128

The Privacy Invasions: A Designers Guide to the Post Snowden Era

Embed Size (px)

Citation preview

Who is

Edward

Snowden?

Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.

Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.

Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.

Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.

Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.

Known for Revealing details of classified United States government surveillance programs

Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.

Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.

Known for Revealing details of classified United States government surveillance programs

Criminal charge Theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person (June 2013)

Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.

Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.

Known for Revealing details of classified United States government surveillance programs

Criminal charge Theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person (June 2013)

Awards Sam Adams Award (2013), Right Livelihood Award (2014), Stuttgart Peace Prize (2014) Source: Wikipedia

Lots of power,

little

accountability

Formed November 4, 1952; 63 years agoPreceding agency Armed Forces Security AgencyHeadquarters Fort Meade, Maryland, U.S.

Motto "Defending Our Nation. Securing The Future.”

Employees Classified (30,000–40,000 estimate)

Annual budget Classified (estimated $10.8 billion, 2013)

Source: Wikipedia

GCHQ

Same, for the

UK

5 Eyes - US,

UK, Australia,

New Zealand,

Canada

Telecoms

[ ] Hero

[ ] Traitor

[ ] Other?

the privacy invasions

LAUNCH VIDEO

Helsinki, Finland March 4

This presentation is brought to you in part by

The TSA

The Transportation Security Administration a.k.a. the TSA. The TSA is an agency of the U.S. Department of Homeland Security that has authority over the security of the traveling public in the United States.

Keeping us safe, but

• Boundary issues• Questionable hiring processes• Arbitrary rules and regulations

TSA Meme - imgflip.com

My Mother-

in-law

A lovely lady, but

• Boundary issues• Questionable motives • Calls 20+ times a day!• Landline only

Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use

/privacy unpacked

So what is privacy? Privacy is not having my mother-in-law call 20 times a day. But it's more than that. The NY Times columnist David Brooks put it pretty well I think.

"There has to be an interior zone within each person that other people do not see. There has to be a zone where half-formed thoughts and delicate emotions can grow and evolve without being exposed to the harsh glare of public judgement. There has to be a private space where you can share your doubts and secrets and expose your weaknesses with the expectation that you will still be loved and supported." I like that.

From Snowden by Ted Ral - http://www.amazon.com/Snowden-Ted-Rall/dp/1609806352

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.”

- Eric Schmidt, Executive Chairman of Alphabet Inc.

http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html

Google Exec Considering Internet "Hate-Checker by Day Donaldson Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

“Privacy is dead” – Mark Zuckerberg, founder and CEO, Facebook.

[http://www.theguardian.com/technology/2010/jan/11/facebook-privacy]

Mark Zuckerberg by JD Lasica Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

But hang on, privacy isn’t dead. It’s actually more important than ever before!

Just because you have haven’t done anything wrong doesn’t mean that you want everyone to know everything about you all the time!

NSA staff used spying power to snoop on lovers and spouses

[Reuters http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927]

NSA Inside by Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

TSA saved 35,000 images

[http://www.zdnet.com/article/body-scanner-saved-35000-naked-images/]

- - -

Image from an active millimeter wave body scanner - Transportation Security Administration - http://www.tsa.gov Public Domain

Chrissy

Chambers

petition

Concerns about privacy are nothing new. They’ve just become much more pronounced with the world wide web. For example…

In the 1960s, Michel Foucault observed that surveillanceis not neutral. it instills discipline by forcing self-regulation…

[https://en.wikipedia.org/wiki/Discipline_and_Punish]

Michel Foucault by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

Until recently in human history discipline focused on the body.

Public executions worked in the sense that the set clear example of the consequences for breaking rules, at the same time Foucault pointed out that these brutal methods were fraught with risk e.g. riots, freeing the prisoner, etc. Too much could go wrong given that the mood of the audience was highly unpredictable.

[https://en.wikipedia.org/wiki/Discipline_and_Punish]

Damiens before his judges - French School, (18th century) - Bibliothèque nationale de France - Public Domain

A shift to “bio-power” changed the focus from the body to the “soul”.Now interior thoughts, emotions, and patterns become the central focus of power over the individual, versus the body.

[https://en.wikipedia.org/wiki/Discipline_and_Punish]

A Clockwork Orange (1971) Warner Bros. – Fair Use

The panopticon became a metaphor for a society based on surveillance-based discipline

[https://en.wikipedia.org/wiki/Discipline_and_Punish]

Presidio Modelo prison by I, Friman, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2410607

/meet the new invaders

We talked about the NSA and its international sister agencies, but there are numerous other threats to our privacy…

Hackers and

Crackers

Target Stores 2013110 million records compromised

Anthem, 201569 million to 80 million records compromised

Home Depot, 201456 million payment cards compromised

Evernote, 2013More than 50 million records compromised

and the list goes on and on…

Our devices

Facial detection

Street view

Drones

Ad tracking

Sousveillance

(a.k.a. our

friends)

US

Artificial

Intelligence

and machine

learnng

And so much more. Now back to my mother-in-law…

How we deal

with my M-I-L

/how we deal with my M-I-L

_1 set boundaries

But in order to set boundaries we start using some new tactics and tools.

Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use

“In the

Beginning…was

the Command

Line”

Windows

Apple

GNU/Linux

Linux has

evolved…

Peng Zong’s

PRISM BREAK

The problem with most open source software is that it is just to difficult to use.

For open source tools to hit mainstream, they’ll need some design love.

Wait does this mean that I have to stop using my Mac? Or Slack? Or Photoshop?

No way. But let’s think about sketching out a personal ecosystem that sets boundaries for different kinds of data…

Hovering Art Directors @Markswi http://hoveringartdirectors.tumblr.com/

Digital free zone

Private Zone

Work ZoneMass audience / personal public relations

FinancialMedicalPolitical

Legal

FacebookGoogleInstagramPinterestLinkedin

Corporate or freelance VPN

/how we deal with my M-I-L

_1 set boundaries_2 explain the terms and conditions

Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use

Privacy pages

were an after

thought

Apple: best-of-

breed privacy

microsite

Apple: best-of-

breed privacy

microsite

Apple: best-of-

breed privacy

microsite

Apple: best-of-

breed privacy

microsite

Tim Cook is a

bad ass

How do we get away from all these intrusions?

_1 set boundaries_2 explain the terms and conditions_3 take breaks and get away

Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use

We need to go

deep

The internet is much larger than what we generally experience today. There is much to explore…

Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0

/deep web

/surface web

/dark web

Google, Yahoo!, Wikipedia

Academic records Legal recordsMedical recordsSubscription information

TOR-encrypted websitesPrivate communicationsIllegal information

The internet is much larger than what we generally experience today. There is much to explore…

Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0

Tor Browser for

MS, OSX, Linux

There is some

really bad stuff

out there

Profiles for sale

Fake cash

Fake IDs

Guns and

ammo. And far

worse.

But there’s

some good stuff

you can find

too…*

Hactivist

resumes

Anonymous

searches on

Google, Yahoo,

etc.

The dark web

has a major PR

problem

though.

And sometimes we need to simply unplug for a bit. Whether we realize it or not, we are already cyborgs.

The phone has become an extension of our bodies…

“When you tap your pockets...” - lolworthy.com

This is a thing

now…

How do we get away from all these intrusions?

_1 set boundaries_2 explain the terms and conditions_3 take breaks and get away_4 Get support (it takes a village)

What most

people think of

hackers…

Hactivists are

focused on

causes, not

destruction

Open Tech

Fund – like

Kickstarter for

hactivism

Open Tech

Fund – like

Kickstarter for

hactivism

/in summary

In summary to quote Marshall McLuhan, “We shape our tools and thereafter our tools shape us”

http://www.theguardian.com/technology/2011/jul/24/marshall-mcluhan-media-john-naughton

Rolling Stone magazine. image: http://english.mashkulture.net/2011/05/17/shepard-fairey-the-medium-is-the-massage-cover/ – Fair Use

/epilogue

Some app ideas I’m working on…

Image source: http://ilyke.co/modern-amish-or-hipster-god/49080

GrafikJam

Connecting

communication

professionals with OSS

developers

Image source: TSA.gov

TSA app

Partnership with the

TSA to improve service

and public relations

SmallTalk

Help seniors find

people to talk to 24/7.

Meanwhile

Snowden is still in

Russia

Microsoft is suing the

US Government to

protect customer

emails and online

documents

This is happening…

The TSA keep doing

what they do best…

Source: http://oathkeepers.com

And vows to change

amidst threats of

security privatization

We have resolved our

situation with our

M-I-L

Sometimes you have

to cut the chord

Source: http://dailydot.com

Insane sister-in-law

moved in with M-I-L,

keeps her occupied

Source: http://ingunowners.com

/kiitos!

Kyle OutlawTwitter: @koutlawInstagram: kyleoutlawLinkedin.l/in/koutlaw

/Photo credits

_1 Banksy by Michael Summers Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_2/7 Edward Snowden - Wired Magazine Cover by Mike Mozart Flickr (CC) Attribution 2.0 Generic (CC BY 2.0)

_3 Unplug Big Brother: NSA Spying T-Shirts - eff.org

_4 GCHQ “Doughnut” – https://en.wikipedia.org Open Government License

_5 FVEY - privacyinternational.org – Fair Use_6 Sputnik I Heart You by Ignas Kukenys- Flickr Attribution 2.0 Generic (CC BY 2.0) _8 Homeland Security Banksy – Photo by Duca di Spinaci Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_9 TSA Meme - imgflip.com

_10 Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use_11 Original Banksy at Dismaland by Stephen Allport Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_12 Google Exec Considering Internet "Hate-Checker by Day Donaldson Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)_13 Mark Zuckerberg by JD Lasica Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_14 NSA Inside - Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

/Photo credits

_14 NSA Inside - Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_14 Change.org

_15 Michel Foucault by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_16 Damiens before his judges - French School, (18th century) - Bibliothèque nationale de France - Public Domain

_17 A Clockwork Orange (1971) Warner Bros. – Fair Use_18 Presidio Modelo prison by I, Friman, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2410607

_19 "Banksy in New York" - carnagenyc Flickr (CC) Attribution 2.0 Generic (CC BY 2.0)

_20 Anonymous Hacker by Brian Klug Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

_30 Automatic face detection with OpenCV - en.wikipedia.org CC BY 3.0

_31 WTF Google Street View Blow Up Doll - http://cdn.smosh.com/

_32 Drones Attack by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)

/Photo credits

_33 Delete Cookies by Gegen Den Strich - gegen-den-strich.com/

_34 Pig-Pen by Neijo - deviantart.com

_36 Her (2013) – Warner Bros. – Fair Use

_41 Heavy tank during 8th 'Tank Day' in Military Technical Museum Lešany Adamicz - CC BY-SA 3.0

_54 Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0

_55 Deepwebtechblog posted by Abe http://deepwebtechblog.com/the-deep-web-is-not-all-dark/

_56 https://www.torproject.org/

_66 https://blog.torproject.org/blog/what-tor-supporter-looks-cory-doctorow

_68 Digitaldetox.org

_72-73 https://www.opentech.fund/

/Reference

_2 https://en.wikipedia.org/wiki/Edward_Snowden

_3 https://en.wikipedia.org/wiki/National_Security_Agency

_4 https://en.wikipedia.org/wiki/Government_Communications_Headquarters

_5 https://en.wikipedia.org/wiki/Five_Eyes_11 David Brooks quote from Snowden by Ted Ral - http://www.amazon.com/Snowden-Ted-Rall/dp/1609806352

_12 Google's Schmidt Roasted for Privacy Comments - http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html

_13 Privacy no longer a social norm, says Facebook founder - The Guardian http://www.theguardian.com/technology/2010/jan/11/facebook-privacy

_14 Reuters http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927

_17-20 https://en.wikipedia.org/wiki/Discipline_and_Punish

_24_28 Elizabeth Palermo http://www.tomsguide.com/us/biggest-data-breaches,news-19083.html

/Reference

See also:

http://www.crn.com/slide-shows/security/300077563/the-10-biggest-data-breaches-of-2015-so-far.htm/pgno/0/1

http://www.networkworld.com/article/3011103/security/biggest-data-breaches-of-2015.html

http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2015/

_29 http://www.telegraph.co.uk/technology/apple/11743790/Asking-Siri-to-charge-your-phone-dials-the-police.html

_38-41 In the Beginning…was the Comamand Line by Neal Stephenson - http://www.amazon.com/In-Beginning-was-Command-Line/dp/0380815931

_43 Prism Break website by Peng Zong https://prism-break.org/en/

_52 http://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html?_r=0

_55 Deepwebtechblog posted by Abe http://deepwebtechblog.com/the-deep-web-is-not-all-dark/

/Reference

_56 https://www.torproject.org/

_66 https://blog.torproject.org/blog/what-tor-supporter-looks-cory-doctorow

_68 Digitaldetox.org

_72-73 opentechfund.org

_76 http://www.theguardian.com/technology/2011/jul/24/marshall-mcluhan-media-john-naughton

/Acknowledgments

Special thanks to IXDA and the amazing technical crew at IXD16 in Helsinki. Also shout out to Razorfish, Christian Wallin at Form Stories.