Whyâ©Doâ©Youâ©Knowâ©Soâ©Muchâ©Aboutâ©Me?â© Privacyâ©inâ©theâ©Digitalâ©Age
Notâ©talkingâ©aboutâ©surveillanceâ© Notâ©talkingâ©aboutâ©theâ©governmentâ© Butâ©ratherâ© Theâ©voluntaryâ©disclosureâ©ofâ©personalâ©informationâ©toâ© privateâ©institutions
Weâ©sayâ©oneâ©thing.â© Iâ©wantâ©myâ©privacy.â© Weâ©doâ©somethingâ©else.â© Hereâsâ©myâ©data.â©Takeâ©whatâ©youâ©want.â© (justâ©giveâ©meâ©myâ©stuff)
43%â©ofâ©onlineâ©usersâ©claimâ©thatâ©theyâ© areâ©likelyâ©toâ©readâ©theâ©privacyâ©policyâ©ofâ© aâ©websiteâ©beforeâ©buyingâ©anything
Whatâ©Privacyâ©Statementsâ©Say
26%â©actuallyâ©consultedâ©theâ©privacyâ© policyâ© Evenâ©moreâ©odd,â©thereâ©wasâ©noâ© differenceâ©betweenâ©privacyâ© fundamentalists,â©pragmatists,â©orâ©theâ© unconcerned
71%â©wantâ©toâ©controlâ©whoâ©canâ©accessâ© theirâ©personalâ©information
75%â©haveâ©supplied
50%â©haveâ©supplied
âąâFirstâ©nameâ© âąâLastâ©nameâ© âąâEâmailâ© âąâStreetâ©address
âąâPhoneâ©numberâ© âąâBirthdayâ© âąâCreditâ©cardâ©information
âYouâ©haveâ©zeroâ©privacy.â©Getâ©overâ©itââ© Scottâ©McNealyâ© Formerâ©CEOâ©Sunâ©Microsystems
âIfâ©youâ©haveâ©somethingâ©youâ©donâtâ© anyoneâ©toâ©know,â©maybeâ©youâ© shouldnâtâ©beâ©doingâ©itâ©inâ©theâ©firstâ© place.ââ© Ericâ©Schmidtâ© Formerâ©Googleâ©CEO
âPeopleâ©haveâ©gottenâ©moreâ© comfortableâ©notâ©onlyâ©sharingâ© moreâ©information,â©butâ©moreâ© openlyâ©andâ©withâ©moreâ©people.ââ© Markâ©Zukerbergâ© Facebookâ©CEO
Whatâ©doâ©youâ©thinkâ©privacyâ©is?
Privacyâ©isâŠ.?â© ïœâ Secrecy,â©Concealment,â©Seclusion,â©Solitude,
Confidentiality,â©Anonymityâ© ïœâ Prejudicialâ©Informationâ© ïœâ Personallyâ©Identifiableâ©Informationâ©(PII)â© ïœâ Whateverâ©youâ©wantâ©itâ©toâ©be
Privacyâ©isâ©theâ©claimâ©ofâ©individuals,â© groups,â©orâ©institutionsâ©toâ©determineâ© forâ©themselvesâ©when,â©how,â©andâ©toâ© whatâ©extentâ©informationâ©aboutâ©themâ© isâ©communicatedâ©toâ©others.
Viewedâ©inâ©termsâ©ofâ©theâ©relationâ©ofâ©theâ© individualâ©toâ©socialâ©participation,â© privacyâ©isâ©theâ©voluntaryâ©andâ© temporaryâ©withdrawalâ©ofâ©aâ©personâ© fromâ©aâ©generalâ©societyâ©intoâ©aâ© conditionâ©ofâ©anonymityâ©orâ©reserve.
Privacyâ©isâ©theâ©abilityâ©ofâ©anâ©individualâ©orâ© groupâ©toâ©secludeâ©themselvesâ©orâ© informationâ©aboutâ©themselvesâ©andâ© therebyâ©revealâ©themselvesâ©selectively.
Privacyâ©inâ©Colonialâ©Americaâ© ïœâ Findâ©anâ©openâ©fieldâ©toâ©talkâ© ïœâ Sneakâ©offâ©intoâ©theâ©woodsâ© ïœâ Noâ©privacyâ©indoorsâ© ïœâ Churchesâ©encouragedâ©neighborsâ©toâ©snoopâ©onâ©eachâ©other
Privacyâ©inâ©theâ©1800sâ© ïœâ Longâdistanceâ©communicationâ©byâ©telegraphâ© ïœâ Lettersâ© ïœâ Concernâ©aboutâ©invasiveâ©pressâ© ïœâ Snoopingâ©discouragedâ© ïœâ Gossip,â©Wordâ©ofâ©Mouth
Privacyâ©fromâ©1900â©ââ©1965â© ïœâ Firstâ©buggingâ©deviceâ© ïœâ Searchâ©ofâ©electronicâ©conversationsâ©constitutionalâ© ïœâ Telephoneâ©communicationsâ©overâ©wiresâ© ïœâ Coldâ©Warâ©promptsâ©governmentâ©toâ©increaseâ©surveillance
ofâ©civiliansâ©withoutâ©theirâ©knowledge
Privacyâ©fromâ©1965â©ââ©1990â© ïœâ Watergateâ©Scandalâ© ïœâ Personalâ©computersâ© ïœâ Publicâkeyâ©encryptionâ©inventedâ© ïœâ Internetâ©emergedâ© ïœâ Sensationalistâ©journalism
Privacyâ©fromâ©1990â©ââ©2001â© ïœâ Noâ©privacyâ©forâ©publicâ©figuresâ© ïœâ Wirelessâ©communicationâ© ïœâ Camerasâ© ïœâ Satellitesâ© ïœâ Confusionâ©overâ©whoâ©ownsâ©contentâ©onâ©computerâ©networks
Privacyâ©Afterâ©Septemberâ©11thâ©â© ïœâ Privateâ©customerâ©informationâ©divulgedâ©toâ©federal
authoritiesâ©huntingâ©forâ©terroristsâ©orâ©criminalsâ© ïœâ Airportâ©searchesâ© ïœâ Pollsâ©inâ©theâ©USâ©indicatedâ©thatâ©peopleâ©thinkâ©thatâ©theâ©1stâ© amendmentâ©ofâ©theâ©USâ©Constitutionâ©mightâ©goâ©tooâ©far
Totalâ©Informationâ©Awarenessâ© ïœâ Postâ©9/11â©projectâ©to:â© ïœ
[Create]â©enormousâ©computerâ©databasesâ©toâ©gatherâ©andâ©storeâ© theâ©personalâ©informationâ©inâ©theâ©Unitedâ©States,â©includingâ© personalâ©emails,â©socialâ©networkâ©analysis,â©creditâ©cardâ©records,â© phoneâ©calls,â©medicalâ©records,â©andâ©numerousâ©otherâ©sources,â© withoutâ©anyâ©requirementâ©forâ©aâ©searchâ©warrant.â©Additionally,â© theâ©programâ©includedâ©fundingâ©forâ©aâ©biometricâ©surveillanceâ© technologiesâ©thatâ©couldâ©identifyâ©andâ©trackâ©individualsâ©usingâ© surveillanceâ©camerasâ©andâ©otherâ©methods.
Televisionâ©&â©Privacyâ© ïœâ 1992â©broughtâ©theâ©launchâ©ofâ©Realityâ©Televisionâ©where
everyoneâsâ©livesâ©becameâ©publicâ©consumptionâ© ïœâ Thisâ©broughtâ©aboutâ©showsâ©aboutâ©people:â© ïœâ ïœâ ïœâ ïœ
Livingâ©togetherâ©inâ©homesâ©andâ©islandsâ© Familiesâ©strugglingâ©withâ©personalâ©issuesâ© Celebritiesâ©privateâ©issuesâ©madeâ©publicâ© Peopleâ©showingâ©offâ©theirâ©stupidityâ©toâ©winâ©moneyâ©andâ©fame
ïœâ Inâ©short,â©Realityâ©TVâ©tookâ©theâ©privacyâ©discussionâ©toâ©aâ©new
level
Privacyâ©Todayâ© ïœâ YouTubeâ©hasâ©endedâ©allâ©formsâ©ofâ©personalâ©privacyâ© ïœâ Bloggersâ©haveâ©madeâ©theirâ©personalâ©(andâ©theirâ©friends/
acquaintances)â©livesâ©topicsâ©ofâ©discussionâ©ofâ©theâ©entireâ© worldâ© ïœâ Andâ©thenâ©cameâ©socialâ©networksâŠ.â© ïœâ Weâ©areâ©comfortableâ©sharingâ©ourâ©livesâ©andâ©thoughtsâ© instantlyâ©withâ©thousandsâ©ofâ©peopleâ©ââ©closeâ©friendsâ©andâ© strangersâ©alike
Waysâ©Technologyâ©Threatensâ©Privacyâ© ïœâ Phishing
ïœâ Cloudâ©Computing
ïœâ Malwareâ©&â©Spyware
ïœâ Electronicâ©Medicalâ©Data
ïœâ Socialâ©Networkingâ©sites
ïœâ Publicâ©WiâFi
ïœâ Photoâ©&â©Videoâ©Sharing
ïœâ Retailâ©Loyaltyâ©Cards
ïœâ Webâ©History
ïœâ Workplaceâ©Computers
ïœâ Targetedâ©Advertisingâ©&
ïœâ Cellâ©Phones
Cookies
Whyâ©Privacyâ©Hasâ©Changed?â© ïœâ Curiosityâ© ïœâ Convenienceâ© ïœâ Theâ©Internetâ©andâ©Evolvingâ©Technologyâ© ïœâ Socialâ©Trendsâ© ïœâ Desireâ©toâ©relateâ©&â©shareâ©withâ©othersâ© ïœâ Identityâ© ïœâ Fameâ© ïœâ Posterity
Theâ©primaryâ©businessâ©modelâ©ofâ© todayâsâ©mostâ©successfulâ©corporationâ© isâ©theâ©monetizationâ©inâ©theâ©massâ© collection,â©correlationâ©&â©analysisâ©ofâ© individualâ©privateâ©data
Privateâ©Infoâ©Monetizedâ© ïœ
Acxiomâ©ââ©750â©billionâ©piecesâ©ofâ©informationâ©orâ©1,500â©factsâ©onâ©Âœâ© billionâ©peopleâ© ïœâ ïœ
Correlateâ©âconsumerââ©infoâ©fromâ©signups,â©surveys,â©magazineâ© subscriptionsâ© USDâ©1.â©38â©billionâ©turnoverâ©forâ©FY2008
Colligentâ©ââ©Actionableâ©consumerâ©researchâ©derivedâ©fromâ©socialâ© networksâ© ïœâ Rapleafâ©ââ©450â©millionâ©socialâ©networkâ©profilesâ© ïœ
ïœ
ïœ
Submitâ©requestâ©andâ©aggregatedâ©socialâ©networkâ©profilesâ©returnedâ© withinâ©aâ©day
Phormâ© ïœ
Usesâ©âbehavioralâ©keywordsââ©ââ©keywordsâ©derivedâ©fromâ©aâ©combinationâ© ofâ©searchâ©terms,â©URLsâ©andâ©evenâ©contextualâ©pageâ©analysisâ©overâ©timeâ©ââ© toâ©findâ©theâ©rightâ©users
Howâ©Itâ©Affectsâ©Us?
Whiteâsâ©Taxonomyâ©ofâ©Onlineâ©Privacyâ©Invasionâ© Webâ©â© Requestâ© Crossâ©Siteâ©Tracking
Richâ©Browserâ©Environments
Applicationâ©Data
Aggregation,â©Correlationâ©&â©MetaâData
Taxonomyâ©ââ©Webâ©Requestâ© ïœ
Aâ©singleâ©webâ©requestâ© ïœ
Anâ©imageâ©onâ©aâ©website
Oneâ©webpageâ©isâ©madeâ©upâ©ofâ© multipleâ©requestsâ© ïœâ Whatâ©Theyâ©Canâ©Findâ©Outâ© ïœ
ïœâ ïœâ ïœâ ïœâ ïœâ ïœ
Locationâ©(Latitude,â©Longitude,â© City,â©Country)â© Languageâ© Operatingâ©Systemâ©&â©Browserâ© Whatâ©siteâ©youâ©cameâ©fromâ© ISPâ© Haveâ©youâ©beenâ©hereâ©before?
Webâ©â© Request
Taxonomyâ©ââ©Crossâ©Siteâ©Trackingâ© ïœâ Usingâ©cookiesâ©toâ©track
acrossâ©computersâ©andâ© affiliatedâ©sitesâ© ïœâ Cookieâ©isâ©storedâ©onâ©yourâ© computerâ©andâ©sentâ©withâ© everyâ©requestâ© ïœâ Cookiesâ©usuallyâ©associatedâ© withâ©loginâ©detailsâ© ïœâ Whatâ©Theyâ©Canâ©Findâ©Outâ© ïœâ ïœâ ïœ
Whoâ©youâ©areâ© Whatâ©sitesâ©youâ©visitâ© Behavioralâ©profiles
Crossâ©Siteâ©Tracking
Taxonomyâ©ââ©Richâ©Browserâ©Environmentsâ© ïœâ Richâ©Webâ©2.0â©Technologiesâ© ïœâ ïœ
JavaScript/AJAXâ© Flash/Silverlight
ïœâ Whatâ©Theyâ©Canâ©Findâ©Out
Browserâ©historyâ© ïœâ Clipboardâ©dataâ© ïœâ Keyâ©pressesâ© ïœâ Visualâ©stimulusâ© ïœâ Browserâ©pluginsâ© ïœâ Desktopâ©displayâ© preferencesâ© ïœ
Richâ©Browserâ© Environments
Taxonomyâ©ââ©Applicationâ©Dataâ© Richâ©Informationâ©Inputsâ© ïœâ Structuredâ©&â©Unstructuredâ© Dataâ© ïœ
ïœâ ïœâ ïœâ ïœ
ïœ
Searchâ©requestsâ© Eâmailsâ© Calendarâ©itemsâ© Instantâ©Messageâ© Communications
Whatâ©Theyâ©Canâ©Findâ©Outâ© ïœâ ïœâ ïœâ ïœ
Whoâ©youâ©areâ© Whoâ©yourâ©friendsâ©areâ© Whatâ©youâreâ©doingâ©onâ©Sundayâ© Yourâ©Interests
Applicationâ©Data
Taxonomyâ©ââ©Aggregation,â©Correlationâ©&â©Metaâ©Dataâ© ïœ
Combiningâ©theâ©previousâ©levelsâ© ïœâ ïœ
ïœ
ïœâ ïœ
MetaâDataâ©ââ©Includeâ© interactionsâ©withâ©applicationsâ© Aggregationâ©ââ©combiningâ©theâ© informationâ©fromâ©variousâ© sourcesâ© Correlationâ©ââ©normalizingâ© entitiesâ©acrossâ©sources
Providesâ©informationâ©youâ©mayâ© notâ©beâ©awareâ©ofâ© Whatâ©theyâ©canâ©findâ©outâ© ïœâ ïœâ ïœâ ïœ
Socialâ©networksâ© Behavioralâ©profilesâ© Psychologicalâ©profilesâ© Deepâ©databases
Aggregation,â©â© Correlationâ©&â©â© MetaâData
Howâ©Doesâ©Informationâ©Getâ©Revealed?
Byâ©ISPsâ© ïœâ ISPsâ©alwaysâ©knowâ©yourâ©IPâ©addressâ©andâ©theâ©IPâ©addressâ©to
whichâ©youâ©areâ©communicatingâ© ïœâ ISPsâ©areâ©capableâ©ofâ©observingâ©unencryptedâ©dataâ©passingâ© betweenâ©youâ©andâ©theâ©Internetâ©butâ©notâ©properlyâ encryptedâ©dataâ© ïœâ Theyâ©areâ©usuallyâ©preventedâ©toâ©doâ©soâ©dueâ©toâ©socialâ© pressureâ©andâ©law
Byâ©EâMailâ© ïœâ Mayâ©beâ©inappropriatelyâ©spreadâ©byâ©theâ©originalâ©receiverâ© ïœâ Mayâ©beâ©interceptedâ© ïœâ Mayâ©beâ©legallyâ©viewedâ©orâ©disclosedâ©byâ©serviceâ©providers
orâ©authorities
Byâ©Discussionâ©Groupsâ© ïœâ Thereâ©isâ©noâ©barrierâ©forâ©unsolicitedâ©messagesâ©orâ©emails
withinâ©aâ©mailingâ©listâ©orâ©onlineâ©discussionâ©groupâ© ïœâ Anyâ©memberâ©ofâ©theâ©listâ©orâ©groupâ©couldâ©collectâ©andâ© distributeâ©yourâ©emailâ©addressâ©andâ©informationâ©youâ©post
Byâ©Internetâ©Browsersâ© ïœâ Mostâ©webâ©browsersâ©canâ©saveâ©someâ©formsâ©ofâ©personal
data,â©suchâ©asâ©browsingâ©history,â©cookies,â©webâ©formâ©entriesâ© andâ©passwordâ© ïœâ Youâ©mayâ©accidentallyâ©revealâ©suchâ©informationâ©whenâ©usingâ© aâ©browserâ©onâ©aâ©publicâ©computerâ©orâ©someoneâ©else's
Byâ©Searchâ©Enginesâ© ïœâ Searchâ©enginesâ©haveâ©andâ©useâ©theâ©abilityâ©toâ©trackâ©eachâ©one
ofâ©yourâ©searchesâ©byâ©IPâ©address,â©searchâ©termsâ©andâ©timeâ©ofâ© day
Howâ©Doâ©Weâ©Knowâ©ââ©AOLâ© ïœâ Augâ©7,â©06â©ââ©AOLâ©apologizedâ©forâ©releasingâ©searchâ©logâ©data
onâ©subscribersâ©thatâ©hadâ©beenâ©intendedâ©forâ©useâ©withâ©theâ© company'sâ©newlyâ©launchedâ©researchâ©site.â©â© ïœâ Almostâ©twoâ©weeksâ©beforeâ©that,â©AOLâ©hadâ©quietlyâ©releasedâ© roughlyâ©twentyâ©millionâ©searchâ©recordâ©fromâ©658,000â©usersâ© onâ©theirâ©newâ©AOLâ©Researchâ©site.â©â© ïœâ Theâ©dataâ©includesâ©aâ©numberâ©assignedâ©toâ©theâ©anonymousâ© user,â©theâ©searchâ©term,â©theâ©dateâ©andâ©timeâ©ofâ©theâ©search,â© andâ©theâ©website(s)â©visitedâ©asâ©aâ©resultâ©ofâ©theâ©search.â© ïœâ NYâ©Timesâ©wasâ©ableâ©toâ©identifyâ©severalâ©usersâ©byâ©crossâ referencingâ©withâ©phonebooks/publicâ©records
Howâ©Doâ©Weâ©Knowâ©ââ©Departmentâ©ofâ©Justiceâ© ïœâ Janâ©06,â©theâ©USâ©Deptâ©ofâ©Justiceâ©issuedâ©aâ©subpoenaâ©asking
popularâ©searchâ©enginesâ©toâ©provideâ©aâ©"randomâ©sampling"â© ofâ©1â©millionâ©IPâ©addressesâ©thatâ©usedâ©theâ©searchâ©engine,â©andâ© aâ©randomâ©samplingâ©ofâ©1â©millionâ©searchâ©queriesâ©submittedâ© overâ©aâ©oneâweekâ©period.â©â© ïœâ Theâ©governmentâ©wantedâ©theâ©informationâ©toâ©defendâ©aâ© childâ©pornographyâ©law.â©â© ïœâ Microsoft,â©Yahooâ©andâ©AOLâ©compliedâ©withâ©theâ©request,â© whileâ©Googleâ©foughtâ©theâ©subpoena.
Howâ©Doâ©Weâ©Knowâ©ââ©Googleâ© ïœâ Googleâ©collectsâ©massiveâ©amountsâ©ofâ©userâ©dataâ© ïœâ Gmailâ©hasâ©aâ©machineâ©readingâ©emailâ©toâ©improveâ©the
relevanceâ©ofâ©advertisementsâ©displayedâ© ïœâ Googleâ©Streetâ©Viewâ©ââ©public/privateâ©propertyâ©&â©peopleâ© capturedâ©inâ©imagesâ© ïœâ Searchâ©historiesâ©areâ©keptâ©forâ©twoâ©yearsâ©andâ©identifiedâ©viaâ© aâ©cookie
Byâ©Indirectâ©Marketingâ© ïœâ Webâ©bugsâ©ââ©aâ©graphicâ©(inâ©aâ©websiteâ©orâ©aâ©graphicâ©enabled
email)â©thatâ©canâ©confirmâ©whenâ©theâ©messageâ©orâ©webâ©pageâ© isâ©viewedâ©andâ©recordâ©theâ©IPâ©addressâ©ofâ©theâ©viewerâ© ïœâ Thirdâ©partyâ©cookiesâ©ââ©aâ©webâ©pageâ©mayâ©containâ©imagesâ©orâ© otherâ©componentsâ©storedâ©onâ©serversâ©inâ©otherâ©domains.â© Cookiesâ©thatâ©areâ©setâ©duringâ©retrievalâ©ofâ©theseâ© componentsâ©areâ©calledâ©thirdâpartyâ©cookies.
Whatâ©Areâ©Cookies?â© ïœâ Cookiesâ©areâ©dataâ©packetsâ©sentâ©byâ©aâ©serverâ©toâ©aâ©webâ©client
andâ©thenâ©sentâ©backâ©unchangedâ©byâ©theâ©clientâ©eachâ©timeâ©itâ© accessesâ©thatâ©serverâ© ïœâ Cookiesâ©areâ©usedâ©forâ©authenticating,â©sessionâ©trackingâ©andâ© maintainingâ©specificâ©informationâ©aboutâ©users,â©suchâ©asâ©siteâ© preferencesâ©orâ©theâ©contentsâ©ofâ©theirâ©electronicâ©shoppingâ© cartsâ© ïœâ Cookiesâ©areâ©onlyâ©data,â©notâ©programsâ©orâ©virusesâ© ïœâ Thereâ©areâ©twoâ©typesâ©ofâ©cookiesâ©ââ©persistentâ©andâ©nonâ persistent
Whyâ©Donâtâ©Weâ©Likeâ©Cookies?â© ïœâ Cookiesâ©canâ©beâ©hijackedâ©andâ©modifiedâ©byâ©attackersâ© ïœâ Cookiesâ©canâ©beâ©usedâ©toâ©trackâ©browsingâ©behaviorâ©soâ©some
thinkâ©theyâ©areâ©tagged
Byâ©Directâ©Marketingâ© ïœâ Directâ©marketingâ©isâ©aâ©salesâ©pitchâ©targetedâ©toâ©aâ©person
basedâ©onâ©previousâ©consumerâ©choices.â© ïœâ Itâ©isâ©commonâ©theseâ©daysâ© ïœâ Manyâ©companiesâ©alsoâ©sellâ©orâ©shareâ©yourâ©informationâ©toâ© others.â©Thisâ©sharingâ©withâ©otherâ©businessesâ©canâ©beâ©doneâ© rapidlyâ©andâ©cheaply
Byâ©Instantâ©Messagingâ© ïœâ Yourâ©IMâ©conversationâ©canâ©beâ©savedâ©ontoâ©aâ©computerâ©even
ifâ©onlyâ©oneâ©personâ©agreesâ© ïœâ Workplaceâ©IMâ©canâ©beâ©monitoredâ©byâ©yourâ©employerâ© ïœâ SPIMâ©ââ©Spamâ©distributedâ©inâ©IM
Byâ©Employersâ© ïœâ 76%â©ofâ©employersâ©monitorâ©employeesâ©website
connectionsâ© ïœâ 65%â©useâ©technologyâ©toâ©blockedâ©connectionsâ©toâ©bannedâ© websitesâ© ïœâ 55%â©monitorâ©email
Byâ©Cybercrimeâ© ïœâ Spywareâ©takesâ©advantageâ©ofâ©securityâ©holesâ©toâ©attackâ©the
browserâ©andâ©forceâ©itâ©toâ©beâ©downloadedâ©andâ©installedâ©toâ© gatherâ©informationâ©withoutâ©yourâ©knowledgeâ© ïœâ Phishingâ©occursâ©whenâ©criminalsâ©lureâ©theâ©victimâ©intoâ© providingâ©financialâ©dataâ©toâ©anâ©unsecureâ©websiteâ© ïœâ Pharmingâ©occursâ©whenâ©criminalsâ©plantâ©programsâ©inâ©theâ© victim'sâ©computerâ©whichâ©redirectâ©theâ©victimâ©fromâ© legitimateâ©websitesâ©toâ©scamâ©lookâalikeâ©sites
Facebookâ©âPrivacyâ