Who is this Person and Why do we Care?
POLL
Goals: • You’re a professional.
• You’re an informed citizen.
Why do we need you?
http://gizmodo.com/why-californias-new-web-wide-delete-button-for-teens-w-1377730365
Why do we need you?
Practical stuff: http://userweb.cs.utexas.edu/users/ear/
Term: Spring, 1460 Instructor: Mr. Gutenberg
Your first job after graduation is system administrator for a 200 person privately held manufacturing company. The president/owner sends this message to the employees:
“I want to encourage each of you to make comments to me about any facet of our operation you care to. Your response should be made through our anonymizer program so that your identity will not be disclosed”
The president/owner finds one response saying:
“This company sucks. The only way I find to retaliate for the way I have been treated is sabotage. Every tenth part I turn out is defective.”
The president/owner insists that you examine the computer usage records to determine the identity of the alleged saboteur.
What should you do?
• The security of your job • Your hope for promotion • The impact of the sabotage (the company make party favors – the company makes pacemakers) • The consequences for the alleged saboteur • A belief that even if you refuse to assist in the identification, someone else could do it instead • The message instead is:
“A coworker says this company sucks. He says the only way he can find to retaliate for the way he has been treated is sabotage. He claims every tenth part he turns out is defective.”
• You believe you know the alleged saboteur and that person is your friend (your enemy)
• What is the effect on you?
• What is right and what is wrong?
• What is the greater good for the company?
• What is the greater good for the employees of the company? • What is the greater good for your community?
The analysis of the nature and the social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.
James Moor, 1985
Why are computers special?
Why are computers special?
• Logical malleability • Impact on society • Invisibility factor
Why are computers special?
• Logical malleability • Impact on society • Invisibility factor • Invisible abuse • Invisible programming values • Invisible complex calculation
When algorithms discriminate: http://www.nytimes.com/2015/07/10/upshot/when-algorithms-discriminate.html?_r=1&abt=0002&abg=1 When algorithms don’t discriminate: http://mobile.nytimes.com/blogs/bits/2015/07/26/using-algorithms-to-determine-character/
Latisha Smith Latanya Sweeney Instantcheckmate.com ads: • • “Latisha Smith Truth... Check Latisha Smith's Arrests.” “Latisha Smith Truth... Check Latisha Smith's Arrests.” http://articles.chicagotribune.com/2012-11-25/business/sns-rt-usa internetprofilingl1e8me8dx-20121124_1_internet-ad-personal-data-ad text
Latisha Smith, M.D.
Latanya Sweeney Professor Harvard Instantcheckmate.com
ads: • • “Latisha Smith Truth... Check Latisha Smith's Arrests.” “Latisha Smith Truth... Check Latisha Smith's Arrests.” • “We found Emily Jefferson.” According to preliminary findings of Professor Sweeney's research, searches of names assigned primarily to black babies, such as Tyrone, Darnell, Ebony and Latisha, generated "arrest" in the instantcheckmate.com ad copy between 75 percent and 96 percent of the time. Names assigned at birth primarily to whites, such as Geoffrey, Brett, Kristen and Anne, led to more neutral copy, with the word "arrest" appearing between zero and 9 percent of the time.
http://www.cnn.com/2012/11/25/world/meast/saudi-arabia-women/index.html?c=&page=2
"There is a lot of information that will be available and ready to mine like never before," he said. "When do the family arguments start? How many people watch the football games? How much do people drink?”
But who owns the bits? Will Google and Facebook be the arbiters of who can do this research? Should they give the date to researchers: • Are the data proprietary?
• What about the privacy of users?
But you can do some research yourself: www.google.com
http://www.cs.utexas.edu/users/ear/cs349/GoogleQueryResearch.html
• Conceptual muddles • Policy vacuums
• Computer programs become economically significant assets.
• Policy vacuum: How should this intellectual property be protected?
• Conceptual muddle: What is a program? • Is it text? • Is it an invention? • Is it mathematics?
• Email • Policy vacuum: Should the privacy of email communication be protected?
• Conceptual muddle: What is email? Is it more like a: • letter, or a • postcard?
• E Cigs
• E Cigs
• E Cigs • Policy vacuum: How should they be regulated? Can they advertise? Who can by them?
• Conceptual muddle: What are they: • Cigarettes • Drug delivery vehicles • Something else
• E Cigs • Ethical Issues: • May help smokers quit • May lure kids into smoking • Rights of smokers vs. others: How bad do second hand vapors have to be in order to be banned?
• What to do when we don’t have the science yet?
Is there a muddle here: What is stealing?
Aaron Swartz
http://www.jstor.org/
1986 Computer Fraud and Abuse Act • Computer Espionage • Computer tresspassing, and taking government, financial, or commerce info • Computer tresspassing in a government computer • Committing fraud with a protected computer • Damaging a protected computer • Trafficking in passwords of a government or commerce computer • Threatening to damage a (including viruses, worms) protected computer • Conspiracy to violate (a) • Penalties • Miscellaney
You are the MIT CIO. What do you do?
A. Plug the hole and forget it.
B.
Do what they did to catch him but don’t call the police.
C. Call the police.
D. Something else.
Can we back up and start over and find a better solution?
Can we back up and start over and find a better solution?
Is there a vacuum here: Swartz faced: • 35 years in prison • $1 million in fines A rapist may face: • 7 years in prison
No Then Yes Now
Capitol v. Thomas Oct. 2007 - In the first RIAA suit against an individual to reach a courtroom, the court found in favor of the RIAA. Jammie Thomas, a 30 year-old single mom, has been ordered to pay $220,000 to the RIAA for sharing 24 music files on Kazaa ($9,250 per song). Sept. 24, 2008 – Judge ordered new trial.
At issue: “making available”
On Thursday, June 18, 2009, a federal jury in Minneapolis, MN returned a $1.92 million ($80,000 per song) verdict against Jammie Thomas-Rasset The playlist
On Jan. 22, 2010, a U.S. district court slashed the amount of the penalty to $54,000, or $2,250 per song. On Jan. 27, the RIAA offered Thomas-Rasset a settlement: $25,000, if she agreed to ask the judge to "vacate" his decision of the previous week. The RIAA said that the $25,000 would go to a musician’s charity. Thomas Rasset declined the offer. The RIAA appealed again.
On Nov. 3, 2010 Thomas-Rasset lost another round in court. A jury in Minneapolis decided that she was liable for $1.5 million in copyright infringement damages to Capitol Records, or $62,500 for each song she illegally shared in April 2006. http://news.cnet.com/8301-1023_3-20021735-93.html#ixzz1B23XH5Ct
In July 2011, the court again reduced the $1.5 million jury award to $54,000, or $2,250 per song.
In August, the RIAA filed another appeal.
Two distinct legal issues: • Is “making available” “distribution”?
• Is it constitutional to award large statutory damages that bear no relationship to real damages?
In early 2012, Thomas-Rasset agreed to drop the making-available issue and accept an injunction against further making-available of copyrighted works to the public, but asked the court to explicitly state that no decision had been reached on the issue and that it was merely being set aside.
On September 11, 2012, the Eighth Circuit Court of Appeals reversed the District Court's reduction of the award, and reinstated the award of $222,000, which was the amount awarded by the jury in the first trial.
March 18, 2013 U.S. Supreme court refused to hear the case.
The RIAA is no longer pursuing a policy of going after individuals. Instead, it is trying to work with internet providers to stop illegal file sharing.
Stephan Kinsella
Stephan Kinsella
Warrant-less demands for cell location data: Is raw location data protected by your right to privacy in the same way that the content of what you say on your phone is?
Warrant-less demands for cell location data: Is raw location data protected by your right to privacy in the same way that the content of what you say on your phone is?
• Conceptual muddle: what is cell location?
• Policy vacuum: Can the police get it without a warrant?
US Supreme Court UNITED STATES v. MILLER, 425 U.S. 435 (1976) 425 U.S. 435 UNITED STATES v. MILLER. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT. No. 74-1179. Argued January 12, 1976. Decided April 21, 1976.
Respondent, who had been charged with various federal offenses, made a pretrial motion to suppress microfilms of checks, deposit slips, and other records relating to his accounts at two banks, which maintained the records pursuant to the Bank Secrecy Act of 1970 (Act). He contended that the subpoenas duces tecum pursuant to which the material had been produced by the banks were defective and that the records had thus been illegally seized in violation of the Fourth Amendment. Following denial of his motion, respondent was tried and convicted. The Court of Appeals reversed, having concluded that the subpoenaed documents fell within a constitutionally protected zone of privacy. Held: Respondent possessed no Fourth Amendment interest in the bank records that could be vindicated by a challenge to the subpoenas, and the District Court therefore did not err in denying the motion to suppress. Pp. 440-446.
The subpoenaed materials were business records of the banks, not respondent's private papers. Pp. 440-441.
July, 2011, New York Appellate Division First Department in People v. Hall, 926 N.Y.S.2d 514, (1 st Dept. 2011). The Court briefly addressed the constitutional issues presented and then concluded that access to three days of location surveillance in the absence of a warrant was permissible: “Obtaining defendant’s CSLI without a warrant did not violate the Fourth Amendment because, under the Federal Constitution, defendant had no
reasonable expectation of privacy while traveling in public
.” August, 2011, U.S. District Court for the Eastern District of New (In the Matter
of an Application of the United States of America for an Order Authorizing the
Release of Historical Cell-Site Information, 10-MC-897 (NGG)). After an extensive constitutional analysis, U.S. District Judge Nicholas Garaufis concluded that a probable cause warrant issued by a judge is required before law enforcement can obtain a customer’s CSLI data: “This court…seeks to resolve the question before it: whether the request for at least 113 days of
cumulative cell-site-location records for an individual's cell phone constitutes a search under the Fourth Amendment…The court
concludes that it does. Consequently, the information sought by the Government may not be obtained without a warrant and the requisite showing of probable cause.”
July, 2013. United States Court of Appeals for the Fifth Circuit has decided that the government before tracking doesn’t need to get a search warrant citizens’ location data on mobile phones. Specifically, the court ruled that the Constitution’s Fourth Amendment “protects only reasonable expectations of privacy,” which it says don’t include cell phone location data because “a cell phone user makes a choice to get a phone, to select a particular service provider, and to make a call, and because … he voluntarily conveys his cell site data each time he makes a call.
” http://bgr.com/2013/07/31/cellphone-location-data-tracking-ruling/
Police Need Warrant for Cellphone Location Data, Appeals Court Rules
June 12, 2014 An Atlanta-based federal appeals court ruled Wednesday that police need a warrant before acquiring Americans’ cellphone location data.
The decision from a three judge panel of the U.S. Court of Appeals for the 11th Circuit doesn’t apply outside Alabama, Georgia and Florida, but it’s a major development in the nationwide legal fight over applying the Fourth Amendment to electronic data.
http://www.google.org/flutrends/ But there’s a danger in relying too much on complex black boxes: http://mobihealthnews.com/37836/google-flu-trends-will-supplement-crowdsourced-approach-with-cdc-data/
Yellow dots: http://www.instructables.com/id/Yellow_Dots_of_Mystery_Is_Your_Printer_Sp ying_on_/ What about your printer? http://www.eff.org/pages/list-printers-which-do-or-do not-display-tracking-dots
Massachusetts Group Insurance Commission releases “anonymized” medical data.
Voter registration lists can be bought for $20.00.
Governor Weld’s medical records are suddenly public.
Data from the 1990 US Census show that 87% (216 million out of 248 million) of the United States population provided data that likely make them unique based on only the three attributes of zip code, date of birth, and gender. Latanya Sweeney, k-Anonymity: A Model for Protecting Privacy
Work here at UT shows that de anonymizing isn’t that hard.
In tests involving the photo-sharing site Flickr and the microblogging service Twitter, the Texas researchers were able to identify a third of the users with accounts on both sites simply by searching for recognizable patterns in anonymized network data. Both Twitter and Flickr display user information publicly, so the researchers anonymized much of the data in order to test their algorithms.
http://www.technologyreview.com/web/22593/?a=f
Megan Meier Lori Drew http://en.wikipedia.org/wiki/Megan_Meier
What tools were available: • The Computer Fraud and Abuse Act • The Terms and Conditions of MySpace
What tools were available: • The Computer Fraud and Abuse Act • The Terms and Conditions of MySpace Why weren’t the right tools available: • Policy vacuum resulting from a • Conceptual muddle
• Clarify the muddle.
• Fill in the legal vacuum.
• November, 2007: Board of Aldermen for the City of Dardenne Prairie, passed an passed an ordinance that makes any harassment that utilizes an electronic medium, including the Internet, text messaging services, pagers, and similar devices a misdemeanor, with fines of up to $500 and up to 90 days imprisonment.
• May, 2008: Missouri updated its existing harassment law to cover bullying via the internet. The new law removes the requirement for illegal harassment to be either written or over the telephone. These changes make the law applicable to harassment from computers, text messages, and other electronic devices.
• Since then, over twenty states have enacted legislation to address bullying that occurs through electronic media. These laws include statutes that mandate that school boards must adopt policies to address cyberbullying, statutes that criminalize harassing minors online, and statutes providing for cyberbulling education.
• 2009: Megan Meier Cyberbullying Prevention Act introduced in U.S. Congress, but never passed.
• But “you can’t legislate against meanness”.
• Social Benefit • Risk • Software Quality • Security • Ethics • Free Speech • Privacy • Law • Government Policy http://www.nytimes.com/2010/01/24/health/24radiation.html?pagewanted=1 &partner=rss&emc=rss
Introduction: http://www.youtube.com/watch?v=FC3IryWr4c8 Watch a sample round: http://www.youtube.com/watch?v=WFR3lOm_xhE From Day 1 of the real match: http://www.youtube.com/watch?v=seNkjYyG3gI Bad Final Jeopardy: http://www.youtube.com/watch?v=mwkoabTl3vM&feature=relmfu How does Watson win? http://www.youtube.com/watch?v=d_yXV22O6n4
There will be huge job losses by 2040 or 2050 as robots move into the workplace. For example: • Nearly every construction job: ~6 million jobs. • Nearly every manufacturing job: ~16 million jobs lost. • Nearly every transportation job: ~3 million jobs lost. • Many wholesale and retail jobs: at least 15 million lost jobs. • Nearly every hotel and restaurant job: ~10 million jobs lost. If you add that all up, it's over 50 million jobs lost to robots. That is a conservative estimate. By 2050 or so, it is very likely that over half the jobs in the United States will be held by robots. From Marshall Brain, Robotic Nation
http://mobile.nytimes.com/2015/07/08/technology/code-specialists-oppose-us-and-british-government-access-to-encrypted communication.html?_r=0
• Computer Professionals for Social Responsibility (CPSR) • Electronic Frontier Foundation (EFF) • Online Ethics Center at the National Academy of Engineering