SlideShare a Scribd company logo
Hacking Your Thoughts:
Batman Forever meets Black Mirror
Katherine Pratt
DEFCON 27
10 Aug 19
The Standard Disclaimer
The work in this presentation was done at the University of Washington as
part of a PhD dissertation. The results and views presented here do not
necessarily represent those of my funding sources or my current employer.
2
Summary of Presentation
• Separating hype from reality
• Some experimental result
• Do consumers care about their neural privacy?
• Thoughts about proactive policy solutions:
what do I want all of you to do?
3
Things NOT Covered by This Presentation
• Aliens are not involved
• I know nothing about any chips that the government has implanted
4
Definitions Before We Get Started
• Brain Computer Interfaces (BCIs): can record brain activity
while an individual is performing different actions (for example,
blinking their eyes, playing a video game, or texting on a
phone). BCIs are often used to give a user control of a
computer using their brain activity.
5
Definitions Before We Get Started
• Brain Computer Interfaces (BCIs): can record brain activity
while an individual is performing different actions (for example,
blinking their eyes, playing a video game, or texting on a
phone). BCIs are often used to give a user control of a
computer using their brain activity.
• Targeted elicitation: showing specific stimuli in order to
obtain a particular response
6
What do you think of when you
hear “Brain Hacking”?
7
8
IMDb
You've sucked Gotham's brain
waves and now you've devised a
way to read minds!
You betcha! Soon my little "Box" will be
on countless TVs around the world.
Feeding me, credit card numbers, bank
codes, sexual fantasies, and little white lies.
IMDb
IMDb
9
10
IMDb
This means that some of what you
expect… isn’t really possible.
11
Separating Hype from Reality: Neuralink
• No feedback loop for information
to return to brain from
“reanimated” limbs
• Unclear how this implantation
technique will work for deeper
brain structures
• Possibility of profound side
effects by stimulating brain tissue
(Deep Brain Stimulator literature)
12
Neuralink via
Scientific American
Separating Hype from Reality: Facebook
• Current gold standard for “typing-
by-brain” is ~1 word per minute
• Published research study only
done with 3 subjects, using
incredibly invasive surgically
placed electrodes
• Do you really want Facebook to
have direct access to all of your
thoughts and reactions?
IEEE Spectrum
14
Mark Stone/University of Washington
15
Mark Stone/University of Washington
16
Mark Stone/University of Washington
CU School of Medicine, Dept of Neurology
So What’s Currently Feasible?
How do you get the information out?
17
Electroencephalography (EEG):
No Surgery Needed
18
Bonaci 2015
Guilty Knowledge Test:
P300 “Oddball” Response
19
Guilty Knowledge Test:
P300 “Oddball” Response
20
Guilty Knowledge Test:
P300 “Oddball” Response
21
Guilty Knowledge Test:
P300 “Oddball” Response
22
23
Guilty Knowledge Test:
P300 “Oddball” Response
24
Guilty Knowledge Test:
P300 “Oddball” Response
25
Guilty Knowledge Test:
P300 “Oddball” Response
26
Guilty Knowledge Test:
P300 “Oddball” Response
27
Guilty Knowledge Test:
P300 “Oddball” Response
28
Guilty Knowledge Test:
P300 “Oddball” Response
Experimental Paradigm:
Single Digit Guessing Game
• Prior literature uses overt (conscious) and subliminal (“unconscious”)
stimuli, and results almost entirely rely on training data
• My research involved “guessing” a subject’s pre-selected digit, without
any prior data about the subject
29
Three Different Kinds of Results
• Overall effectiveness in identifying subject’s chosen digit
• Effect of attention on correctly identifying subject’s digit
• Determining current versus future digits (intention)
30
1. Overall effectiveness in identifying subject’s
chosen digit
For all but one subject, the
computer correctly calculated
the correct digit 2-3 times for
the 10 experimental sessions.
31
1. Overall effectiveness in identifying subject’s
chosen digit
For all but one subject, the
computer correctly calculated
the correct digit 2-3 times for
the 10 experimental sessions.
32
Human Guess
3 2
8 6
0 8
2 1
5 5
1 1
8 9
9 4
6 6
6 3
2. Effect of attention on correctly identifying
subject’s digit
Percentage wise, the correct digit was calculated more often for
spacebar rounds (attention) than non-spacebar rounds (passive).
33
3. Determining current versus future
digits (intention)
• The number the subject was going to pick
*for the next round* was calculated almost
as many times as the number for the current
round (13 vs 14)
• The number of correct future guesses
varied by subject (not consistent)
34
3. Determining current versus future
digits (intention)
• The number the subject was going to pick
*for the next round* was calculated almost
as many times as the number for the current
round (13 vs 14)
• The number of correct future guesses
varied by subject (not consistent)
35
Human Guess
6 9
3 3
8 9
2 7
0 9
7 9
4 2
9 4
6 6
5 8
Human Guess
3 5
7 5
5 1
5 7
9 9
9 2
2 8
2 4
4 4
4 1
What do Consumers Think of
Neural Privacy?
36
IMDb
What Is Being Protected?
• What I’m interested in: quantifiable information that is determined from
a combination of EEG and relevant environmental stimuli
• Raw, original neural signals without context are much less informative
37
38
Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
39
Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
40
Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
3. What relationship do we have with those who elicit
information neutrally?
41
Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
3. What relationship do we have with those who elicit
information neutrally?
4. The importance of trust
42
Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
43
Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
• Defining and ascribing ownership is necessary to provide value to what is
being elicited (controlling a video game vs monitoring emotions)
44
Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
• Defining and ascribing ownership is necessary to provide value to what is
being elicited (controlling a video game vs monitoring emotions)
• Users should be able to trust that the information taken from elicited
neural signals by a company will be used and interpreted properly,
making the relationship between user and company an intimate one
45
Neuroethics Survey
• Is there a difference in perceived privacy violation between a person
intercepting BCI signals versus a phone app?
• What are the differences in trust and willingness to share neural
information with a range of entities?
• Is neural information more important that other data that’s already
available about us?
46
1. Who/What is Taking Your Information?
47
?
Content
Video
Brain Activity
Neural Planning
Emotions
Summary of Results:
Who/What is Taking Your Information
• Person procurement of neural planning information is a
statistically significant privacy violation over the app
• Mobility status does not statistically impact perceptions of
neural privacy in these scenarios
48
Trust and
Willingness
49
Food
Physical and mental state
Attraction
Political views
50
Food
Physical and mental state
Attraction
Political views
Trustworthiness?
Willingness?
Trust and
Willingness
Government
Non-profit
For-profit
51
Extremely Unwilling/
Untrustworthy
Extremely Willing/
Trustworthy
What’s More Important?
• Fitbit or similar exercise tracker
• Record of my personal medical
history (e.g. at your doctor's office)
• Genetic information from a
company like 23andMe
• Online shopping history
• Monthly credit card statement
• Journal/diary
52
>
=
<Is your neural information…
53
What are potential policy and
regulatory implications?
Is there anything we can do about this?
54
Existing Biometric Precedents:
Protecting and Profiting Off of You
• 2008 Genetic Information Non-Discrimination Act
• Life Insurance
• Rosenbach v Six Flags
55
(Final questions from last section’s neuroethics survey)
Who…
• User
• University Researcher
• Independent Regulatory Organization
• Legislators
• Device Manufacturers
…for BCIs, compared to current
involvement
• Development oversight
• Use
• Reparations for malicious
elicitation or misuse
56
Who Should Be In Charge of Regulation and When?
Summary of Results:
Policy and Responsibility
• Independent Regulatory Organizations, Legislators, and Device
Manufacturers should be more involved going from development to
reparations for misuse
• Users should be least involved in reparations from misuse, while Device
Manufacturers should be the most involved
57
Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
58
Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
59
Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
• Accountability for device manufacturers
60
Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
• Accountability for device manufacturers
• Overall, how do consumers understand the risks of using a device?
61
Here’s My Ask of You
The Main Takeaways
62
Gunshow Comic, KC Green
You Are Here
63
To the Developers in the Room
• Just because you can doesn’t mean you should
64
To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
65
To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
• Do as much processing as possible locally/on device
66
To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
• Do as much processing as possible locally/on device
67Bonaci, Calo, Chizeck (2014)
To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
68
To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
69
To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
• Ask for comprehensive US federal data privacy legislation:
contactingcongress.org
• Call/email their DC offices
• Go to town halls and ask for their positions on data privacy
• Be involved in the democratic process!
70
To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
• Ask for comprehensive US federal data privacy legislation:
contactingcongress.org
• Call/email their DC offices
• Go to town halls and ask for their positions on data privacy
• Be involved in the democratic process!
• Read the terms of service to find out what is happening to your
biometric information
71
To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
72
To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
73
To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
• These are the results from compliant, willing participants
74
To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
• These are the results from compliant, willing participants
• This technology is still in its infancy and should not be considered the
ultimate solution to any problem
75
So In Summary…
76
This is One Potential Future…
77
IMDb
… But We Can Create a Different One
78
IMDb
But if there’s one thing I need you
to remember from this talk…
79
80
There is a difference between telepathy
and targeted elicitation of information.
81
There is a difference between telepathy
and targeted elicitation of information.
Time for Questions?
@GattaKat
82
Backup Slides
83
1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
84
1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
85
1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
• Without appropriate remedies, there is no right
86
1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
• Without appropriate remedies, there is no right
• Is there different language we can use to describe what we
are owed, if anything, with respect to our privacy?
87
1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
88
1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
• DeCew: If privacy is instead an interest, it can still be protected
or invaded, and discussed without justifying why or how it
should be observed
89
1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
• DeCew: If privacy is instead an interest, it can still be protected
or invaded, and discussed without justifying why or how it
should be observed
• The fact that there is no overarching and defined statutory right
to privacy means it will continue to be infringed upon like an
interest, or ignored
90
2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
91
2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
92
2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
93
2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
• If ownership is assigned:
• It’s easier to create a legal construct to protect the person eliciting information,
and the company receiving it
• But it’s also more difficult of the wrong information is elicited
94
2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
• If ownership is assigned:
• It’s easier to create a legal construct to protect the person eliciting information,
and the company receiving it
• But it’s also more difficult of the wrong information is elicited
• The purpose for eliciting information should be important to questions
of ownership 95
3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
96
3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
• Intimacy: specification that choice is involved on the part of the agent
providing information, and that the value comes from the original
relationship one has with the information (Inness)
97
3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
• Intimacy: specification that choice is involved on the part of the agent
providing information, and that the value comes from the original
relationship one has with the information (Inness)
• When information is elicited not by choice, the violation of privacy can
be linked to a lack of acknowledging that the sharing of information is in
fact a relationship
98
4. The Importance of Trust
• Lack of trust may no longer be an adequate deterrent to a company’s
malevolent behavior
• 91% of Americans in 2016 agreed or strongly agreed that users had lost control
over the collection and use of of their information
• 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in
protecting private information
99
4. The Importance of Trust
• Lack of trust may no longer be an adequate deterrent to a company’s
malevolent behavior
• 91% of Americans in 2016 agreed or strongly agreed that users had lost control
over the collection and use of of their information
• 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in
protecting private information
• Privacy as trust (Waldman): relationship through regulation of access,
either restricting or openness
100
First Analysis: Person vs App
Odds ratio < 1 means respondents perceived
the app collecting their neural information as
LESS of a privacy issue than if it was
collected by a person
101
102
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
103
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.83 0.55 0.77 0.56 0.97
Odds
Ratios
104
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.83 0.55 0.77 0.56 0.97
Odds
Ratios
Second Analysis:
Mobility vs Non-Mobility Impaired
Odds ratio < 1: non-mobility impaired individuals
perceive the data collected to be less of a privacy
violation, compared to those who are
Odds ratio > 1: non-mobility impaired individuals
perceived data collected to be more of a privacy
violation, compared to those who are
105
106
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
107
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.95 0.96 1.24 1.76 1.70
Odds
Ratios
108
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
109
First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
Odds ratio > 1 means less involvement
through each stage
110
First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
Odds ratio > 1 means less involvement
through each stage
Odds ratio < 1 indicates the entity should
be more involved through each stage
111
112
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
2.481 1.248 0.709 0.685 0.741
Odds
Ratios
113
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
2.481 1.248 0.709 0.685 0.741
Odds
Ratios
Second Analysis: Involvement by Stage
114
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
Second Analysis: Involvement by Stage
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
115
Second Analysis: Involvement by Stage
116
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
117
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
1.461
1.536
0.620
Odds
Ratios
118
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
1.461
1.536
0.620
Odds
Ratios
DGE-1256082
DGE-1762114
NSF EEC 1028725
Sources of Funding
119
Irene Peden
Endowed Fellowship

More Related Content

Similar to DEF CON 27 - KATHERINE PRATT - hacking your thoughts batman forever meets black mirror

How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...
SharpBrains
 
eHealth: Big Data, Sports Analysis & Clinical Records
eHealth: Big Data, Sports Analysis & Clinical Records eHealth: Big Data, Sports Analysis & Clinical Records
eHealth: Big Data, Sports Analysis & Clinical Records
Health Informatics New Zealand
 
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Alex Pinto
 
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
Health Catalyst
 
Big Data Better Life
Big Data Better LifeBig Data Better Life
The Future of Neuroimaging: A 3D Exploration of TBI
The Future of Neuroimaging: A 3D Exploration of TBIThe Future of Neuroimaging: A 3D Exploration of TBI
The Future of Neuroimaging: A 3D Exploration of TBI
Hunter Whitney
 
Intro to Vita Beans
Intro to Vita BeansIntro to Vita Beans
Intro to Vita Beans
amruth
 
30 Argumentative Essay Examples In Illustrator Go
30 Argumentative Essay Examples In Illustrator  Go30 Argumentative Essay Examples In Illustrator  Go
30 Argumentative Essay Examples In Illustrator Go
Tanya Williams
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Petia Radeva
 
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
SharpBrains
 
In search of the lost loss function
In search of the lost loss function In search of the lost loss function
In search of the lost loss function
Stephen Senn
 
How To Write A Good Reflective Nursing Essay
How To Write A Good Reflective Nursing EssayHow To Write A Good Reflective Nursing Essay
How To Write A Good Reflective Nursing Essay
Tonya Jackson
 
Can Marketers Get to Grips with the Human Condition?
Can Marketers Get to Grips with the Human Condition?Can Marketers Get to Grips with the Human Condition?
Can Marketers Get to Grips with the Human Condition?
Klaxon
 
What (not) to ask users
What (not) to ask usersWhat (not) to ask users
What (not) to ask users
Hester Bruikman
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
Renee Spahn
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
Melissa Williams
 
8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.
Monica Rivera
 
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
Sean Manion PhD
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
gloriakt
 

Similar to DEF CON 27 - KATHERINE PRATT - hacking your thoughts batman forever meets black mirror (20)

How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...How to address privacy, ethical and regulatory issues: Examples in cognitive ...
How to address privacy, ethical and regulatory issues: Examples in cognitive ...
 
eHealth: Big Data, Sports Analysis & Clinical Records
eHealth: Big Data, Sports Analysis & Clinical Records eHealth: Big Data, Sports Analysis & Clinical Records
eHealth: Big Data, Sports Analysis & Clinical Records
 
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...
 
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
 
Big Data Better Life
Big Data Better LifeBig Data Better Life
Big Data Better Life
 
The Future of Neuroimaging: A 3D Exploration of TBI
The Future of Neuroimaging: A 3D Exploration of TBIThe Future of Neuroimaging: A 3D Exploration of TBI
The Future of Neuroimaging: A 3D Exploration of TBI
 
Intro to Vita Beans
Intro to Vita BeansIntro to Vita Beans
Intro to Vita Beans
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
30 Argumentative Essay Examples In Illustrator Go
30 Argumentative Essay Examples In Illustrator  Go30 Argumentative Essay Examples In Illustrator  Go
30 Argumentative Essay Examples In Illustrator Go
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...
 
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
Best prac­tices to assess and enhance brain func­tion via mobile devices and ...
 
In search of the lost loss function
In search of the lost loss function In search of the lost loss function
In search of the lost loss function
 
How To Write A Good Reflective Nursing Essay
How To Write A Good Reflective Nursing EssayHow To Write A Good Reflective Nursing Essay
How To Write A Good Reflective Nursing Essay
 
Can Marketers Get to Grips with the Human Condition?
Can Marketers Get to Grips with the Human Condition?Can Marketers Get to Grips with the Human Condition?
Can Marketers Get to Grips with the Human Condition?
 
What (not) to ask users
What (not) to ask usersWhat (not) to ask users
What (not) to ask users
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
 
8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.
 
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
"Your Health App may be Illegal" IEEE 3 Feb 2021, Manion
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Felipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
Felipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
Felipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
Felipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
Felipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
Felipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
Felipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
Felipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
Felipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
Felipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
Felipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
Felipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
Felipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Felipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
Felipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
Felipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

DEF CON 27 - KATHERINE PRATT - hacking your thoughts batman forever meets black mirror

  • 1. Hacking Your Thoughts: Batman Forever meets Black Mirror Katherine Pratt DEFCON 27 10 Aug 19
  • 2. The Standard Disclaimer The work in this presentation was done at the University of Washington as part of a PhD dissertation. The results and views presented here do not necessarily represent those of my funding sources or my current employer. 2
  • 3. Summary of Presentation • Separating hype from reality • Some experimental result • Do consumers care about their neural privacy? • Thoughts about proactive policy solutions: what do I want all of you to do? 3
  • 4. Things NOT Covered by This Presentation • Aliens are not involved • I know nothing about any chips that the government has implanted 4
  • 5. Definitions Before We Get Started • Brain Computer Interfaces (BCIs): can record brain activity while an individual is performing different actions (for example, blinking their eyes, playing a video game, or texting on a phone). BCIs are often used to give a user control of a computer using their brain activity. 5
  • 6. Definitions Before We Get Started • Brain Computer Interfaces (BCIs): can record brain activity while an individual is performing different actions (for example, blinking their eyes, playing a video game, or texting on a phone). BCIs are often used to give a user control of a computer using their brain activity. • Targeted elicitation: showing specific stimuli in order to obtain a particular response 6
  • 7. What do you think of when you hear “Brain Hacking”? 7
  • 9. You've sucked Gotham's brain waves and now you've devised a way to read minds! You betcha! Soon my little "Box" will be on countless TVs around the world. Feeding me, credit card numbers, bank codes, sexual fantasies, and little white lies. IMDb IMDb 9
  • 11. This means that some of what you expect… isn’t really possible. 11
  • 12. Separating Hype from Reality: Neuralink • No feedback loop for information to return to brain from “reanimated” limbs • Unclear how this implantation technique will work for deeper brain structures • Possibility of profound side effects by stimulating brain tissue (Deep Brain Stimulator literature) 12 Neuralink via Scientific American
  • 13. Separating Hype from Reality: Facebook • Current gold standard for “typing- by-brain” is ~1 word per minute • Published research study only done with 3 subjects, using incredibly invasive surgically placed electrodes • Do you really want Facebook to have direct access to all of your thoughts and reactions? IEEE Spectrum
  • 16. 16 Mark Stone/University of Washington CU School of Medicine, Dept of Neurology
  • 17. So What’s Currently Feasible? How do you get the information out? 17
  • 19. Guilty Knowledge Test: P300 “Oddball” Response 19
  • 20. Guilty Knowledge Test: P300 “Oddball” Response 20
  • 21. Guilty Knowledge Test: P300 “Oddball” Response 21
  • 22. Guilty Knowledge Test: P300 “Oddball” Response 22
  • 23. 23 Guilty Knowledge Test: P300 “Oddball” Response
  • 24. 24 Guilty Knowledge Test: P300 “Oddball” Response
  • 25. 25 Guilty Knowledge Test: P300 “Oddball” Response
  • 26. 26 Guilty Knowledge Test: P300 “Oddball” Response
  • 27. 27 Guilty Knowledge Test: P300 “Oddball” Response
  • 28. 28 Guilty Knowledge Test: P300 “Oddball” Response
  • 29. Experimental Paradigm: Single Digit Guessing Game • Prior literature uses overt (conscious) and subliminal (“unconscious”) stimuli, and results almost entirely rely on training data • My research involved “guessing” a subject’s pre-selected digit, without any prior data about the subject 29
  • 30. Three Different Kinds of Results • Overall effectiveness in identifying subject’s chosen digit • Effect of attention on correctly identifying subject’s digit • Determining current versus future digits (intention) 30
  • 31. 1. Overall effectiveness in identifying subject’s chosen digit For all but one subject, the computer correctly calculated the correct digit 2-3 times for the 10 experimental sessions. 31
  • 32. 1. Overall effectiveness in identifying subject’s chosen digit For all but one subject, the computer correctly calculated the correct digit 2-3 times for the 10 experimental sessions. 32 Human Guess 3 2 8 6 0 8 2 1 5 5 1 1 8 9 9 4 6 6 6 3
  • 33. 2. Effect of attention on correctly identifying subject’s digit Percentage wise, the correct digit was calculated more often for spacebar rounds (attention) than non-spacebar rounds (passive). 33
  • 34. 3. Determining current versus future digits (intention) • The number the subject was going to pick *for the next round* was calculated almost as many times as the number for the current round (13 vs 14) • The number of correct future guesses varied by subject (not consistent) 34
  • 35. 3. Determining current versus future digits (intention) • The number the subject was going to pick *for the next round* was calculated almost as many times as the number for the current round (13 vs 14) • The number of correct future guesses varied by subject (not consistent) 35 Human Guess 6 9 3 3 8 9 2 7 0 9 7 9 4 2 9 4 6 6 5 8 Human Guess 3 5 7 5 5 1 5 7 9 9 9 2 2 8 2 4 4 4 4 1
  • 36. What do Consumers Think of Neural Privacy? 36 IMDb
  • 37. What Is Being Protected? • What I’m interested in: quantifiable information that is determined from a combination of EEG and relevant environmental stimuli • Raw, original neural signals without context are much less informative 37
  • 38. 38
  • 39. Issues to Consider in Defining Neural Privacy 1. Is privacy a right or an interest? 39
  • 40. Issues to Consider in Defining Neural Privacy 1. Is privacy a right or an interest? 2. Do we own our own thoughts? 40
  • 41. Issues to Consider in Defining Neural Privacy 1. Is privacy a right or an interest? 2. Do we own our own thoughts? 3. What relationship do we have with those who elicit information neutrally? 41
  • 42. Issues to Consider in Defining Neural Privacy 1. Is privacy a right or an interest? 2. Do we own our own thoughts? 3. What relationship do we have with those who elicit information neutrally? 4. The importance of trust 42
  • 43. Defining Neural Privacy • We all should have an interest in protecting our neural privacy, but require additional legal frameworks to make it a right 43
  • 44. Defining Neural Privacy • We all should have an interest in protecting our neural privacy, but require additional legal frameworks to make it a right • Defining and ascribing ownership is necessary to provide value to what is being elicited (controlling a video game vs monitoring emotions) 44
  • 45. Defining Neural Privacy • We all should have an interest in protecting our neural privacy, but require additional legal frameworks to make it a right • Defining and ascribing ownership is necessary to provide value to what is being elicited (controlling a video game vs monitoring emotions) • Users should be able to trust that the information taken from elicited neural signals by a company will be used and interpreted properly, making the relationship between user and company an intimate one 45
  • 46. Neuroethics Survey • Is there a difference in perceived privacy violation between a person intercepting BCI signals versus a phone app? • What are the differences in trust and willingness to share neural information with a range of entities? • Is neural information more important that other data that’s already available about us? 46
  • 47. 1. Who/What is Taking Your Information? 47 ? Content Video Brain Activity Neural Planning Emotions
  • 48. Summary of Results: Who/What is Taking Your Information • Person procurement of neural planning information is a statistically significant privacy violation over the app • Mobility status does not statistically impact perceptions of neural privacy in these scenarios 48
  • 49. Trust and Willingness 49 Food Physical and mental state Attraction Political views
  • 50. 50 Food Physical and mental state Attraction Political views Trustworthiness? Willingness? Trust and Willingness Government Non-profit For-profit
  • 52. What’s More Important? • Fitbit or similar exercise tracker • Record of my personal medical history (e.g. at your doctor's office) • Genetic information from a company like 23andMe • Online shopping history • Monthly credit card statement • Journal/diary 52 > = <Is your neural information…
  • 53. 53
  • 54. What are potential policy and regulatory implications? Is there anything we can do about this? 54
  • 55. Existing Biometric Precedents: Protecting and Profiting Off of You • 2008 Genetic Information Non-Discrimination Act • Life Insurance • Rosenbach v Six Flags 55
  • 56. (Final questions from last section’s neuroethics survey) Who… • User • University Researcher • Independent Regulatory Organization • Legislators • Device Manufacturers …for BCIs, compared to current involvement • Development oversight • Use • Reparations for malicious elicitation or misuse 56 Who Should Be In Charge of Regulation and When?
  • 57. Summary of Results: Policy and Responsibility • Independent Regulatory Organizations, Legislators, and Device Manufacturers should be more involved going from development to reparations for misuse • Users should be least involved in reparations from misuse, while Device Manufacturers should be the most involved 57
  • 58. Examples of Policy Solutions • Increased involvement by legislators with reparations for malicious elicitation or misuse • Federal or state-level right to neural privacy legislation (or broader generic/biometric data privacy legislation) • Provide reparations by statute (monetary, private right of action, etc.) • Empower regulatory agencies like the FTC 58
  • 59. Examples of Policy Solutions • Increased involvement by legislators with reparations for malicious elicitation or misuse • Federal or state-level right to neural privacy legislation (or broader generic/biometric data privacy legislation) • Provide reparations by statute (monetary, private right of action, etc.) • Empower regulatory agencies like the FTC • Involving Independent Regulatory Organizations 59
  • 60. Examples of Policy Solutions • Increased involvement by legislators with reparations for malicious elicitation or misuse • Federal or state-level right to neural privacy legislation (or broader generic/biometric data privacy legislation) • Provide reparations by statute (monetary, private right of action, etc.) • Empower regulatory agencies like the FTC • Involving Independent Regulatory Organizations • Accountability for device manufacturers 60
  • 61. Examples of Policy Solutions • Increased involvement by legislators with reparations for malicious elicitation or misuse • Federal or state-level right to neural privacy legislation (or broader generic/biometric data privacy legislation) • Provide reparations by statute (monetary, private right of action, etc.) • Empower regulatory agencies like the FTC • Involving Independent Regulatory Organizations • Accountability for device manufacturers • Overall, how do consumers understand the risks of using a device? 61
  • 62. Here’s My Ask of You The Main Takeaways 62
  • 63. Gunshow Comic, KC Green You Are Here 63
  • 64. To the Developers in the Room • Just because you can doesn’t mean you should 64
  • 65. To the Developers in the Room • Just because you can doesn’t mean you should • Ask yourself what problem you’re solving, how else you can obtain that information, and what is the least amount of information you need to complete a particular task 65
  • 66. To the Developers in the Room • Just because you can doesn’t mean you should • Ask yourself what problem you’re solving, how else you can obtain that information, and what is the least amount of information you need to complete a particular task • Do as much processing as possible locally/on device 66
  • 67. To the Developers in the Room • Just because you can doesn’t mean you should • Ask yourself what problem you’re solving, how else you can obtain that information, and what is the least amount of information you need to complete a particular task • Do as much processing as possible locally/on device 67Bonaci, Calo, Chizeck (2014)
  • 68. To the Privacy-Conscious in the Room • Just don’t use these kinds of devices 68
  • 69. To the Privacy-Conscious in the Room • Just don’t use these kinds of devices • You may feel better with a slower screen refresh rate to prevent subliminal elicitation 69
  • 70. To the Privacy-Conscious in the Room • Just don’t use these kinds of devices • You may feel better with a slower screen refresh rate to prevent subliminal elicitation • Ask for comprehensive US federal data privacy legislation: contactingcongress.org • Call/email their DC offices • Go to town halls and ask for their positions on data privacy • Be involved in the democratic process! 70
  • 71. To the Privacy-Conscious in the Room • Just don’t use these kinds of devices • You may feel better with a slower screen refresh rate to prevent subliminal elicitation • Ask for comprehensive US federal data privacy legislation: contactingcongress.org • Call/email their DC offices • Go to town halls and ask for their positions on data privacy • Be involved in the democratic process! • Read the terms of service to find out what is happening to your biometric information 71
  • 72. To the 3-Letter Agencies in the Room • (Yes, I know you’re here) 72
  • 73. To the 3-Letter Agencies in the Room • (Yes, I know you’re here) • If you’re even thinking about using this kind of technique for interrogation, you must come to terms with some serious ethical and legal questions • 1st Amendment: Freedom of Speech/Expression • 4th Amendment: Reasonable expectation of privacy • 5th Amendment: Self-incrimination 73
  • 74. To the 3-Letter Agencies in the Room • (Yes, I know you’re here) • If you’re even thinking about using this kind of technique for interrogation, you must come to terms with some serious ethical and legal questions • 1st Amendment: Freedom of Speech/Expression • 4th Amendment: Reasonable expectation of privacy • 5th Amendment: Self-incrimination • These are the results from compliant, willing participants 74
  • 75. To the 3-Letter Agencies in the Room • (Yes, I know you’re here) • If you’re even thinking about using this kind of technique for interrogation, you must come to terms with some serious ethical and legal questions • 1st Amendment: Freedom of Speech/Expression • 4th Amendment: Reasonable expectation of privacy • 5th Amendment: Self-incrimination • These are the results from compliant, willing participants • This technology is still in its infancy and should not be considered the ultimate solution to any problem 75
  • 77. This is One Potential Future… 77 IMDb
  • 78. … But We Can Create a Different One 78 IMDb
  • 79. But if there’s one thing I need you to remember from this talk… 79
  • 80. 80 There is a difference between telepathy and targeted elicitation of information.
  • 81. 81 There is a difference between telepathy and targeted elicitation of information.
  • 84. 1. Is Privacy a Right or an Interest? Part 1 • The term “right” is often synonymous with a guarantee, even if there is no legal remedy for an infraction or harm 84
  • 85. 1. Is Privacy a Right or an Interest? Part 1 • The term “right” is often synonymous with a guarantee, even if there is no legal remedy for an infraction or harm • There is renewed interest in a right to privacy given our current internet ecosystem and the lack of control over our information 85
  • 86. 1. Is Privacy a Right or an Interest? Part 1 • The term “right” is often synonymous with a guarantee, even if there is no legal remedy for an infraction or harm • There is renewed interest in a right to privacy given our current internet ecosystem and the lack of control over our information • Without appropriate remedies, there is no right 86
  • 87. 1. Is Privacy a Right or an Interest? Part 1 • The term “right” is often synonymous with a guarantee, even if there is no legal remedy for an infraction or harm • There is renewed interest in a right to privacy given our current internet ecosystem and the lack of control over our information • Without appropriate remedies, there is no right • Is there different language we can use to describe what we are owed, if anything, with respect to our privacy? 87
  • 88. 1. Is Privacy a Right or an Interest? Part 2 • Thomson: There is no right to privacy—rather, what we think of as a right to privacy is just a collection of different, but related, rights 88
  • 89. 1. Is Privacy a Right or an Interest? Part 2 • Thomson: There is no right to privacy—rather, what we think of as a right to privacy is just a collection of different, but related, rights • DeCew: If privacy is instead an interest, it can still be protected or invaded, and discussed without justifying why or how it should be observed 89
  • 90. 1. Is Privacy a Right or an Interest? Part 2 • Thomson: There is no right to privacy—rather, what we think of as a right to privacy is just a collection of different, but related, rights • DeCew: If privacy is instead an interest, it can still be protected or invaded, and discussed without justifying why or how it should be observed • The fact that there is no overarching and defined statutory right to privacy means it will continue to be infringed upon like an interest, or ignored 90
  • 91. 2. Do We Own Our Own Thoughts? • Is ownership necessary to assert privacy claim? Inness says no 91
  • 92. 2. Do We Own Our Own Thoughts? • Is ownership necessary to assert privacy claim? Inness says no • The construct of ownership may only be necessary if there is a value (monetary or otherwise) to the thought 92
  • 93. 2. Do We Own Our Own Thoughts? • Is ownership necessary to assert privacy claim? Inness says no • The construct of ownership may only be necessary if there is a value (monetary or otherwise) to the thought • It may be difficult to know the value of a “thought” until something is done with it 93
  • 94. 2. Do We Own Our Own Thoughts? • Is ownership necessary to assert privacy claim? Inness says no • The construct of ownership may only be necessary if there is a value (monetary or otherwise) to the thought • It may be difficult to know the value of a “thought” until something is done with it • If ownership is assigned: • It’s easier to create a legal construct to protect the person eliciting information, and the company receiving it • But it’s also more difficult of the wrong information is elicited 94
  • 95. 2. Do We Own Our Own Thoughts? • Is ownership necessary to assert privacy claim? Inness says no • The construct of ownership may only be necessary if there is a value (monetary or otherwise) to the thought • It may be difficult to know the value of a “thought” until something is done with it • If ownership is assigned: • It’s easier to create a legal construct to protect the person eliciting information, and the company receiving it • But it’s also more difficult of the wrong information is elicited • The purpose for eliciting information should be important to questions of ownership 95
  • 96. 3. What Relationship Do We Have With Those Who Elicit Information Neurally? • Defining the relationship between the user and the company 96
  • 97. 3. What Relationship Do We Have With Those Who Elicit Information Neurally? • Defining the relationship between the user and the company • Intimacy: specification that choice is involved on the part of the agent providing information, and that the value comes from the original relationship one has with the information (Inness) 97
  • 98. 3. What Relationship Do We Have With Those Who Elicit Information Neurally? • Defining the relationship between the user and the company • Intimacy: specification that choice is involved on the part of the agent providing information, and that the value comes from the original relationship one has with the information (Inness) • When information is elicited not by choice, the violation of privacy can be linked to a lack of acknowledging that the sharing of information is in fact a relationship 98
  • 99. 4. The Importance of Trust • Lack of trust may no longer be an adequate deterrent to a company’s malevolent behavior • 91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information • 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information 99
  • 100. 4. The Importance of Trust • Lack of trust may no longer be an adequate deterrent to a company’s malevolent behavior • 91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information • 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information • Privacy as trust (Waldman): relationship through regulation of access, either restricting or openness 100
  • 101. First Analysis: Person vs App Odds ratio < 1 means respondents perceived the app collecting their neural information as LESS of a privacy issue than if it was collected by a person 101
  • 102. 102 Message Text Record Typing Brain Activity Planned Brain Activity Brain Activity + Emotional State
  • 103. 103 Message Text Record Typing Brain Activity Planned Brain Activity Brain Activity + Emotional State 0.83 0.55 0.77 0.56 0.97 Odds Ratios
  • 104. 104 Message Text Record Typing Brain Activity Planned Brain Activity Brain Activity + Emotional State 0.83 0.55 0.77 0.56 0.97 Odds Ratios
  • 105. Second Analysis: Mobility vs Non-Mobility Impaired Odds ratio < 1: non-mobility impaired individuals perceive the data collected to be less of a privacy violation, compared to those who are Odds ratio > 1: non-mobility impaired individuals perceived data collected to be more of a privacy violation, compared to those who are 105
  • 106. 106 Message Text Record Typing Brain Activity Planned Brain Activity Brain Activity + Emotional State
  • 107. 107 Message Text Record Typing Brain Activity Planned Brain Activity Brain Activity + Emotional State 0.95 0.96 1.24 1.76 1.70 Odds Ratios
  • 108. 108 More Involved Less Involved Same User Researcher Indep Reg Org Legislators Manufacturers Compared to Current Involvement
  • 109. First Analysis: Involvement by Entity How should each entity’s involvement change through the BCI lifecycle 109
  • 110. First Analysis: Involvement by Entity How should each entity’s involvement change through the BCI lifecycle Odds ratio > 1 means less involvement through each stage 110
  • 111. First Analysis: Involvement by Entity How should each entity’s involvement change through the BCI lifecycle Odds ratio > 1 means less involvement through each stage Odds ratio < 1 indicates the entity should be more involved through each stage 111
  • 112. 112 More Involved Less Involved Same User Researcher Indep Reg Org Legislators Manufacturers Compared to Current Involvement 2.481 1.248 0.709 0.685 0.741 Odds Ratios
  • 113. 113 More Involved Less Involved Same User Researcher Indep Reg Org Legislators Manufacturers Compared to Current Involvement 2.481 1.248 0.709 0.685 0.741 Odds Ratios
  • 114. Second Analysis: Involvement by Stage 114 Who should be more involved at each stage? Odds ratios > 1 means involvement should decrease going from user to device manufacturer Odds ratios < 1, involvement should increase going from user to device manufacturer.
  • 115. Second Analysis: Involvement by Stage Who should be more involved at each stage? Odds ratios > 1 means involvement should decrease going from user to device manufacturer Odds ratios < 1, involvement should increase going from user to device manufacturer. 115
  • 116. Second Analysis: Involvement by Stage 116 Who should be more involved at each stage? Odds ratios > 1 means involvement should decrease going from user to device manufacturer Odds ratios < 1, involvement should increase going from user to device manufacturer.
  • 117. 117 More Involved Less Involved Same User Researcher Indep Reg Org Legislators Manufacturers Compared to Current Involvement 1.461 1.536 0.620 Odds Ratios
  • 118. 118 More Involved Less Involved Same User Researcher Indep Reg Org Legislators Manufacturers Compared to Current Involvement 1.461 1.536 0.620 Odds Ratios
  • 119. DGE-1256082 DGE-1762114 NSF EEC 1028725 Sources of Funding 119 Irene Peden Endowed Fellowship

Editor's Notes

  1. DEBUNK A LOT OF THE HYPE, SHARE THE REALITY Hype as manipulation…. We’re not actually there yet Patterns of generalized responses to the brain
  2. Policy = general term for legislation, regulation, delegation, independent oversight, etc.
  3. This is how associations are given in the analysis of survey questions in parts 2 or 3 Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
  4. This is how associations are given in the analysis of survey questions in parts 2 or 3 Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
  5. The concept of taking information for some malicious purpose was intuitive to the common viewer in 1995, before the technology itself was mature.
  6. Just one example
  7. However, this same group has also published results that demonstrate masking effect by having subjects perform various actions in response to the non-targets that they knew about before the experiment started (J.Peter Rosenfeld, Matthew Soskins, Gregory Bosh, and Andrew Ryan. Simple, effective countermeasures to P300-based tests of detection of concealed information. Psychophysiology, 41(2):205–219, March 2004.) Time-locked changes in neural signal amplitude based on specific stimuli ERN – error recognition, frontal/central P300 – oddball, parietal N400 – semantic processing, centro-parietal P600 – unexpected grammar, centro-parietal N400: unexpected words in read sentences… semantic processing, and is not just a response to unexpected words. P600: grammatical inconsistencies, or unexpected order (The brown quick fox jump over the lazy dog). Each ERP has its own paradigms and uses in research, and it may be possible to extract different kinds of personal information based on the measured ERP.
  8. Targeted elicitation: showing specific stimuli in order to observe the kind of response. This is a paradigm that is studied extensively in literature
  9. Targeted elicitation: showing specific stimuli in order to observe the kind of response. This is a paradigm that is studied extensively in literature
  10. 10 subjects total (8 male, 2 female, average age 31.3 minus one subject who did not provide age) Analyzed 7 subjects 10 total rounds per subject, with subject-determined breaks in between each round At the beginning of each round, the subject selects a number, then looks at 200 pseudorandom digit stimuli (20 x 10 digits) 5 of 7 analyzed subjects did counterbalanced attention sessions (pressing the space bar)
  11. So assuming that the error is the same between trials, repetition of trials will allow for the extraction of a digit, or a particular kind of information, up to a given threshold (not 100%, there will always be some sort of error) Repetitions can be adaptive
  12. So assuming that the error is the same between trials, repetition of trials will allow for the extraction of a digit, or a particular kind of information, up to a given threshold (not 100%, there will always be some sort of error) Repetitions can be adaptive Non-spacebar to start
  13. Overly Honest Methods: singular boundary fit… so need to get better at R and will probably have in the final dissertation text For space-bar rounds (attention), the target digit was calculated 8/25 times For non-spacebar rounds (passive), the target digit was calculated 6/45 times
  14. Subject knows the game and is preparing for the next time Slightly more likely to calculate next digit versus current digit (using something called an odds ratio, or strength of correlation between two events, 1.04) The odds ratio of calculating the next digit compared to the current digit is 1.04
  15. Subject knows the game and is preparing for the next time Left: non-spacebar first Right: spacebar first The odds ratio of calculating the next digit compared to the current digit is 1.04
  16. It’s not reliable and people don’t actually want this What would the residents of Gotham have said if they were asked about having all of their neural data taken by Edward Nygma?
  17. Questioning what is private and what is public always happens when new tech comes out Photography: 1890 that “[i]nstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life” Warren and Brandeis (1890)
  18. These are the four that I considered and did in-depth research
  19. These are the four that I considered and did in-depth research
  20. These are the four that I considered and did in-depth research
  21. These are the four that I considered and did in-depth research
  22. Distributed online Responses taken for 24 days 77 respondents 46 Female, 27 Male, 3 other (nonbinary, genderqueer, born female), 1 no resp. Average age 39.7, median 35.5 18 indicated mobility impairment
  23. Answers were requested on 5-point Likert scale from Disagree Completely to Agree Completely, and the prompts were given as: Person: (a) ... read the content of a text message I sent to my family member (b)  ... recorded a video of me typing a text message to my family member which they watched later to find out the content of the text message. (c)  ... obtained a recording of my brain activity while I typed a text message to my family member from which the content of my text message could be figured out. (d)  ... obtained a recording of my brain activity *as I was planning* to type out a text message to my family member such that the content of the text message could be predicted before I typed it. (e)  ... obtained a recording of my brain activity that included my emotional state while typing a message to my family member (e.g., to reveal feelings of inattention, boredom, excitement, anxiety, other states?) App on Phone: (a)  ... downloaded and stored the content of a text message I sent to my family member (b)  ... used a keylogger to record me typing out the message in real time, including what was typed and deleted. (c)  ... obtained a recording of my brain activity while I typed a text message to my family member from which the content of my text message could be figured out. (d)  ... obtained a recording of my brain activity *as I was planning* to type out a text message to my family member such that the content of the text message could be predicted before I typed it. (e)  ... obtained a recording of my brain activity that included my emotional state while typing a message to my family member (e.g., to reveal feelings of inattention, boredom, excitement, anxiety, other states?)
  24. Largest perceived privacy violation is advance planning obtained by a person FaceApp
  25. Example categories
  26. “Impact on the person” Feedback loop Benefit was not identified Relevance
  27. Most people think neural information is important… would love to talk to the 1% who think neural information is less important than their exercise tracker info, or 9% who think their neural information is less important than their shopping history. Things that can be perceived as “more personal” or belonging to the body, diary or genetic information, it’s more split… Don’t do commercial DNA tests!
  28. If Harvey Dent hadn’t become Two Face, could he have prosecuted Edward Nygma? Could Bruce Wayne and Nygma’s supervisor cited regulation or legislation that would have been more effective at stopping the project instead of just “this is dangerous and we don’t like it?”
  29. The increasing use of genetic testing helps with identifying and diagnosing medical conditions. But because many of these are correlated or occur only in unique populations, it may deter an individual to seek out treatment (sickle cell anemia in African-Americans is explicitly called out as previously addressed example in the legislative text), due to subsequent discrimination [2]. From an implementation standpoint, it invokes the 1964 Civil Rights Act as well as the Equal Employment Opportunity Commission to amend various existing federal regulations to prohibit employment and health insurance discrimination based on one’s genetic profile. Wall Street Journal advice: Don’t post photos of yourself smoking on social-media sites. Do post photos of yourself running. Riskier sports, like skydiving, could complicate the situation. Use fitness-tracking devices that indicate an interest in fitness. Purchase food from online meal-preparation services that specialize in healthy choices. Visit the gym with a phone linked to a location-tracking service. If you visit the bar, leave your phone at home. So could we move to a world where you’re required to provide neural information for life insurance or job screenings?
  30. IROs: Developing standards for accuracy or anonymization of signals
  31. IROs: Developing standards for accuracy or anonymization of signals I’m considering hackers as an IRO in this case… y’all have a ton of power to look at systems and see what’s happening.
  32. IROs: Developing standards for accuracy or anonymization of signals
  33. Notice and consent is broken (Existing regulatory frameworks do not necessarily have to be applied to this kind of data (e.g. does not have to be notice and consent)
  34. So yes, we’re in a bad place, but it’s not too late (relatively speaking) to combat the problem. I asked three questions in this dissertation, looking at the holistic picture of neural security and its ethical and policy implications, to create a more comprehensive solution.
  35. Put up link to actually calling/contacting reps Daniel Zolnikov (spoke a DEFCON last year, MT legislator)
  36. Put up link to actually calling/contacting reps
  37. Some non-government members of the audience are probably very mad that I even considered doing this kind of research, because I’m just handing it to them on a silver platter. Instead, I did the work so that you, the general DEFCON audience and beyond, have just one example of technology that’s coming down the road. You now know to look for what signals are being analyzed when you use a BCI, and that it’s not as simple as “I’m going to laser a hole in your skull and throw in a wire.” This is an incredibly valuable and nuanced field that deserves more attention than it’s getting. But since I know that this does have some in the government very interested, I want to talk directly to you now.
  38. 4th amendment reasonable expectation of privacy 5th amendment self incrimination 1st amendment freedom of speech/expression Can’t use fMRI in US courts (lawneuro.org, Vanderbilt and MacArthur Foundation Research Network)
  39. 4th amendment reasonable expectation of privacy 5th amendment self incrimination 1st amendment freedom of speech/expression
  40. You can’t solve
  41. Let’s not be too dystopian about this
  42. Very specific question with a limited number of answers
  43. CIRCLE BACK TO SCIENCE FICTION ARC WEAVE THE NARRATIVE THROUGH Questions for the creators… what world are you envisioning Digital exhaust vs closed loop Pick a future that is very pro-future (where humans win)… not just dystopia
  44. There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it (where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?) Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  45. There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it (where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?) Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  46. There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it (where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?) Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  47. There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it (where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?) Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  48. So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information) Sharing a fact that was given to you in confidence (violating a right to confidentiality) Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  49. So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information) Sharing a fact that was given to you in confidence (violating a right to confidentiality) Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  50. So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information) Sharing a fact that was given to you in confidence (violating a right to confidentiality) Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
  51. Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them? I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
  52. Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them? I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
  53. Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them? I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
  54. Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them? I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
  55. Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them? I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
  56. If one chooses to allow a company to elicit information that can be used for future targeted ads, the user is allowing for an intimate relationship because the receiver (the company) is able to create value (monetary) from the information.
  57. And if a company is being truthful up front about why information is being requested, they may be initiating a intimate relationship that reassures the user. Having transparency and choice changes the relationship between user and company from one of taking to one of mutual understanding.
  58. 91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information, while 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information
  59. 91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information, while 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information
  60. Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event ordinal logistic regression with clustering by individual Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that people perceive app collecting data as less of a privacy issue than collected by people. Calculated with 95% confidence interval
  61. While all situations indicated that the app collecting information was less of a privacy violation compared to the person, the only one statistically significant with a 95% confidence interval was for the person obtaining planned neural activity being the greatest perceived privacy violation.... don't want people to know your future plans.
  62. For all cases, the app was less of a privacy violation Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that subjects perceive app collecting data as less of a privacy issue than collected by people. Calculated with 95% confidence interval Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
  63. The only one statistically significant with a 95% confidence interval was for the person collecting planned neural activity being the greatest perceived privacy violation. This unease with future knowledge ties in with the finding from the first section about being able to calculate future digits in the single digit guessing game.
  64. Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event Odds ratio < 1 means respondents who did not indicate a mobility impairment perceive the data collected to be less of a privacy violation, compared to those who did indicate a mobility impairment. Also means that odds ratio > 1 means non-mobility impaired individuals perceived data collected to be more of a privacy violation, compared to those who are
  65. Unfortunately, none of these results are statistically significant, but there is a noticeable split of perceptions of privacy. Just the messages themselves, or recording of the message being typed, is more of a privacy violation for mobility-impaired individuals The scenarios that involved neural activity were more of a privacy violation for non-mobility impaired individuals. There’s several further analyses for this data.
  66. Users and university researchers should be LESS involved going from development to usage to reparations Independent regulatory organizations, legislators, and manufacturers should be MORE involved going from development to usage to reparations.
  67. And in fact, it’s the latter three entities that are statistically significant Reparations for malicious elicitation or misuse
  68. This is assuming that the ranking of user, researcher, IRO, legislator, device manufacturer --- is in fact in a rank order
  69. This is assuming that the ranking of user, researcher, IRO, legislator, device manufacturer --- is in fact in a rank order
  70. Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that people perceive app collecting data as less of a privacy issue than collected by people. Calculated with 95% confidence interval
  71. So in development and usage, involvement should decrease across entities. In the reparations area, involvement should increase
  72. And in fact, the increase in involvement in reparations across entities is the only one that is statistically significant
  73. Give the TPL a moment (Ryan, Howard, Tamara, etc…)