Bath University’s Reckless Invasion of Privacy By Michael Bennett.

6
Bath University’s Reckless Invasion of Privacy By Michael Bennett

Transcript of Bath University’s Reckless Invasion of Privacy By Michael Bennett.

Page 1: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

Bath University’sReckless Invasion of Privacy

By Michael Bennett

Page 2: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

Composed of multiple sensors; began in Bath, England, now worldwide

Tracking Bluetooth IDs• Sensor detects Bluetooth ID• Centralized database stores IDs, location

histories Why it works

• Bluetooth devices broadcast their IDs publically; many users do not know to turn it off

• Detecting ID required to connect to device, so not illegal

Page 3: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

Unwilling participation• “Participants” are not

informed of the program• No opt-in/opt-out option

Potential privacy invasion• Bluetooth IDs can contain

personal information Name Phone number Email address

• IDs stored in database in the clear

Page 4: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

“The objective is not to track individuals, whether by Bluetooth or any other means. We are interested in the aggregate behaviour of city dwellers as a whole. The notion that any agency would seriously consider Bluetooth scanning as a surveillance technique is ludicrous.”

-Eamonn O’Neill, Cityscape director

“For Bath University to assert that there aren't privacy implications demonstrates an astonishing disregard for consumer rights.”

-Simon Davies, Privacy International director

“If a person's phone is talking to a scanner, then they should be told about it . . . I agree this is complex and I agree there are harmful scenarios.”

-Vassilis Kostakos, former Cityware member

Page 5: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

Willing participation• At the very least, allow people the option to

opt-out• Should probably require opt-in as well

Hiding of information• IDs could be hashed before being stored

Much like passwords... the ID would still be recognizable as the same one, but the contents would be hidden

Would prevent reverse look-up (using a known ID to track its whereabouts)

• Would reduce/remove the potential for unintended abuse

Page 6: Bath University’s Reckless Invasion of Privacy By Michael Bennett.

http://www.guardian.co.uk/uk/2008/jul/21/civilliberties.privacy

http://life-test.calit2.net/blulogo.jpg http://www.technovelgy.com/

graphics/content08/Digital-Footprints-cityware-bbc.jpg

http://www.ess.co.at/GICONS/cityware.gif