Budny 4:00 L06 ETHICAL DATA COLLECTION Michelle Banas (mlb163@pitt.edu) INTRODUCTION: A LESSON IN ENGINEERING ETHICS In any situation there are a certain set of guidelines people generally stick to. These could be social norms, classroom rules, or federal laws, which were agreed to and are considered a base line for acceptable behavior. From them we can then derive what is acceptable, unacceptable, particularly favorable, and so on. In some situations these norms are governed only by opinion while in others formal written documents explain what is acceptable and what is not. These formal guidelines include federal, state, and local laws as well as things such as organizational bylaws and professional codes of ethics. Engineering, for example, has many of these professional codes. Perhaps the most important of them is the National Society of Professional Engineers (NSPE) Code of Ethics for Engineers. It lays out, quite plainly, the effect engineers have on society by stating, “Engineering has a direct and vital impact on the quality of life for all people. Accordingly, the services provided by engineers require honesty, impartiality, fairness, and equity, and must be dedicated to the protection of the public health, safety, and welfare. Engineers must perform under a standard of professional behavior that requires adherence to the highest principals of ethical conduct” [1]. This is only a glimpse into the NSPE Code of Ethics, not to mention the numerous other codes governing specific engineering disciplines. A much easier way to understand the ethics behind an ethical engineering decision is, perhaps, through example. A Glimpse into the Development of Mobile Computing Allow me to describe a scenario: somewhere deep within a rather nondescript building just as deep within a rather nondescript industrial park there is work being done on the next mobile operating system. It could be entirely new or simply the next version of an existing standard; it’s not all that important. What is important is that while the team of computer and software engineers have been working diligently, doing their best to ignore the strange, alien noises from the lab across the hall, and pushing to meet the date the new software is supposed to go live, a vulnerability has been exposed. The problem is, of course, investigated and it is discovered that an application that comes pre-installed with the operating system is transmitting data such as geo-location, accelerometer readings, and other sensor readings back to the carrier without informing the user. A setting buried deep within layers and layers of menus allows the user to turn off the data tracking, but by default it remains on. The team lead brings the problem to their supervisor reporting that this security hole can be patched but the release date may not be University of Pittsburgh, Swanson School of Engineering 2013-10-29 met because of it. The supervisor shrugs off the team lead’s concerns. After all, the data could be useful to the carrier. It would allow them to improve their Dynamic Base Station Operation set-up along with improving the data pool for other Big Data projects. The team lead is told not to worry, to leave that application alone, and not to mention it to anyone else. This becomes a moral and ethical problem for the engineers involved. Are they to simply remain silent about the issue, as instructed, or are they to defend the user and the user’s right to privacy? DATA CAN BE USEFUL The Dynamic Base Station Operation Structure In a study performed by researchers at the University of Southern California, the University of California at Davis, and Tsinghua University it was shown that as of 2011 the biggest consumer of energy in a cellular network is the operation of base station equipment. Estimates show that base stations are responsible for 60-80 percent of the total energy consumption. Even when a base station is experiencing little or no activity it is still consuming 90 percent of the energy it would at peak performance. In order to save any significant amount of energy entire base stations must be shut down using a dynamic approach that allows the transfer of that station’s usual traffic to neighboring base stations [2]. This is called Dynamic Base Station Operation Structure (DBSOS). By reducing energy consumption by its base stations a carrier can save a significant amount of its operating costs. Estimates of user traffic and location can be optimized by collecting data from individual devices, allowing carriers to get a better idea of when and where users are making use of their towers. Although optimization of these estimates may have positive environmental and financial impacts, the collection of data is still ethically questionable as will be explained further in this essay. Implementation of the Smart Grid An article published in IEEE Transactions on Wireless Communications entitled When the Smart Grid Meets Energy-Efficient Communications: Green Wireless Cellular Networks Powered by the Smart Grid provides some insight into the effects of combining the smart grid system with DBSOS. The basic infrastructure of the grid powering our cities, and as such providing energy to cellular networks, is moving away from the traditional and shifting to a smarter grid. “Specifically, the dynamic operation of cellular base stations depends on the traffic, real time electricity price, and the pollutant level associated with electricity generation” [3]. Michelle Banas This is all data that can be gathered from the smart grid. Even the International Energy Agency believes “the widespread deployment of smart grids is crucial to achieving a more secure and sustainable energy future” [4]. The smart grid can, unfortunately, be just as vulnerable to a security breach as a personal mobile phone because “the increased use of wireless networking technology and its introduction into control center networks and field devices have compounded this challenge. Consequently, utilities have had to establish electronic security perimeters (ESPs) to monitor, protect, and control their infrastructure” [4]. If utilities go to such lengths to protect their wirelessly transmitted data, why shouldn’t the average user be as concerned about theirs? The lengths that companies go to in order to protect their private data should give some indication of what the average citizen should be doing to protect their own. all users would like to think their mobile device is no riskier than a traditional telephone, newspaper, radio, and a few amusing games combined into a convenient package. The current state of the art is distinctly unfriendly to those people, and their security and privacy are constantly at risk” [7]. Because data collection is not only limited to use by a carrier, a data collection door left open by a developer could invite other malicious developers to either attack the device itself to gather information from a specific user or to attack the carrier’s warehouse of this data, revealing the private data of every one of the subscribers. This is an ethical problem because, as stated by Katie Shilton in Four Billion Little Brothers? Privacy, mobile phones, and ubiquitous data collection, “data reveals a lot about your regular locations, habits, and routines. Once such data is captured, acquaintances, friends, or authorities might coerce you to disclose it. Perhaps worse, it could be collected or reused without your knowledge or permission… your location might reveal your child’s school, your regular trips to a therapist or doctor, and times when you arrived late or left early from work. These traces are easy to mine and difficult or impossible to retract once shared” [8]. It has already been shown that seemingly harmless applications can mine for data and send it overseas without the user’s knowledge. For example, some wallpaper apps downloaded by over a million users were actually Trojanhorses which collected personal information and sent it to China [9]. A user is more likely to trust what comes preinstalled with their device than a third party application. A data collection application built into the architecture of a device is more likely to escape notice than something downloaded, and as such the developer is actively deceiving the user in order to gain access to private information by not advising the user outright that their data is being collected. WHAT THE USER EXPECTS As a subscriber to any wireless carrier the user has certain expectations about the Quality of Service (QoS) and Quality of Experience (QoE) they receive for their monthly fee. In a study out of the University of Western Sydney it was found that because QoE can be influenced by a user’s environment, device, and type of service it is an extremely subjective matter. It has been found that three important factors make up a typical user’s QoE. They are accessibility, retention, and integrity of service. Security is a topic that falls directly under accessibility [5]. Another study entitled Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects explains that “Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging” [6]. Users expect basic anonymity in that “activities must not be linkable by eavesdroppers” and non-linkability that “an adversary cannot link the communication activities of a particular user together and thus establish the user’s profile” [6]. By collecting data from the user that could be used to create a profile of their activities it is a breach of the security and privacy a user expects from their device. By doing so the carrier also undermines the QoE it is looking to provide to its subscribers. What is ‘Private?’ We now understand that mobile computing and data collection can be dangerous to a user’s privacy, but what exactly makes the data on a mobile phone ‘private,’ making its collection an ethical concern? As explained in Information Ethics in the Context of Smart Devices by Brian Roux and Michael Falgoust, “Concepts of privacy vary by jurisdiction both ethically in terms of cultural norms and legally in terms of developed jurisprudence… As everyday things, smart devices appear trivial, but as extensions of our cognitive capabilities, we have a stake in protecting the privacy of our devices” [10]. This privacy can be explained further, though it is context-dependent, based on the users’ relationships with one another. To borrow an example from Roux and Falgoust, “Imagine an agent as she goes about a fairly mundane series of errands. At each point, she interacts with other agents and conducts her specific business. At the end of the day, each agent with whom she has interacted knows something about her business, but none of them know the complete series of WHO OWNS THE DATA ANYWAY? An article written by Hilarie Orman entitled Did You Want Privacy With That? goes as far as to state “mobile phones are dangerous to your privacy.” She is gracious enough to explain, adding “pack all that sensing and recording capability along with numerous useful and entertaining applications together into a small device and you have a treasure trove of vulnerabilities that act as magnets for exploitation” [7]. These vulnerabilities can include situations such as our example, where data is collected and stored without the knowledge of the user. “Certainly, 90 percent of 2 Michelle Banas errands, so the agent’s plans remain private. Nevertheless, if another agent follows the first and interrogates everyone to whom the first agent spoke. If successful, the second agent will have a detailed understanding of the first agent’s errands. Since the first agent has not taken the second into her confidence, the second agent has committed an indirect privacy violation” [10]. By allowing a mobile device to track a user’s geo-location along with other sensor data and report it to the carrier without the user’s knowledge the device is, in effect, acting like that second agent. It has followed the user everywhere and recorded the details of the experience through various sensor readings, allowing another to see this data and quite possibly construct a profile of the user’s day without their knowledge of the data ever being recorded. states bluntly in its Fundamental Cannons that “Engineers, in fulfillment of their professional duties, shall… avoid deceptive acts” [1]. By allowing the activity of our theoretical application to remain hidden under layers of settings and giving no hint of its existence in the first place the developers are, in effect, deceiving the user. As the IEEE Code of Ethics instructs engineers “to improve the understanding of technology; its appropriate application, and potential consequences” [12] it is wrong for an engineer to hide aspects of a device from the public rather than educating them about the potential uses and dangers as it is also their responsibility “to disclose promptly factors that might endanger the public” [12]. Also, to not disclose the existence of this application publicly would be omitting a material fact about the workings of the device, which is not allowed by the NSPE Code of Ethics [1]. Engineers are expected “to disclose promptly factors that might endanger the public” [12] and by not disclosing the existence of this software the engineer may endanger many members of the public by allowing their information to be gathered without their consent and leaving the door open for malicious developers to collect the users’ data as well. Last, but certainly not least, “Engineers shall not reveal facts, data, or information without the prior consent of the client” [1]. This is, perhaps, the most directly relevant part of the Code of Ethics. By collecting a user’s data and allowing it to be used by the service provider the engineer is revealing facts about that user’s personal life, and as such breaching their privacy. WHY PROTECTION CANNOT BE LEFT UP TO THE USER Unfortunately, as of present, most users take their devices for granted. Already “the amount of personal information in circulation over the former is tremendous and increasing, as are the unsanctioned uses of personal data.” Although “some technologists have professed a goal for such technologies to be invisible to the users… [They] can be used in knowledge creation, but also for stalking of various sorts” [11]. One starts to wonder how we can include, and have included, such capable sensing devices in our everyday lives without allowing them to become surveillance tools that record our every move. Data collected by mobile devices needs to be protected and developers cannot necessarily rely on the user to protect their own privacy, even when the option to do so is presented to them. Although “57 percent of all app users have at some time felt compelled to remove or avoid an app that might violate their privacy” [7] the user cannot be expected to search for a setting that gives no indication of its existence in the first place. On top of that, developers have stated “If you ask the average user to give away all their privacy to view a cute cat video, nine out of 10 will happily click ‘yes’” [7]. Unfortunately the reason behind those users clicking ‘yes’ is often the use of cryptic End User License Agreements (EULA’s) that make it difficult for users to understand what, exactly, they’re signing up for. Data literacy is something that is acquired over time, and by then it may be too late for some users whose data is already being uploaded overseas by that video of a cute cat. [8]. CONCLUSION: PROTECTING THE USER To revisit our scenario from the beginning of this paper, it should now be clear that the engineers on the project ethically have no choice but to either fix the security problem, making the data collection clear to the user and giving them a choice in whether or not their data will be collected, or to publicly expose the software issue before it can go to market. If they do nothing, not only will they be in violation of at least two professional codes of ethics but they will also have other moral issues to deal with on their own. It is a violation of a user’s privacy to have a smart device engage in data collection without the user’s direct consent, despite any potential benefits a carrier may gain from doing so. REFERENCES [1] National Society of Professional Engineers (2007). “Code of Ethics for Engineers.” [2] E. Oh, B. Krishnamachari, X. Liu, Z. Niu. (2011). “Toward Dynamic Energy-Efficient Operation of Cellular Network Infrastructure.” IEEE Communications Magazine. (Online Article). DOI: 10.1109/MCOM.2011.5783985. pp. 56-61 [3] S. Bu, F.R. Yu, Y. Cai, X.P. Liu. (2012). “When the Smart Grid Meets Energy-Efficient Communications: Green WHAT THE OFFICIAL CODES OF ETHICS HAVE TO SAY Both the NSPE Code of Ethics and the Institute of Electrical and Electronics Engineers (IEEE) Code of Ethics have very firm stands on how engineers are to deal with issues concerning the public. To start, and perhaps as enough to close the argument all together, the NSPE Code of Ethics 3 Michelle Banas Wireless Cellular Networks Powered by the Smart Grid.” IEEE Transactions on Wireless Communications. (Online Article). DOI: 10.1109/TWC.2012.052512.111766. pp. 3014-3024 [4] F. Sheldon, J. Webber, S. Yoo, W. Pan. (2012). “The Insecurity of Wireless Networks.” IEEE Security and Privacy. (Online Article). DOI: 10.1109/MSP.2012.60. pp 54-61 [5] F. Farid, S. Shahrestani, C. Ruan. (2013). “Quality of Service Concerns in Wireless and Cellular Networks.” Communications of the IBIMA. (Online Article). DOI: 10.5171/2013.794626 [6] D. He, C. Chen, et al. (2013). “Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects.” IEEE Communications Magazine. (Online Article). DOI: 10.1109/MCOM.2013.6461199. pp. 142-150 [7] H. Orman. (2013) “Did You Want Privacy With That? Personal Data Protection in Mobile Devices.” IEEE Internet Computing. (Online Article). DOI: 10.1109/MIC.2013.48. pp. 83-86 [8] K. Shilton. (2010). “Four Billion Little Brothers? Privacy, Mobile Phones, and Ubiquitous Data Collection.” Communications of the ACM. (Online Article). DOI: 10.1145/1592761.1592778. pp. 48-53 [9] G. Hurlburt, J. Voas, K. Miller. (2011). “Mobile App Addiction: Threat to Security?” IT Professional. (Online Article). DOI: 10.1109/MITP.2011.104. pp. 9-11 [10] B. Roux, M. Falgoust. (2013). “Information Ethics in the Context of Smart Devices.” Ethics and Information Technology. (Online Article). DOI: 10.1007/s10676-0139320-7. [11] K. Pimple. (2011). “Computing Ethics Surrounded By Machines.” Communications of the ACM. (Online Article). DOI: 10.1145/1897852.1897864 pp. 29-31 [12] “IEEE Code of Ethics.” IEEE Policies. (Online Article). ACKNOWLEDGMENTS I would like to thank Dan McMillan for responding to my particularly random email in a timely manner. I would also like to thank my historian friend Ai for inspirational allcaps typing to get me to write my paper in a timely manner and get off the internet. 4