|
|||||||
|
Privacy HypotheticalsPrivacy today is not what it was a decade ago. We have created a set of new privacy hypotheticals to provide examples of ways by which an individual can lose his or her privacy in today's digital world.
• Dustin Touglas is a film producer who understands that his reputation in the film industry is essential and that BooTube views are now a measure of your appeal. Because of this, he is careful to keep questionable and/or poorly shot material on private settings, where people need a password to view it. He posted a video of himself complaining about the band for which he was filming a music video. He complained about how their music sucked, how they were only able to make this video because of the band members’ wealthy parents, and how the girl in the band is a slut. Dustin’s a humorous guy, especially when he’s drunk and pissed off. Tory, Dustin’s friend, used the password to access the video and decided to repost it without a password. The video quickly shot to the top of BooTube’s most viewed list. Dustin quickly contacts BooTube’s owner company, Goggle. It takes Goggle four days to remove the video – enough time for Dustin to lose his next contract with the band. • For the last couple of weeks, Sam Brelinsky has been hooking up with Andrew, the ex-boyfriend of Sam’s roommate and best friend, Ryan. Sam and Andrew decided it was easiest to just keep it a secret, so they exclusively hook up at Andrew’s place. Last night, Sam drank too much, blacked out, and lost his wallet. While Sam was in the shower, Ryan realized he could digitally retrace Sam’s steps using the recorded GPS information on Sam’s oPhone. Ryan picked up Sam’s phone and began going through the information. Ryan was confused when he saw Sam was at Andrew’s house the night before. Curious, Ryan looked further and realized that Sam has been at Andrew’s house most nights of the week, often until the next morning. • ThreeTriangle is a new social networking tool that lets you see friends and friends-of-friends who are physically close to you at present. ThreeTriangle is meant to serve as the link between people who may or may not have met before. When Katie checks into a location, an announcement is sent to all of Katie’s friends and friends-of- friends within a half-mile radius. ThreeTriangle designers want to maximize the usefulness of the social network, so they set the default privacy settings as least secure as possible. To ease security concerns, ThreeTriangle allows Katie to block certain users from receiving any updates from her. This blacklist mechanism requires Katie to list the ThreeTriangle user names of any people she wants not to receive updates. A blacklist is in opposition of a whitelist, where Katie would have to approve a member before a message is sent to that user. Katie had blocked her ex-boyfriend from receiving her updates because he had a bad habit of showing up wherever she checked in. Once he realized he hadn’t received any updates from Katie, an avid ThreeTriangle user, he decided to make second ThreeTriangle account, friend one of their mutual friends from that account, and head down to her favorite row of bars and wait for her to check in at one of them. He promptly heads to the next place she checks in and continues to “accidently” run into her most weekend nights, without ever letting on that he is doing so through ThreeTriangle. • Alexis Sillon lived an extravagant life for a while – partying internationally at the hottest clubs. Carrying around her credit card was a drag, so she had an RFID chip implanted into her hand with her name, birthdate (for age verification), and credit card information on it. To close out her tab, all she had to do was wave her hand within five feet of the club’s RFID reader. Jon, a regional stock manager of the large chain Walshop, drove by the church where Alexis was attending an AA/NA meeting. Jon used RFIDs to maintain stock levels in the various Walshop. Because of the size of warehouses, Walshop bought the most recent RFID readers, which had a range of 60 feet. As Jon was driving from one store to another his RFID reader beeped. Looking over at the reader, he saw Alexis’s name and information pop up on the reader. Thinking on his feet, he quickly wrote down the information and began making subtle charges on her credit cards, which went unnoticed for months. • Marack Olama is the only Muslim male in a predominately white neighborhood. He has a day job at a bank, but his real passion is to become a writer. He’s been working on his first suspense novel at night for the past year. The search engine he uses, Aluminum, gains extra money by selling sets of web searches that have been “declassified.” One company looking to optimize advertising bought many of these data sets for their analyses. Chris Green is in charge of this project and he notices something suspicious when looking through the data sets. One user has an inordinate number of searches of terms like “jihad” “train bombing” “dirty bombs” and “explosion impact patterns.” More alarmingly, these searches are mixed in with searches related to his neighborhood – in particular, directions to and from Marack’s house. Chris alerts the police but as far as he can tell, the police do nothing. Chris decides to take matters into his own hands and warn his neighbors. He creates a website that identifies Marack as a homegrown terrorist and cites his searches as proof. The website quickly picks up steam throughout the neighborhood and in the general Internet community. The 6chan /d/ community catches wind of this website and decides to launch a Goggle bomb. For the next two months, when someone began typing “Marack” into the search bar, Aluminum suggested the autocomplete statement “Marack is a homegrown terrorist.” When his first book hit the stands, many readers refused to purchase or read it because Marack was “linked” to terrorist organizations. • Stop and Buy is a grocery store that offers customers with Stop and Buy cards customized coupons based on the customer’s previous purchases. These coupons are profitable because Stop and Buy sells the information collected from the cards to consumer analysts. A fertility clinic employs consumer analysts to determine which neighborhoods purchase higher than average amounts of pregnancy tests. The fertility clinic moves in and begins advertising with signs reading, “You’re not alone: 30% of women in this neighborhood struggle with becoming pregnant!” accompanied by pictures in which actual receipts were reconstructed (meaning, all the items on the receipt were put photographed in a shopping cart) with the pregnancy test right on top. Catherine Cavalier, a neighborhood woman who has been trying to get pregnant for two years, recognizes her weekly shopping list in the cart – down to the same brands and less common items. • VictoriasSshhh.com uses cookies to make returning visitors’ shopping experiences more pleasant. When someone visits the website, VictoriaSshh.com cookies let the website suggest items similar to the user’s previous purchases and automatically look for items in the user’s size. Her own laptop broken, Rachel Lee used her husband’s laptop to purchase new bras and underwear on VictoriasSshhh.com. Rachel quickly realized that the suggested sizes were not her size and the similar items were unlike anything her husband had given her. Rachel is able to log onto her husband’s Bookface account, since the default setting is to remain logged in after closing the window. She looks through his messages and discovers he is having an affair with a woman named Liz Narner. Rachel uses online search service to look up Liz and finds her phone number. Only after leaving many, increasingly aggressive voicemails does Rachel learn that the online search service incorrectly listed a Liz Parner’s phone number as Liz Narner’s. • Chelsea Tillet is the head of social networking for Parah Salin’s presidential campaign. The heads of the campaign love what Chelsea is doing with social networking but don’t know about her Furry fetish. Chelsea is a member of several private Furry groups on Bookface, but is very careful to keep her membership private from her colleagues. Dristol Salin, Parah’s daughter, is also working on the campaign in between shooting episodes of Twirling With The Supernovas, a popular dance competition reality show. Bored on Bookface one day, Dristol sees that she has many friends in common with Chelsea and looks through them. Beyond fellow campaign workers, Dristol notices that many of the friends in common are friends she met while at Furry conventions, since she too has a secret Furry fetish. Over the next few days, Dristol goes out of her way to walk by Chelsea, who is always on Bookface, so that she can see Chelsea’s Bookface ads. In a surprising stroke of intelligence, Dristol knows that Bookface’s ad formula fails to take into account whether a user’s membership to a group is private or not. So the appearance of the same ads that Dristol gets on Bookface confirm Dristol’s suspicion that Chelsea also has a Furry fetish. Not willing to risk being exposed by Chelsea, Dristol begins to monitor Chelsea’s email, as allowed by Chelsea’s contract, looking for anything upon which to fire her. Dristol fires Chelsea for lack of support the minute Chelsea sends an email questioning any of the campaign’s decisions. • Davida Tat, a gossip blogger and coder, writes new program that utilizes free facial recognition technology to identify plastic surgery. The program scans the web for photographs of people whose features line up almost perfectly. The program uses metadata from the photographs to determine the date of the photograph and compares photographs for matches of seven out of eight measurements – nose, mouth, cheeks, forehead, and area around eyes, breast, waist, and ears. If a person changes one of these measurements dramatically in a short time period, the two photographs are delivered to Davida’s inbox. If upon visual inspection Davida deems the change the work of a surgeon, Davida will post the photographs on her blog as before and after shots. Readers of the blog are encouraged to provide any details they know about the work, including the name of the person and their surgeon. The majority of students at Dale University use the same cell phone provider, SY&Y. SY&Y had a major data leak, and cell phone call and text records were released for all users in the area surrounding the university. Students from the campus tabloid, the Bumpus, downloaded this data set. The same students also pulled the cellphone numbers of Dale students from the school’s facebook and students’ accounts on Bookface. These lists were cross-referenced with each other to produce a list of who called whom and at what times. Using only the weakest of deductions, they were able to publish a “Gettin’ It On” list of likely hook-ups, based on number of days that two people exchanged calls after 2 AM. They also published “Dale’s Finest,” a list of the twenty male and twenty female students who called the largest number of different people after 2 AM in a single month. That issue became the most read issue of Bumpus ever. • Walshop uses RFIDs to maintain close records on their more expensive and frequently stolen items such as electronics, razor blades and pregnancy tests. Robert Whitmore, a stock manager, is walking by a group of Walshop employees on their break when his RFID scanner begins picking up a signal. Robert demands to investigate their bags to see if they have stolen anything. In Caitlin’s bag, he finds a pregnancy test box and one used pregnancy test, which indicated “pregnant.” Caitlin had the paid for the test and still had the receipt, so she was not accused of any wrongdoing. However, all of her co-workers discovered she was pregnant, so when she later had an abortion it was obvious that something had happened. Jake Bevelyn and Morgan Mahs were best friends in high school, but since going to college they have lost contact. Out of the blue, Jake receives an email saying that Morgan posted a photograph of him on a new social networking website. Jakes not a member of the site, so in order to view the photograph he must provide significant personal information about himself, including his name, birthday, geographic location, and educational background. Jake had plenty of photographs taken of him doing embarrassing and/or illegal activity when he was younger, so now he must choose between certain exposure of personal information or the possibility that that photograph may incriminating or embarrassing. • Hillary Baxon applies for a job with Sorgan Manley, a financial powerhouse. In the hiring process, Sorgan Manley human resources employees search the Internet for information on Hillary Baxon. They find the public profiles of Hillary’s friends, who have posted hundreds of photographs and videos. Since the default setting on photographs and videos is public, the photographs chronicling Hillary’s frequent bar crawls, power hours, and anything-but-clothes (or lack-of-clothes) parties are easily found. • Home Depots in California recently began using RFID chips to help keep track of quantities, manage shelves, speed up checkout, and generally improve consumer experience. Each item in the store has a tiny RFID chip embedded in its packaging. This allows Home Depot employees to remotely monitor which goods are running low and what shelves need to be re-stocked. Since the RFID chips have a signal radius of ten feet, this new technology also makes checkout much easier (no more moving everything to that silly conveyor belt!). Julia Twain has been buying enormous quantities of fertilizer over a period of six months to help make a bomb. A clever and careful terrorist, Julia has spread her purchases out over many Home Depots in California so as to escape the attention of the authorities. Once she had gathered enough fertilizer, Julia constructed the bomb and placed all the discarded fertilizer bags in opaque, black trash bags on the curb to be picked up the next morning by the garbage truck. The next morning, a police cruiser drove casually down Julia’s street looking for the a lost cat with an RFID chip in its collar. Scanning the yards on the left and right with the detectors, Officer Sam Ginsburg noticed an extremely large amount of RFID chips that registered as fertilizer bags coming from a pile of trash outside one house. Officer Ginsburg examined the house and saw no signs of landscaping or gardening, and the quantity of fertilizer was enough to raise suspicions. Officer Ginsburg returned the next day with a warrant to search Julia’s and found the bomb along with detailed plans for an attack on a nearby subway station. • Web-based information aggregator ChoicePoint builds profiles of individuals based on information purchased or gathered from a variety of websites that harvest data from their users. Chris Smith was applying for a very competitive teaching job at Young’s Preschool. After several rounds of interviews, Chris was given the disappointing news that he did not get the job. Chris felt that he was far more qualified than all the other applicants, so he asked why he was not chosen. The preschool disclosed that they contacted ChoicePoint to conduct a background search. The information ChoicePoint provided was largely incorrect, including three ex-wives and a statutory rape charge. • Web-based information aggregator ChoicePoint builds profiles of individuals based on information purchased or gathered from a variety of websites that harvest data from their users. Chris Smith was applying for a very competitive teaching job at Young’s Preschool. After several rounds of interviews, Chris was given the disappointing news that he did not get the job. Chris felt that he was far more qualified than all the other applicants, so he asked why he was not chosen. The preschool disclosed that they contacted ChoicePoint to conduct a background search. The information ChoicePoint provided was largely incorrect, including three ex-wives and a statutory rape charge. • One day, Barb Rasin invests in a new smartphone from the local phone store. Excited with her purchase, she rushes home to upload her new phone number to her private Facebook profile to alert her friends and family. Strangely, within a few hours Barb begins receiving mysterious phone calls from callers asking her sexually explicit questions and desiring to meet up. Confused, Barb searches her new phone number on the Internet and realizes that Ax Chu, a transvestite hooker, has posted an ad for her services on Craiglist but has accidently listed Barb’s new phone number to call. Either that, or Barb’s new friends are playing a horrible prank on her. Unfortunately, not only does Barb’s new phone continue ringing off the hook with potential suitors, but also unbeknownst to her the data-aggregating, public profile site Spokeo has linked information from the Craiglist ad to its listing of her information. Quickly, other data-aggregrating, public profile sites also add “transvestite prostitute” to Barb’s occupation list. When Barb attempts to email these websites to get this information removed, they demand that she send them a copy of driver’s license to prove who she is. The problem is, her driver’s license shows her gender to be female, and given her occupation, these websites are skeptical that the license is real, so they refuse to take her public profiles down. • Sylvia Rifkin gets arrested for the misdemeanor charge of interfering with an officer during a raid of Levitate night club. Incidental to this arrest, the police scroll through her phone as part of a search of her person. In doing so, they find emails detailing her close ties to a potentially violent political organization dedicated to saving the whales. Intrigued, the officers make a note of these connections, add this information to her police file, and release Sylvia. The next time Sylvia is at the airport, TSA sends her through extra security because her name is now linked with a suspicious political organization. Undeterred, she eventually boards her flight after extra interrogation but is surprised to experience the same treatment on her ride home. Upon talking with the Customer Relations desk at her home airport, she learns that her new background profile means that she will never fly easily again. This is particularly problematic because Sylvia works as a consultant. Sylvia must fly frequently as a part of her job and needs to be able to get to urgent appointments quickly. Some months after the initial change to her profile, Sylvia’s car company client, Fonda, demands her immediate presence for crisis management in the wake of an impending recall of their new car, the Concord. When Sylvia attempts to rush through the airport with her boss, TSA once again singles her out for super-enhanced security, but this time it causes her to miss her flight altogether. Sylvia’s boss, enraged by her failure to make the meeting in time and suspicious of the reasons behind Sylvia’s detention fires her on the spot. • Jonas Schmonas is an assistant manager at the local UPS branch. Unbeknownst to him, he is a distant--but not too distant--relative of the recently deceased billionaire Wilson Bumfort. Part of Mr. Bumfort’s will included a clause that $100 million be given to each of his living relatives, so his attorneys use ancestry.com to locate these Schmonas clicks on them. As soon as he arrives at these sites, the companies collect his IP address, name, and web browsing habits through cookies placed on his computer. These cookies enable the companies to identify Mr. Schmonas completely and he begins receiving paper advertisements through the mail for an array of wealth-related services. In spite of Mr. Schmonas’s best efforts to remove himself from these mailing lists, the advertisements deluge his office and apartment building, attracting the attention of colleagues and neighbors. Sebastian Tark, a local reporter living in Mr. Schmonas’ building, takes a special interest in the vast array of wealth-related mailings and decides to investigate Mr. Schmonas. During his investigation, Sebastian uses a similar site to ancestry.com to uncover the relationship between Mr. Schmonas and Wilson Bumfort. With this, Sebastian infers that Mr. Schmonas has indeed received a sizable sum of money. Seeing the potential to break a big story, Sebastian writes about his find in the local paper, revealing the details of Mr. Schmonas’s mailings as well as the nature of his relationship to Wilson Bumfort. Quickly, big media players like The New York Rhymes and Washington Roast as well as Mr. Bumfort’s local evening news pick up the story. Mr. Schmonas is devastated by this exposure, having immediately received a mix of hatemail and ingratiating emails that affirmed his worst fears that his new wealth would harm his friendships. Worse still, local thieves learn of the new money in their midst. They Google Mr. Schmonas’s home on Google Earth, verifying not only his address but also his complete lack of home security. So, that night just as Mr. Schmonas is lying back to have an evening drink to take the edge off the night, these men break into his apartment and rob him of all his belongings. • Sophia Landa goes streaking through the library as part of the annual Jale University naked finals run. While she normally would never partake in this sort of activity, her friends convince her by explaining that the “audience” will be only be other students who have key-card access to the library. Unfortunately, Sophia fails to anticipate the interest of the night-shift security guard, who records her on his camera phone as she runs past him. Before she even gets back to her dorm later that night, the security guard has uploaded the video for the entire public to see, making Sophia’s somewhat-private run into an international peep-show. Horrified, Sophia’s parents pull her out of school even as the general public online quickly traces her identity using the name of her University as well as the semi-public directory that the University posts online. Searches of “Sophia Landa” now turn up more Google videos of her naked run than she could ever hope to have taken down. • Tale-New Baven Hospital releases a set of de-identified patient treatment data. Unfortunately, the data contains gender and tracks the progression of each person’s disease with the dates of different appointments. University students at MIT want to make a point about how de-identified data is definitely not non-identifiable. They put it together with publically available GPS data and personal information from the social networking site, ThreeTriangle. This allows them to identify some of the individual patients, including Mary Gibbs. Through a simple algorithm, it is now publically known that Mary Gibbs has HIV/AIDS. • Doel Circus lends his laptop to his friend, Dobby Bresser, to check his online bank statement. Dobby failed to press the tab button hard enough to switch from the “user name” field to the “password” field. As a result, he types her username (DBresser1992) and password (password1234) into the same box. BankofUSA.com cookies record this information to make it easier for the next time Dobby visits the site from that computer. The next time Doel goes to BankofUSA.com and types “d” into the user name field, Dobby’s username and password friend pop up. • Ax Zho just got a new job with Orange Media. A big user of the new social networking site, StatusUpdate, Ax posts about his new job right away. Considering his new employment status, he makes sure to edit his privacy settings so that unapproved users cannot see any of his photos or statuses. Ax starts his new job, and while he loves most things about it, he quickly develops a deep hatred for his immediate supervisor. Because no one at the company is linked to him on StatusUpdate, he starts to post hateful comments about his supervisor under the username AxZho as early as his second day of work. At the very end of its privacy policy, StatusUpdate includes a clause that reads: “We reserve the right to change this Privacy Policy at any time.” Three weeks into his new employment, StatusUpdate changes it’s privacy settings so that users have to specifically opt out of sharing current statuses, past statuses, and statuses that are more than two weeks old. There is no way to know this change occurred unless users visit the Privacy Policy on StatusUpdate.com to check for changes. Employees at the company who also use StatusUpdate.com on a daily basis discover Ax Zho’s two week-old posts, and word of his feelings quickly gets around. Eventually it reaches his supervisor and Ax is promptly fired. • One fine summer day, a Bank of America in Manhattan was robbed. Three armed men in ski masks burst through the doors shortly after 2:00 pm, waving machine guns and shouting demands. They were out the door with bags full of cash in under ten minutes, but they did not realize that the silent alarm had been sounded the instant they entered the bank. As they sped away in their getaway van, a handful of police cars followed. But before the van could get more than ten blocks from the bank, the robbers encountered a road block set up by the police and were forced to pull over. The police forced the three of them out of the van and took them into the station. Once in custody, the robbers had their smartphones confiscated. Two were locked, so the police dumped the contents of the phones’ hard drives and then examined the data. They found a significant number of text messages between the three criminals planning the operation. The third phone was not password-protected, and the police has free reign over its contents. They scoured the criminal’s emails, which contained a large number of receipts and confirmations from various banks. Curious, they logged into the phone’s owner’s bank account from the smartphone using the saved password on the bank’s mobile site. Information found in the online account provided incriminating evidence that linked the detainee to various money laundering operations, a significant amount of fraud, and a series of other armed robberies in the area. |
||||||
|