08-WhyDoYouKnowSoMuchAboutMe

Page 1

Why Do You Know So Much About Me? Privacy in the Digital Age

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Not talking about surveillance Not talking about the government But rather The voluntary disclosure of personal information to private institutions

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


We say one thing. I want my privacy. We do something else. Here’s my data. Take what you want. (just give me my stuff)

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


43% of online users claim that they are likely to read the privacy policy of a website before buying anything

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


What Privacy Statements Say

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


26% actually consulted the privacy policy Even more odd, there was no difference between privacy fundamentalists, pragmatists, or the unconcerned http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


71% want to control who can access their personal information

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


75% have supplied

50% have supplied

• First name • Last name • E‐mail • Street address

• Phone number • Birthday • Credit card information

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


“You have zero privacy. Get over it” Scott McNealy Former CEO Sun Microsystems http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


“If you have something you don’t anyone to know, maybe you shouldn’t be doing it in the first place.” Eric Schmidt Former Google CEO

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


“People have gotten more comfortable not only sharing more information, but more openly and with more people.” Mark Zukerberg Facebook CEO

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


What do you think privacy is?

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy is….? ¾

¾ ¾ ¾

Secrecy, Concealment, Seclusion, Solitude, Confidentiality, An onymity Prejudicial Information Personally Identifiable Information (PII) Whatever you want it to be

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Viewed in terms of the relation of the individual to social participation, privacy is the voluntary and temporary withdrawal of a person from a general society into a condition of anonymity or reserve.

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy in Colonial America ¾ ¾ ¾ ¾

Find an open field to talk Sneak off into the woods No privacy indoors Churches encouraged neighbors to snoop on each other

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy in the 1800s ¾ ¾ ¾ ¾ ¾

Long‐distance communication by telegraph Letters Concern about invasive press Snooping discouraged Gossip, Word of Mouth

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy from 1900 ‐ 1965 ¾ ¾ ¾ ¾

First bugging device Search of electronic conversations constitutional Telephone communications over wires Cold War prompts government to increase surveillance of civilians without their knowledge

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy from 1965 ‐ 1990 ¾ ¾ ¾ ¾ ¾

Watergate Scandal Personal computers Public‐key encryption invented Internet emerged Sensationalist journalism

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy from 1990 ‐ 2001 ¾ ¾ ¾ ¾ ¾

No privacy for public figures Wireless communication Cameras Satellites Confusion over who owns content on computer networks

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy After September 11th ¾

¾ ¾

Private customer information divulged to federal authorities hunting for terrorists or criminals Airport searches Polls in the US indicated that people think that the 1st amendment of the US Constitution might go too far

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Total Information Awareness ¾

Post 9/11 project to: – [Create] enormous computer databases to gather and store the personal information in the United States, including personal emails, social network analysis, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant. Additionally, the program included funding for a biometric surveillance technologies that could identify and track individuals using surveillance cameras and other methods.

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Television & Privacy ¾

¾

¾

1992 brought the launch of Reality Television where everyone’s lives became public consumption This brought about shows about people: – Living together in homes and islands – Families struggling with personal issues – Celebrities private issues made public – People showing off their stupidity to win money and fame In short, Reality TV took the privacy discussion to a new level

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Privacy Today ¾ ¾

¾ ¾

YouTube has ended all forms of personal privacy Bloggers have made their personal (and their friends/acquaintances) lives topics of discussion of the entire world And then came social networks…. We are comfortable sharing our lives and thoughts instantly with thousands of people – close friends and strangers alike

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Ways Technology Threatens Privacy ¾ ¾ ¾ ¾ ¾ ¾

Phishing Malware&Spyware Social Networking sites Photo & Video Sharing Web History Targeted Advertising & Cookies

http://emagine‐group.com

¾ ¾ ¾ ¾ ¾ ¾

Cloud Computing Electronic Medical Data Public Wi‐Fi Retail Loyalty Cards Workplace Computers Cell Phones

Experience Focused, Socially Active, Digitally Enabled


Why Privacy Has Changed? ¾ ¾ ¾ ¾ ¾ ¾ ¾ ¾

Curiosity Convenience The Internet and Evolving Technology Social Trends Desire to relate & share with others Identity Fame Posterity

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


The primary business model of today’s most successful corporation is the monetization in the mass collection, correlation & analysis of individual private data

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Private Info Monetized ¾

¾ ¾

¾

Acxiom – 750 billion pieces of information or 1,500 facts on ½ billion people – Correlate “consumer” info from signups, surveys, magazine subscriptions – USD 1. 38 billion turnover for FY2008 Colligent – Actionable consumer research derived from social networks Rapleaf – 450 million social network profiles – Submit request and aggregated social network profiles returned within a day Phorm – Uses “behavioral keywords” – keywords derived from a combination of search terms, URLs and even contextual page analysis over time – to find the right users

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


How It Affects Us?

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


White’s Taxonomy of Online Privacy Invasion Web Request Cross Site Tracking

Rich Browser Environments

Application Data

Aggregation, Correlation & Meta‐Data

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Taxonomy – Web Request ¾ ¾ ¾

A single web request – An image on a website One webpage is made up of multiple requests What They Can Find Out – Location (Latitude, Longitude, City, C ountry) – Language – Operating System & Browser – What site you came from – ISP – Have you been here before?

http://emagine‐group.com

Web Request

Experience Focused, Socially Active, Digitally Enabled


Taxonomy – Cross Site Tracking ¾

¾

¾

¾

Using cookies to track across computers and affiliated sites Cookie is stored on your computer and sent with every request Cookies usually associated with login details What They Can Find Out – Who you are – What sites you visit – Behavioral profiles

http://emagine‐group.com

Cross Site Tracking

Experience Focused, Socially Active, Digitally Enabled


Taxonomy – Rich Browser Environments ¾

¾

Rich Web 2.0 Technologies – JavaScript/AJAX – Flash/Silverlight What They Can Find Out – Browser history – Clipboard data – Key presses – Visual stimulus – Browser plugins – Desktop display preferences

http://emagine‐group.com

Rich Browser Environments

Experience Focused, Socially Active, Digitally Enabled


Taxonomy – Application Data ¾ ¾

¾

Rich Information Inputs Structured & Unstructured Data – Search requests – E‐mails – Calendar items – Instant Message Communications What They Can Find Out – Who you are – Who your friends are – What you’re doing on Sunday – Your Interests

http://emagine‐group.com

Application Data

Experience Focused, Socially Active, Digitally Enabled


Taxonomy – Aggregation, Correlation & Meta Data ¾

¾ ¾

Combining the previous levels – Meta‐Data – Include interactions with applications – Aggregation – combining the information from various sources – Correlation – normalizing entities across sources Provides information you may not be aware of What they can find out – Social networks – Behavioral profiles – Psychological profiles – Deep databases

http://emagine‐group.com

Aggregation, Correlation & Meta‐Data

Experience Focused, Socially Active, Digitally Enabled


How Does Information Get Revealed?

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By ISPs ¾

¾

¾

ISPs always know your IP address and the IP address to which you are communicating ISPs are capable of observing unencrypted data passing between you and the Internet but not properly‐encrypted data They are usually prevented to do so due to social pressure and law

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By E‐Mail ¾ ¾ ¾

May be inappropriately spread by the original receiver May be intercepted May be legally viewed or disclosed by service providers or authorities

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Discussion Groups ¾

¾

There is no barrier for unsolicited messages or emails within a mailing list or online discussion group Any member of the list or group could collect and distribute your email address and information you post

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Internet Browsers ¾

¾

Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password You may accidentally reveal such information when using a browser on a public computer or someone else's

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Search Engines ¾

Search engines have and use the ability to track each one of your searches by IP address, search terms and time of day

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


How Do We Know ‐ AOL ¾

¾

¾

¾

Aug 7, 06 ‐ AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost two weeks before that, AOL had quietly released roughly twenty million search record from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website(s) visited as a result of the search. NY Times was able to identify several users by cross‐ referencing with phonebooks/public records

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


How Do We Know – Department of Justice ¾

¾

¾

Jan 06, the US Dept of Justice issued a subpoena asking popular search engines to provide a "random sampling" of 1 million IP addresses that used the search engine, and a random sampling of 1 million search queries submitted over a one‐week period. The government wanted the information to defend a child pornography law. Microsoft, Yahoo and AOL complied with the request, while Google fought the subpoena.

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


How Do We Know ‐ Google ¾ ¾

¾

¾

Google collects massive amounts of user data Gmail has a machine reading email to improve the relevance of advertisements displayed Google Street View ‐ public/private property & people captured in images Search histories are kept for two years and identified via a cookie

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Indirect Marketing ¾

¾

Web bugs ‐ a graphic (in a website or a graphic enabled email) that can confirm when the message or web page is viewed and record the IP address of the viewer Third party cookies ‐ a web page may contain images or other components stored on servers in other domains. Cookies that are set during retrieval of these components are called third‐ party cookies.

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


What Are Cookies? ¾

¾

¾ ¾

Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts Cookies are only data, not programs or viruses There are two types of cookies ‐ persistent and non‐persistent

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Why Don’t We Like Cookies? ¾ ¾

Cookies can be hijacked and modified by attackers Cookies can be used to track browsing behavior so some think they are tagged

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Direct Marketing ¾

¾ ¾

Direct marketing is a sales pitch targeted to a person based on previous consumer choices. It is common these days Many companies also sell or share your information to others. This sharing with other businesses can be done rapidly and cheaply

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Instant Messaging ¾

¾ ¾

Your IM conversation can be saved onto a computer even if only one person agrees Workplace IM can be monitored by your employer SPIM ‐ Spam distributed in IM

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Employers ¾ ¾

¾

76% of employers monitor employees website connections 65% use technology to blocked connections to banned websites 55% monitor email

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


By Cybercrime ¾

¾

¾

Spyware takes advantage of security holes to attack the browser and force it to be downloaded and installed to gather information without your knowledge Phishing occurs when criminals lure the victim into providing financial data to an unsecure website Pharming occurs when criminals plant programs in the victim's computer which redirect the victim from legitimate websites to scam look‐alike sites

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


Facebook “Privacy”

http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled


http://emagine‐group.com

Experience Focused, Socially Active, Digitally Enabled



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.