorded might include engine
speed, break application, throttle position, vehicle
speed, safety belt usage, airbag readiness, airbag
performance, and the severity of the crash.
Information concerning a crash will not be shared with
others except if it is “in response to an official request
of police or similar government office, required by law,
or as part of GM’s defense.”
2/1/09
Miller CSC309
5
Radio-frequency identification
An RFID tag is an object that can be applied
to or incorporated into a product, animal, or
person for the purpose of identification and
tracking using radio waves. Some tags can be
read from several meters away and beyond
the line of sight of the reader.
Chipless technology now allows for tags to be
printed directly on products. Wikipedia
10/23/08
Miller CSC309
6
Radio-frequency identification
So in the brave new future you walk into
Walmart (currently using RFID technology)
where you are greeted by a robot that calls
you by name (because it can read your ID
from either your verichip or the credit cards
in your wallet) and informs you that the
underwear you have on needs replacing
(RFID tag again) and offers directions to that
section of the store.
10/23/08
Miller CSC309
7
Skype
Established in 2003, this Luxenborg based
company, provides free computer to
computer “telephone service” and makes
its money by charging for computer to
landline or cell phone links around the
world. Skype is available in 28 languages
and is used in almost every country.
10/23/08
Miller CSC309
8
Skype
Researchers have discovered a Chinese Gov.
surveillance operation (estimated 30,000
employees) that is monitoring voice and text
messages looking for offensive words. The
Chinese servers retain personal information
about the users who send such messages, and
record chat conversations between local and
Skype users from outside China. The system
also recorded text messages and Skype caller
identification. (Surveillance of Skype Messages Found in China
New York Times (10/02/08) P. C1; Markoff, John)
10/23/08
Miller CSC309
9
Privacy Issues for Both the
Private and Public Sectors
What methods are used to gather data?
How is the data stored?
How is the data secured?
How is the data validated?
Who has access to the data?
How is the data analyzed?
How is information distributed?
How is the data used?
10/1/08
Miller CSC309
10
Privacy Balancing Act (Alan Westin)
(1) Safeguarding personal and group privacy,
in order to protect individuality and freedom
against unjustified intrusions by authorities.
(2) Collecting relevant personal information
essential for rational decision-making in social,
commercial, and government life; and
(3) Conducting the constitutionally limited
government surveillance of people and activities
necessary to protect public order and safety.
8/26/01
Miller CSC309
11
Privacy and the Constitution
While the U.S. Constitution does not explicitly
use the word "privacy," several of its provisions
protect different aspects of this fundamental
right. The strongest protections arise from
the Fourth Amendment, which safeguards
individuals in their persons, homes, papers,
and effects, from unreasonable searches and
seizures.
8/26/01
Miller CSC309
12
Privacy and the Constitution
The First Amendment's freedom of expression
and association clause, protects information
about those with whom we associate (e.g.,
political groups and social organizations), and
offers protections for the materials that we
create, read, view, etc., in the privacy of our
homes.
8/26/01
Miller CSC309
13
Privacy and the Constitution
The Fifth Amendment's privilege against
self-incrimination, protects the autonomy
of our bodies, thoughts and beliefs.
8/26/01
Miller CSC309
14
Code of Fair Information Practices
(Gov Advisory Cmt 1973)
There should be no systems whose existence is
secret.
There should be a way for a person to find out
what data about him or her are in the system
and how they are used.
Information obtained for one purpose should
not be used for another purpose without the
person's consent.
8/26/01
Miller CSC309
15
Code of Fair Information Practices
(Gov Advisory Cmt 1973)
There should be a way for a person to correct
errors in his or her files.
Any organization creating, maintaining, using,
or distributing personal data is responsible for
the reliability and security of the data.
8/26/01
Miller CSC309
16
Code of Fair Information Practices
(Gov Advisory Cmt 1973)
This set of five principles has formed the basis
of privacy-related laws in the US.
They have been put as part of national data
protection laws in many industrial countries
with the US being a major exception.
They influenced the 1974 Privacy Act
1/27/03
Miller CSC309
17
Auto Tags
In Detroit reporters were able to trace the
various factions of a major crime family by
recording auto license plates of autos parked
around the home of a reputed mobster.
Motor vehicle data sells for about $5 per name.
On the web you can find folks that will look up
tags for you.
8/26/01
Miller CSC309
18
Auto Tags
According to the the US Bureau of Transit
Statistics for 2006 there were 250,851,833
registered passenger vehicles in the US and
over 200 million licensed drivers.
There is information on where you live, what
you drive, your height, weight, any physical
handicaps, birth date, etc. We now have the
ability (not my idea) to write an article on the
ten heaviest women in the state.
1/22/09
Miller CSC309
19
Motor Vehicle Data
It would be nice if we could say the data we
give about ourselves in order to get a drivers
license can be used only for making that
decision but States are currently passing
laws that make that impossible.
Wisconsin: a drivers license can be
suspended for failure to pay a fine (such as a
library fine).
Kentucky: A student can lose a license if
he/she cuts class or fails classes.
6/29/02
Miller CSC309
20
Deadbeat Parents
More than 300,000 parents in 42 states have
lost their drivers license because of late
child support payments.
In Maine it can cost you a chance at a license
to shoot a moose.
Every state has some type of license
suspension program.
In at least 26 states deadbeat parents have
lost professional licenses (beauticians in MS).
6/29/02
Miller CSC309
21
Auto Tags
In Los Angeles, a man spotted an actress driving
her car, hired a private investigator to look the
plate number up in a data base which then gave
him a home address. He then shot and killed her
when she opened her front door.
The death to actress Rebecca Schaeffer by a
stalker led to the passage of the Driver’s Privacy
Protection Act of 1994. Drivers were given the
right to “Opt-out”of having their personal data
sold.
2/13/02
Miller CSC309
22
: DMV Info at Stake in
Senate Legislation
25 June 1999
A transportation-funding bill in the Senate
contains a provision that state motor vehicle
agencies may not sell their drivers license databases. Direct marketing firms are lobbying hard
against the bill, while the ACLU and privacy
advocates are offering their support.
http://www.wired.com/news/print_version/politics/story/20435.html? wnpg=all
8/26/01
Miller CSC309
23
Supreme Court Rules in
Favor of Drivers' Data
-- 13 January 2000
In a unanimous decision, the Supreme Court
upheld the constitutionality of the 1994
Driver's Privacy Protection Act (DPPA),
which restricts states from selling drivers
license data without the drivers' consent.
http://www.gcn.com/breaking-news/000113124350.html
8/26/01
Miller CSC309
24
The Rest of the Story
The reason the Supreme court was reviewing
the law was because South Carolina was making
good money selling drivers license data and
photographs without consent of the drivers and
the 1999 modifications (Oct 1999) to the Driver’s
Privacy Protection Act of 1994 was changing an
opt-out option to one where specific permission
(opt-in) had to be given before data could be
sold. The Oct 1999 change had a problem in that
when it eliminated the sale of information for
marketing it also eliminated the sale of
information to investigators for specified lawful
purposes. This was corrected.
6/4/02
Miller CSC309
25
IRS
Has scanned vehicle registrations for people
who own expensive boats or cars.
Examined (1993) cash transactions on two
million taxpayers.
Clearly has the data on everyone who has
reported contributions to charitable
organizations that have been alleged to
support terrorism.
12/25/01
Miller CSC309
26
Government Files
In 1982 it was estimated there were
approximately 2000 federal databases
containing 3.5 billion personnel files.
Used to detect fraud and to recover bad debts.
Serious threat to personal privacy.
What about government access to bank records?
8/26/01
Miller CSC309
27
Data Base Privacy
In the 1990’s health insurance company for
Commonwealth of Massachusetts released
data for research that was stripped of individual
identifiers but kept date of birth, gender, and
ZIP code in the records.
That is enough information to uniquely identify
TWO-THIRDS of the population.
Greengard, “Privacy Matters” CACM, 09/08, Vol. 51, no 9, p17-18.
9/21/08
Miller CSC309
28
Survey Privacy USM
Faculty asked to give an anonymous evaluation
of the administration. For statistical studies
they were asked to provide information on their
gender, the college they were members of, the
number of years in college teaching, and the
number of years at they had worked at USM.
Anonymous?
How do you respond?
9/21/08
Miller CSC309
29
Matching/profiling
Computer Matching means combining and
comparing information from different
databases. (Usually using SS#s to extract
information on an individual from various
sources.)
Computer Profiling means using data in
computer files to determine characteristics
of people most likely to engage in certain
behavior.
8/26/01
Miller CSC309
30
Profiling 1/28/09
In an investigative report on ABC’s Good
Morning America, It was reported that
at least American Express was monitoring
where you shop to determine your credit
limits. The argument being that people who
shop at certain locations have a lower instance
of staying current, so, if you do, your more of
a risk. Lower limit yields higher balance/limit
ratio yields higher rate. Don’t use card to pay
marriage
counselor.
1/29/09
Miller CSC309
31
Linkage Attack
A linkage attack is one in which information
from a database is used to compromise
privacy in a different database.
8/26/01
Miller CSC309
32
Netflix Linkage Attack
Netflix published dataset: More than
100,000,000 ratings, from 480,000 randomlychosen anonymous customers on 18,000
movie titles. Privacy was protected by
removing all personal information and by
then replacing customer IDs with randomlyassigned IDs. Each movie rating contained
the date of the rating and the title and
year of release of the movie.
10/7/08
Miller CSC309
33
Netflix Linkage Attack
Researchers from Univ of Texas Austin
were able to identify individuals in the
Netflix data base by using public reviews
published in the Internet Movie Database.
Eight ratings with dates provided enough
information for the identifications to
have 99% accuracy.
10/7/08
Miller CSC309
34
On being a Professional
The Netflix breach of privacy was probably
a surprise because it did look like they had
taken reasonable precaution.
The latest advance, (2006) “differential
privacy” introduces random noise and
assures that the database behaves the same
independent of any individual or small
group being either included or excluded.
10/7/08
Miller CSC309
35
Selective Service
Bought the birthday list from a major ice
cream parlor chain to find 18 year olds who
had not registered.
No Selective Service registration, no student
aid.
12/25/01
Miller CSC309
36
FBI(2000)
National Crime Information Center (NCIC).
Criminal histories on 17 million people.
24 million records on wanted felons, missing
property, etc.
Can legally obtain credit reports without a
court order.
Database links to other databases being
expanded.
8/26/01
Miller CSC309
37
Issues
What about Fourth Amendment protection
against "unreasonable search and seizure"?
Requires "probable cause" for search and
seizure.
We can now find a suspect and look for a
crime.
Problem with starting with a presumption
of guilt.
8/26/01
Miller CSC309
38
Census Bureau
Mandated census every ten years.
Information collected is supposed to be
confidential.
Marketing information collected.
Information used to catch draft dodgers.
Race information gathering is more
complicated now because of changing attitudes
and the tie to government benefits.
12/25/01
Miller CSC309
39
SS Numbers
Extension of the Social Security Number to
the status of an ID card was rejected in 1971
by the Social Security Administration task
force on the SSN.
1991 report to congress
"60% based on unverified information"
Privacy and security experts recommend
that people not give their SS# without first
determining if it is legally required or that
there is a valid reason for requesting it.
12/24/01
Miller CSC309
40
Credit Bureaus
The Fair Credit Reporting Act of 1970 restricted
the distribution of information to only those who
needed it for legitimate business purposes.
In 1993, the Federal Trade Commission ruled that
the use of credit information to generate marketing
lists violates law and ordered TRW (now Experian)
and TransUnion to stop. Equifax the other major
credit reporting firm, had stopped the practice in
1991.
1/29/04
Miller CSC309
41
Annualcreditreport.com
In 2003 legislation was passed that required
that the credit reporting agencies provide,
upon request, a free credit report every
twelve months to every consumer. The goal
was to allow consumers a way to ensure
their credit information is correct and to
guard against identity theft. (Wikipedia)
It also allows the consumer to see how he
looks in an enquiry.
10/1/08
Miller CSC309
42
Annualcreditreport.com
The three major credit reporting agencies,
Equifax, Experian and TransUnion created
a joint venture company to oversee their
compliance with the legislation.
This action led to annualcreditreport.com.
A common strategy is to request a report
every 4 months. (Good idea)
Wikipedia
10/1/08
Miller CSC309
43
Annualcreditreport.com
Annualcreditreport.com is the only federally
mandated and authorized source for
obtaining a free credit report. Wikipedia
Note: You don’t find free if you make your
selection of reporting agencies on first
page of annualcreditreport.com
Your credit score will cost you $7.95 and
you will be given lots of chances to buy it.
10/1/08
Miller CSC309
44
Feds Drop Privacy Push
WASHINGTON (AP) -- Federal Trade Commission
chairman Timothy J. Muris is to announce Thursday
that his agency will not seek stronger consumer privacy
laws. His position is a reversal of Clinton-era policy
that said consumer privacy laws were needed to protect
personal data on the Internet.
The decision carries more weight after the September 11
terrorist attacks. Since then, many companies have been
sharing their consumer data with law enforcement
agencies and each other in an attempt to look for
suspicious coincidences.
10/15/01
Miller CSC309
45
National ID cards
National ID cards have long been advocated
as a means to enhance national security,
unmask potential terrorists, and guard
against illegal immigrants. Also proposed in
debates on gun control, national health care,
and Social Security reform. They are in use in
many countries around the world including
most European countries, Hong Kong,
Malaysia, Singapore and Thailand.
12/25/01
Miller CSC309
46
History of rejection for
National ID cards
1971 Social Security Administration task force.
1973 Health Education and Welfare advisory ctm.
1976 Federal advisory ctm. on False Identification.
1977 Carter Administration “no” on SSN use.
1981 Regan Administration “explicitly opposed”
Clinton Administration “opposed”*
1999 Congress repeals provision of Illegal
Immigration Reform and Immigrant
Responsibility Act of 1996.
9/11/01+ White House “not even considering.”
12/25/01
Miller CSC309
47
National ID card debate after
9/11/2001
Larry Ellison, chairman and CEO of Oracle
“We need a national ID card with our
photograph and thumbprint digitized and
imbedded in the ID card” and I’ll “provide
the software for this absolutely free.”
Bush Administration saying “not an option” but
some members of Congress clearly tempted.
12/25/01
Miller CSC309
48
What’s new in National ID card
proposals?
Technology options are more varied and more
sophisticated. In addition to the massive networked databases and the unbelievable
computing power which is available for
searching/matching we now have digital
fingerprinting, handprint scans, facial
recognition technologies, voice authentication
devices, and retinal scans. More on chip
implants later.
12/26/01
Miller CSC309
49
Fake ID cards
Any estimate of the number of teenagers that
have obtained “good enough” false ID to get
by the “age” police? How difficult would it be
with the support of a well financed terrorist
organization or country to get a quality false
ID? Does the estimated 750,000 cases of stolen
identity in 2001 give some feel for how easy
this might be?
12/25/01
Miller CSC309
50
The Dutch and ID cards
In 2003, all Dutch citizens with European
Union (EU) identification cards will have
unique biometric data stored in a chip. These
cards are travel documents for use within the
EU only. Passports will also get a chip, but a
date has yet to be set, Van Beers said. The
biometric information will not be centrally
stored in a database, only on the chip, he
stressed. The trials are conducted with
immigrants because they have to report to
the police regularly. http://www.epic.org/privacy/id_cards/
1/19/02
Miller CSC309
51
Could an ID card decrease
security?
It is not the card that security folks will be
relying on but on the integrity of the process
that produced the card. Cards can be forged,
or obtained improperly and any over reliance
on their validity will provide a false sense of
security that can result in major breaches
of security.
[We will make a similar argument concerning
the use of passwords and how they can provide
a false sense of security that leads to problems.]
12/26/01
Miller CSC309
52
Google (2/8/09)
An upgraded mapping system will enable people
to use mobile phones and other wireless devices
to share their location with “family and friends.”
About privacy concerns: Each user can easily
turn the tracking software on or off and can
limit access. Google promises to store only the
last position read on its computers.
2/8/09
Miller CSC309
53
Microsoft, Google, Yahoo (2/8/09)
A record is made of every search you do online
including the words and sites you search for,
and the time and date.
Records are kept:
Microsoft: 18 months
Google: 9 months
Yahoo: 3 months
2/8/09
Miller CSC309
54
America Online (AOL)
In 2006 AOL shared roughly 20 million
search records from 658,000 users on their
new AOL Research site. The data included
a number assigned to the anonymous user,
the search term, the date and time of the
search, and the website visited as a result
of the search. The data revealed possible
illegal drug use, murder, suicide, medical
information, names, addresses and social
security numbers. AOL closed the site.
2/8/09
Miller CSC309
55
The Government and Internet
Search Records
The AOL incident reported in the previous
slide occurred just months after the
government had requested requested all
the search result conducted over a one
week period from all the major search
engines including AOL, Yahoo, and
Google. Google was the only search
engine that did not give in to the request.
They took their case to court and
eventually won.
2/8/09
Miller CSC309
56
Protecting Privacy in the Future
Baker predicts the emergence of a market in
which "all kinds of companies are going to sell
us software that helps us keep control of our
data, furnish our data to those who will use it
responsibly, and keep it from those who won't.”
Numerati
10/27/08
Miller CSC309
57
History Snapshot (What does this have
to do with privacy?)
David Gelernter took a bachelor's
degree in religious studies and a
master's in Hebrew literature from
Yale. He went on to collect a PhD in
computer science from the State
University of New York at Stony Brook,
but joined Yale as faculty in 1982. He
made a name for himself by developing
a computer language named "Linda”.
2/7/09
Miller CSC309
58