privacy Virus tracing app raises privacy concerns in India By www.dailystar.com.lb Published On :: 2020-05-08T21:19:00.0000000 As India enters an extended coronavirus lockdown, the government is actively pursuing contact tracing to help control infections. Full Article World
privacy Why People Demanded Privacy to Confide in the World’s First Chatbot By feedproxy.google.com Published On :: Mon, 18 Nov 2019 14:00:00 GMT In 1966, the Eliza program couldn’t say much—but it was enough Full Article robotics robotics/artificial-intelligence
privacy New NHS contact tracing app 'must be open for scrutiny' over protecting user privacy, main opposition parties say By www.standard.co.uk Published On :: 2020-04-12T19:05:00Z Read our live coronavirus updates HERE Full Article
privacy Meghan Markle privacy claim case against Mail on Sunday kicks off with first court hearing By www.standard.co.uk Published On :: 2020-04-24T06:50:00Z Meghan wrote in her letter: 'Your actions have broken my heart into a million pieces' Full Article
privacy Meghan Markle claims Mail on Sunday 'exploited' her father and 'caused' rift between them as privacy case begins By www.standard.co.uk Published On :: 2020-04-24T10:26:00Z Mr White also took issue with the duchess's allegation that the publisher "acted dishonestly" when deciding which parts of her letter to her father to publish. Full Article
privacy High Court to rule on first stage of Meghan Markle's privacy claim against Mail on Sunday By www.standard.co.uk Published On :: 2020-05-01T06:20:00Z The High Court is due to give its ruling on the first stage of the Duchess of Sussex's privacy claim against Mail on Sunday today. Full Article
privacy Meghan Markle loses first stage of High Court privacy action against Mail on Sunday By www.standard.co.uk Published On :: 2020-05-01T10:34:00Z The publisher of the Mail on Sunday has won the first High Court skirmish in the Duchess of Sussex's privacy claim against it over publication of a letter to her estranged father. Full Article
privacy Charity warns of privacy concerns over coronavirus contact-tracing app By www.standard.co.uk Published On :: 2020-05-04T19:26:00Z The UK public's right to privacy could become "another casualty" of the coronavirus crisis through the use of a contact-tracing app, Amnesty International UK has warned. Full Article
privacy COVID-19 tracing apps come with privacy risks to Canadians, watchdogs warn By globalnews.ca Published On :: Thu, 07 May 2020 18:48:00 +0000 Federal privacy commissioner Daniel Therrien says the health crisis calls for some flexibility when it comes to the application of privacy laws. Full Article Canada Tech contact tracing contact tracing alberta contact tracing canada contact tracing coronavirus Coronavirus coronavirus canada COVID covid canada COVID-19 Privacy privacy Canada Privacy Commissioner What Is Contact Tracing
privacy Google data suggests Canadians following COVID-19 rules, but experts wary over privacy By globalnews.ca Published On :: Thu, 07 May 2020 19:27:57 +0000 While location-tracking technology is nothing new, privacy and ethics experts have been wary about its use on such a large scale — especially by governments. Full Article Canada Health Politics Science Tech Canada Coronavirus Canada COVID-19 Coronavirus coronavirus canada Coronavirus In Canada COVID-19 google coronavirus google mobility data google tracking coronavirus google tracking COVID-19 google tracking data Privacy privacy google
privacy Google and Apple place privacy limits on countries using their coronavirus tracing technology By news.yahoo.com Published On :: Mon, 04 May 2020 16:23:33 -0400 The tech giants shared details Monday about the tools they’ve been developing to help governments and public health authorities trace the spread of the coronavirus. Full Article
privacy What is contact tracing? Here's what you need to know about how it could affect your privacy By www.cbc.ca Published On :: Thu, 7 May 2020 04:00:00 EDT Health experts agree contact tracing is a key measure to contain a pandemic. But is the answer a contact tracing app? Full Article News/Canada
privacy Canada's privacy commissioners offer guidance on COVID-19 contact-tracing apps By www.cbc.ca Published On :: Thu, 7 May 2020 22:22:47 EDT As New Brunswick and other provincial governments contemplate launching COVID-19 contact-tracing apps, privacy watchdogs from across the country have issued joint guidelines on what they are describing as an "extraordinary" measure, urging transparency and accountability. Full Article News/Canada/New Brunswick
privacy Newsletter: Privacy-minded consumer groups say the kids aren't all right By www.latimes.com Published On :: Mon, 9 Dec 2019 08:00:51 -0500 Coalition calls on FTC to review how companies are marketing to children and tracking them online. Full Article
privacy It's 2020 and you have new privacy rights online. But you might have to show ID By www.latimes.com Published On :: Wed, 1 Jan 2020 03:01:29 -0500 Californians have newfound power over their online information in 2020. Here's how to exercise those new rights. Full Article
privacy Seeing those opt-out messages about your personal information on websites? Thank California's new privacy law By www.latimes.com Published On :: Thu, 2 Jan 2020 09:57:01 -0500 "Do not sell my info" links popped up on websites New Year's Day as companies scrambled to comply with California's sweeping new consumer privacy protection law. Full Article
privacy Ad industry seeks to delay new California data privacy law By www.latimes.com Published On :: Wed, 29 Jan 2020 18:57:00 -0500 Some of the advertising industry's biggest trade associations are asking California's attorney general to delay enforcement of the state's new privacy law — which is set for July 1— by at least six months. Full Article
privacy How effective will the UK Covid-19 contact tracing app be and will it protect your privacy? By www.itv.com Published On :: Thu, 07 May 2020 15:01:47 +0100 Questions remain over the viability of the coronavirus contact tracing app that has been developed by the NHS's digital department, NHSX. Full Article
privacy Statement of Deputy Assistant Attorney General Jason Weinstein Before the Senate Judiciary Subcommittee on Privacy, Technology and the Law By www.justice.gov Published On :: Tue, 10 May 2011 10:57:21 EDT "One of the Department of Justice’s core missions is protecting the privacy of Americans and prosecuting criminals who violate that privacy," said Deputy Assistant Attorney General Weinstein. Full Article Testimony
privacy Joint Statement on the Negotiation of a EU-U.S. Data Privacy and Protection Agreement by Attorney General Eric Holder and European Commission Vice-President Viviane Reding By www.justice.gov Published On :: Thu, 21 Jun 2012 09:59:40 EDT Attorney General Eric Holder and European Commission Vice-President Viviane Reding issued the following statement following the EU-U.S. Justice and Home Affairs Ministerial meeting in Copenhagen. Full Article OPA Press Releases
privacy U.S. and Canada Announce the Release of the Beyond the Border: Statement of Privacy Principles By www.justice.gov Published On :: Thu, 28 Jun 2012 16:19:43 EDT The United States and Canada today announced they are delivering on key commitments under the U.S.-Canada Beyond the Border Action Plan by releasing a joint Statement of Privacy Principles. Full Article OPA Press Releases
privacy Testimony as Prepared for Delivery by Acting Assistant Attorney General for the Criminal Division Mythili Raman Before the U.S. Senate Committee on the Judiciary on the Topic, “Privacy in the Digital Age” By www.justice.gov Published On :: Tue, 4 Feb 2014 16:28:52 EST At the Department of Justice, we are devoting significant resources and energy to fighting computer hacking and other types of cybercrime. The recent revelations about the massive thefts of financial information from large retail stores have served as a stark reminder to all of us about how vulnerable we are to cyber criminals who are determined to steal our personal information. The Justice Department is more committed than ever to ensuring that the full range of government enforcement tools is brought to bear in the fight against cybercrime. Full Article Speech
privacy APEC Steps Up Promotion of Cross-Border Privacy Rules By www.apec.org Published On :: Thu, 12 Sep 2019 11:08:00 +0800 APEC economies, data privacy regulators, and other stakeholders are exploring ways to bolster the Cross-Border Privacy Rules (CBPR) system. Full Article
privacy DHC Privacy Post By regulatoryrx.blogspot.com Published On :: Thu, 16 Jan 2020 15:20:00 +0000 The Digital Health Coalition asked for my views on the renewed emphasis on privacy for pharmaceutical marketers. I shared a few thoughts here. Full Article Digital Health Coalition privacy
privacy Privacy and Security in the Cloud Computing Age By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 10:00:00 -0400 Event Information October 26, 201010:00 AM - 11:30 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventAlthough research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.” After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20101026_cloud_computing Full Article
privacy Privacy and Security in Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 11:50:00 -0400 Executive Summary Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks. What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b). This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009). Downloads Download the Full Paper Authors Allan A. FriedmanDarrell M. West Image Source: Jupiterimages Full Article
privacy Bridging Transatlantic Differences on Data and Privacy After Snowden By webfeeds.brookings.edu Published On :: Tue, 20 May 2014 07:30:00 -0400 “Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships. I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation. The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship. Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route. [I] But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S. These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone. The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders. So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions. My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago. What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America. The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies. So the decision heightens the differences between the U.S. and Europe. Nonetheless, it does not have to be so desperate. In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction. [I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013. Authors Cameron F. Kerry Image Source: © Yves Herman / Reuters Full Article
privacy Missed Connections: Talking With Europe About Data, Privacy, and Surveillance By webfeeds.brookings.edu Published On :: Tue, 20 May 2014 11:57:00 -0400 The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year. And both Silicon Valley and Hollywood do big business with Europe every year. Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership. In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations. Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe. He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses. To promote transatlantic trade the United states should: Not be defensive about its protection of privacy Provide clear information to the worldwide community about American law enforcement surveillance Strengthen its own privacy protection Focus on the importance of trade to the American and European economies Downloads Download the paper Authors Cameron F. Kerry Image Source: © Francois Lenoir / Reuters Full Article
privacy Managing health privacy and bias in COVID-19 public surveillance By webfeeds.brookings.edu Published On :: Tue, 21 Apr 2020 15:40:28 +0000 Most Americans are currently under a stay-at-home order to mitigate the spread of the novel coronavirus, or COVID-19. But in a matter of days and weeks, some U.S. governors will decide if residents can return to their workplaces, churches, beaches, commercial shopping centers, and other areas deemed non-essential over the last few months. Re-opening states… Full Article
privacy Civilian Drones, Privacy, and the Federal-State Balance By webfeeds.brookings.edu Published On :: Tue, 30 Sep 2014 00:00:00 -0400 Full Article
privacy Unmanned aircraft systems: Key considerations regarding safety, innovation, economic impact, and privacy By webfeeds.brookings.edu Published On :: Tue, 24 Mar 2015 14:30:00 -0400 Good afternoon Chair Ayotte, Ranking Member Cantwell, and Members of the Subcommittee. Thank you very much for the opportunity to testify today on the important topic of domestic unmanned aircraft systems (UAS). I am a nonresident senior fellow in Governance Studies and the Center for Technology Innovation at the Brookings Institution. I am also a National Fellow at the Hoover Institution at Stanford, and a professor at UCLA, where I hold appointments in the Electrical Engineering Department and the Department of Public Policy. The views I am expressing here are my own, and do not necessarily represent those of the Brookings Institution, Stanford University or the University of California. Downloads Download the testimony Authors John Villasenor Image Source: © Mike Segar / Reuters Full Article
privacy @ Brookings Podcast: Eye-Tracking Technology and Digital Privacy By webfeeds.brookings.edu Published On :: Fri, 20 Apr 2012 16:39:00 -0400 Eye-tracking technology now makes it possible for computers to gather staggering amounts of information about individuals as they use the Internet, and draw hyper-accurate conclusions about our behavior as consumers. As the technology becomes more practical, Senior Fellow John Villasenor discusses its benefits and risks. previous play pause next mute unmute @ Brookings Podcast: Eye-Tracking Technology and Digital Privacy 07:55 Download (Help) Get Code Brookings Right-click (ctl+click for Mac) on 'Download' and select 'save link as..' Get Code Copy and paste the embed code above to your website or blog. Video Eye-Tracking Technology and Digital Privacy Audio @ Brookings Podcast: Eye-Tracking Technology and Digital Privacy Image Source: © Scanpix Sweden / Reuters Full Article
privacy A conversation with the CIA’s privacy and civil liberties officer: Balancing transparency and secrecy in a digital age By webfeeds.brookings.edu Published On :: Wed, 22 May 2019 18:59:40 +0000 The modern age poses many questions about the nature of privacy and civil liberties. Data flows across borders and through the hands of private companies, governments, and non-state actors. For the U.S. intelligence community, what do civil liberties protections look like in this digital age? These kinds of questions are on top of longstanding ones… Full Article
privacy How well-intentioned privacy laws can contribute to wrongful convictions By webfeeds.brookings.edu Published On :: Tue, 11 Feb 2020 16:37:41 +0000 In 2019, an innocent man was jailed in New York City after the complaining witness showed police screenshots of harassing text messages and recordings of threatening voicemails that the man allegedly sent in violation of a protective order. The man’s Legal Aid Society defense attorney subpoenaed records from SpoofCard, a company that lets people send… Full Article
privacy The Impact of Domestic Drones on Privacy, Safety and National Security By webfeeds.brookings.edu Published On :: Legal and technology experts hosted a policy discussion on how drones and forthcoming Federal Aviation Agency regulations into unmanned aerial vehicles will affect Americans’ privacy, safety and the country’s overall security on April 4, 2012 at Brookings. The event followed a new aviation bill, signed in February, which will open domestic skies to “unmanned aircraft… Full Article
privacy Facebook, Google, and the Future of Privacy and Free Speech By webfeeds.brookings.edu Published On :: Mon, 02 May 2011 00:00:00 -0400 IntroductionIt was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud. Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.” Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond? If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution. At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms. Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1] As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook. The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person. Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8] The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring. Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation. Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable. The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10] Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy. The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking. Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband. It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion. And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12] It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept. The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure. But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure. This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15] When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact. Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month. Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition. The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech: Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17] In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights. From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech. A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18] Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever. Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users. So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said. It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market. The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict. Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21] At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet. At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad. For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?” Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes. It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.” That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct. Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does. I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action. In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.” [1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring). [2] See United States v. Miller, 425 U.S. 435 (1976).[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983). [4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010). [5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010). [6] 615 F.3d at 558. [7] Id. at 562.[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html [9] Lawrence v. Texas, 539 U.S. 558, 562 (2003). [10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010. [11] United States v. Place, 462 U.S. 696 (1983). [12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009). [14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010. [15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008). [16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y. Times, August 20, 2010, B4.[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html [19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php [20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/ [21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008. Downloads Download the Full Paper Authors Jeffrey Rosen Image Source: David Malan Full Article
privacy Emerging Chinese Smartphone maker Vargo Technology Showcased in Times Square Provides closed-loop security - Vargo, an end to privacy leaks By feedproxy.google.com Published On :: 31 Dec 2015 10:45:00 EST Emerging Chinese Smartphone maker Vargo Technology Showcased in Times Square Full Article Computer Electronics Consumer Electronics Telecommunications High Tech Security Wireless Communications New Products Services Broadcast Feed Announcements MultiVu Video
privacy Worried about Zoom's privacy problems? A guide to your video-conferencing options By www.theguardian.com Published On :: 2020-04-09T05:00:36Z From FaceTime to Houseparty, there is no shortage of platforms for work and play as you shelter in placeWith offices and schools around the world temporarily shut amid the coronavirus crisis, the video platform Zoom has seen overnight success. But growing concerns over security across the platform have many consumers wondering about tech alternatives.Privacy-minded consumers should consider video chat options carefully, said Arvind Narayanan, an associate computer science professor at Princeton University who has been outspoken about the security concerns surrounding Zoom. Related: ‘Zoom is malware’: why experts worry about the video conferencing platform Continue reading... Full Article Technology Zoom US news Coronavirus outbreak Skype Apple Microsoft
privacy 'Firewall' for smartphones may protect your privacy By www.mid-day.com Published On :: 27 May 2018 12:03:22 GMT Representational Image Scientists have developed the first ultrasound-firewall that can prevent hackers from eavesdropping on hidden data transmission between smartphones and other mobile devices. The permanent networking of mobile devices can endanger the privacy of users and lead to new forms of monitoring. New technologies such as Google Nearby and Silverpush use ultrasonic sounds to exchange information between devices via loudspeakers and microphones. More and more of our devices communicate via this inaudible communication channel. Ultrasonic communication allows devices to be paired and information to be exchanged. It also makes it possible to track users and their behaviour over a number of devices, much like cookies on the Web. Almost every device with a microphone and a loudspeaker can send and receive ultrasonic sounds. Users are usually unaware of this inaudible and hidden data transmission. Researchers from the St Polten University of Applied Sciences in Austria has developed a mobile application that detects acoustic cookies, brings them to the attention of users and if desired, blocks the tracking. The app is, in a sense, the first available ultrasound-firewall for smartphones and tablets "The most challenging part of developing the app was to devise a method that can detect different existing ultrasound-transmission techniques reliably and in real time," said Matthias Zeppelzauer, who led the project. Such ultrasonic signals can be used for so-called "cross-device tracking". This makes it possible to track the user's behaviour across multiple devices, and relevant user profiles can be merged with one other. In this way, more accurate user profiles can be created for targeted advertising and filtering of internet content. Unlike their electronic counterparts when visiting web pages, up to now it has not been possible to block acoustic cookies. "In order to accept voice commands, the mobile phone microphone is often permanently active. Every mobile application that has access to the microphone, as well as the operating system itself, can at any time without notice: activate the microphone of a mobile device, listen to it, detect acoustic cookies and synchronise it over the Internet," said Zeppelzauer. Users are often not informed of this information transmission during ongoing operation. Only a permanent deactivation of the microphone would help, whereby the device as a telephone would become unusable. Researchers developed a procedure to expose the cookies and inform device users. For masking and blocking the ultrasonic data transfer, interference signals are transmitted via the loudspeaker of the mobile device. Thus, acoustic cookies can be neutralised before operating systems or mobile applications can access them. Users can selectively block cookies without affecting the functionality of the smartphone. The masking of the cookies occurs by means of ultrasound, which is inaudible to humans. "There is currently no technology on the market that can detect and block acoustic cookies. The application developed in this project represents the first approach that gives people control over this type of tracking," said Zeppelzauer. Catch up on all the latest Crime, National, International and Hatke news here. Also, download the new mid-day Android and iOS apps to get latest updates This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever. Full Article
privacy European virus tracing apps put spotlight on privacy By www.mid-day.com Published On :: 5 May 2020 02:29:26 GMT The race by governments to develop mobile tracing apps to help contain infections after coronavirus lockdowns ease is focusing attention on privacy. The debate is especially urgent in Europe, which has been one of the hardest-hit regions in the world, with nearly 140,000 people killed by COVID-19. The use monitoring technology, however, may evoke bitter memories of massive surveillance by totalitarian authorities in much of the continent. The European Union has in recent years led the way globally to protect people's digital privacy, introducing strict laws for tech companies and web sites that collect personal information. Academics and civil liberties activists are now pushing for greater personal data protection in the new apps as well. European authorities, under pressure to ease lockdown restrictions in place for months in some countries, want to make sure infections don't rise once confinements end. One method is to trace who infected people come into contact with and inform them of potential exposure so they can self-isolate. Traditional methods involving in-person interviews of patients are time consuming and labor intensive, so countries want an automated solution in the form of smartphone contact tracing apps. But there are fears that new tech tracking tools are a gateway to expanded surveillance. Intrusive digital tools employed by Asian governments that successfully contained their virus outbreaks won't withstand scrutiny in Europe. Residents of the EU cherish their privacy rights so compulsory apps, like South Korea's, which alerts authorities if users leave their home, or location tracking wristbands, like those used by Hong Kong, just won't fly. The contact-tracing solution gaining the most attention involves using low energy Bluetooth signals on mobile phones to anonymously track users who come into extended contact with each other. Officials in western democracies say the apps must be voluntary. The battle in Europe has centered on competing systems for Bluetooth apps. One German-led project, Pan-European Privacy-Preserving Proximity Tracing, or PEPP-PT, which received early backing from 130 researchers, involves data uploaded to a central server. However, some academics grew concerned about the project's risks and threw their support behind a competing Swiss-led project, Decentralized Privacy-Preserving Proximity Tracing, or DP3T. Privacy advocates support a decentralised system because anonymous data is kept only on devices. Some governments are backing the centralized model because it could provide more data to aid decisionmaking, but nearly 600 scientists from more than two dozen countries have signed an open letter warning this could, 'via mission creep, result in systems which would allow unprecedented surveillance of society at large.' Apple and Google waded into the fray by backing the decentralized approach as they unveiled a joint effort to develop virus-fighting digital tools. The tech giants are releasing a software interface so public health agencies can integrate their apps with iPhone and Android operating systems, and plan to release their own apps later. The EU's executive Commission warned that a fragmented approach to tracing apps hurt the fight against the virus and called for coordination as it unveiled a digital 'toolbox' for member countries to build their apps with. Catch up on all the latest Crime, National, International and Hatke news here. Also download the new mid-day Android and iOS apps to get latest updates. Mid-Day is now on Telegram. Click here to join our channel (@middayinfomedialtd) and stay updated with the latest news This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever Full Article
privacy Apple-Google's contact-tracing system upholds user-privacy; bans location tracking By Published On :: Tue, 05 May 2020 02:15:32 +0530 Apple and Google's contact tracing system won't allow apps built using its API to use location services in smartphones, addressing some concerns privacy experts might have. Full Article
privacy Adtech scores a pandemic pause from UK privacy oversight By feedproxy.google.com Published On :: Thu, 07 May 2020 18:41:50 +0000 The coronavirus is proving to have an unexpected upside for the adtech industry. The U.K.’s data protection agency has paused an investigation into the industry’s processing of internet users’ personal data, saying targeted suspension of privacy oversight is merited because of disruption to businesses as a result of the COVID-19 pandemic. The investigation into adtech […] Full Article Advertising Tech Europe Privacy brave Brexit coronavirus COVID-19 data protection data security european commission european union General Data Protection Regulation Google ICO information commissioner's office Johnny Ryan personal data privacy United Kingdom United States
privacy Apple and Google update joint coronavirus tracing tech to improve user privacy and developer flexibility By feedproxy.google.com Published On :: Fri, 24 Apr 2020 16:15:20 +0000 Apple and Google have provided a number of updates about the technical details of their joint contact tracing system, which they’re now exclusively referring to as an “exposure notification” technology, since the companies say this is a better way to describe what they’re offering. The system is just one part of a contact tracing system, […] Full Article Apps Europe Health Privacy TC Android Apple Bluetooth Cédric O contacts tracing coronavirus COVID-19 cryptography dave burke european union France Germany Google privacy
privacy UK privacy and security experts warn over coronavirus app mission creep By feedproxy.google.com Published On :: Wed, 29 Apr 2020 14:30:15 +0000 A number of UK computer security and privacy experts have signed an open letter raising transparency and mission creep concerns about the national approach to develop a coronavirus contacts tracing app. The letter, signed by 177 academics, follows a similar letter earlier this month signed by around 300 academics from across the world, who urged […] Full Article Apps Europe Health Privacy Security TC Android Apple Bluetooth computer security coronavirus COVID-19 France gchq Germany Google iOS Matt Hancock National Cyber Security Centre National Health Service NHSX privacy UK parliament United Kingdom
privacy Apple and Google update joint coronavirus tracing tech to improve user privacy and developer flexibility By techcrunch.com Published On :: Fri, 24 Apr 2020 16:15:20 +0000 Apple and Google have provided a number of updates about the technical details of their joint contact tracing system, which they’re now exclusively referring to as an “exposure notification” technology, since the companies say this is a better way to describe what they’re offering. The system is just one part of a contact tracing system, […] Full Article Apps Europe Health Privacy TC Android Apple Bluetooth Cédric O contacts tracing coronavirus COVID-19 cryptography dave burke european union France Germany Google privacy
privacy UK privacy and security experts warn over coronavirus app mission creep By techcrunch.com Published On :: Wed, 29 Apr 2020 14:30:15 +0000 A number of UK computer security and privacy experts have signed an open letter raising transparency and mission creep concerns about the national approach to develop a coronavirus contacts tracing app. The letter, signed by 177 academics, follows a similar letter earlier this month signed by around 300 academics from across the world, who urged […] Full Article Apps Europe Health Privacy Security TC Android Apple Bluetooth computer security coronavirus COVID-19 France gchq Germany Google iOS Matt Hancock National Cyber Security Centre National Health Service NHSX privacy UK parliament United Kingdom
privacy Adtech scores a pandemic pause from UK privacy oversight By techcrunch.com Published On :: Thu, 07 May 2020 18:41:50 +0000 The coronavirus is proving to have an unexpected upside for the adtech industry. The U.K.’s data protection agency has paused an investigation into the industry’s processing of internet users’ personal data, saying targeted suspension of privacy oversight is merited because of disruption to businesses as a result of the COVID-19 pandemic. The investigation into adtech […] Full Article Advertising Tech Europe Privacy brave Brexit coronavirus COVID-19 data protection data security european commission european union General Data Protection Regulation Google ICO information commissioner's office Johnny Ryan personal data privacy United Kingdom United States
privacy Tom Brady says Florida mansion he shares with Gisele Bundchen lacks privacy By www.dailymail.co.uk Published On :: Fri, 10 Apr 2020 17:47:46 GMT They relocated to the state following his switch from the New England Patriots NFL franchise to the Tampa Bay Buccaneers - but Tom admits their transition hasn't been entirely seamless. Full Article
privacy Aarogya Setu denies privacy breach, contradicts ethical hacker’s claims By www.businessinsider.in Published On :: Wed, 06 May 2020 05:37:06 GMT Aarogya Setu has claimed that the Coronavirus tracking app is secure, and no privacy breaches have been found.Elliot Alderson, an ethical hacker had claimed that he had found a security issue in the app.French ethical hacker who goes by the fictitious name Elliot Alderson claimed that there was a security issue in Aarogya Setu, the coronavirus tracking app launched by the Indian government. In his tweet, Elliot Alderson had claimed that a security issue has been found in the Aarogya Setu app and that the privacy of over 90 million Indians was at risk. Soon after this, Alderson was contacted by the National Informatics Centre (NIC) and the Indian Computer Emergency Response Team (CERT-In). After disclosing the issue to them, Alderson said that he would wait for the issue to be fixed before Full Article
privacy These are the privacy issues in Aarogya Setu, India's Covid-19 tracker app, alleged by French hacker Elliot Alderson By www.businessinsider.in Published On :: Thu, 07 May 2020 05:10:43 GMT Elliot Alderson has claimed that the Aarogya Setu app allows users to find out who is sick in a particular area.He has also contradicted the Aarogya Setu team’s claim that bulk calls to the API are not possible.A French ethical hacker who goes with the alias "Elliot Alderson" earlier claimed that he found security and privacy issues in India’s Covid-19 tracker app Arogya Setu. This was denied by the Aarogya Setu team and they said that the app is secure.After this, Alderson has come up with a post highlighting the issues found by him in the Aarogya Setu app.App allows users to access internal filesIn April, Alderson found that the WebViewActivity allowed users to access internal files of the app by using commands as there was no host validation. However, the issue has now been fixed.Aarogya Full Article