Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Blurred lines: Surveillance and ethics

789 Aufrufe

Veröffentlicht am

Presentation delivered to the Bar Association of Sri Lanka (BASL), on 21 March 2017.

Veröffentlicht in: Technologie
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Blurred lines: Surveillance and ethics

  1. 1. Blurred lines: Surveillance and ethics Sanjana Hattotuwa
  2. 2. –Time Berners-Lee, 12 March 2017 Political advertising online needs transparency and understanding It’s too easy for misinformation to spread on the web We’ve lost control of our personal data
  3. 3. Youyou Wu and Michal Kosinski
  4. 4. Post-privacy world?
  5. 5. Everyone a suspect
  6. 6. Investigatory Powers Act 2016 or Snoopers’ Charter
  7. 7. • ISPs and mobile phone providers will keep a record of every website visit of anyone using a British network for up to a year. This includes sites visited through mobile browsers and phone apps (like Facebook) - but not individual web pages. • The data will be stored by the network that collected it, but police and many government departments will be able to use a central search tool to find and access those records. • Searches of that data will be conducted at the discretion of the police and will be overseen by a specially trained supervising officer only. Weak judicial oversight.
  8. 8. Intermediary liability
  9. 9. Beyond oversight
  10. 10. 15th March 2014, email from a purported friend of Director of Intelligence Bureau Military Intelligence, Sri Lanka Police, CID.
  11. 11. –William Gibson “The future is already here — it's just not very evenly distributed.”
  12. 12. Data is the new oil
  13. 13. Informed consent is increasing a myth
  14. 14. Surveillance the new norm
  15. 15. Encryption vs. surveillance. Targeted ops.
  16. 16. e-NIC and revolving doors
  17. 17. Intelligence in the cloud
  18. 18. Convenience cloaks siphoning
  19. 19. when does intelligence turn into surveillance? how to maintain control over privacy within ecosystem of competing owners, location sensors, proxy indicators, sentient nodes, ambient observation, pervasive automation
  20. 20. A pawn in someone’s Matrix?
  21. 21. thank you