1 Sara Teasdale and Ray Bradbury "There Will Come Soft Rains" Steve Bradshaw s Art Institute of Pittsburgh version: 3:55
2 Time enough
3 A World Information Order - Privacy and Security in a Hyper-networked World of Data and Analysis Law + Informatics Symposium on Digital Evidence 2015 Michael Losavio, University of Louisville, U.S.A. Joshua James, Soon Chun Hyang University, Republic of Korea Pavel Gladyshev, University College Dublin, Ireland K.P. Chow, University of Hong Kong
4 Concerns 1. What did privacy mean back in the day? 2. What does privacy mean today? 3. What interests/ things is privacy meant to protect? 4. How might Smart technologies protect those interests/ things? 5. How might Smart technologies injure those interests/ things? 6. Was Louis Brandeis the most brilliant Justice ever? Take that, Ohio!
5 Towards a Smarter Planet Intelligent Interconnected Instrumented IBM Initiatives
6 Core systems of the smart city Sources Types Collections Analytics and Use
7 information generation and exchange is at least bilateral and commutative.
8 SMART CITIES economy community environment Information Technology transportation governance lifestyle Elements of a Smart City
9 Smart+Interconncted Communities Improved Citizen Interactions Connected Residential Communities Creation of Smart, Efficient Workspaces Elements of CISCO's Smart+Interconncted Communities
10 information source nodes as the activities and services of social and civic life: People Work Home Transportation Social Life
11 We now live in a new space of information density, evolving with the Internet of Things and the Smart City. This global information space is shared with powerful and high-powered analytics that can give every government the surveillance powers of totalitarian regimes. This discussion examines the evolving facts and law relating to personal autonomy, identity and authenticity of electronic data, its mutability and evanescence, and how this might impact the liberties and security of the peoples of the world
12 America The Constitution of the United States of America Article I, Section 9 the writ of habeas corpus The Bill of Rights 1 st 2 nd 4 th 5 th 6th
13 Europa EU Data Protection Directive Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (2) Whereas data-processing systems are designed to serve man; whereas they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, notably the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals;
14 The Fourth Amendment to the Constitution of the United States of America Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized
15 Step by step United States v. Olmstead United States v. Katz Kyllo v. United States United States v. Jones Riley v. California, United States v. Wurie Florida v. Harris Florida v. Jardines Rodriguez v. Nebraska, tbd And our friends FRE 702, 802, 803, 901
16 Back to the Future Justice Brandeis in Olmstead, dissenting The protection guaranteed by the amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man's spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the government, the right to be let alone-the most comprehensive of rights and the right most valued by civilized men. To protect, that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.
17 Phillip K. Dick Minority Report eaix2k4
18 Justice Sotomayor in Jones observed as to the interconnected sensors of radio-linked global positioning satellite (GPS) monitors analyzed with geo-mapping and locational computing that: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, , 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-thehour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda-Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004
19 digital forensics and computational data collection and analysis in The Smart City personal autonomy, identity and authenticity
20 The New Space of Information Density and Its Risks and Rights "Smart City" reflection of the "Internet of Things" embedded, networked capabilities of devices IBM s paradigm instrumented, interconnected and "intelligent," i.e., computationally-adapted.
21 Investigators Dramatis Personae in LAW ENFORCEMENT Procurators Judges victims Witnesses The CIO Staff Outside consultants and contractors Other Data Mavens! Tech, security & privacy officers, analytics and tactics
22 Dramatis Personae in the city You Me Our families Our friends Our personal, social, athletic, business and professional associates Government
23 The System of the World Compliance Risk Management OGC The People Factor The Cloud System Storage Computation Networking Security & Assurance Smart cities Instrumented, interconnected intelligent??
24 To what do the law, society and government attend? First, Safety and Security from: Taking of property, liberty and life Trespass to rights in property, liberty and life Destruction of property, liberty and life In other words, when someone is hurt, there should be a response Injury may be from Normal business processes or malicious/careless system use Including Computationally-induced results
25 But Justice Sotomayor continued: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, , 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda- Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004).
26 core general principles relating to privacy and cyber privacy law: 1) Activities within the home have the greatest level of protection and are generally protected from intrusion by others absent reasonable grounds based on law. 2) Activities that extend outside the home may still be protected as to privacy but the level of protection may vary. This may depend on special protection in law for that activity. 3) Activities out in public or involving third parties may have little or no protection as to privacy absent special protection in law 4) Activities subject to public regulation may carry lesser or no privacy protections, particularly where data collection is part of regulation or a pre-condition to state permission to use regulated services. 5) Any activity data may be monitored, collected and used with the consent of the data subject, absent statutory prohibitions on use even with consent. And even where a data subject may consent without actually reading the consent document they execute..
27 Justice Sotomayor suggested in her concurring opinion in the Jones GPS tracking case that a reevaluation of the concept of privacy and third party data collection should be undertaken in this new age of electronic data collection and analysis. Her concern, as seen simply in GPS data collection and analytics, was that: The net result is that GPS monitoring by making available at a relatively low cost such a substantial quantum of intimate information about any person whom the Government, in its unfettered discretion, chooses to track may alter the relationship between citizen and government in a way that is inimical to democratic society.
28 Case in point, conclusion 2013 Boston Marathon terrorist bombing crowd-sourced investigation Pointers to the future? Will we let it take that which makes us who we are.
LIBERTY AND SECURITY IN A CHANGING WORLD 12 December 2013 Report and Recommendations of The President s Review Group on Intelligence and Communications Technologies This page has been intentionally left
Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act Dr. J.V.J. van Hoboken, A.M. Arnbak, LL.M. & Prof. Dr. N.A.N.M. van Eijk, with the assistance of N.P.H. Kruijsen, LL.M.
SURVEILLANCE, THEN AND NOW: Securing Privacy in Public Spaces Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada June 2013 Acknowledgements I would like to express my deepest appreciation
Data Protection Pursuant to the Right to Privacy in Human Rights Treaties [Published in International Journal of Law and Information Technology, 1998, volume 6, pp. 247 284] Lee A Bygrave Abstract This
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Technologies and Business vs. Law - Cloud computing, transborder access and data retention: a legal perspective from the State which is conducting an investigation. FRANCESCO CAJANI Deputy Public Prosecutor,
Council of the European Union Brussels, 19 December 2014 (OR. en) Interinstitutional File: 2012/0011 (COD) 15395/14 LIMITE NOTE From: To: No. prev. doc.: DATAPROTECT 165 JAI 860 MI 965 DRS 167 DAPIX 167
Draft Communications Data Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2012 Cm 8359 20.00 Crown copyright 2012 You may re-use this information
If An Agent Knocks Table of Contents Introduction 4 Visits & Searches 6 If I Am Approached or Called by a Law Enforcement Agent, Do I Have to Talk? 6 What Are The Consequences If I Do Talk? 8 What If An
EUROPEAN COMMISSION Brussels, 25.1.2012 COM(2012) 11 final 2012/0011 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing
THE RIGHT OF PRIVACY IN FLORIDA IN THE AGE OF TECHNOLOGY AND THE TWENTY-FIRST CENTURY: A NEED FOR PROTECTION FROM PRIVATE AND COMMERCIAL INTRUSION THE HONORABLE BEN F. OVERTON* AND KATHERINE E. GIDDINGS**
A QUESTION OF TRUST REPORT OF THE INVESTIGATORY POWERS REVIEW by DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation JUNE 2015 Presented to the Prime Minister pursuant to section 7 of the
Engineering Privacy by Design Seda Gürses, Carmela Troncoso, and Claudia Diaz K.U. Leuven/IBBT, ESAT/SCD-COSIC firstname.lastname@example.org Abstract. The design and implementation of privacy requirements
European Charter of the rights and responsibilities of older people in need of long-term care and assistance JUNE 2010 PREAMBLE Human dignity is inviolable. Age and dependency cannot be the grounds for
Data protection Anonymisation: managing data protection risk code of practice 2 xx Contents 3 Contents Information Commissioner s foreword 4 Appendix 1 Glossary 48 1. About this code 6 2. Anonymisation
ta REPORT TO THE PRESIDENT BIG DATA AND PRIVACY: A TECHNOLOGICAL PERSPECTIVE Executive Office of the President President s Council of Advisors on Science and Technology May 2014 REPORT TO THE PRESIDENT
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
Your Right to Remain Silent Miranda v. Arizona www.annenbergclassroom.org SUMMARY In 1966, the Supreme Court handed down a controversial 5-4 ruling in Miranda v. Arizona that dramatically changed criminal
U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Gang Prosecution Manual July 2009 Copyright 2009 Institute for Intergovernmental Research. All
World Bank Institute GOVERNANCE WORKING PAPER SERIES Access to Information Program The Right to Information and Privacy: Balancing Rights and Managing Conflicts David Banisar The World Bank Canadian International
LAWS OF KENYA The Constitution of Kenya Revised Edition 2010 Published by the National Council for Law Reporting with the Authority of the Attorney General 2 Constitution of Kenya [Rev. 2010 THE CONSTITUTION
Convention on the Rights of Persons with Disabilities and Optional Protocol UNITED NATIONS CONVENTION ON THE RIGHTS OF PERSONS WITH DISABILITIES Preamble The States Parties to the present Convention, (a)
2011 CONSUMER U.S. INTELLECTUAL DATA PRIVACY PROPERTY ENFORCEMENT IN A NETWORKED COORDINATOR WORLD: COVER ANNUAL TITLE REPORT HERE ON A FRAMEWORK FOR PROTECTING PRIVACY INTELLECTUAL AND PROMOTING PROPERTY
Guiding Principles on Business and Human Rights Implementing the United Nations Protect, Respect and Remedy Framework Guiding Principles on Business and Human Rights Implementing the United Nations Protect,
A Cooperative Agreement Program of the Federal Maternal and Child Health Bureau and the American Academy of Pediatrics Acknowledgments The American Academy of Pediatrics (AAP) would like to thank the Maternal