Author: Paula Kift

  • PRG News Roundup: December 7th

    By Alexia Ramirez

    Popular Chinese credit rating firms, Sesame Credit and China Rapid Finance, have been reported to use consumer’s online-shopping habits and social networks to calculate their credit scores. The companies reward consumers with good credit scores with perks such as express service at hotels or deposit-waivers on rental cars, which serves to incentivize consumer participation and the relinquishing of such personal data.

    Uber’s newest update now asks users to always share their location with the company, even when the app is running in the background. However, Uber claims they will only collect location information from the moment you request a ride to five minutes after your ride has ended. The changes are meant to help improve pick-ups and drop-offs as well as user’s overall experience with the service. Concerned users can opt-out of location sharing and instead enter their location for pick-up manually.

    Amazon recently launched Amazon Go, a grocery store that provides consumers with a checkout-free shopping experience. Through an elaborate network of sensors, Amazon is able to track shoppers and automatically detect when products are taken from the shelves and keep items in a virtual cart. After shopping, consumers merely walk out of the store and Amazon will charge their account for the products selected. The new technology and collection of granular data about how people shop in physical spaces raises a whole host of privacy concerns.

    Israeli startup, Faception, utilizes deep learning to analyze faces and predict the likelihood they belong to different categories, such as terrorists, pedophiles, Mensa members, and more. Such use of facial-profiling could be dangerously inaccurate and deeply biased, reports Business Insider.

    Facebook, Twitter, YouTube, and Microsoft announced their new collaboration, an industry database to help identify and limit the spread of terrorist content online.

  • PRG News Roundup: November 16th

    By Eliana Pfeffer

    Security contractors recently discovered preinstalled software in some Android phones that monitors where users go, whom they talk to and what they write in text messages. The American authorities say it is not clear whether this represents secretive data mining for advertising purposes or a Chinese government effort to collect intelligence. http://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html?_r=0

    In an order released last week, the Eleventh Circuit temporarily delayed enforcement of the Federal Trade Commission’s (FTC) order in the LabMD case. http://www.natlawreview.com/article/eleventh-circuit-court-stays-enforcement-ftc-s-labmd-order

    On Monday, both Google and Facebook altered their advertising policies to explicitly prohibit sites that traffic in fake news from making money off lies. http://www.nytimes.com/2016/11/17/technology/social-medias-globe-shaking-power.html

    By collecting and analyzing data points from social media, MogIA correctly predicted the last three US election results. http://www.techrepublic.com/article/ai-tool-successfully-predicted-trump-win-still-ai-experts-are-skeptical/

    The Department of Homeland Security (DHS) has released guidelines for internet of things cybersecurity, the second federal agency to do so on Tuesday. http://thehill.com/policy/cybersecurity/306171-dhs-offers-guide-to-internet-of-things-security

    In an open letter to President Elect Donald Trump, IBM chief executive Ginni Rometty outlined several bi-partisan steps she thinks the new administration could employ to help create jobs. http://fortune.com/2016/11/15/ibm-ceo-letter-to-trump/

    Los Angeles Police Chief Charlie Beck said Monday that he has no plans to change the LAPD’s stance on immigration enforcement, despite President-elect Donald Trump’s pledge to toughen federal immigration laws and deport millions of people upon taking office. http://www.latimes.com/local/lanow/la-me-ln-los-angeles-police-immigration-20161114-story.html Similarly, Mayor de Blasio last week suggested that New York City would fight to prevent the future president from accessing ID-related data, which contains personal information on undocumented immigrants. http://www.theverge.com/2016/11/15/13640344/trump-president-immigration-data-idnyc-new-york-city

    France plans to create a single, unified database holding the biometric data from the passports and identity cards of 60 million citizens. http://arstechnica.co.uk/tech-policy/2016/11/france-id-database-biometric-data-60-million-citizens/

  • PRG News Roundup: November 2nd

    By Caroline Alewaerts

    The news of the discovery of new e-mails potentially relevant to Hillary Clinton’s private server investigation is all over the media. The fact that these e-mails have been discovered as part of an unrelated investigation raises an important question regarding compliance with the 4th Amendment. An interesting article discussing on the issue is available here.

    Recent publications reveal that Facebook advertising platform may allow advertisers to discriminate based on race and other constitutionally protected basis, by letting them target their audience based on criteria that include, e.g., gender, financial status, political affiliation and ethnic affinity. See notably The Atlantic and ProPublica.

    On the other hand, Facebook has blocked a UK-based insurance company from using Facebook status and likes to build up profiles and risk assessments regarding users’ driving style. The insurance company had planned to offer car insurance discounts to those considered likely to drive safely. Facebook declared that this violated its privacy policies.

    The EU-US Privacy Shield already faces legal challenges. Two privacy groups (Irish and French) have filed an action for annulment against it before the EU General Court. The EU-US Privacy Shield was adopted earlier this year after the ECJ struck down its predecessor, the Safe Harbor Program, and more than 500 companies are already self-certified under it, including Facebook, Google, and Microsoft.

    The FCC adopted new broadband consumer privacy rules last Thursday. They establish a framework for increased choice, transparency, and security of consumer personal data, and notably require broadband ISPs to collect their consumer’s consent in order to use and share their data.

    The industry points out that this new regulation will have consequences on telecom companies’ efforts to develop their presence in the sphere of targeted advertising, and already raises concerns regarding the risk of double standards since web companies such as Google or Facebook are not subject to the FCC jurisdiction (but fall under the FTC one).

    Regarding this last issue and on a similar note, Daniel Solove discusses in this article the serious implications for consumer privacy laws of the FTC v. AT&T decision of last August (holding that FTC lacks jurisdiction over companies that engage in common carrier activity). An amicus brief has been filed with the US Court of Appeals for the 9th Circuit asking for a re-hearing of the case.

  • With the Launch of Zcash, Speculators Consider the Potential of an Untraceable Cryptocurrency

    By Eli Siems

    A new digital currency was launched last Friday (28 Oct.) that threatens to give Bitcoin a run for its virtual money. It’s called Zcash. But there’s one major distinction between the two so-called cryptocurrencies that Zcash believes will give it an edge in the digital market. The currency’s official website puts it this way: “If Bitcoin is like http for money, Zcash is https.” In other words, this new cryptocurrency is designed to be secure, private, and virtually untraceable by anyone but the parties to a transaction.

    Interest and speculation is high. On Monday, the New York Times reported that “investors were paying over $1000 for a single unit of Zcash.” The currency launched with a ton of buzz and with the support of computer scientists at Johns Hopkins and MIT, privacy activists, and electronic currency traders, speculators, and aficionados.

    While it’s far too early to say if the currency will take off, its core principles and technology are already shaping conversations on the future of data privacy.

    The difference between Zcash and other, less private cryptocurrencies is its handling of an essential component known as a blockchain, a permanent ledger that tracks coins. The blockchain is key to maintaining the integrity of the currency and proving no counterfeiting or interference has taken place. For Bitcoin, the blockchain is public and can be accessed to analyze the flow of currency, which has raised more than a few eyebrows across the spectrum of potential Bitcoin users. As The Economist reports, “This is a serious barrier for banks: blockchains could reveal their trading strategies and information about their customers”

    But Zcash is fundamentally different. Using a “zero-knowledge proof construction called a zk-SNARK,” the Zcash team has managed to create a secure ledger that keeps the identities of parties to a transaction and the amounts transferred undisclosed. Beyond cryptocurrency, the encryption technology is making waves on all shores of digital privacy and cryptography.

    Aside from potential benefits to large players like banks, Zcash markets itself on its privacy protection for every user. But such a currency, readily accessible and exchangeable, will bring with it huge and probably obvious law enforcement concerns. Back in 2013, when the idea that became Zcash was first proposed by Johns Hopkins researchers, Global Financial Integrity voiced strong opinions that a currency like Zcoin would do little more than facilitate a wide range of illicit transactions and cripple hard-won law enforcement tools. Monero, a similarly private but less anticipated cryptocurrency, has already shown up in countless illicit transactions.

    On the other side, Zcash founder Zooko Wilcox insists that Zcoin has a different purpose: “All of the conversations I’ve had with businesses, banks, regulators and law enforcement have been about the need for data security for commercial applications.”

    Matthew Green of Johns Hopkins, an originator of the Zcoin concept, frames it differently: “The basic story is that we have been gradually losing our privacy in a whole bunch of ways that people don’t appreciate,” Zcash being a way to take back that privacy in at least one area.

    Whatever your opinion is on the utilities or dangers of an untraceable cryptocurrency, one thing is quite clear: Zcash is here and is bringing back longstanding debates about privacy and law enforcement in the digital age with renewed immediacy.

  • PRG News Roundup: October 26th

    By Alexia Ramirez

    AARP has filed a lawsuit against the Equal Employment Opportunity Commission in response to the growing number of employers who financially incentivize their workers to sign up for wellness programs. AARP argues that the programs, which force individuals to choose between financial penalties and the disclosure of private medical information, violate anti-discrimination laws meant to protect workers’ medical information.

    ProPublica reported that Google had quietly changed its privacy policy over the summer. Now, users’ browsing habits “may be” combined with Gmail data and other tools (i.e., Double Click). Existing users were prompted to opt-in to the change and it has become the default standard for new users. Here’s how to opt-out.

    The Pentagon has prioritized artificial intelligence as central to the United States’ defense strategy. The military is examining the use of artificial intelligence to create autonomous and semi-autonomous weapons, such as drones that can identify targets. This development has sparked a debate amongst legal and military experts about the ethics of implementing this technology.

    Last Friday, DynDNS, a company whose servers facilitate internet traffic, experienced a distributed denial-of-service attack. The troubling aspect of this attack was that the hackers relied on new weapons—hundreds of thousands of internet-connected devices, such as cameras, baby monitors, and home routers. These everyday devices were infected with software that allowed hackers to command them to flood a target with overwhelming traffic.

    Sweden’s highest court has banned drones with cameras. “Cameras attached to drones fall foul of Sweden’s strict surveillance laws, the country’s highest court has ruled by slapping an outright ban on drone filming—unless the kit is used by a law enforcement agency or an expensive permit has been issued.”

     

     

  • Facebook Wants You to Get Even More Political

    By Sofia Grafanaki

    Facebook rolled out a new feature last week, allowing users to officially endorse a presidential candidate. It is very simple to use – all a user needs to do is go on the candidate’s Facebook page and click on the “endorsement” tab to add his/her own endorsement. One can also add a message with it, presumably explaining their position. The feature has already sparked several interesting discussions, ranging from whether journalists should use this tool, given the conflicting values of neutrality and transparency in the context of political journalism, to the potential harassment that can result from expressing political opinions.

    Facebook seems to have a bigger agenda than just the upcoming presidential election by planning to make the feature more widely available, to state and local election candidates for instance. Detailed instructions on Facebook’s Help Center page explain that to receive endorsements, all a user needs to do is change the category of his/her page to “Politician, Political Candidate, or Government Official.”

    The feature is not just directed to users who are open about their political opinions and positions, as the feature allows you to select the audience who can view your endorsement post. Detailed instructions on Facebook’s Help Center page warn users to:

    Keep in mind that if you choose Public as the audience of your endorsement, it may also appear on the candidate’s Page if the candidate chooses to feature your endorsement.

    Interestingly, while this may seem somewhat respectful to voter privacy, it also helps a reluctant user feel more comfortable to share their political preferences, making it almost as if the user were completing a missing piece of their profile, one that no one needs to see. The result however is that Facebook obtains more accurate data on their users, allowing for more accurate targeted advertising.

    The fact that the Company has been tracking political preferences is not news; it has been doing that since the launch of its ad personalization tool, in order to bring users ads that cater to their interests. Theoretically users’ can see and somewhat control their political labels among others, but as they are “tucked away” in the ad preferences section on Facebook, this is not always intuitive.

    Most importantly, while previously these labels were based on inferences Facebook algorithms were “taught” to make based on information collected from the users’ profiles and activity, with the new endorsement feature, these inferences are now confirmed or even corrected by the users themselves.

    Ultimately this is just a glance at a much larger discussion on the acceptable boundaries of voter-micro targeting. Is it just the natural evolution of political campaigning or are we starting to cross lines that affect our democratic process?

    https://www.facebook.com/help/1289003767810596

    https://techcrunch.com/2016/10/18/facebook-presidential-endorsements/

    http://money.cnn.com/2016/10/18/technology/facebook-endorsement-election-2016/

    http://www.poynter.org/2016/ask-the-ethicist-should-journalists-use-facebooks-new-endorsement-tool/435713/

    http://www.digitaltrends.com/social-media/facebook-endorsements/

    http://www.nytimes.com/2016/08/24/us/politics/facebook-ads-politics.html?_r=2

    http://www.digitaltrends.com/social-media/facebook-political-views-ads/

    https://www.facebook.com/ads/preferences

     

     

  • Privacy, Security and the Internet of Things: A Changing Landscape

    By: Yan Shvartzshnaider

    There is no such thing as a “bullet-proof” system. A system’s security is in a constant state of becoming. Breaking into any system used to require resources and time: the more resources you had, the less time you needed, and vice-versa. To protect your system you would want to ensure that it takes a significant amount of time (in the best case, approaching infinity) for the attacker to be able to break it.

    For a while, this was an achievable goal: resources were too expensive and hard to come by for the average perpetrator to even bother with an attack. This was particularly true of well-established infrastructure. Things have changed, however. Cloud services like Amazon Web Services (AWS) allow one to span hundreds of servers with the ease of clicking a button. We connected fridges, toaster, thermostats and other appliances to the Internet, the Internet of Things (IoT). Today, one neither needs money, expensive resources nor time to mount a serious attack. In one of the most recent attacks, two teenagers were able to “coordinate more than 150,000 so-called distributed denial-of-service (DDoS) attacks” from the comfort of their home, while making money in the process.

    While the technological landscape has changed, the attitude of consumers has not. The market is full of unpatched devices that make it easy for an attacker to compromise the system and use it as they see fit.

    In a recent blog post— Security Economics of the Internet of Things —Bruce Schneier discusses these issues and argues that we have reached a point where the government needs to intervene with adequate regulation:

    IoT will remain insecure unless government steps in and fixes the problem. When we have market failures, government is the only solution. The government could impose security regulations on IoT manufacturers, forcing them to make their devices secure even though their customers don’t care.

    Whether or not government intervention is the correct answer remains to be seen, but we should all be grateful to Schneier for raising the question.

    https://www.schneier.com/blog/archives/2016/10/security_econom_1.html

  • Google’s Clever Plan to Stop Aspiring ISIS Recruits

    By Sofia Grafanaki

    A new and promising approach seeks to disrupt ISIS online recruiting efforts through targeted advertising, as presented at a recent event at the Brookings Institution. Google’s tech incubator Jigsaw (previously called Google Ideas), together with Moonshot CVE, Quantum Communications, and the Gen Next Foundation, developed a plan to help the fight against terrorism. The “Redirect Method” is described as a way to get inside the heads of potential terrorists before they are actually recruited and change their intentions.

    The way the program seems to work, is that it “places advertising alongside results for any keywords and phrases that Jigsaw has determined people attracted to ISIS commonly search for”. The advertising links to YouTube channels with videos that Jigsaw believes can “undo ISIS’s brainwashing”. According to Yasmin Green, Jigsaw’s head of research and development, “the Redirect Method is at its heart a targeted advertising campaign: Let’s take these individuals who are vulnerable to ISIS’ recruitment messaging and instead show them information that refutes it.” Results seem to show that the program is effective – it seems that more than 300,000 people were drawn to the anti-ISIS YouTube channels in just about 2 months.

    But could this “powerful tool for getting inside the minds of some of the least understood and most dangerous people on the Internet”, as described by Wired Magazine, be used for just about anything else as well? There is no doubt that the specific use is desirable (and a lot more respective of privacy than NSA’s bulk surveillance method). But once it’s out there as a tool, can it not be used for other causes? If it’s really just a targeted advertising campaign, can Google develop a product out of this? Or is it already a product in some ways? How would we feel if the cause was not to stop terrorism but to stop a political candidate for instance that some deem dangerous? The minute we move away from extremism, the idea of using data and analytics to get inside the minds of people and change their intentions starts to sound much less appealing.

    https://www.wired.com/2016/09/googles-clever-plan-stop-aspiring-isis-recruits/

    http://www.slate.com/articles/technology/future_tense/2016/09/the_problem_with_google_jigsaw_s_anti_extremism_plan_redirect.html

    https://theintercept.com/2016/09/07/google-program-to-deradicalize-jihadis-will-be-used-for-right-wing-american-extremists-next/

    http://www.businessinsider.com/jigsaw-redirect-method-to-stop-isis-recruits-2016-9

  • PRG News Roundup: October 19th

    By Eli Siems

    Researchers from the Center for Privacy & Technology at Georgetown Law released a major study on the police use of facial recognition software. The report, The Perpetual Line-Up: Unregulated Police Face Recognition in America, reveals that half of all Americans are catalogued in law enforcement facial recognition networks and that the use of such networks by at least 52 agencies is effectively unregulated. #PerpetualLineUp

    The Justice Department outlined a new initiative to collect data on the use of force by law enforcement. The plan seeks to “collect, maintain and report data . . .  on all officers involved shootings, whether fatal or nonfatal, as well as any in-custody death.” The DoJ will be collaborating with “local, state, tribal and federal agencies” to implement a comprehensive data collection program.

    Facebook is testing an update to its messenger app that will propose conversation topics based on information about a user’s activities and interests.

    Our own Helen Nissenbaum will be a panelist on the topic of data collection and sharing this Friday (10/21) at the Conference on Security and Privacy for the Internet of Things at Princeton University. The conference is to be videotaped and livestreamed.

    The European Digital Rights Initiative (EDRi) has released a charming illustrated guide to internet privacy for kids. Adults seeking similar information can check out this page maintained by Consumer Reports.

    And finally, Famed naturalist David Attenborough has suggested that gorilla exhibits at zoos should utilize peepholes for visitor viewing rather than customary glass panes, TIME reports. The proposal is the result of evidence that the animals’ knowledge that they’re being watched affects their behavior and well-being, perhaps amounting to a suggestion that the chilling effect of surveillance is not limited to human subjects (though this did not come as news to primatologists).

  • PRG News Roundup: October 12

    By Nate Tisa

    The ACLU of Northern California has revealed U.S. firm Geofeedia used social media metadata access to deliver location and monitoring information to law enforcement agencies engaged in tracking activists, particularly those involved in the Ferguson, MO protests surrounding the death of Micheal Brown. Facebook, Instagram, and Twitter cut Geofeedia’s API access in late September for violation of their respective privacy policies.

    In the wake of Hurricane Matthew, government agencies and private firms are developing ways to use mobile application geolocation and metadata to track progress and compliance rates in areas of mandatory evacuation. Comparison of live data to existing baselines can give emergency planners an estimate of how many people remain in a given area that should be more or less void of activity.

    U.K. Prime Minister Theresa May has banned wearable technology, including the Apple Watch, from all cabinet meetings out of fear that compromised devices could serve as microphones for foreign intelligence services. The decision comes on the heels of U.S. investigations into possible Russian hacks of the Democratic National Committee and other election-related entities.

    The Tactical Tech Collective is hosting an open event with Mozilla in New York City this November and seeking workshop leaders. For more information see their website: https://tacticaltech.org.