Privacy & Surveillance Overview
Privacy & Surveillance: Overview
This section details the fundamental concepts surrounding privacy and surveillance. It covers topics such as metadata vs data, digital fingerprinting, multi-factor authentication (MFA), location tracking, and the legal landscape regarding privacy.
Key Points of Discussion
Campus Privacy Expectations
Public Spaces: Locations like the Yard and the One‑Stop Office where privacy expectations may face challenges due to the nature of interactions occurring there.
The Yard: An open public space frequented by students for study and socializing.
One‑Stop Office: A hub for academic discussions, billing inquiries, and exchange of sensitive information.
Distinction between Metadata and Data
Metadata: Defined as "data about data". Examples:
Sender and recipient addresses
Email subject
Timestamp of the communication
URLs visited.
Data: Refers to the actual content, such as the body of an email or attached files.
Invasiveness of Metadata: Despite being non-content based, metadata can still infringe on privacy rights due to the detailed information it contains.
Legal Landscape Related to Metadata
Court Compulsion: Courts can mandate companies to hand over metadata during law enforcement investigations. A significant point of contention is whether such practices violate the confidentiality aspect of the CIA triad (Confidentiality, Integrity, Availability).
Utah Data Center: Operated by the NSA; it serves as a significant repository for metadata collection.
Surveillance Techniques and Claims
Web and Device Fingerprinting
Fingerprinting Techniques: Techniques used primarily for targeted advertising, involving:
Web Browser Fingerprinting: A unique set of data points (e.g., user-agent string, screen resolution, installed fonts) that can identify a device across different browsing sessions without the use of cookies.
Digital Fingerprints: Analytics which synergizes biological fingerprints’ uniqueness and permanence traits with digital identifiers like hardware IDs and software configurations.
Multi-Factor Authentication (MFA)
Evolution of MFA: Originated in high-security contexts (e.g., Federal Deposit Insurance Corporation) but is now commonly utilized across various platforms.
Example Implementation: A Duo push notification system that requires a secondary code input after a password entry.
Databases and Linkage of Fingerprints
Centralized Data Storage
Database Capabilities: Centralized databases can house biological and digital fingerprints alongside personal identification records (e.g., driver's licenses, criminal records).
Utilization of Fingerprints: Matched fingerprints can:
Identify Individuals
Correlate Activities Across Services: This enables surveillance-as-a-service models, which profit from aggregated fingerprint data.
Digital Fingerprinting and Trace Data
Definitions and Concepts
Digital Fingerprint: A unique combination of device characteristics, including browser version, screen resolution, and installed fonts.
Trace Data: Metadata that is unintentionally left behind during digital interactions, considered essentially invisible to end-users.
Collection by Companies: Major corporations like Google, Meta, and Adobe utilize trace data to build user fingerprints.
Targeted Advertising Strategies
Remarketing: A method wherein ads for products previously viewed by a user are displayed upon subsequent visits.
Workflow Example: If a user visits an e-commerce site on Monday, their digital fingerprint is recorded, and ads for viewed products are shown later.
Connectivity of Privacy and Location Tracking
Location Tracking Technologies
GPS: Global Positioning System; not prominently used in browsers due to high power consumption and inaccuracy.
Methods Indicating Location:
IP Address: Provides an approximate geographic location based on network routing.
Wi-Fi SSID/BSSID: Identifiers of nearby routers that can be mapped geographically.
Bluetooth Low Energy (BLE): Small beacons can triangulate position with an accuracy up to 3cm.
Comparison of Tracking Technologies
Technology | Power Usage | Typical Accuracy | Primary Use |
|---|---|---|---|
GPS | High | 5–10m (outdoors) | Navigation |
IP Address | Low | City-level | Network routing |
Wi-Fi scanning | Moderate | 10–30m | Indoor positioning |
BLE Beacons | Very Low | 1–3cm | Proximity detection |
Cookies vs. Web Fingerprinting
Cookies
Definition: Small text files stored by browsers that users may block.
Transition to Fingerprinting
Web Fingerprinting: Emerges as a robust alternative for tracking by collecting browser and device characteristics, forming persistent identifiers without dependencies on cookies.
Industry Shift: Google is transitioning from cookie-based systems to web fingerprinting, highlighting an industry-wide trend towards more resilient identifiers.
Real-World Implications of Digital Surveillance
Case Study: Target's Predictive Marketing
Example Scenario: Target used shopping patterns to predict personal life events, such as a customer's pregnancy, by analyzing specific purchasing behaviors—tracking items like maternity-related products.
Business Goal: To embed Target as the go-to store for expectant mothers by mailing relevant advertisements during key phases of their pregnancy.
Data Collection Sources
Retail Chains: Major e-commerce sites and retail outlets such as Target and M-Dub are primary repositories for consumer data.
Surveillance & Law Enforcement
Legal Considerations
Social-Media Metadata: Extensive metadata related to user activities on social media platforms can be pivotal in criminal investigations. For instance, prosecutors can request specific datasets from platforms like Facebook to support cases.
Legal Compliance: Companies may be compelled to produce data deemed necessary for trials, despite the lack of explicit legal privacy rights in the U.S. Constitution.
Final Considerations on Privacy Implications
Uniqueness of Fingerprints
Significance: Unique digital fingerprints can link online behaviors back to real individuals without their consent, thereby implicating both privacy and legal concerns.
Commercial vs. Law Enforcement Use: The same metadata can serve distinct purposes depending on the accessing party's intent—whether for targeted marketing or for surveillance in criminal investigations.
Proposals for Greater Privacy: Discussions on the necessity of updated privacy rights in light of evolving digital footprints and surveillance technologies are ongoing.