Copyright 1988-2008 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at ANU and the Uni. of Hong.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Repaso: Unidad 2 Lección 2
Variations of the Turing Machine
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Process Description and Control
AP STUDY SESSION 2.
1
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor at ANU, UNSW, and the Uni. of Hong Kong Chair, Australian Privacy Foundation.
Select from the most commonly used minutes below.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Processes and Operating Systems
STATISTICS HYPOTHESES TEST (I)
David Burdett May 11, 2004 Package Binding for WS CDL.
Key Telecom/ICT Indicators Esperanza C. Magpantay Market, Economics and Finance Unit Telecommunication Development Bureau 4 th World Telecommunication/ICT.
Joint ITU/ECA Regional Workshop on Information and Communication Technologies (ICT) Indicators Gaborone, Botswana October 2004
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt RhymesMapsMathInsects.
1 How many layers of the Earth are there? The part of the Earth that consists of molten metal.
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
1 OFDM Synchronization Speaker:. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outline OFDM System Description Synchronization What is Synchronization?
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
Andrew McNaughton 1 Radical Change is Entirely Possible! 2 nd November 2011.
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
Red Tag Date 13/12/11 5S.
PP Test Review Sections 6-1 to 6-6
Employee & Manager Self Service Overview
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
BEEF & VEAL MARKET SITUATION "Single CMO" Management Committee 22 November 2012.
Why Do You Want To Work For Us?
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Adding Up In Chunks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 3 Networking Media.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Subtraction: Adding UP
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 10 A Monetary Intertemporal Model: Money, Prices, and Monetary Policy.
Types of selection structures
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
Aviation Management System 1 2  Silver Wings Aircraft Aviation Management System represents a functional “high – end” suite of integrated applications.
FIGURE 3-1 Basic parts of a computer. Dale R. Patrick Electricity and Electronics: A Survey, 5e Copyright ©2002 by Pearson Education, Inc. Upper Saddle.
Presentation transcript:

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at ANU and the Uni. of Hong Kong Chair, Australian Privacy Foundation {.html,.ppt} Location Privacy Seminar – UNSW – 23 July 2008 YOU ARE WHERE YOU'VE BEEN Location Technologies' Deep Privacy Impact

Copyright Prologue – 30 Anonymous Days in Spain

Copyright Prologue – 30 Anonymous Days in Spain Air-Travel by identified credit-card tx, and Passport presentation at every border-crossing (2) Car-Hire by identified credit-card tx and passport Passport at every Casa Rurale and Hotel (14) Major Purchases (accomm., petrol, sustenance) by identified credit-card or debit-card tx (28) Cash Withdrawals by identified debit-card tx (1) AP (Autovia Peage) (20) Mobile phone (continuous)

Copyright You Are Where Youve Been AGENDA Intellectual and Analytical Tools Location and Tracking Identity, Entity and Nymity Privacy and Dataveillance Location and Tracking Technologies Handhelds Motor Vehicles Human Bodies Threats Controls

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,...

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,...

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,... Tracking – knowing the sequence of locations of something over a period of time

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,... Tracking – knowing the sequence of locations of something over a period of time Real-Time-Tracking

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,... Tracking – knowing the sequence of locations of something over a period of time Real-Time-Tracking Retrospective Tracking

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,... Tracking – knowing the sequence of locations of something over a period of time Real-Time-Tracking Retrospective Tracking Predictive Tracking

Copyright Concepts of Location and Tracking Location – knowing the whereabouts of something, in relation to known reference points Physical Space, Network Space, Intellectual Space,... Precision, Accuracy, Reliability, Timeliness,... Tracking – knowing the sequence of locations of something over a period of time Real-Time-Tracking Retrospective Tracking Predictive Tracking Associative Tracking

Copyright Names Codes Roles Identity and Identifier

Copyright The Entity/ies underlying an Identity

Copyright Entity and Entifier

Copyright Nymity

Copyright Privacy The interest that individuals have in sustaining a 'personal space', free from interference by other people and organisations

Copyright Privacy The interest that individuals have in sustaining a 'personal space', free from interference by other people and organisations Dimensions of Privacy The Physical Person Personal Behaviour Personal Communications Personal Data

Copyright Why is Privacy ? Physical Needs Psychological Needs Social / Sociological Needs Economic Needs Political Needs The Philosophical Level

Copyright Why is Privacy ? Physical Needs Psychological Needs Social / Sociological Needs Economic Needs Political Needs The Philosophical Level Highly Person-Dependent – Highly Context-Dependent

Copyright Privacy Protection Privacy often conflicts with other interests: other interests of the same person interests of another person interests of a group or community interests of an organisation interests of society as a whole

Copyright Privacy Protection Privacy often conflicts with other interests: other interests of the same person interests of another person interests of a group or community interests of an organisation interests of society as a whole Privacy Protection is a process of finding appropriate balances between privacy and multiple competing interests

Copyright Vehicles for Privacy Protection Categories of Measures: Legal Organisational Technical

Copyright Vehicles for Privacy Protection Categories of Measures: Legal Organisational Technical Secrecy Data Silo'ing Identity Silo'ing Nymity

Copyright The Vacuousness of Data Protection Laws FIPs (Fair Information Practices) were designed for administrative convenience OECD Guidelines were designed to protect businesses from inconsistent national laws Exceptions, Exemptions, Loop-Holes Over-Rides and Small-Print Authorisations 1980 Provisions for 1970s Computing A Privacy Commissioner whose duty is to protect government and business, not privacy

Copyright Vignettes of Location and Tracking Technologies V1Handhelds Computers Phones V2Motor Vehicles (specifically ANPR) V3Human Bodies Tightly-Associated RFID Tags Embedded Chips

Copyright V1 Handhelds Personal Digital Assistants (PDAs) for computing on the move – for business or personal use, and for text, sound, image and/or video Wifi/IEEE x / WiMax/802.16x / iBurst Mobile Phones for voice-calls from any location within range of a transceiver connected to the relevant wireless network Analogue Early Digital, e.g. GSM, CDMA Third Generation/3G Digital e.g. GSM/GPRS, CDMA2000, UMTS/HSPA

Copyright Location and Tracking of PDAs The primary identifier is generally the IP-Address, which is commonly assigned short-term The router may also have access to a device entifier, such as a processor-id or NIC Id Device entifiers are not tightly linked with the individuals who use each device But Multi-Functional Handsets connect with not only Wifi networks but also cellular networks … And Networks will converge over the next decade

Copyright Location and Tracking of Mobiles Inherent There is insufficient capacity to broadcast all traffic in all cells The network needs to know the cell each mobile is in Mobiles transmit registration messages to base-station(s) They do so when nominally switched off or placed on standby What is being tracked: The SIM-card, an identifier The mobile-phone id, an entifier The SIM-card and/or mobile-phone may be registered to a human identity (and may be required by law to be so) The vast majority of handsets are used for long periods with a single SIM-card installed, and by a single person

Copyright The Practicability of Location and Tracking Location is intrinsic to network operation () Tracking is feasible, because the handset sends a stream of messages () Real-Time Tracking is feasible if the data-stream is intense and latency is low () Retrospective Tracking is feasible if the series of locations is logged (), and the log is retained () Predictive Tracking is feasible if the data-stream is intense and latency is low () Associative Tracking is feasible if data-streams are intense and precision is high ()

Copyright The Precision of Handset Location Intrinsically, the Cell-Size: 1km-10km radius for Mobile non-CBD 100m radius for Wifi & CBD Mobile Potentially much more fine-grained: Directional Analysis Differential Signal Analysis Triangulation Self-Reporting of GPS coordinates

Copyright The Accuracy and Reliability of Handset Location Directional Analysis The Case of the Cabramatta Murder Conviction Differential Signal Analysis A Wide Array of Error-Factors Triangulation Multiple Transceivers Multiple Error-Factors Self-Reporting of GPS coordinates Highly situation-dependent, and unknown Dependent on US largesse, operational requirements

Copyright The Case of the Cabramatta Murder Conviction In 1994, a NSW MP, John Newman, was murdered In 2001, Phuong Ngo was convicted, sentenced to life in prison, 'never to be released', and is in solitary in a maximum-security prison In July 2008, after further pressure (from an ANU law academic and Four Corners), the NSW Chief Justice commissioned a formal review

Copyright The Case of the Cabramatta Murder Conviction In 1994, a NSW MP, John Newman, was murdered In 2001, Phuong Ngo was convicted, sentenced to life in prison, 'never to be released', and is in solitary in a maximum-security prison In July 2008, after further pressure (from an ANU law academic and Four Corners), the NSW Chief Justice commissioned a formal review The conviction depended heavily on mobile-phone location evidence This made assumptions about the precision of directional analysis The evidence went unchallenged It appears to have been materially misleading

Copyright Location and Tracking Technologies V2 Motor Vehicles Vehicles can be monitored in various ways, e.g. Manual Inspection of VINs, registration plates Passive RFID-tags passing control-points On-Board Transmitters, with self-reporting of GPS-based or other coordinates Vehicle Registration Data can be monitored: Cameras were wet chemistry, are now digital Extraction was manual, is now automated

Copyright Automated Number Plate Recognition (ANPR)

Copyright Automated Number Plate Recognition (ANPR) A Digital Camera Captures an image of a motor vehicles 'number' plate Software Extracts the registration data (numbers, letters, perhaps other data such as colour and jurisdiction identifiers) (Maybe) List(s) of Numbers Being Sought So that the extracted data can be compared with it Transmission Facilities Send the extracted data and perhaps other data elsewhere

Copyright ANPR for (1) User-Pays Charging Transport infrastructure can be paid for centrally, or by the users of the resources It's attractive to extract revenue for: on-street parking use of space in garages and parking stations use of toll-roads use of congested areas such as inner-cities Reliable and inexpensive payment is needed Controls are needed over non-payers

Copyright User-Pays Control Mechanism

Copyright Privacy Threats in User-Pays Road Transport Denial of Anonymous Travel (no cash booths, no or inconvenient non-identified payment) Error Re the Registration Data: Indiscriminate Collection (i.e. all vehicles not just non-payers) Retention not Early Destruction Availability for Exploitation Availability for Disclosure

Copyright Privacy-Sensitive Architectures are Feasible A simple example: Vehicle Registration Data could be retained for the duration of the trip only The payment tag could be issued, electronically, with a Receipt Number The operator could store the facility usage data that gave rise to the charge in combination with the Receipt Number, not the Registration Data But Privacy-Sensitive Architectures are not implemented

Copyright ANPR for (2) Law Enforcement Traffic Administration. Detection and interception of Unregistered Vehicles, and of Vehicles owned by people whose driving licences are currently suspended Traffic Law Enforcement. Detection and prosecution of Offences, e.g. running red lights driving at a point-in-time speed in exceed of the speed limit ?driving at an average speed in excess of the speed limit ?Public Safety. Deterrence of unsafe practices (e.g. speeding, driving unregistered vehicles, driving unlicensed) ??Criminal Law Enforcement. Detection and interception of vehicles reported stolen, or associated with 'wanted people'

Copyright Appropriate 'Blacklist in Camera' Architecture

Copyright ANPR for (3) Mass Surveillance Indiscriminate collection Long retention Data Mining to generate suspicions All Australian Police Forces are adopting this approach, and are being aided and abetted by the Clth (Crimtrac)

Copyright ANPR Quality Alliances of purveyors and purchasers suggest that registration data extraction is accurate and reliable But: Very little evidence is publicly available There appear to have been no independent tests Many factors reduce reliability, incl. the state of the registration plates, of the camera lens and of the light-path The extraction is by its nature 'fuzzy', and confidence threshholds have to be set Reliable extraction of the registration data may be as low as 70% even under favourable conditions

Copyright Location and Tracking Technologies V3 Human Bodies Location and Tracking requires a chip-set and an associated transceiver, antenna and power-source The most relevant technology/ies: contactless smartcards radio-frequency identification (RFID) near field communications (NFC) Carriers – 'plastic cards', 'RFID tags', handsets Alternative Carrier 'Form-Factors': Adornments – wrist-watches, brooches, belt-buckles, body-piercings (ear, nose, navel, tongue) Tightly-Attached RFID Tags (Wristlets, Anklets) Embedded Chips (hand, arm, tooth-enamel, gums,...)

Copyright Chips for Goods Monitoring

Copyright Monitoring of Animal-Attached Chips

Copyright Monitoring of Animal-Embedded Chips

Copyright Continuous Monitoring of Chips

Copyright Categorising Surveillance (1)Of What? Person, Object, Space (2)For Whom? Person, Involved Party, Third Party (3) By Whom? Person, Involved Party, Third Party (4) Why? Wellbeing, Evidence, Deterrence (5) How? Physical (visual, aural, at distance, auto-surveillance) Dataveillance (retrospective, real-time, predictive) Communications / Experience Personal / Mass Surveillance (6) Where? Physical, Virtual, Intellectual (7) When? Once, Recurrent, Scattered, Continuous

Copyright Voluntary? Consensual? Coerced? Imposed? Voluntary e.g. individuals who are concerned about being kidnapped Consensual e.g. genuinely optional use to locate people within a campus Coerced 'an offer you couldn't refuse', e.g. a condition of a job or a promotion Imposed, e.g. on employees by powerful employers such as the military on various categories of institutionalised individuals prisoners on parole prisoners within low-security facilities prisoners within conventional gaols people on remand (charged, untried, may be a flight risk) the frail aged, especially those suffering senile dementia babies in neo-natal wards unconscious patients during operational procedures

Copyright Potential Impacts of Location and Tracking Chilling Effect on: Terrorism Crime Sociopathic Behaviour Chilling Effect on: 'Anti-Social Behaviour' Creative Behaviour Dissidence Travel Association Denial of: Service Travel Identity

Copyright Counterveillance Principles 1.Independent Evaluation of Technology 2.A Moratorium on Technology Deployments 3.Open Information Flows 4.Justification for Proposed Measures 5.Consultation and Participation 6.Evaluation 7.Design Principles 1.Balance 2.Independent Controls 3.Nymity and Multiple Identity 8.Rollback

Copyright You Are Where Youve Been AGENDA Intellectual and Analytical Tools Location and Tracking Identity, Entity and Nymity Privacy and Dataveillance Location and Tracking Technologies Handhelds Motor Vehicles Human Bodies Threats Controls

Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at ANU and the Uni. of Hong Kong Chair, Australian Privacy Foundation {.html,.ppt} Location Privacy Seminar – UNSW – 23 July 2008 YOU ARE WHERE YOU'VE BEEN Location Technologies' Deep Privacy Impact