SlideShare a Scribd company logo
1 of 19
Download to read offline
5/22/2018 1
Privacy Concerns: The Clash
between Technological Capabilities
and Societal Expectations
Ernst L. Leiss
Department of Computer Science
University of Houston
coscel@cs.uh.edu
Partially funded under NSF Grant #1241772
Any opinions, findings, conclusions, or recommendations expressed herein are those
of the author and do not reflect the views of the National Science Foundation
Updated 28 Feb. 2018
5/22/2018 2
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
1. Introduction: Societal Expectations
2. Statistical databases: Inference control
3. Data aggregation
4. Monitoring the location of an individual: Cell phones, tracking devices for vehicles,
devices that read license plates of vehicles and monitor their location,
face recognition software for public monitoring cameras
5. Monitoring the behavior of an individual: Cars with devices that record speed,
acceleration and deceleration, g-forces (in turns), recording websites visited
6. Monitoring communications: Cell phones vs. landlines (US), monitoring under a court
order, monitoring international communications (Echelon)
7. Smartphones
8. Encryption: Access to encrypted communication under a court order, requiring the
divulgence of keys and passwords (self-incrimination), treating encryption algorithms as
munitions (US) or restricting/forbidding its use
9. SMS, texting, etc.: For business purposes, the lack of a central storage and monitoring
unit may be undesirable
10. Repurposing data sets collected for a different purpose
11. The use of watermarking to trace digital content
12. Implanted RFIDs for people?
13. The use of an individual’s fully sequenced genome
14. Conclusion
5/22/2018 3
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
1. Introduction: Societal Expectations
Behavior: Law, ethics
For individuals, organizations, and government
Laws should reflect ethics
Technology: Unexpected and unknown capabilities
May clash with a society’s expectations and ethics
The expectation of privacy: may be contradicted by new technological capabilities
Legal landscape: US vs. EU
This talk is concerned with the tension between what we can do and what we
should do
5/22/2018 4
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
The notion of a statistical database
Access to individual entries vs. access to statistics
Confidential data, legal requirements to maintain confidentiality:
The use of statistical queries must guarantee confidentiality
In practice, extremely difficult to achieve
Extensive literature, for many approaches, restrictions, and models of
statistical databases
5/22/2018 5
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
Example
Assume ordinary SQL queries
Each query involves a set of elements
Typical: Median, average, sum
Confidential information in statistical queries is numerical
Assume query type SUM: A query defines a set of elements and returns the
sum of the confidential information associated with the elements in the set
Can do or (union of underlying set) and not (complement of set)
Restriction: A query q is legal iff h <= NU(q) <= N-h
N is the total number of elements in the database, h is an arbitrary value,
NU(q) is the number of elements in the set underlying the query q
General tracker: Any query GT s. t. 2h <= NU(GT) <= N-2h
Illegal query qbad:
x := SUM(GT) + SUM(notGT)
SUM(qbad) = SUM(qbad or GT) + SUM(qbad or not GT) – x too small
SUM(qbad) = 2x – [SUM(not qbad or GT) + SUM(not qbad or not GT)] too large
5/22/2018 6
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
2. Statistical databases: Inference control
Upshot
Impossible to maintain the confidentiality of the information of
individual entries
Similar results hold for virtually all type of restrictions
that are imposed on the queries
Randomizing is a possible solution, except the responses
are falsified (slightly)
5/22/2018 7
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
3. Data aggregation
Two entirely innocuous databases may be combined to
identify uniquely an individual
Example:
US: DoB; 5-digit zip code
330M; 100 000 zip codes: on average 3 300 inhabitants per zip
365 x 80 birth dates: on average 12 000 people with same DoB
Combined: DoB plus zip code identifies uniquely many, if not most
individuals: 100 000 x 365 x 80 >> 330M
5/22/2018 8
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
4. Monitoring the location of an individual
Cell phones: Store and transmit location information, service providers may
provide this information
Tracking devices for vehicles: Can be used to locate individuals, may be
attached without the owner’s knowledge
Devices that read license plates of vehicles and monitor their location
Law enforcement, traffic restrictions (Inner City), toll booths
Face recognition software for public monitoring cameras
Ownership of data collected
5/22/2018 9
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
5. Monitoring the behavior of an individual
Cars with devices that record driving behavior
speed, acceleration and deceleration, g-forces (in turns)
Recording websites visited
websites, time, duration
Point-of-Sales information
acquisition of items, matching credit card information with purchases
Ownership of data collected
5/22/2018 10
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
6. Monitoring communications
Cell phones vs. landlines (US)
“Americans’ Cellphones Targeted in Secret U.S. Spy Program”
(Nov 14, 2014, WSJ) Devices on planes mimic cellphone towers to target criminals’
phones but also gather information from thousands of other phones
Ownership of communication systems: Employers monitoring
employees’ e-mail and surfing/downloading behavior
Monitoring under a court order
Monitoring international communications (Echelon)
5/22/2018 11
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
7. Smartphones
The danger of sensors, the abuse of apps
Motion detector app: can be used to infer “keystrokes”, e. g. to guess PINs
Gyroscope, accelerometer, light sensor, magnetism measuring
magnetometer, microphone (tapping noise)
Apps may be “overloaded” – activate one function and the camera or the
microphone are also activated
5/22/2018 12
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
8. Encryption
Encryption is dual-use: Civilian and government (law-
enforcement, military)
Access to encrypted communication under a court order
Requiring the divulgence of keys and passwords (self-
incrimination)
Treating encryption algorithms as munitions (US) or
restricting/forbidding its use
5/22/2018 13
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
9. SMS, texting, etc.
Ubiquitous technology
Private use
Business use: lack of central storage and monitoring unit undesirable
Lack of control
5/22/2018 14
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
10. Repurposing Data Sets
In much scientific research, data sets are collected.
Permissions to use such data sets must often be secured.
These permissions often define specific purposes of study and analysis.
It is frequently tempting to reuse such a data set for a different study or
analysis.
Different data sets may also be combined with the same study or analysis
objective.
It is necessary to obtain permissions for the new studies or analyses?
EU’s privacy directive vs. US sectoral legislation (related to medical, financial,
or student data)
Example: Human subjects. IRBs. Medical data sets.
5/22/2018 15
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
11. Watermarking to trace digital content
Digital watermarks
Tag digital objects imperceptibly (to the human senses)
Video and audio
Can be used to identify uniquely copies of digital objects
Precedent: The Oscars
5/22/2018 16
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
12. Implanted RFIDs for people?
Exist already for pets
Easily applied to people (e. g., children)
Monitoring requires extensive infrastructure (software
dependent)
Orwellian society
5/22/2018 17
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
13. The use of an individual’s fully sequenced
genome
An individual’s fully sequenced genome costs now under
US$1000 (2014)
Drop in cost largely due to more efficient software (and
economy of scale)
Is it desirable for many people to know their full genome?
to predict disease susceptibility [Huntingdon’s – no cure!]
for genetic screening, e. g., for jobs and for insurance purposes
for fetal testing, including to determine termination of pregnancies
for genetic counseling
5/22/2018 18
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
Use of DNA in Finding the Golden State Serial Killer (Joseph DeAngelo)
2017/8
Matches with ancestors (DeAngelo’s great-great-great grand parents!)
Huntington’s chorea: England's Court of Appeal 2017: Physicians treating patients
with it have a duty to disclose this diagnosis to the patient’s children
What about genetic testing results?
Genetic snooping: Get someone’s DNA from a discarded cup or band-aid
or tissue
5/22/2018 19
Leiss Privacy Concerns: Technological Capabilities and Societal Expectations
14. Conclusion
Raised issues of clashes between technological capabilities
and ethics
Most violate our expectation of privacy, but not all (criminals
encrypting their communications)
The problem of quality of information (e. g., toll roads vs. DMV info)
The law lags seriously behind the technology
As computer scientists, we have a greater responsibility than
ordinary citizens because we help create the technology

More Related Content

What's hot

Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
Soumen Debgupta
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
AltheimPrivacy
 

What's hot (20)

The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Ethics In DW &amp; DM
Ethics In DW &amp; DMEthics In DW &amp; DM
Ethics In DW &amp; DM
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Investigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRsInvestigatory Powers Bill & ICRs
Investigatory Powers Bill & ICRs
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 

Similar to Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
croysierkathey
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 

Similar to Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica (20)

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
Chapter2
Chapter2Chapter2
Chapter2
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptx
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 

More from Facultad de Informática UCM

More from Facultad de Informática UCM (20)

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation Computers
 
uElectronics ongoing activities at ESA
uElectronics ongoing activities at ESAuElectronics ongoing activities at ESA
uElectronics ongoing activities at ESA
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura Arm
 
Formalizing Mathematics in Lean
Formalizing Mathematics in LeanFormalizing Mathematics in Lean
Formalizing Mathematics in Lean
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented Computing
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuro
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error Correction
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intento
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPC
 
Type and proof structures for concurrency
Type and proof structures for concurrencyType and proof structures for concurrency
Type and proof structures for concurrency
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
 
Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore wind
 

Recently uploaded

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas de la Sociedad Cívica

  • 1. 5/22/2018 1 Privacy Concerns: The Clash between Technological Capabilities and Societal Expectations Ernst L. Leiss Department of Computer Science University of Houston coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the author and do not reflect the views of the National Science Foundation Updated 28 Feb. 2018
  • 2. 5/22/2018 2 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 1. Introduction: Societal Expectations 2. Statistical databases: Inference control 3. Data aggregation 4. Monitoring the location of an individual: Cell phones, tracking devices for vehicles, devices that read license plates of vehicles and monitor their location, face recognition software for public monitoring cameras 5. Monitoring the behavior of an individual: Cars with devices that record speed, acceleration and deceleration, g-forces (in turns), recording websites visited 6. Monitoring communications: Cell phones vs. landlines (US), monitoring under a court order, monitoring international communications (Echelon) 7. Smartphones 8. Encryption: Access to encrypted communication under a court order, requiring the divulgence of keys and passwords (self-incrimination), treating encryption algorithms as munitions (US) or restricting/forbidding its use 9. SMS, texting, etc.: For business purposes, the lack of a central storage and monitoring unit may be undesirable 10. Repurposing data sets collected for a different purpose 11. The use of watermarking to trace digital content 12. Implanted RFIDs for people? 13. The use of an individual’s fully sequenced genome 14. Conclusion
  • 3. 5/22/2018 3 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 1. Introduction: Societal Expectations Behavior: Law, ethics For individuals, organizations, and government Laws should reflect ethics Technology: Unexpected and unknown capabilities May clash with a society’s expectations and ethics The expectation of privacy: may be contradicted by new technological capabilities Legal landscape: US vs. EU This talk is concerned with the tension between what we can do and what we should do
  • 4. 5/22/2018 4 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control The notion of a statistical database Access to individual entries vs. access to statistics Confidential data, legal requirements to maintain confidentiality: The use of statistical queries must guarantee confidentiality In practice, extremely difficult to achieve Extensive literature, for many approaches, restrictions, and models of statistical databases
  • 5. 5/22/2018 5 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control Example Assume ordinary SQL queries Each query involves a set of elements Typical: Median, average, sum Confidential information in statistical queries is numerical Assume query type SUM: A query defines a set of elements and returns the sum of the confidential information associated with the elements in the set Can do or (union of underlying set) and not (complement of set) Restriction: A query q is legal iff h <= NU(q) <= N-h N is the total number of elements in the database, h is an arbitrary value, NU(q) is the number of elements in the set underlying the query q General tracker: Any query GT s. t. 2h <= NU(GT) <= N-2h Illegal query qbad: x := SUM(GT) + SUM(notGT) SUM(qbad) = SUM(qbad or GT) + SUM(qbad or not GT) – x too small SUM(qbad) = 2x – [SUM(not qbad or GT) + SUM(not qbad or not GT)] too large
  • 6. 5/22/2018 6 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 2. Statistical databases: Inference control Upshot Impossible to maintain the confidentiality of the information of individual entries Similar results hold for virtually all type of restrictions that are imposed on the queries Randomizing is a possible solution, except the responses are falsified (slightly)
  • 7. 5/22/2018 7 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 3. Data aggregation Two entirely innocuous databases may be combined to identify uniquely an individual Example: US: DoB; 5-digit zip code 330M; 100 000 zip codes: on average 3 300 inhabitants per zip 365 x 80 birth dates: on average 12 000 people with same DoB Combined: DoB plus zip code identifies uniquely many, if not most individuals: 100 000 x 365 x 80 >> 330M
  • 8. 5/22/2018 8 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 4. Monitoring the location of an individual Cell phones: Store and transmit location information, service providers may provide this information Tracking devices for vehicles: Can be used to locate individuals, may be attached without the owner’s knowledge Devices that read license plates of vehicles and monitor their location Law enforcement, traffic restrictions (Inner City), toll booths Face recognition software for public monitoring cameras Ownership of data collected
  • 9. 5/22/2018 9 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 5. Monitoring the behavior of an individual Cars with devices that record driving behavior speed, acceleration and deceleration, g-forces (in turns) Recording websites visited websites, time, duration Point-of-Sales information acquisition of items, matching credit card information with purchases Ownership of data collected
  • 10. 5/22/2018 10 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 6. Monitoring communications Cell phones vs. landlines (US) “Americans’ Cellphones Targeted in Secret U.S. Spy Program” (Nov 14, 2014, WSJ) Devices on planes mimic cellphone towers to target criminals’ phones but also gather information from thousands of other phones Ownership of communication systems: Employers monitoring employees’ e-mail and surfing/downloading behavior Monitoring under a court order Monitoring international communications (Echelon)
  • 11. 5/22/2018 11 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 7. Smartphones The danger of sensors, the abuse of apps Motion detector app: can be used to infer “keystrokes”, e. g. to guess PINs Gyroscope, accelerometer, light sensor, magnetism measuring magnetometer, microphone (tapping noise) Apps may be “overloaded” – activate one function and the camera or the microphone are also activated
  • 12. 5/22/2018 12 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 8. Encryption Encryption is dual-use: Civilian and government (law- enforcement, military) Access to encrypted communication under a court order Requiring the divulgence of keys and passwords (self- incrimination) Treating encryption algorithms as munitions (US) or restricting/forbidding its use
  • 13. 5/22/2018 13 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 9. SMS, texting, etc. Ubiquitous technology Private use Business use: lack of central storage and monitoring unit undesirable Lack of control
  • 14. 5/22/2018 14 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 10. Repurposing Data Sets In much scientific research, data sets are collected. Permissions to use such data sets must often be secured. These permissions often define specific purposes of study and analysis. It is frequently tempting to reuse such a data set for a different study or analysis. Different data sets may also be combined with the same study or analysis objective. It is necessary to obtain permissions for the new studies or analyses? EU’s privacy directive vs. US sectoral legislation (related to medical, financial, or student data) Example: Human subjects. IRBs. Medical data sets.
  • 15. 5/22/2018 15 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 11. Watermarking to trace digital content Digital watermarks Tag digital objects imperceptibly (to the human senses) Video and audio Can be used to identify uniquely copies of digital objects Precedent: The Oscars
  • 16. 5/22/2018 16 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 12. Implanted RFIDs for people? Exist already for pets Easily applied to people (e. g., children) Monitoring requires extensive infrastructure (software dependent) Orwellian society
  • 17. 5/22/2018 17 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 13. The use of an individual’s fully sequenced genome An individual’s fully sequenced genome costs now under US$1000 (2014) Drop in cost largely due to more efficient software (and economy of scale) Is it desirable for many people to know their full genome? to predict disease susceptibility [Huntingdon’s – no cure!] for genetic screening, e. g., for jobs and for insurance purposes for fetal testing, including to determine termination of pregnancies for genetic counseling
  • 18. 5/22/2018 18 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations Use of DNA in Finding the Golden State Serial Killer (Joseph DeAngelo) 2017/8 Matches with ancestors (DeAngelo’s great-great-great grand parents!) Huntington’s chorea: England's Court of Appeal 2017: Physicians treating patients with it have a duty to disclose this diagnosis to the patient’s children What about genetic testing results? Genetic snooping: Get someone’s DNA from a discarded cup or band-aid or tissue
  • 19. 5/22/2018 19 Leiss Privacy Concerns: Technological Capabilities and Societal Expectations 14. Conclusion Raised issues of clashes between technological capabilities and ethics Most violate our expectation of privacy, but not all (criminals encrypting their communications) The problem of quality of information (e. g., toll roads vs. DMV info) The law lags seriously behind the technology As computer scientists, we have a greater responsibility than ordinary citizens because we help create the technology