SlideShare a Scribd company logo
Privacy Reconsidered: The Ethic of Privacy and Why Anonymous Matters Brian J. Alseth, Esq.  Technology and Liberty Director  ACLU of Washington
What is privacy?
There are knowable unknowables and then there are unknowable unknowables, and then there is the internet Majority of Americans state they are very concerned about their privacy and what online companies are doing with their data Facebook has over 600 million users and has overtaken Google as the top visited site. Zuckerberg’s Law – Sharing will grow exponentially whereby people will share twice as much this year as last, and next year will see people sharing twice the amount of content as this year, etc.  (track’s with Moore’s law). Top 100 websites include mostly user generated content Youtube – 24 hours of new content is posted to youtube every minute of every day.
Industry’s Response
So once again, what is privacy? We say one thing . . . But we each have a different threat model
Behold! DATA The Power of
Firesheep
MOORE’S LAW Charts: Zoomer Magazine, Computer Measurement Group
The Future of Moore’s Law Today: $349.99                  In 20 years: $0.04
Government and Court Records Customer and Commercial Records Elections The story of your life…in data Consumer and Online Records And so much more…
Government Records Court Records Census Voterfiles Secretary of State Filings
ELECTION DATA Voterfile Party Data
Where is my web data going?
Data Brokers Data from all sources is interrelated and is compiled, analyzed and sold by Data Brokers – The used car dealers of data InfoUsa Hoovers Experion Dunn and Bradstreet  Reed Elsevier -(Choicepoint, Lexis) CACI
Facial-Recognition
Video Analytics
DNA
Technologies Combined
“Ring of Steel” ,[object Object]
Combine with license plate readers, central monitoring, Face recognition
Access-control gates,[object Object]
Cracked Magazine
THE HAXORZ ARE REAL?!? OH NOES!!!
Identity Theft & Data Security Over 600 million records containing private info lost in security breaches since January 2005 ID Theft is allegedly more profitable to organized crime than drugs. Cost per valid CC# on carder sites: $.04
Apps, ATMS and Google, oh my.
So, Privacy is Dead, Right?
Would You Define Privacy Already?
Public and Private are relative terms, like hot and cold, wet and dry.  One defines the other and neither exists alone.   Every revolution in communication technology has resulted in IRL revolution once the public is given the means to speak without fear of reprisal; to speak anonymously. Since Brandeis and the Kodak, however, each new bit of technology also brings with it a measure of privacy fear.
Fear isn’t everything though. Not all 600 Million Facebook users are crazy.
Privacy fears can lead to lead to censorship of that which should be public Self regulation and market regulation of privacy leads to industry being the sole regulator and protector of privacy.  Germans hate Google Street View, so Google now blurs German houses in street view to continue to do business in Germany. Google has censored Chinese search traffic and the Aurora Attacks arose out of a Chinese Politburo Member Googling his name and finding unflattering things. In the US, Google obscures a number of public buildings including the Vice President’s mansion.   If Google can be pressured to pixelate images of public buildings, what next? Why do we trust Google? ,
Why is the private private and the Public Public? Because some things are just creepy, right?  Define “Creepy” Policy Shouldn’t be based on an undefined emotion Scandinavian countries publish salaries. U.S. publishes mugshots.
Absolute Privacy, Trust and Duty What is absolute privacy? Only that which you keep in your head.  (Cat’s third name, PD). For all other knowledge exchanges, the individual provides information based on some trust/value calculus. No matter how small the reveal, the provider has certain expectations as to how the recipient will receive and use the information.  These expectations are privacy. What if you could share and speak anonymously? TL:DR – knowledge = duty = privacy + Anon tease
Privacy as an Ethic – The Duty of Knowing
First, The Ethic of Publicness That which is public must be: 	Generous 	Transparent 	Authentic We must demand publicness from those who protect our privacy. Publicness is a potential tool and a weapon. Wikileaks didn’t bring about the apocalypse, and the work of the people should be done before the people.
The Ethic of Privacy Don’t Steal Information Protect Information Context Matters (threat model (g-chat v. Obama’s Blackberry, culture, etc.) Give Credit Be Transparent about use of information Give Access Don’t Use Information Against the Individual Where information is collected, a return value must be provided. (free services for data – google, facebook, OKCupid).
That’s why we have laws and stuff, right? No expectation of privacy or warrant needed for information we turn over to third parties.  Electronic Communications Privacy Act (ECPA) of 1986 Feudal age of data regulation – Assorted state and local statutes Law enforcement officials have claimed that records of online activities are not protected. What result for data in the cloud? E-book, iPad, phone GPS tracking?
What Must Be Done? Update ECPA and enact comprehensive technology specific privacy laws
Technology Did Not Kill Privacy . . . But Privacy by Policy Alone Might
If Not Privacy By Policy, then What? www.privacybydesign.ca  - Dr. Ann Cavoukian Information & Privacy Commissioner of Ontario
7 Foundational Principles of Privacy by Design 1. Proactive not Reactive; Preventative not Remedial  2. Privacy as the Default  3. Privacy Embedded into Design  4. Full Functionality – Positive-Sum, not Zero-Sum  5. End-to-End Lifecycle Protection  6. Visibility and Transparency  7. Respect for User Privacy
Clever Transition to Anonymous Portion
Anonymous Speech This country is founded on the freedom of speech which includes a right to speak anonymously.  Publius When an oppressive regime shuts down open channels of communication only anonymous speech can continue to safely question the  Anonymous speech requires no trust relationship, allowing people to freely speak their minds without fear of persecution or shame No trust and no duty, however, also allows people to divorce themselves from responsibility for their speech - None of us are as cruel as all of us
The Anonymous Internet What happens when people have the ability to use the internet as an anonymous forum to interact with strangers? Sadly, ChatRoulette answered this question all too clearly
4Chan – The Soul of The Internet What is 4Chan? Anonymous Image Board No Archives The likely source of everything amazing and horrible you’ve seen on the internet.
Lolcats, Image macros and Chanspeak
Rule 34 and memes Anonymous allows the community to take hold of something and make it something new. Original content barely exists
Anonymous allows the community to take hold of something and make it something new. Original content barely exists
Anonymous also brings out the worst Anonymous will test the limits of the first amendment.
The Other Side of Online Anonymous Speech The Tor Project Navy built to provide anonymous channels State department funds efforts to train foreign dissidents of oppressive regimes to use Tor to communicate anonymously.  Used by journalists, military, students, dissidents and anyone and everyone else. Also forms the backbone of the secure wikileaks document submission process Wikileaks Provides anonymous means for those in possession of secrets to release them. Secrets are power.  Wikileaks seeks to return that power to the people.
Anonymous & Hackers in the Middle East
Anonymous in the Middle East After Egypt and other regimes shut down the internet, a volunteer militia of volunteer hackers and other interested parties set to work restoring communications and attacking the government  Anon_Ops –  developed makeshift comms 1-pager Faxbombedwikileaks Egypt docs to Egypt. LOIC lasers pointed at Government Targets Others Voice to tweet invented and deployed Ad Hoc networks and other support
Anonymous the Collective  Roots in 4Chan Although clans exist, and leaders necessarily emerge Anonymous is nebulous and without leadership. Longstanding fight with Scientology Things changed about a year ago with Wikileaks Operation Payback Gawker HB Gary Scott Walker the Furry? Anonymous is the internet The internet is feeling threatened.
Anonymous Speech is Threatened The right to connect is fundamental Anonymous is frightening Fear again leads to censorship and curtailing of rights New Digital ID systems threaten online anonymous speech as one would essentially log in to use an ISP Blogs, newspapers, and even 4Chan have been ordered to divulge identifying information about anonymous posters which chills speech.  No one entity should have the power to shut down the internet. We are all anonymous and we all need our protection.

More Related Content

What's hot

Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
Shawn Tuma
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)
Felipe Prado
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Piracy
PiracyPiracy
Piracy
Manasa Mona
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
Victoria Herring
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
Felipe Prado
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Sidejbraindc
 
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPAThe Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
Shanna Kurpe
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
Cheldy S, Elumba-Pableo
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Webabraxasdarknetmarket
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.
Emiland
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile worldMark Tremblay
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
Amy Larrimore
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
TeamOneI1MBA11
 

What's hot (20)

Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Piracy
PiracyPiracy
Piracy
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
 
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPAThe Internet Blackout of 2012 - Protest Against SOPA and PIPA
The Internet Blackout of 2012 - Protest Against SOPA and PIPA
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
 
Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.Dear NSA, let me take care of your slides.
Dear NSA, let me take care of your slides.
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile world
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 

Similar to Privacy reconsidered

Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Internet Privacy
Internet PrivacyInternet Privacy
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
Felipe Prado
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
Felipe Prado
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
lilianedwards
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
Felipe Prado
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
CHEMISTRY AGENCY
 

Similar to Privacy reconsidered (15)

Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
 
Polinter11
Polinter11Polinter11
Polinter11
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 

More from Brian Rowe

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBA
Brian Rowe
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lecture
Brian Rowe
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Brian Rowe
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix Culture
Brian Rowe
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
Brian Rowe
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismBrian Rowe
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101Brian Rowe
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureBrian Rowe
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipenBrian Rowe
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy IgniteBrian Rowe
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentBrian Rowe
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Brian Rowe
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thBrian Rowe
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Brian Rowe
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Brian Rowe
 

More from Brian Rowe (20)

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBA
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lecture
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - Draft
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix Culture
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Ecc 2013
Ecc 2013 Ecc 2013
Ecc 2013
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
 
WLA Lecture
WLA LectureWLA Lecture
WLA Lecture
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

Privacy reconsidered

  • 1. Privacy Reconsidered: The Ethic of Privacy and Why Anonymous Matters Brian J. Alseth, Esq. Technology and Liberty Director ACLU of Washington
  • 3. There are knowable unknowables and then there are unknowable unknowables, and then there is the internet Majority of Americans state they are very concerned about their privacy and what online companies are doing with their data Facebook has over 600 million users and has overtaken Google as the top visited site. Zuckerberg’s Law – Sharing will grow exponentially whereby people will share twice as much this year as last, and next year will see people sharing twice the amount of content as this year, etc. (track’s with Moore’s law). Top 100 websites include mostly user generated content Youtube – 24 hours of new content is posted to youtube every minute of every day.
  • 5. So once again, what is privacy? We say one thing . . . But we each have a different threat model
  • 6. Behold! DATA The Power of
  • 8. MOORE’S LAW Charts: Zoomer Magazine, Computer Measurement Group
  • 9. The Future of Moore’s Law Today: $349.99 In 20 years: $0.04
  • 10.
  • 11. Government and Court Records Customer and Commercial Records Elections The story of your life…in data Consumer and Online Records And so much more…
  • 12. Government Records Court Records Census Voterfiles Secretary of State Filings
  • 14. Where is my web data going?
  • 15. Data Brokers Data from all sources is interrelated and is compiled, analyzed and sold by Data Brokers – The used car dealers of data InfoUsa Hoovers Experion Dunn and Bradstreet Reed Elsevier -(Choicepoint, Lexis) CACI
  • 18. DNA
  • 20.
  • 21. Combine with license plate readers, central monitoring, Face recognition
  • 22.
  • 24. THE HAXORZ ARE REAL?!? OH NOES!!!
  • 25. Identity Theft & Data Security Over 600 million records containing private info lost in security breaches since January 2005 ID Theft is allegedly more profitable to organized crime than drugs. Cost per valid CC# on carder sites: $.04
  • 26. Apps, ATMS and Google, oh my.
  • 27. So, Privacy is Dead, Right?
  • 28. Would You Define Privacy Already?
  • 29. Public and Private are relative terms, like hot and cold, wet and dry. One defines the other and neither exists alone. Every revolution in communication technology has resulted in IRL revolution once the public is given the means to speak without fear of reprisal; to speak anonymously. Since Brandeis and the Kodak, however, each new bit of technology also brings with it a measure of privacy fear.
  • 30. Fear isn’t everything though. Not all 600 Million Facebook users are crazy.
  • 31. Privacy fears can lead to lead to censorship of that which should be public Self regulation and market regulation of privacy leads to industry being the sole regulator and protector of privacy. Germans hate Google Street View, so Google now blurs German houses in street view to continue to do business in Germany. Google has censored Chinese search traffic and the Aurora Attacks arose out of a Chinese Politburo Member Googling his name and finding unflattering things. In the US, Google obscures a number of public buildings including the Vice President’s mansion. If Google can be pressured to pixelate images of public buildings, what next? Why do we trust Google? ,
  • 32. Why is the private private and the Public Public? Because some things are just creepy, right? Define “Creepy” Policy Shouldn’t be based on an undefined emotion Scandinavian countries publish salaries. U.S. publishes mugshots.
  • 33. Absolute Privacy, Trust and Duty What is absolute privacy? Only that which you keep in your head. (Cat’s third name, PD). For all other knowledge exchanges, the individual provides information based on some trust/value calculus. No matter how small the reveal, the provider has certain expectations as to how the recipient will receive and use the information. These expectations are privacy. What if you could share and speak anonymously? TL:DR – knowledge = duty = privacy + Anon tease
  • 34. Privacy as an Ethic – The Duty of Knowing
  • 35. First, The Ethic of Publicness That which is public must be: Generous Transparent Authentic We must demand publicness from those who protect our privacy. Publicness is a potential tool and a weapon. Wikileaks didn’t bring about the apocalypse, and the work of the people should be done before the people.
  • 36. The Ethic of Privacy Don’t Steal Information Protect Information Context Matters (threat model (g-chat v. Obama’s Blackberry, culture, etc.) Give Credit Be Transparent about use of information Give Access Don’t Use Information Against the Individual Where information is collected, a return value must be provided. (free services for data – google, facebook, OKCupid).
  • 37. That’s why we have laws and stuff, right? No expectation of privacy or warrant needed for information we turn over to third parties. Electronic Communications Privacy Act (ECPA) of 1986 Feudal age of data regulation – Assorted state and local statutes Law enforcement officials have claimed that records of online activities are not protected. What result for data in the cloud? E-book, iPad, phone GPS tracking?
  • 38. What Must Be Done? Update ECPA and enact comprehensive technology specific privacy laws
  • 39. Technology Did Not Kill Privacy . . . But Privacy by Policy Alone Might
  • 40. If Not Privacy By Policy, then What? www.privacybydesign.ca - Dr. Ann Cavoukian Information & Privacy Commissioner of Ontario
  • 41. 7 Foundational Principles of Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Lifecycle Protection 6. Visibility and Transparency 7. Respect for User Privacy
  • 42. Clever Transition to Anonymous Portion
  • 43. Anonymous Speech This country is founded on the freedom of speech which includes a right to speak anonymously. Publius When an oppressive regime shuts down open channels of communication only anonymous speech can continue to safely question the Anonymous speech requires no trust relationship, allowing people to freely speak their minds without fear of persecution or shame No trust and no duty, however, also allows people to divorce themselves from responsibility for their speech - None of us are as cruel as all of us
  • 44. The Anonymous Internet What happens when people have the ability to use the internet as an anonymous forum to interact with strangers? Sadly, ChatRoulette answered this question all too clearly
  • 45. 4Chan – The Soul of The Internet What is 4Chan? Anonymous Image Board No Archives The likely source of everything amazing and horrible you’ve seen on the internet.
  • 46. Lolcats, Image macros and Chanspeak
  • 47. Rule 34 and memes Anonymous allows the community to take hold of something and make it something new. Original content barely exists
  • 48. Anonymous allows the community to take hold of something and make it something new. Original content barely exists
  • 49. Anonymous also brings out the worst Anonymous will test the limits of the first amendment.
  • 50. The Other Side of Online Anonymous Speech The Tor Project Navy built to provide anonymous channels State department funds efforts to train foreign dissidents of oppressive regimes to use Tor to communicate anonymously. Used by journalists, military, students, dissidents and anyone and everyone else. Also forms the backbone of the secure wikileaks document submission process Wikileaks Provides anonymous means for those in possession of secrets to release them. Secrets are power. Wikileaks seeks to return that power to the people.
  • 51. Anonymous & Hackers in the Middle East
  • 52. Anonymous in the Middle East After Egypt and other regimes shut down the internet, a volunteer militia of volunteer hackers and other interested parties set to work restoring communications and attacking the government Anon_Ops – developed makeshift comms 1-pager Faxbombedwikileaks Egypt docs to Egypt. LOIC lasers pointed at Government Targets Others Voice to tweet invented and deployed Ad Hoc networks and other support
  • 53. Anonymous the Collective Roots in 4Chan Although clans exist, and leaders necessarily emerge Anonymous is nebulous and without leadership. Longstanding fight with Scientology Things changed about a year ago with Wikileaks Operation Payback Gawker HB Gary Scott Walker the Furry? Anonymous is the internet The internet is feeling threatened.
  • 54. Anonymous Speech is Threatened The right to connect is fundamental Anonymous is frightening Fear again leads to censorship and curtailing of rights New Digital ID systems threaten online anonymous speech as one would essentially log in to use an ISP Blogs, newspapers, and even 4Chan have been ordered to divulge identifying information about anonymous posters which chills speech. No one entity should have the power to shut down the internet. We are all anonymous and we all need our protection.
  • 55. Contact info: Brian J. Alseth Technology and Liberty Director ACLU of Washington balseth@aclu-wa.org 206-624-2184 @balseth