SlideShare a Scribd company logo
1 of 18
Download to read offline
Digital Surveillance for COVID-19 and its
Implications for Security and Privacy
Rohini Lakshané
12 August 2020
United Nations DPPA-DPO
(un)data Seminar Series on Outrageous Questions
CC-BY
(https://about.me/rohini)
Overview of Covid-19 tech responses
A. Apps
i. Contact-tracing
ii. Quarantine Management/ geofencing
iii. Information, updates about the pandemic and govt services,
medical advisories, etc.
iv. Services required/ provided during lockdown and quarantine
(curfew passes, mental health counselling, delivery of groceries,
etc.)
B. Electronic-tagging devices such as ankle bracelets for quarantine
management/ geofencing
Overview of Covid-19 tech responses (contd.)
C. Tracking mobile phones using BTS (that is, mobile towers) in two ways:
1. Aggregated data:
https://www.reuters.com/article/us-health-coronavirus-europe-telecoms/euro
pean-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2,
2. Tracking individual phones:
https://www.thehindu.com/news/national/coronavirus-geo-fencing-app-will-be
-used-to-locate-quarantine-violators/article31241055.ece
3. Combination of C1 and C2
D. Combination of A and B or A and C
Overview of Covid-19 tech responses (contd.)
E. Drones (spraying disinfectant, aerial video surveillance, making
announcements, contactless measurement of body temperature) - Not covered in
the seminar
F. Video surveillance, face recognition, machine learning (thermal imaging of
persons in public places for the purpose of fever detection; detecting whether or
not people are wearing masks; machine learning to find correlations and
patterns in their whereabouts, movements etc; mapping of Covid19 hotspots)
Overview of Covid-19 tech responses (contd.)
These interventions are inherently privacy-invading:
● However, the principle of derogability of rights applies (Desperate times,
desperate measures etc.)
● A new set of risks and challenges arises when interventions that were
hitherto largely manual are digitised and datafied.
Health/medical data has greater protections
Patient confidentiality
https://www.encyclopedia.com/medicine/encyclopedias-almanacs-transcripts-a
nd-maps/patient-confidentiality-0
https://www.aafp.org/about/policies/all/patient-confidentiality.html
Health data/ information privacy
https://www.ncbi.nlm.nih.gov/books/NBK9579/
GDPR Recital 35, “Health Data” https://gdpr-info.eu/recitals/no-35/
Issues with these tech interventions
Issues with these interventions
● Usability/ user experience - Not covered in the seminar
● Technical (bugs, ‘quality’ of code, false positives, false negatives, etc) - Not
covered in the seminar
● Digital security
● Privacy (technical and legal)
Surveillance companies
NSO (Israel)
https://www.bloomberg.com/news/articles/2020-03-17/surveillance-company-nso-
supplying-data-analysis-to-stop-virus (March 2020… About a dozen countries are
testing the NSO technology… The software takes two weeks of mobile-phone
tracking information from the infected person -- the incubation time of the virus --
then matches with location data collected by national mobile phone companies that
pinpoints citizens who were in the patient’s vicinity for more than 15 minutes and are
vulnerable to contagion…”)
Surveillance companies (contd.)
NSO software codenamed Fleming
https://techcrunch.com/2020/05/07/nso-group-fleming-contact-tracing,
https://www.vice.com/en_us/article/epg9jm/nso-covid-19-surveillance-tech-softwar
e-tracking-infected-privacy-experts-worried
Cy4gate.com (pitched to the Italian govt) - Human Interaction Tracking System or
HITS.
https://www.vice.com/en_us/article/epg9jm/nso-covid-19-surveillance-tech-softwar
e-tracking-infected-privacy-experts-worried
Surveillance companies (contd.)
Cellebrite (Israel)
“When someone tests positive, authorities can siphon up the patient’s location data and
contacts, making it easy to “quarantine the right people,” according to a Cellebrite email
pitch to the Delhi police force this month.”
https://thewire.in/tech/spyware-delhi-police-covid-19-quarantine
“This would usually be done with consent, the email said. But in legally justified cases, such
as when a patient violates a law against public gatherings, police could use the tools to
break into a confiscated device, Cellebrite advised. “We do not need the phone passcode to
collect the data,” the salesman wrote to a senior officer…”
Surveillance companies (contd.)
Apps developed by Pixxon AI - Surveillance company in India:
https://play.google.com/store/apps/details?id=com.pixxonai.covid19
https://play.google.com/store/apps/details?id=com.pixxonai.covid19wb
NotionTag Technologies - Video surveillance company in India; Makes facial recognition
software called FaceTagr. App developed by it:
https://play.google.com/store/apps/details?id=www.facetagr.com.cobuddy
More info about Pixxon AI and FaceTagr at:
https://citizenmatters.in/tracking-quarantine-tracing-cases-sharing-info-can-these-govt-i
ssued-apps-help-fight-covid-19-17151
Gold rush to surveillance tech
The market is rife with numerous companies offering numerous Covid-19 tech
solutions. It is hard to verify their claims about efficacy and accuracy.
Not much information is publicly available on whether or not they have been tested
and audited or evaluated independently from the perspective of privacy and security.
Security threats/ risks/ vulnerabilities
1. Targeting of healthcare bodies, pharmaceutical companies, academia,
medical research organisations, and local government. (As an example, see:
https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-ser
vices-advisory)
2. Risks/ vulnerabilities in Covid response tech: For example, Aarogya Setu
Android app static security analysis report using the tool MobSF:
https://drive.google.com/file/d/15RpAvajPqCHxPxKwbemoJXuvVL1MsV
dE/view (overview of results on the next slide)
3. Scams, phishing, counterfeit apps etc.
More threats and risks
● Function creep
● No rollback of expanded surveillance capabilities
● Data breaches/ leaks
● Inadvertent disclosures (not leaks or breaches) such as “Fitness tracking app Strava gives
away location of secret US army bases”
https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-locatio
n-of-secret-us-army-bases (Interesting to note: Indian Army advises personnel to use govt’s
Aarogya Setu app, but with usual cyber precautions:
https://theprint.in/defence/army-allows-personnel-to-use-govts-aarogya-setu-app-but-wit
h-usual-cyber-precautions/402527)
Safeguards, redress mechanisms, checks & balances
for Covid19 tech interventions
Data protection/ Information privacy law/ legal provisions
Public audit (open source -- client side and server side code, verifiable builds)
Independent auditor appointed in consultation with civil society
Audits for security and privacy
Judicial, legal, executive oversight
Interventions should be proportionate, purpose-limited, time-bound, and implemented with
transparency
Further reading
A passwordless server run by spyware maker NSO sparks contact-tracing privacy concerns
https://techcrunch.com/2020/05/07/nso-group-fleming-contact-tracing/
10 requirements for the evaluation of "Contact Tracing" apps
https://www.ccc.de/en/updates/2020/contact-tracing-requirements
Aarogya Setu: The story of a failure (technical analysis of the earliest versions of the app)
https://medium.com/@fs0c131y/aarogya-setu-the-story-of-a-failure-3a190a18e34
Qatar: Contact tracing app security flaw exposed sensitive personal details of more than one
million
https://www.amnesty.org/en/latest/news/2020/05/qatar-covid19-contact-tracing-app-security-
flaw/
Further reading (contd.)
White paper on DP3T
https://github.com/DP-3T/documents/blob/master/DP3T%20White%20Paper.pdf
The Price of Covid Freedom May Be Eternal Spying
https://www.bloomberg.com/opinion/articles/2020-05-10/coronavirus-contact-tracing-apps-me
an-spying-end-to-data-privacy
John Snow’s mapping of cholera outbreaks, 1854
https://www.ph.ucla.edu/epi/snow/mapsbroadstreet.html

More Related Content

Similar to Digital surveillance for covid 19 and its implications for security and privacy

The fda and byod mobile and fixed medical device cybersecurity[1]
The fda and byod mobile and fixed medical device cybersecurity[1]The fda and byod mobile and fixed medical device cybersecurity[1]
The fda and byod mobile and fixed medical device cybersecurity[1]
Pam Gilmore
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 

Similar to Digital surveillance for covid 19 and its implications for security and privacy (20)

Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
 
presentation
presentationpresentation
presentation
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
A Survey on Current Applications for Tracking COVID-19
A Survey on Current Applications for Tracking COVID-19A Survey on Current Applications for Tracking COVID-19
A Survey on Current Applications for Tracking COVID-19
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Digital technology and COVID-19 . Daniel Shu Wei Ting & others
Digital technology and COVID-19 . Daniel Shu Wei Ting & othersDigital technology and COVID-19 . Daniel Shu Wei Ting & others
Digital technology and COVID-19 . Daniel Shu Wei Ting & others
 
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
 
Information Technology in Pandemic
Information Technology in PandemicInformation Technology in Pandemic
Information Technology in Pandemic
 
The FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device CybersecurityThe FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
 
The fda and byod mobile and fixed medical device cybersecurity[1]
The fda and byod mobile and fixed medical device cybersecurity[1]The fda and byod mobile and fixed medical device cybersecurity[1]
The fda and byod mobile and fixed medical device cybersecurity[1]
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
Artificial intelligence to fight against covid19
Artificial intelligence to fight against covid19Artificial intelligence to fight against covid19
Artificial intelligence to fight against covid19
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
healthcare-9667352 (1).pdf
healthcare-9667352 (1).pdfhealthcare-9667352 (1).pdf
healthcare-9667352 (1).pdf
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Ethical Questions of Facial Recognition Technologies by Mika Nieminen
Ethical Questions of Facial Recognition Technologies by Mika Nieminen Ethical Questions of Facial Recognition Technologies by Mika Nieminen
Ethical Questions of Facial Recognition Technologies by Mika Nieminen
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
 
Real Time Mask Detection Architecture for COVID Prevention
Real Time Mask Detection Architecture for COVID PreventionReal Time Mask Detection Architecture for COVID Prevention
Real Time Mask Detection Architecture for COVID Prevention
 

More from Rohini Lakshané

More from Rohini Lakshané (13)

Of Sieges and Shutdowns
Of Sieges and ShutdownsOf Sieges and Shutdowns
Of Sieges and Shutdowns
 
Lessons from creating a diversity toolkit
Lessons from creating a diversity toolkitLessons from creating a diversity toolkit
Lessons from creating a diversity toolkit
 
Non-consensual intimate imagery in India
Non-consensual intimate imagery in IndiaNon-consensual intimate imagery in India
Non-consensual intimate imagery in India
 
Making crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against womenMaking crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against women
 
Exploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phonesExploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phones
 
Gender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreachGender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreach
 
Patent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in IndiaPatent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in India
 
Competition policy and the internet
Competition policy and the internetCompetition policy and the internet
Competition policy and the internet
 
Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...
 
Designing technology for diversity and inclusion
Designing technology for diversity and inclusionDesigning technology for diversity and inclusion
Designing technology for diversity and inclusion
 
Holistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imageryHolistic security strategies to address non-consensual intimate imagery
Holistic security strategies to address non-consensual intimate imagery
 
The WhatsApp economy
The WhatsApp economyThe WhatsApp economy
The WhatsApp economy
 
The art of community review
The art of community reviewThe art of community review
The art of community review
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Digital surveillance for covid 19 and its implications for security and privacy

  • 1. Digital Surveillance for COVID-19 and its Implications for Security and Privacy Rohini Lakshané 12 August 2020 United Nations DPPA-DPO (un)data Seminar Series on Outrageous Questions CC-BY (https://about.me/rohini)
  • 2. Overview of Covid-19 tech responses A. Apps i. Contact-tracing ii. Quarantine Management/ geofencing iii. Information, updates about the pandemic and govt services, medical advisories, etc. iv. Services required/ provided during lockdown and quarantine (curfew passes, mental health counselling, delivery of groceries, etc.) B. Electronic-tagging devices such as ankle bracelets for quarantine management/ geofencing
  • 3. Overview of Covid-19 tech responses (contd.) C. Tracking mobile phones using BTS (that is, mobile towers) in two ways: 1. Aggregated data: https://www.reuters.com/article/us-health-coronavirus-europe-telecoms/euro pean-mobile-operators-share-data-for-coronavirus-fight-idUSKBN2152C2, 2. Tracking individual phones: https://www.thehindu.com/news/national/coronavirus-geo-fencing-app-will-be -used-to-locate-quarantine-violators/article31241055.ece 3. Combination of C1 and C2 D. Combination of A and B or A and C
  • 4. Overview of Covid-19 tech responses (contd.) E. Drones (spraying disinfectant, aerial video surveillance, making announcements, contactless measurement of body temperature) - Not covered in the seminar F. Video surveillance, face recognition, machine learning (thermal imaging of persons in public places for the purpose of fever detection; detecting whether or not people are wearing masks; machine learning to find correlations and patterns in their whereabouts, movements etc; mapping of Covid19 hotspots)
  • 5. Overview of Covid-19 tech responses (contd.) These interventions are inherently privacy-invading: ● However, the principle of derogability of rights applies (Desperate times, desperate measures etc.) ● A new set of risks and challenges arises when interventions that were hitherto largely manual are digitised and datafied.
  • 6. Health/medical data has greater protections Patient confidentiality https://www.encyclopedia.com/medicine/encyclopedias-almanacs-transcripts-a nd-maps/patient-confidentiality-0 https://www.aafp.org/about/policies/all/patient-confidentiality.html Health data/ information privacy https://www.ncbi.nlm.nih.gov/books/NBK9579/ GDPR Recital 35, “Health Data” https://gdpr-info.eu/recitals/no-35/
  • 7. Issues with these tech interventions Issues with these interventions ● Usability/ user experience - Not covered in the seminar ● Technical (bugs, ‘quality’ of code, false positives, false negatives, etc) - Not covered in the seminar ● Digital security ● Privacy (technical and legal)
  • 8. Surveillance companies NSO (Israel) https://www.bloomberg.com/news/articles/2020-03-17/surveillance-company-nso- supplying-data-analysis-to-stop-virus (March 2020… About a dozen countries are testing the NSO technology… The software takes two weeks of mobile-phone tracking information from the infected person -- the incubation time of the virus -- then matches with location data collected by national mobile phone companies that pinpoints citizens who were in the patient’s vicinity for more than 15 minutes and are vulnerable to contagion…”)
  • 9. Surveillance companies (contd.) NSO software codenamed Fleming https://techcrunch.com/2020/05/07/nso-group-fleming-contact-tracing, https://www.vice.com/en_us/article/epg9jm/nso-covid-19-surveillance-tech-softwar e-tracking-infected-privacy-experts-worried Cy4gate.com (pitched to the Italian govt) - Human Interaction Tracking System or HITS. https://www.vice.com/en_us/article/epg9jm/nso-covid-19-surveillance-tech-softwar e-tracking-infected-privacy-experts-worried
  • 10. Surveillance companies (contd.) Cellebrite (Israel) “When someone tests positive, authorities can siphon up the patient’s location data and contacts, making it easy to “quarantine the right people,” according to a Cellebrite email pitch to the Delhi police force this month.” https://thewire.in/tech/spyware-delhi-police-covid-19-quarantine “This would usually be done with consent, the email said. But in legally justified cases, such as when a patient violates a law against public gatherings, police could use the tools to break into a confiscated device, Cellebrite advised. “We do not need the phone passcode to collect the data,” the salesman wrote to a senior officer…”
  • 11. Surveillance companies (contd.) Apps developed by Pixxon AI - Surveillance company in India: https://play.google.com/store/apps/details?id=com.pixxonai.covid19 https://play.google.com/store/apps/details?id=com.pixxonai.covid19wb NotionTag Technologies - Video surveillance company in India; Makes facial recognition software called FaceTagr. App developed by it: https://play.google.com/store/apps/details?id=www.facetagr.com.cobuddy More info about Pixxon AI and FaceTagr at: https://citizenmatters.in/tracking-quarantine-tracing-cases-sharing-info-can-these-govt-i ssued-apps-help-fight-covid-19-17151
  • 12. Gold rush to surveillance tech The market is rife with numerous companies offering numerous Covid-19 tech solutions. It is hard to verify their claims about efficacy and accuracy. Not much information is publicly available on whether or not they have been tested and audited or evaluated independently from the perspective of privacy and security.
  • 13. Security threats/ risks/ vulnerabilities 1. Targeting of healthcare bodies, pharmaceutical companies, academia, medical research organisations, and local government. (As an example, see: https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-ser vices-advisory) 2. Risks/ vulnerabilities in Covid response tech: For example, Aarogya Setu Android app static security analysis report using the tool MobSF: https://drive.google.com/file/d/15RpAvajPqCHxPxKwbemoJXuvVL1MsV dE/view (overview of results on the next slide) 3. Scams, phishing, counterfeit apps etc.
  • 14.
  • 15. More threats and risks ● Function creep ● No rollback of expanded surveillance capabilities ● Data breaches/ leaks ● Inadvertent disclosures (not leaks or breaches) such as “Fitness tracking app Strava gives away location of secret US army bases” https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-locatio n-of-secret-us-army-bases (Interesting to note: Indian Army advises personnel to use govt’s Aarogya Setu app, but with usual cyber precautions: https://theprint.in/defence/army-allows-personnel-to-use-govts-aarogya-setu-app-but-wit h-usual-cyber-precautions/402527)
  • 16. Safeguards, redress mechanisms, checks & balances for Covid19 tech interventions Data protection/ Information privacy law/ legal provisions Public audit (open source -- client side and server side code, verifiable builds) Independent auditor appointed in consultation with civil society Audits for security and privacy Judicial, legal, executive oversight Interventions should be proportionate, purpose-limited, time-bound, and implemented with transparency
  • 17. Further reading A passwordless server run by spyware maker NSO sparks contact-tracing privacy concerns https://techcrunch.com/2020/05/07/nso-group-fleming-contact-tracing/ 10 requirements for the evaluation of "Contact Tracing" apps https://www.ccc.de/en/updates/2020/contact-tracing-requirements Aarogya Setu: The story of a failure (technical analysis of the earliest versions of the app) https://medium.com/@fs0c131y/aarogya-setu-the-story-of-a-failure-3a190a18e34 Qatar: Contact tracing app security flaw exposed sensitive personal details of more than one million https://www.amnesty.org/en/latest/news/2020/05/qatar-covid19-contact-tracing-app-security- flaw/
  • 18. Further reading (contd.) White paper on DP3T https://github.com/DP-3T/documents/blob/master/DP3T%20White%20Paper.pdf The Price of Covid Freedom May Be Eternal Spying https://www.bloomberg.com/opinion/articles/2020-05-10/coronavirus-contact-tracing-apps-me an-spying-end-to-data-privacy John Snow’s mapping of cholera outbreaks, 1854 https://www.ph.ucla.edu/epi/snow/mapsbroadstreet.html