Getting the social side of pervasive computing right

26
Getting the social side of pervasive computing right Ian Brown, Computer Science, UCL Also work with: Privacy International, European Digital Rights, Foundation for Information Policy Research, Open Rights Group

description

 

Transcript of Getting the social side of pervasive computing right

Page 1: Getting the social side of pervasive computing right

Getting the social side of pervasive computing right

Ian Brown, Computer Science, UCL

Also work with: Privacy International, European Digital Rights, Foundation for Information Policy Research, Open Rights Group

Page 2: Getting the social side of pervasive computing right

Overview

• “Dark scenarios”• Privacy principles and laws• Designing privacy in

Page 3: Getting the social side of pervasive computing right

Pervasive/ubiquitous/ambient/whatever

• Computing systems that use new sensor technology (RFIDs, smart dust, biometric readers, millimeter wave scanners…) to collect an order of magnitude more environmental information

• Networked together with novel user interfaces and large data stores to provide history

Page 4: Getting the social side of pervasive computing right

Many positive prospects for “invisible” computing

• Especially for those who are less comfortable with existing device-centric technology:– Seniors– Less educated– Non information workers

• Much more information available from environment to improve system decision making

Page 5: Getting the social side of pervasive computing right

Need to address social impacts to ensure trust in new systems

• Just like security, privacy is much easier to design in from the start than to lump on at the end

• Privacy disasters (see RFIDs) are hard to recover from• “How would you like it if, for instance, one day you realized

your underwear was reporting on your whereabouts?”– California State Senator Debra Bowen, at a 2003 hearing

Page 6: Getting the social side of pervasive computing right

Safeguards in a World of Ambient Intelligence (SWAMI)

• European Commission-funded research to identify four “dark scenarios” that show potential social problems with pervasive computing

• Based on capabilities of existing and prototype systems and recent news stories

• Two reports available from swami.jrc.es, conference being held 21-22 March in Brussels

Page 7: Getting the social side of pervasive computing right

SWAMI “threats”

• Quantity of personal information in circulation will increase greatly

• Introduction of perceptual and biometric interfaces will transform the qualitative nature of personal information in circulation

• Personalised services require the tracking and collection of significant portions of users’ everyday activities

Page 8: Getting the social side of pervasive computing right

Day-to-day family life scenario

• Middle-class teleworkers with two teenage children

• Security requirements for home office includes video surveillance, presence and biometric sensors

• Location-based services and shopping agents widely used

Page 9: Getting the social side of pervasive computing right

Day-to-day family life problems

• Police open investigation into father based on inaccurate profiling of his activities, delaying a promotion at work

• Shopping agent interrupts mother’s client presentation with inappropriate gift suggestion. Borrowed dress is scanned by criminals, who break into friend’s home

• Teenage son circumvents home network security, places bets, downloads porn, and rifles through father’s favourite sites and stored data

Page 10: Getting the social side of pervasive computing right

Seniors on a journey scenario

• Two retirees take a group vacation and a bus accident occurs after a malfunction in traffic light management software

• Group members use advanced health monitoring systems

Page 11: Getting the social side of pervasive computing right

Seniors on a journey problems

• Seniors’ families are automatically notified of accident, but have trouble getting in contact while digital communicators are blocked by emergency responders and hospital

• One trip member dies on way to hospital as her outdated health monitors fail to inform ambulance workers of serious internal injuries

• Hackers caused traffic light problem by breaking into traffic management priority system

Page 12: Getting the social side of pervasive computing right

Corporate malfeasance scenario

• Data Mining Corporation builds profiles on hundreds of millions of adults based on personal data gathered through ambient intelligence

• Profiles used by private companies and also government intelligence and immigration agencies

• Critical infrastructure staff must wear location implants

Page 13: Getting the social side of pervasive computing right

Corporate malfeasance problems

• 16m records stolen through insider attack• Two highly-placed employees have disappeared

but cannot be tracked via implants. Incidences of ID theft and blackmail leap up

• Lack of ambient intelligence profiles on developing world citizens makes Western nations highly reluctant to allow visits

Page 14: Getting the social side of pervasive computing right

Societal dependence scenario

• Developed societies become totally dependent on pervasive technologies

• Individuals have no meaningful choice to “opt out”• Resources concentrated on profitable activities

such as marketing and profiling, not in areas such as environmental monitoring that could have a wider social impact

Page 15: Getting the social side of pervasive computing right

Societal dependence problems

• Very few systems are engineered for the 99.999% reliability we expect from the phone system

• Imagine the chaos that could result when large-scale pervasive systems crash, are infected by viruses, are taken down by DoS attacks…

• What emergent effects will we see from the interaction of greatly-increased personal area networks and systems?

• Will privacy be an option?

Page 16: Getting the social side of pervasive computing right

Overview

• “Dark scenarios”• Privacy principles and laws• Designing privacy in

Page 17: Getting the social side of pervasive computing right

OECD Fair Information Practices

• Collection Limitation Principle •  Data Quality Principle •  Purpose Specification Principle •  Use Limitation Principle •  Security Safeguards Principle •  Openness Principle •  Individual Participation Principle •  Accountability Principle

Page 18: Getting the social side of pervasive computing right

EU Privacy Directive

• OECD Fair Information Practices incorporated into 1995 EU Directive

• All 25 member states must give force in national law

• Limits export of personal data to non-compliant jurisdictions

• Creates Working Party of Commissioners

Page 19: Getting the social side of pervasive computing right

Art. 29 Working Party concerns

• “Working Party 29 (“Working Party 29”) is concerned about the possibility for some applications of RFID technology to violate human dignity as well as data protection rights. In particular, concerns arise about the possibility of businesses and governments to use RFID technology to pry into the privacy sphere of individuals. The ability to surreptitiously collect a variety of data all related to the same person; track individuals as they walk in public places (airports, train stations, stores); enhance profiles through the monitoring of consumer behaviour in stores; read the details of clothes and accessories worn and medicines carried by customers are all examples of uses of RFID technology that give rise to privacy concerns.” http://europa.eu.int/comm/justice_home/fsj/privacy/docs/wpdocs/2005/wp105_en.pdf

Page 20: Getting the social side of pervasive computing right

Overview

• “Dark scenarios”• Privacy principles and laws• Designing privacy in

Page 21: Getting the social side of pervasive computing right

Security not enough

• Security is necessary but not sufficient for privacy• Magical crypto fairy dust will not solve your

privacy problems• "those who think that their problem can be solved

by simply applying cryptography don't understand cryptography and don't understand their problem" (Needham/Lampson)

Page 22: Getting the social side of pervasive computing right

Pharmaceutical RFID trials (Enterprise Privacy Group)

• Big pharmaceutical company wants to track medicines through the supply chain

• Use RFID to monitor packages as they transit from factory through distribution chain to individual pharmacies

• Pharmacy can check authenticity of specific medicines against manufacturer database

Page 23: Getting the social side of pervasive computing right

How do we solve the “Viagra problem”?

• Disclosure: publicise code of practice to customers• Collection limitation: remove tag at point of sale• Use limitation: kept entirely separate from loyalty schemes• Data quality: integrate into supply chain management• Accountability: pharmacist responsible to customers

Page 24: Getting the social side of pervasive computing right

Government data sinks

• If data can be collected about individuals, there will always be government pressure to store and access that information

• E.g. PATRIOT Act National Security Letters, NSA activities within the US, EU data retention directive

• Data minimisation is a key requirement for privacy in this legislative environment

• Encryption is no protection if governments can compel decryption

Page 25: Getting the social side of pervasive computing right

They have the technology…

• "Our survey of 128 federal departments and agencies on their use of data mining shows that 52 agencies are using or are planning to use data mining. These departments and agencies reported 199 data-mining efforts, of which 68 are planned and 131 are operational.” –Government Accountability Office

• “[Techniques that] look at people's behavior to predict terrorist intent are so far from reaching the level of accuracy that's necessary that I see them as nothing but civil liberty infringement engines." –Jeff Jonas, chief scientist, IBM Entity Analytics

Page 26: Getting the social side of pervasive computing right

Conclusions

• Privacy choices are essential for consumer acceptance of technologies and regulatory compliance

• Privacy needs to be built in, not slapped on• Key design choice: at every stage, minimise

personal information collected