870 likes | 1.11k Views
The Future of Our Privacy. Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog jstanley@aclu.org 202-715-0818. I. THE CHALLENGE TO OUR PRIVACY. The challenge to our privacy:. Technology revolution. A burgeoning security establishment.
E N D
The Future of Our Privacy Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog jstanley@aclu.org 202-715-0818
The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives
The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives
The Ultimate Example: Total Information Awareness
NYC/Microsoft “Domain Awareness System”
Meanwhile: Moore’s Law Charts: Zoomer Magazine, Computer Measurement Group
The Future of Moore’s Law Intel Core i7-2600 Processor: $294.99 on Newegg
The Future of Moore’s Law Today: $294.99
The Future of Moore’s Law Today: $294.99 In 20 years: $0.03
Also following Moore’s Law 20 years: 1,000-32,000x today’s power
The challenge to our privacy: Technology revolution A burgeoning security establishment
The Security State NSA: 30,000 employees CIA: 20,000 employees Others: many more Overall IC: at least $57 billion Oversight? Not much. FBI: 33,000
FISA Amendments Act of 2008 • General Warrants. No specificity required. (All US-London traffic?) • Little judicial oversight. FISA court only reviews the government’s “targeting” and “minimization.” No role overseeing actual use of surveillance power. • No limits on use of data. Huge databases, stored forever, shared with anyone, re-used for any purpose. • Domestic e-mails included. Location uncertain? Go ahead! • Immunity for lawbreakers. Don’t try this at home!
The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives
An emerging surveillance-industrial complex • Recruiting or pressing private companies into service • Partnerships with data companies • Lobbying by companies for more surveillance
Many options for accessing private data Ask for data to be shared voluntarily Simply buy information Demand it using legal powers “Bake in” surveillance Create regularized systems for standing access to records of private activities
Jurisprudence off-track Reasonable expectation” standard Third-party doctrine