1 of 51

META DATA AS SURVEILLANCE

HOW INTERNET ADS �DESTROYED OUR PRIVACY

COMS401.55 S18: KATY ANDERSON�bit.ly/MetaDataAsSurveillance

2 of 51

QUESTIONS

  1. How do we define privacy in a digital age?
  2. Do you care that your information is being collected and stored, �why or why not?
  3. Do you trust the algorithms that are being used?

3 of 51

AGENDA

  1. HOW YOU ARE BEING TRACKED
  2. WHO IS TRACKING YOU
    1. CORPORATIONS
    2. GOVERNMENTS
  3. WHY SHOULD YOU CARE
  4. CAN YOU OPT OUT

4 of 51

You are �being tracked

5 of 51

6 of 51

7 of 51

We're building a dystopia just to make people click on ads�– Zeynep Tufekci

8 of 51

How advertising cookies let observers follow you across the web

9 of 51

“THE INVISIBLE WEB”

10 of 51

11 of 51

Who is tracking you

12 of 51

13 of 51

CORPORATIONS

14 of 51

15 of 51

You are not their customer, you are what they sell.

16 of 51

DATA BROKERS

17 of 51

  • Browsing history, including “private browsing”
  • Social media history: Text, photos and networks
  • Geolocation: Where you go, when, and with who
  • Online shopping history
  • Credit history
  • Health history
  • Present and previous addresses
  • Etc.

Dossiers �of online and offline information

18 of 51

19 of 51

GOVERNMENTS

20 of 51

21 of 51

22 of 51

23 of 51

24 of 51

25 of 51

Metadata and the third-party doctrine

Based on a set of 1970s rulings that hold that people who voluntarily give information to third parties — such as banks, phone companies and internet service providers (Rogers, Bell Telus, Shaw), or social media and e-mail servers — have "no reasonable expectation of privacy."

26 of 51

“More fundamentally, it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks ... I would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection.”

U.S. Supreme Court Justice Sonia Sotomayor, 2013

27 of 51

28 of 51

29 of 51

CCTV

30 of 51

Jill Magid’s Evidence Locker

31 of 51

32 of 51

33 of 51

Why should you care?

34 of 51

Price Discrimination

35 of 51

36 of 51

37 of 51

38 of 51

Okay. So,

Can you opt out?

39 of 51

WHERE WE ARE NOW

“If you’re not comfortable with your data being used, don’t use the service.”

40 of 51

Alternate options

  • Email services that don't code for advertisements
  • Browsers that mask your Internet Protocol (IP) address
  • Virtual Private Networks
  • Secure cloud storage
  • Use HTTPS Everywhere
  • Ad tracker trackers

  • Search engines that don't save your searches (DuckDuckGo instead of Google)
  • Be aware of sharing geolocation (Smartphones, maps, Angry Birds, Flashlight)
  • Alternative operating systems
  • Credit card in different name
  • Signal blocking pouch for phone

41 of 51

“PRIVATE BROWSING” … ?

42 of 51

Tor

43 of 51

44 of 51

45 of 51

Use a Virtual Private Network

46 of 51

Use an ad blocker

47 of 51

Disconnect shows the different sources of tracking — what services are following you around the site.

The more informed you are, the more you can decide who you want tracking you.

48 of 51

Privacy isn’t dead, but...

Is privacy �a luxury good?

49 of 51

50 of 51

DISCUSSION

Do you care that your information is being collected and stored, why or why not? Is the convenience worth being tracked?

Do you trust the algorithms that are being used?

How do we define privacy in a digital age?

51 of 51

REFERENCES

Angwin, J. (2014). Dragnet Nation. New York, NY: Times Books, Henry Holt and Company LLC

Disconnect. (n.d.). Retrieved October 19, 2015, from https://disconnect.me/

Do not track. Retrieved from https://donottrack-doc.com/

Finn, Jonathan. “Surveillance Studies and Visual Art: An Examination of Jill Magid’s Evidence Locker.” Surveillance & Society 10(2), 2012: 134-149. http://www.surveillance-and-society.org | ISSN: 1477-7487.

Ghostery. (n.d.). Retrieved June 10, 2018, from https://www.ghostery.com/en/why-ghostery/tracker-basics/

Jackson, J. (2017, January 08). Eli Pariser: Activist whose filter bubble warnings presaged Trump and Brexit. Retrieved from https://www.theguardian.com/media/2017/jan/08/eli-pariser-activist-whose-filter-bubble-warnings-presaged-trump-and-brexit

Koen, V. (2014, September 13). Getting to know you: Everything people do online is avidly followed by advertisers and third-party trackers. The Economist. Retrieved from http://www.economist.com/news/special-report/21615871-everything-people-do-online-avidly-followed- advertisers-and-third-party

Newell, Bruce Clayton. “The Massive Metadata Machine: Liberty, Power, and Secret Mass Surveillance in the U.S. and Europe.” A Journal of Law and Policy for the Information Society 10(2), 2014: 481-522.

Mosco, V. (2014). Chapter 5: Big data and cloud culture. In To the Cloud: Big Data in a Turbulent World, 175 - 226. Retrieved from http://site.ebrary.com.ezproxy.lib.ucalgary.ca/lib/ucalgary/reader.action?docID=10865335

Tor Project. Retrieved from https://www.torproject.org/about/overview

Is Privacy becoming a luxury good? Retrieved from https://www.youtube.com/watch?v=zEfJY3JkacA

Invisible Web: What it is, Why it exists, How to find it, and Its inherent ambiguity. (n.d.). Retrieved October 19, 2015, from http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html ��Zomorodi, M. (2015, Sept 9). Why online shoppers see different prices for the same item. (Audio podcast) Retrieved from http://www.wnyc.org/story/dynamic-pricing-price-optimization-discrimination/