"There Will Come Soft Rains"



Similar documents
HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT. Jeffrey L. Vagle * INTRODUCTION

THE NOT A SEARCH GAME

Online Research and Investigation

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals.

# # # # # Issue and Decision of the United States Supreme Court

PRIVACY & CRIMINAL JUSTICE INFORMATION: A PRIMER

CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME?

Federal Criminal Court

APPLICATION QUESTIONNAIRE FOR THE VAWA PILOT PROJECT ON TRIBAL CRIMINAL JURISDICTION

HOUSE BILL REPORT ESHB 1440

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS)

Privacy vs. Safety: School Searches of Electronic Devices

9/30/2013. What is Cloud Computing? Benefits of Cloud Computing

California s Alternative Sentencing Law for Veterans and Members of the U.S. Military

State of Nature v. Government

Farzad Family Law Scholarship 2014

National Security Agency

P R O T O C O L. The State Attorney's Office of the Republic of Croatia and the Prosecutor's Office of Bosnia and Herzegovina (hereinafter: Parties)

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

European Charter of the rights and responsibilities of older people in need of long-term care and assistance

DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy

Competing Interests: Enforcing Cybersecurity and Protecting Privacy By Ulka Ghanta

Data Protection A Guide for Users

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy

The District Court suppressed the evidence. The Missouri appellate court agreed. The U.S. Supreme Court agreed the evidence should be suppressed.

FORMAL MEMORANDUM ENQUIRIES AS TO WITNESS CREDIBILITY. Table of Contents

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

The Privacy Implications of Historical Cell Site Location Data

MINNESOTA S DWI IMPLIED CONSENT LAW: IS IT REALLY CONSENT?

Digital Evidence Legal Issues and Trends

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, My name is Richard Allan, and I am the Director of Public Policy

Criminal Justice Curriculum Maps. Unit 1: Introduction to Government and Law Unit 2: Crime Unit 3: Due Process

Department, Board, Or Commission Author Bill Number

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORI(

A Summary of Virginia s Crime Victim and Witness Rights Act

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

xtra redit A Classroom Study of a Supreme Court of Ohio Case

New Zealand Bill of Rights Act 1990

I N F O R M A T I O N B U L L E T I N. Considerations for Sexual Assault Coordination

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery

Working with the Federal Government on Cybersecurity

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

For Now, New York State Investigators Can Ping Cellphones Without A Warrant in New York State

Attorneys and Counselors at Law

Self-Help Guide for a Prosecutorial Discretion Request

Rights for Individuals in Mental Health Facilities

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.

Data controllers and data processors: what the difference is and what the governance implications are

SUMMER 2014 LEGAL INTERNSHIP OPPORTUNITY NOTICE TO LAW STUDENTS American Civil Liberties Union Foundation Reproductive Freedom Project, NY

Crimes (Computer Hacking)

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

The European psychologist in forensic work and as expert witness

Information Security Law: Control of Digital Assets.

Data Retention and Investigatory Powers Bill

Domestic Violence: Can the Legal System Help Protect Me?

Delegations will find attached a set of Presidency drafting suggestions concerning Articles 1-3 of the above proposal, as well as the Recitals.

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection

Legislative Language

RELIGION IN THE PUBLIC SCHOOLS

California Child Abuse and Neglect Reporting Law

DATA PROTECTION POLICY

Case 9:13-cv DPG Document 4 Entered on FLSD Docket 07/11/2013 Page 1 of 8

CITIZEN ADVOCACY CENTER

JUVENILE JUSTICE SYSTEM

First Circuit Prohibits Warrantless Search of Cellular Phones

PRIVACY AND DATA SECURITY MODULE

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL

Name _Pennie M. Thrower Party Affiliation R Incumbent N

FORENSIC DNA COLLECTION: A CITIZEN S GUIDE TO YOUR RIGHTS SCENARIOS AND RESPONSES

How To Handle A Child Abuse Or Neglect Case In A Family Court

BILL ANALYSIS. Senate Research Center H.B By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed

BERMUDA INTERNATIONAL COOPERATION (TAX INFORMATION EXCHANGE AGREEMENTS) ACT : 47

IN RE MARRIAGE CASES (California): 2008

Case 0:13-cv RSR Document 4 Entered on FLSD Docket 08/16/2013 Page 1 of 9

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

MICHAEL D. WAKS LONG BEACH PERSONAL INJURY ATTORNEY

Protection of Freedoms Bill

GOVERNMENT SPONSORED BLACKMAIL? Mass Surveillance and the Threat to Personal Privacy. Ben Woodfinden

Understanding the Civil Involuntary Commitment Process

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16

Colorado Revised Statutes 2014 TITLE 20

Privacy is the ability of an individual or group to keep their lives and

Montgomery presents himself as a law-and-order stalwart, who in his career as a prosecutor has pursued tough sentences.

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper

ORDER MO Appeal MA Peel Regional Police Services Board. January 28, 2016

Dr. Asher Vaturi The Max Stern Yezreel Valley College

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Recent Developments in Cybersurveillance

US Surveillance Law, Safe Harbor, and Reforms Since 2013

How To Write Health Care Directives Legislation In New Bronwell

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

NOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM

Fair Employment Practices

Transcription:

Sara Teasdale and Ray Bradbury "There Will Come Soft Rains" Steve Bradshaw s Art Institute of Pittsburgh version: http://www.youtube.com/watch?v=rcnn5mmmiha 3:55

Time enough

A World Information Order - Privacy and Security in a Hyper-networked World of Data and Analysis Law + Informatics Symposium on Digital Evidence 2015 Michael Losavio, University of Louisville, U.S.A. Joshua James, Soon Chun Hyang University, Republic of Korea Pavel Gladyshev, University College Dublin, Ireland K.P. Chow, University of Hong Kong

Concerns 1. What did privacy mean back in the day? 2. What does privacy mean today? 3. What interests/ things is privacy meant to protect? 4. How might Smart technologies protect those interests/ things? 5. How might Smart technologies injure those interests/ things? 6. Was Louis Brandeis the most brilliant Justice ever? Take that, Ohio!

Towards a Smarter Planet Intelligent Interconnected Instrumented IBM Initiatives

Core systems of the smart city Sources Types Collections Analytics and Use

information generation and exchange is at least bilateral and commutative.

SMART CITIES economy community environment Information Technology transportation governance lifestyle Elements of a Smart City

Smart+Interconncted Communities Improved Citizen Interactions Connected Residential Communities Creation of Smart, Efficient Workspaces Elements of CISCO's Smart+Interconncted Communities

information source nodes as the activities and services of social and civic life: People Work Home Transportation Social Life

We now live in a new space of information density, evolving with the Internet of Things and the Smart City. This global information space is shared with powerful and high-powered analytics that can give every government the surveillance powers of totalitarian regimes. This discussion examines the evolving facts and law relating to personal autonomy, identity and authenticity of electronic data, its mutability and evanescence, and how this might impact the liberties and security of the peoples of the world

America The Constitution of the United States of America Article I, Section 9 the writ of habeas corpus The Bill of Rights 1 st 2 nd 4 th 5 th 6th

Europa EU Data Protection Directive Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (2) Whereas data-processing systems are designed to serve man; whereas they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, notably the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals;

The Fourth Amendment to the Constitution of the United States of America Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized

Step by step United States v. Olmstead United States v. Katz Kyllo v. United States United States v. Jones Riley v. California, United States v. Wurie Florida v. Harris Florida v. Jardines Rodriguez v. Nebraska, tbd And our friends FRE 702, 802, 803, 901

Back to the Future Justice Brandeis in Olmstead, dissenting The protection guaranteed by the amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man's spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the government, the right to be let alone-the most comprehensive of rights and the right most valued by civilized men. To protect, that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.

Phillip K. Dick Minority Report http://www.youtube.com/watch?v=jdl6 eaix2k4

Justice Sotomayor in Jones observed as to the interconnected sensors of radio-linked global positioning satellite (GPS) monitors analyzed with geo-mapping and locational computing that: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, 441 442, 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-thehour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda-Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004

digital forensics and computational data collection and analysis in The Smart City personal autonomy, identity and authenticity

The New Space of Information Density and Its Risks and Rights "Smart City" reflection of the "Internet of Things" embedded, networked capabilities of devices IBM s paradigm instrumented, interconnected and "intelligent," i.e., computationally-adapted.

Investigators Dramatis Personae in LAW ENFORCEMENT Procurators Judges victims Witnesses The CIO Staff Outside consultants and contractors Other Data Mavens! Tech, security & privacy officers, analytics and tactics

Dramatis Personae in the city You Me Our families Our friends Our personal, social, athletic, business and professional associates Government

The System of the World Compliance Risk Management OGC The People Factor The Cloud System Storage Computation Networking Security & Assurance Smart cities Instrumented, interconnected intelligent??

To what do the law, society and government attend? First, Safety and Security from: Taking of property, liberty and life Trespass to rights in property, liberty and life Destruction of property, liberty and life In other words, when someone is hurt, there should be a response Injury may be from Normal business processes or malicious/careless system use Including Computationally-induced results

But Justice Sotomayor continued: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, 441 442, 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda- Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004).

core general principles relating to privacy and cyber privacy law: 1) Activities within the home have the greatest level of protection and are generally protected from intrusion by others absent reasonable grounds based on law. 2) Activities that extend outside the home may still be protected as to privacy but the level of protection may vary. This may depend on special protection in law for that activity. 3) Activities out in public or involving third parties may have little or no protection as to privacy absent special protection in law 4) Activities subject to public regulation may carry lesser or no privacy protections, particularly where data collection is part of regulation or a pre-condition to state permission to use regulated services. 5) Any activity data may be monitored, collected and used with the consent of the data subject, absent statutory prohibitions on use even with consent. And even where a data subject may consent without actually reading the consent document they execute..

Justice Sotomayor suggested in her concurring opinion in the Jones GPS tracking case that a reevaluation of the concept of privacy and third party data collection should be undertaken in this new age of electronic data collection and analysis. Her concern, as seen simply in GPS data collection and analytics, was that: The net result is that GPS monitoring by making available at a relatively low cost such a substantial quantum of intimate information about any person whom the Government, in its unfettered discretion, chooses to track may alter the relationship between citizen and government in a way that is inimical to democratic society.

Case in point, conclusion 2013 Boston Marathon terrorist bombing crowd-sourced investigation Pointers to the future? Will we let it take that which makes us who we are.

It s only a matter of time