CS 182: Ethics, Public Policy, and Mehran Sahami Jeremy Weinstein Technological Change Hilary Cohen Yesterday Was Data Privacy Day Today’S Agenda
Total Page:16
File Type:pdf, Size:1020Kb
Rob Reich CS 182: Ethics, Public Policy, and Mehran Sahami Jeremy Weinstein Technological Change Hilary Cohen Yesterday Was Data Privacy Day Today’s Agenda 1. Orientation to Privacy • Zuckerberg & Sen. Durbin • Panopticon • Stanford Data Panopticon 2. What is Privacy? 3. Privacy and Big Data 4. Privacy and other values: security, transparency, consent 5. Biometrics: is there something special about the body? Mark Zuckerberg testifying before the United States Senate, April 2018 Who is this person? Jeremy Bentham 1748-1832 Stateville Correctional Center, Illinois Michel Foucault (French philosopher) • He is seen, but he does not see; he is an object of information, never a subject in communication. Discipline and Punish Power over Others Hence the major effect of the Panopticon: to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary. - Michel Foucault Stateville Correctional Center, Illinois The Panopticon must not be understood as a dream building; it is the diagram of a mechanism of power reduced to its ideal form. (Foucault) A Modern Panopticon? The 1619 Nikole Hannah-Jones Project Power over Slaves, Power over Workers Today modern technology has facilitated unremitting workplace supervision, particularly in the service sector. Companies have developed software that records workers’ keystrokes and mouse clicks, along with randomly capturing screenshots multiple times a day. Modern-day workers are subjected to a wide variety of surveillance strategies, from drug tests and closed-circuit video monitoring to tracking apps and even devices that sense heat and motion. A 2006 survey found that more than a third of companies with work forces of 1,000 or more had staff members who read through employees’ outbound emails. The technology that accompanies this workplace supervision can make it feel futuristic. But it’s only the technology that’s new. The core impulse behind that technology pervaded plantations, which sought innermost control over the bodies of their enslaved work force. The 1619 Project, New York Times. The Digital Panopticon Citizens can sign up as Virtual Texas Deputies to participate in border surveillance through this social network. Virtual Texas Deputies from around the country will monitor the streaming video from these cameras 24/7 and report any suspicious activities directly to the Border Sheriffs via email. All emails regarding suspicious activity will be submitted anonymously. CCTV in London Greater London has an estimated 500,000 closed circuit television cameras monitoring public spaces. Facial Recognition Clearview AI founder Real Time Facial Recognition for London Police? Edward Snowden: Criminal or Whistleblower? Do we Live in an Age of Surveillance Capitalism? US Bill of Rights (roughly speaking) 1A: Congress shall not limit religious 2A: The right to bear 3A: Govt shall not freedom, or freedom arms shall not be quarter soldiers in of speech or of the infringed. any house. press. 4A: The right of the people to 5A: No person shall be be secure in their persons, required to be a witness houses, papers, and effects, against himself; no private against unreasonable property shall be taken for searches and seizures, shall public use without due not be violated. compensation Digital Bill of Rights? 3A: Government can 1A: Government can 2A: Government can “quarter” in any house, learn where/how discover who has “without the consent of the you worship, what bought Arms and Owner,” ways to learn any you say, with whom can keep track of digitized activity by any you meet or those persons. person or thing in the communicate. house. 4A: Government can search 5A: Any person’s digital any device, without a information can be taken warrant or having any and used against such reason to believe any such person, without person has committed or compensation or any legal intends to commit a crime. process. Adapted,Reed Hundt, Boston Review You have zero privacy. Get over it. Scott McNealy, CEO Sun Microsystems Tim Berners-Lee, founder of the web The right of people to have a private conversation is really important for democracy. People in the same family who live in different cities need to be able to communicate privately without it being intercepted. Really, it is a human right. Wired Magazine 2017 Third Provocation: Stanford data collection policies Third Provocation: Stanford data collection policies Spend 7-10 minutes: Create a shared google doc of all the data that you believe Stanford has collected about you in the past 7 days. Make 2 lists: ordinary on campus life, and another of off-campus virtual life. First 9 Sources of Stanford’s Personal Data Collection SYSTEM BUSINESS PURPOSE AFS Provides general purpose online file storage hosted entirely at Stanford BigFix Software updates for your laptop/desktop computer, provides software and hardware inventory capabilities. DHCP logs assigns network addresses and provides key network configurations to the vast majority of laptops, desktops and mobile devices used on the campus network. Door Access Logs Controls card access to most of the campus buildings. Logs are used for troubleshooting and for maintaining a record of accesses. Email, Contacts, Office 365 is the University's primary electronic collaboration system. Calendar, Office 365 Email Processes all incoming and outgoing email, spam detection and filtering, automatically blocking unencrypted messages containing known High Risk Data Stanford ID Card Meal plans, purchases, library services Server Logs Generate Logs of Stanford Server Activity Network Activity Logs Network activity logs are used to detect network intrusions and identify compromised systems. They are also used for forensic investigations of past intrusions, and sometimes to locate missing students. This is a list of 40 the ways in which Stanford Collects your data (Sources of Stanford’s Personal Data Collection) Laptop/Desktop Anti-Malware for Mac AFS (online file storage) Registry Laptop/Desktop File Backups (Crashplan) Authentication Logs Server Logs BigFix Configuration Management Medicine Box Server Vulnerability Scanning Box Mobile Device Management Software Vendors Centralized Logging for Servers (Splunk) MyDevices Stanford ID Card Financial Transactions Departmental Firewalls and Library Usage NetDB Stanford Whole Disk Encryption DHCP Logs (SWDE) Network Activity Logs Domain Name Service (DNS) Logs SUNet Account Password and Two-Step Authentication Resets Network Equipment Door Access System Logs Telephone Service for Students Email, Calendar, Contacts, OneDrive: Office 365 Network Registration Two-Step Authentication (Duo) Email Data Loss Prevention (Code Green) Paging System Video Cameras and Monitoring Email Logs People Soft Virtual Private Network Google Apps Very Lightweight Reporting Engine IPM (VLRE) Voicemail Laptop/Desktop Anti-Exploit for Windows (EMET) The Worst Product Name in History? Panopto on campus Discussion Question • Imagine that Stanford is seeking a new revenue stream to support financial aid for needy students. • Suppose it also wants to help job placement for its grads. Solution: Monetize the data is possesses about student learning by selling data profiles to prospective employers. • A form of ”targeted” or “personalized” recruitment. • Not ”ad tech” but “placement tech.” Discuss: Do you support? Why or why not? Today’s Agenda 1. Introductory Provocations • Zuckerberg & Sen. Durbin • Panopticon • Stanford Data Panopticon 2. What is Privacy? 3. Privacy and Big Data 4. Privacy and other values: security, transparency, consent 5. Biometrics: is there something special about the body? What is Privacy? Few values so fundamental to society as privacy have been left so undefined in social theory or have been the subject of such vague and confused writing by social scientists. Alan Westin, 1967 What is Privacy? The most striking thing about the right to privacy is that nobody seems to have any very clear idea what it is. Judith Jarvis Thomson, 1975 MIT Philosopher, “The Right to Privacy” What is Privacy? Privacy is a concept in disarray. Daniel Solove Georgetown Law Professor What is Privacy? Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all. Robert Post, Yale Law Professor So, What is Privacy? Aristotle provides us an early view: The Public Sphere: politics and commerce X The Private Sphere: domestic life, family and friends Individuals have interests in shielding the public (politics and commerce) from seeing/hearing what happens in private. This Photo by Unknown Author is licensed under CC BY-NC So, What is Privacy? But the public/private sphere distinction is crude. Social context is what’s important, whether in the public or private sphere (Nissenbaum). We want to be able to control what is known about us, how we present ourselves, whether we are in public or private spheres. Individuals have privacy interests even when in public! So What is Privacy? Privacy is multi-dimensional (Solove) Privacy concerns control over information about ourselves (self- determination), and about the pursuit of relationships with others (intimacy). ➢ Individuals have privacy interests even when in public! Privacy is not