30
Privacy Issues (set 3) CS 340 Spring 2015

Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence management-tutorials

Embed Size (px)

Citation preview

Page 1: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Privacy Issues (set 3)CS 340

Spring 2015

Page 3: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Online tracking devices

• Cookies: small text file that stores information• Stored client side, on hard drive

• Cookie creator: Lou Montulli• Originally

• To allow for shopping cart functionality (online memory)

• Effort made to not allow the sharing of these between sites

• Now• Third party cookies: site to site

• Behavioral Targeting: ad network; relationship with same advertiser

http://live.wsj.com/video/how-advertisers-use-internet-cookies-to-track-you/92E525EB-9E4A-4399-817D-8C4E6EF68F93.html#!92E525EB-9E4A-4399-817D-8C4E6EF68F93

Page 4: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Third Party tracking files

• “The first time a site is visited, it installs a tracking file, which assigns the computer a unique ID number. Later, when the user visits another site affiliated with the same tracking company, it can take note of where that user was before, and where he is now. This way, over time the company can build a robust profile.”

Page 5: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Online tracking devices cont’d

• Beacons• a.k.a. pixel tag, web bug• Invisible image embedded in

webpage• Image is not place there by

website, but by other company for ad tracking

• Potentials:• Capture of what is typed on a

website• Bundles into a profile

http://www.brighttag.com/resources/tag-101/

Page 7: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

The WSJ study findings

• Surreptitious installation of tracking technology• Not just cookies, but real time logging• Buying and selling of profiles

Advertisers:• No longer paying for ad placement on a site• Paying instead to follow users around Internet with personalized

marketing messages

Page 8: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Online advertiser tracking companies• “considered anonymous because it identifies web browsers, not

individuals.”• https://www.privatewifi.com/lotame-online-tracking-and-your-privacy/

• What is tracked:• http://www.bluekai.com/consumers_privacyguidelines.php

• Opt out options:• BlueKai http://www.bluekai.com/registry/ • Lotame http://www.lotame.com/privacy

Page 9: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Taking control of the tracking

• Tracking blockers like Ghostery

• https://www.youtube.com/watch?v=EKzyifAvC_U

Page 10: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Which tracking technology is a transparent 1x1 pixel used to surreptitiously gather what people type?

A. CookieB. BeaconC. Third Party CookieD. Ghostery

25% 25%25%25%

Page 11: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Privacy

As consumers:• Most European countries have specific laws and regulations aimed at

protecting an individual’s (consumer) privacy.• In the US, historically consumer privacy has relied on • social norms and • market forces

• laws are typically a last resort or response to an event• highly reactive and unsystematic

Page 12: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Misc. Privacy Laws

• Fair Credit Reporting Act, 1970• Right to Financial Privacy Act,

1978

• Cable Communications Policy Act, 1984• Video Protection Privacy Act, 1988

• Driver’s Protection Privacy Act, 1994

• Children’s Online Privacy Protection Act (COPPA), 1998• Info on kids under 13

• Financial Services Modernization Act, 1999• Health Insurance Portability and

Accountability Act (HIPAA), 2001

Page 13: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Texas Infant DNA collection program, p. 96-97• Routine and often mandatory blood samples collected after birth.

• Reason?

• What happens to the samples after processed?• Discarded OR• Stored indefinitely• See http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3065077/table/T1/

• Motivations?• Detect important health problems• Later identification

• Are parents informed? Not always. Raises ethical issues• This is not limited to Texas… • Recent issue in Indiana http://www.wthr.com/story/25954821/2014/07/07/your-childs-dna-who-has-it • Alabama policy: http://www.babysfirsttest.org/newborn-screening/states/alabama#second-section • http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3065077/

Page 14: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

50%50%

Texas’ use of the newborn blood test cards to catalogue information unrelated to that infant’s direct health care is an example of a secondary use of information.

A. TrueB. False

Page 15: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

33%33%33%

Opinion: Suppose a public school provides students with laptops. Should that school be able to turn on a web cam on the laptop to check on a student’s off campus behavior?

A. YesB. MaybeC. No

Page 16: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Robbins v. Lower Merion School District, p. 98-99 • US District Court PA (2010)

• School district surreptitiously activated webcams using LANrev on laptops provided to students while students were off campus• Video:

http://www.cbsnews.com/news/610k-settlement-in-school-webcam-spy-case/

• Settlement: $610,000

Page 17: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

European Union’s Right to be Forgotten• Check out Google’s page

“European privacy requests for search removals”

• FAQs

• Totals

• Examples

• Sites most impacted

Page 18: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Encryption on phones can make it impossible to comply with court orders• FBI director Coney’s criticism: Apple can no longer bypass smartphone

user passwords with iOS 8 • Cannot comply with court orders

• See video http://www.cnn.com/2014/09/25/politics/fbi-apple-google-privacy/index.html

Page 19: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

25% 25%25%25%

Opinion: Do you expect that this inability will create serious problems for law enforcement?

A. Yes, frequentlyB. Yes, sometimesC. Yes, but rarelyD. Never

Page 20: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Google’s Street view issues

1. What is captured by the cameras

2. Other information was recorded too• Info gathered about surrounding

Wi-Fi• War driving

Page 21: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Google’s Street View

• Issue: does it violate privacy when photos are taken that show people engaged in activities visible from public property?

• General rule: No, but there are some exceptions

• Dept of Defense: no content from military bases. Complied• Homeland Security: delay with Baltimore-Washington Metropolitan

area

Page 22: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Street view - Is the elevated camera a problem?

Page 23: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

50%50%

Opinion: The height of the street view camera is too tall.

A. YesB. No

Page 24: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

International views on Google Street View• Some European countries prohibit filming w/o consent even if done

on public property if the filming is for the purpose of public display

• Japan: required lowering cameras to 2.05 meters (6.73 ft) from 3 meters (9.8 feet)

Page 25: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

The other problem of Street View: “war driving” • Collecting data from unsecure networks as the street view car drives

by:• “Snippets of e-mails, photographs, passwords, chat messages, postings on

Web sites and social networks” http://www.nytimes.com/2012/05/23/technology/google-privacy-inquiries-get-little-cooperation.html

• In April 2013, Germany fined Google $189,225 in April for Street View’s privacy violation• Amount google makes in 2 minutes. .002% of its $10.7 B profit last year.• See article

http://www.nytimes.com/2013/04/23/business/global/stern-words-and-pea-size-punishment-for-google.html

Page 26: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Google v. Joffe

• 22 plaintiffs suing google for violating their privacy from war driving during Street View mapping• Google argued that the Wi-Fi info is accessible to anyone and as such

does not constitute wiretapping• 9th Circuit rejected Google’s argument• In June 2014, the US Supreme Court denied certiorari so class actions against

Google for war driving can continue• http://www.bloomberg.com/news/2014-06-30/google-rebuffed-by-u-s-high-court-on-pri

vacy-lawsuit.html

Page 27: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

50%50%

Opinion: Do you agree with this statement. Since unsecure Wi-Fi is accessible to many Google did not violate privacy with its war driving.

A. I agree, no violation by GoogleB. I disagree, this is a privacy

violation by Google

Page 28: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

Research study: “Experimental evidence of massive-scale emotional contagion through social networks”• On 689,003 Facebook users

• Manipulated News Feed

• Ethical breach? http://www.theguardian.com/technology/2014/jun/30/facebook-emotion-study-breached-ethical-guidelines-researchers-say

• http://www.usatoday.com/story/tech/2014/10/02/facebook-tightens-rules-for-research-experiments-on-users/16592011/

Page 29: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

August 2014 iCloud photo hack

• Targeted attack on specific celebrity accounts, not a software or system vulnerability.• Guessed passwords• Researched and answered security questions

• Found nude photos in celebrities’ iCloud accounts & posted nude photos on sites like 4chann

• Could have been prevented with two factor authentication. Requiring two of:• Something user knows• Something user has• Something user is

Page 30: Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence  management-tutorials

50%50%

Supplying a username and password constitutes two factor authentication.

A. TrueB. False