Wednesday, May 4, 2016

Student research papers

In lieu of a final exam, students authored an original research paper on a privacy related topic.  As with past years, the student papers this year are of high quality and evidence thoughtful analyses on highly topical subjects.  One student, with my permission, elected to write a series of poems that addressed each of the weekly privacy topics discussed in class.  It is a very creative way to look at privacy.   In no particular order, the titles of the papers are listed below and are hyperlinked to Scribd.com where they may be downloaded and/or read.  Each of the papers is well worth reading and offers a unique insight into what is on the mind of today's millennials.  Enjoy!

Privacy Through Poetry: A Poetic Journey Through Privacy in a Digital Age, by Diana Kelly. https://www.scribd.com/doc/311504061/Privacy-Through-Poetry-a-Poetic-Journey-Through-Privacy-in-a-Digital-Age

The Privacy Rights of Minors in the U.S. Health System, by Steffi Lietzke https://www.scribd.com/doc/311504253/The-Privacy-Rights-of-Minors-in-the-U-S-Health-System

Why Tor Matters To Ordinary People, by Tara Godwin https://www.scribd.com/doc/311504396/Why-Tor-Matters-to-Ordinary-People

The Internet of Things and Privacy Concerns, by Charles Joseph Koronkowski https://www.scribd.com/doc/311504446/The-Internet-of-Things-and-Privacy-Concerns

The Need For Strong Encryption, by Junkang XIE
https://www.scribd.com/doc/311505290/The-Need-For-Strong-Encryption

Has the Internet Replaced God?, by Mary Palmer
https://www.scribd.com/doc/311506078/Has-the-Internet-Replaced-God

Get Out Of My Face(book), by Anne McEwan
 https://www.scribd.com/doc/311506174/Get-Out-Of-My-Face-book

On the Regulation of Data Brokers: Why Regulation is Necessary and Relevant to Privacy in a Digital Age, by Michael Behan
 https://www.scribd.com/doc/311506281/On-the-Regulation-of-Data-Brokers

Why Free Source Software is the Best Choice for Maintaining User Privacy, by Joshua Christensen
https://www.scribd.com/doc/311506602/Why-Free-Source-Software-is-the-Best-Choice-for-Maintaining-User-Privacy

On the Importance of Encryption for Those Who Have Nothing to Hide, by Sheyne Anderson
https://www.scribd.com/doc/311506809/On-the-Imprtance-of-Encryption-for-Those-Who-Have-Nothing-to-Hide























Course Evaluation---Course Knowledge Objectives and Learning Outcomes

Course Evaluation--Course Knowledge Objectives and Learning Outcomes

The University has a general course evaluation which is generic and not course specific.  Accordingly, I supplement the general course evaluation with an assessment of whether the specific course knowledge objectives and desired learning outcomes were achieved.  On the last day of class, each of the 10 students enrolled in the class completed an anonymous evaluation on these two topics. The questions and tabulated results are set out below.


•There were six substantive knowledge  objectives identified in the course syllabus.  Please indicate below whether you believe these course objectives were or were not achieved.

 

After completing this course, I:


1. Understand the underlying legal and policy concepts of a right of personal privacy.

           __10__YES  __0__NO

2.  Understand the role of the various institutional actors (legislators,   judges, regulators, lawyers, NGO’s) in the development of privacy   policy and law.

           __8__YES  __2__NO

3. Understand how technology may be both a threat and an aid to modern privacy protection.

           __10__YES  __0__NO

4.   Appreciate the privacy trade-offs that accompany   increased personal safety, national security,   convenience,   financial benefit and social connection.
           __10__YES  __0__NO

5.  Have an understanding of privacy issues in specific contexts such as national security, targeted advertising, home, school and   health care.
           __10__YES  __0__NO



 Please indicate whether you strongly agree, agree, disagree or strongly disagree with the following statements:


 1. I have learned to think critically about the often competing paradigms of privacy and transparency.

             _5__strongly agree
           _5__agree 

            ___disagree 

            ___strongly disagree

 2. I have improved my written communication skills through the required blog posts, comments  and final research paper.

             _3__strongly agree

           _6__agree

           _1__disagree

             ___strongly disagree

3. I have improved my oral communications skills as a result of the classroom discussions.

          _5__strongly agree
   _5__ agree

  ___  disagree

 ____  strongly disagree

 
4.  I have learned to apply and transfer the principles and ideas   learned in class to life situations and experiences outside the   classroom.

  _2__strongly agree

 _ 8__agree

 ___  disagree

 ____strongly disagree

 
 5.  I believe I am now better equipped with the necessary knowledge   and tools to more effectively safeguard my personal privacy if I so   choose.

         _5__strongly agree
 _5_ agree

 ___  disagree

___  strongly disagree


6.   I have learned that the subject of privacy implicates multiple laws,   public policies, personal values and both public and private   institutions and I believe I have a better understanding of how to   identify and weigh these multiple interests in addressing any   personal privacy issues I may encounter in my personal and/or   work life.

          _4__strongly agree
  _6__agree

 ___  disagree

___  strongly disagree

 

 

 
 

Thursday, April 14, 2016

Question of the Week No. 13

A home may be searched without a warrant if consent is given.  Should police be allowed to conduct a warrantless search if one resident, the wife, consents, but the other resident, the husband objects?

Friday, April 8, 2016

Week 11 Takeaways

  1. The FCC ruled that ISPs which gather lots of information would be required to get explicit “opt-in” consent before they can share information with a third party. Internal purposes wont require “opt-in” consent, but do require an option to opt out. These rules are proposed and will be implemented pending public comment period.
  2. The question of the week was about monitoring the social media accounts of K12 students by school administrators to protect against cyber bullying. None of the class considered such monitoring to be appropriate. Some claimed that the program would not be effective because students use so many social media platforms that the bullies would always migrate to unmonitored services. This was countered with the question, "If this at least stops "casual" bullies, is it not a success?" In a similar vein, some said that students would switch to old fashioned bullying such as beating other students up, and asked the question, "Is it not a judgement call? Deciding whether physical or emotional violence is worse." Finally we discussed whether this is an appropriate role for school administrators, some arguing that this opens up more avenues for creepy abuse by school admins.
  3. YikYak is an anonymous social media platform in which users can post in their current geographical area. The app is self regulating, as users can up vote and down vote content to increase or decrease visibility. If a post receives a total score of -5or less, it is removed. In order to combat hate speech, threats of violence, and other objectionable content YikYak automatically warns users if the post that they are about to submit contains certain keyword (ensuring users think twice before posting unsavory content). YikYak also cooperates with law enforcement if physical threats are posted.
  4. FBI/Apple case the issue if now mooted, as the FBI has accessed the data on Farook's phone. The FBI has said that they will aid other law enforcement agencies in decrypting other iPhones. There is still some legal question as to whether the FBI has a legal obligation to turn over the flaw which they used to unlock the Farook phone. This flaw or 0-day is still technically a backdoor and it still effects millions of iPhone users work wide. It is unlikely the the FBI will hand it over without a trial, and the results of such a trial are hard to predict.
  5. In class we discussed a hypothetical where a girl named Sally is being harassed by a boy named John using school provided iPads that the students can take home. Sally doesn't bring the issue up with school officials or her parents and finally takes her life in the school cafeteria.
    The above plot shows how the class awarded the blame. Note that this is a box an whisker plot. For each of the parties, the percents are divided into 4 sections (the two colored rectangles and each of the whiskers. Each of the 4 regions contains 1/4 of the votes for that percentage of blame. This means that we were fairly evenly split from 50% to 80% for the amount of blame John deserved, while most of us attributed zero to 5% blame on Sally and her parents, some of us attributed as high as 10% of the blame to Sally. It was suggested in class that the blame for Sally might be higher, but that no one wanted to blame the victim.

DNA Databases

DNA stores genetic information and is unique to each person, with the exception of identical twins. It is, some might argue, some of the most personal information, both because it is so unique and it carries so much information. A DNA database is a massive collection of this personal information and is used in criminal investigations, medical research, missing persons cases, and more.

Current laws on DNA Databases
The types of offenders required to submit DNA samples to a database varies by state, as well as nationally. Utah’s database, established in 1994 by Utah State Code 53-10-403, has evolved from only including murder and sexual assault to including Felony 1, 2, 3, and Class A misdemeanor convictions, any felony booking, and any convection that includes the offender being added to the sex offender registry.  Laws also govern the use of these databases. The majority of states allow databases to be used for any criminal investigation, but Washington and North Carolina have restricted use of their databases, possibly in an effort to decrease potential for misuse.

At the national level, the National DNA Index System (NDIS) was established by the DNA Identification Act of 1994. The act created the database and regulates its use, access, and security. The Supreme Court recently upheld the inclusion of arrestees in DNA databases in Maryland vs. King, stating that it was a reasonable search under the fourth amendment.

Many other countries have enacted a national DNA database, with various levels of inclusion. For example, Great Britan, with the world’s largest database includes far more people than criminals. A 2012 law did serve to decrease the amount of profiles of innocent people in order to better balance the privacy of individuals with the needs of law enforcement.

DNA databases currently
DNA databases are maintained by many agencies, both law enforcement and not. In the US, the largest database in CODIS (Combined DNA Index System), which connects local, state, and national DNA databases, including NDIS. CODIS is not limited to those convicted of crimes – it also includes people who are arrested, missing persons, and unidentified persons. Additional DNA databases exist that are not associated with law enforcement, run by the branches of the military, genealogical organizations, and medical organizations.

CODIS contains DNA profiles that consist of one of both alleles on 13 genetic loci. Only profiles with 10 loci are included in the database, meaning degraded or incomplete profiles are not included. Criminal profiles are removed after a court document is issued stating that a conviction has been overturned, charges have been dismissed, or that person was acquitted. Database confidentiality is regulated by federal law (DNA Identification Act of 1994) and breaking this is punishable by a fine of up to $250,000. Data is secured by using a physically restricted terminals and protected, limited access servers.

Genetic Markers and Discrimination
While only 13 alleles are currently stored in CODIS, with advances in large data storage, as well as the potential benefits of more stringent matches (including epigenetic markers to differentiate twins), there is the potential for entire genomes to be stored and analyzed. Some genetic markers that have been identified include schizophrenia, bipolardisorder, and the so called “warrior gene. All three of these genes carry the potential for discrimination – schizophrenia and bipolar disorder because they are falsely associated with violence and the “warrior gene” because it is linked with aggression. While discrimination on the basis of genetics is illegal in the context of hiring and health insurance, there is no such law preventing this discrimination in a legal context. A genetic marker indicates a possible predisposition, not a causation or even 100% correlation, giving an unfounded basis for profiling, constituting discrimination based on an uncontrolled trait.  Genetic discrimination would need to be accounted for when creating a database. One method would be legislating non-discrimination acts. Another would be prohibiting the use of genetic screening on samples or the storage of and access to entire genetic profiles by law enforcement.

Logistics
The logistics of such a program create a variety of problems. The cost of such a program would be huge, and would be an ongoing expense. Who would pay for this? And when would samples be collected? At birth? Not everyone is born in a hospital and parental permission would be needed for testing of the minors. There are also the problems of secure storage, both in the form of digital profiles and the actual samples. The argument could be made for retaining samples in case they need to be retested. However this leads to the need for physical security, increasing costs significantly. Data security, in the form of access to the data and storage of the profiles is also a problem, as such personally identifying information would need to be stored with the highest level of security.

My Thoughts
There are both benefits and drawbacks to the formation of a DNA database that includes all citizens. The main benefit that I can see is helping solve current and past crimes. Another is identification of remains. One of the concerns that sticks out to me is the potential for genetic discrimination and profiling. People can’t help having a genetic marker for an illness or trait, and shouldn’t be punished for having such a trait. Another is access to these profiles. Such a massive amount of personally identifying information would need stringent safeguards to prevent abuse and misuse.

Overall, I believe that the costs of such a program, from both a privacy and a logistics stand point out weigh the potential benefits. The potential for abuse and data compromise are greater than the potential of benefits in criminal investigations, therefore making a universal DNA database not sound public policy.


Thursday, April 7, 2016

Question of the Week No. 12

Healthcare providers are moving to a system of electronic health records where an individual’s entire medical history, diagnoses, treatments, medications and other health information are maintained in a digital form.  In order to provide better and more timely health care to individuals, should physicians and other healthcare providers be able to freely access and share this information with each other without a patient’s consent?

Thursday, March 31, 2016

Social Media Surveillance

What is Social Media? 

Ever since the advent of the Internet, human communication has drastically changed. The networking potential created by the Internet has allowed people from all across the globe to communicate instantaneously in ways that seemed impossible only 25-30 years ago. With the rise of the Internet social media sites have emerged: websites with the specific purpose of communicating with others, sharing ideas and information, and creating interactive communities to share user-generated content. Facebook, the most popular social media site, as of the fourth quarter of 2015 had 1.59 billion monthly active users.

Social media can take many different shapes and sizes, and can feature registered and anonymous users. Such social media outlets, such as the app Yik Yak, have come under fire recently for the content that has been posted on the app. Users posting anonymously have made racist, sexist, and otherwise offensive posts, as well as threats about shootings and terrorism. With the constant threat of terrorism and school shootings at the forefront of the minds of law enforcement and school administrators, postings about threats of violence and other offensive posts are not taken lightly. A survey of college officials in April 2015 showed that a majority of those responding monitored such public social media feeds. The question becomes: should school officials and law enforcement monitor public social media posts, and should they actively seek out those who make offensive or threatening posts?

Pros
On the surface, the benefits to social media monitoring are obvious: should there be threatening, offensive, or other questionable posts, school officials, law enforcement, and other positions of authority will be able see the posts, and act on them. In today’s world, potential attackers with strong social media presences may post about an attack, or hint at it. Even in cases where the poster isn’t serious about the threats they are making, it is impossible to tell someone’s intent without further follow up.  Some of these threats can be made over social media sites like Facebook and Twitter, where users are required to register and disclose information in order to make an account, which makes tracking down the poster easier. However, apps like Yik Yak, where users are able to post anonymously, have been hotbeds for offensive speech, and threats of violence as well. In cases where threats do occur, the anonymous nature of Yik Yak has not protected the identities of posters. Police have arrested multiple people who have used the app to threaten violence. While the police are required to provide a subpoena to get information about the posters, as they are otherwise anonymous, the timing of the arrests (hours after the post itself happens) shows that those running Yik Yak do not take these threats lightly. While the seriousness of the threats remains unknown, the proactivity of law enforcement has likely saved lives.

The benefits to monitoring social media are broader than just preventing violence and terrorism threats. Between September 2012 and September 2013, nine suicides in teenagers were linked to the last.fm social media site alone. Monitoring the social media and Internet activity of teenagers is one way to keep them safe. The Internet is a large, open space. As such, it may not be unreasonable to make sure that teenagers are not getting mixed up in trouble that they shouldn’t be. Additionally, the anonymity provided by the Internet can encourage people to say things that they wouldn’t in real life. This could be even worse for teenagers, as it gives an additional outlet for bullies to harass their victims. Being able to spot harassing posts, and posts about depression, self harm, and other red flags, and then intervene is something that could help prevent further incidents in the future. 

Cons
The proponents against such monitoring and the subsequent follow-ups cite free speech as the main reason postings should be left alone. On Yik Yak, aside from a legitimate threat or other call of violence, the app self regulates through an upvoting/downvoting system. If a post gets a score of negative five, it is removed. Much of the offensive or otherwise negative content gets filtered and self regulated through the community in this way. With this system in place, many offensive or otherwise unpopular posts will not last long. Obviously, trolls and those with hateful opinions aside, many people do not approve of hate speech. Policies like this keep the community a more regulated space, without additional involvement.

For example, to prevent the app from infiltrating the high school community, “geo-fences” have been placed around about 90 percent of high schools and middle schools – effectively preventing anyone from accessing the app from a location near a high school or middle school. This helps to prevent those who aren’t mature enough to handle it from getting to it. Cyberbullying is much more prevalent in middle schools and high schools than it is in college, so the anonymous nature of this app becomes all the more dangerous in the hands of those more likely to abuse it. Taking steps such as these helps to keep the app as it was intended, while still keeping some precautions to prevent it from getting out of hand.
Even in spaces like college campuses, where users can be deemed mature enough to access the app, there is still evidence of hateful speech. However, hateful speech is not illegal. Though it may not be encouraged or condoned by the app developers, its users, or third parties to the situation, people are still free to speak their minds. Were school administrators or law enforcement to seek out those who were making racist, misogynistic, or otherwise offensive posts, there is little they could do to enforce it. The app can be banned via school’s wifi networks, but it is mostly a symbolic gesture, as the app would still be available through cellular data. At state schools, freedom of speech is protected under the first amendment of the constitution.
This also sets a potentially dangerous precedent, and could start a slippery slope. If one part of speech is censored, what will come next?

My Opinion
I see both sides of the argument, and I think there are merits to both sides. I am definitely a proponent of identifying those who make threats of violence and terror threats. As mentioned in the post, there is no way to know if the threats are serious or not, and I don’t think that we can afford to err on the side of leniency with regard to these posts. I think that public social media can be monitored, and not intervened on unless the situation calls for it. Especially when it comes to younger, less mature users of social media sites. However, I think that free speech in all other circumstances should be honored. I don’t approve of hate speech, but I do not think it is right to censor it. I also think that in this age of Internet trolls it would be a waste of resources to go after anyone who says something offensive over the Internet. The Internet is home to so many controversial posts, opinions, and people, and I think it’s important to understand that not everyone will say or do nice things, especially if they are under the veil of anonymity. However, just because someone’s feelings are hurt does not mean we need to seek out and reprimand the offender. What are your thoughts?