The Power of Privacy – documentary film

The Guardian
28 Jan 201628:45

Summary

TLDRThis documentary explores the evolution of privacy in the digital age, examining how technology has transformed our concept of personal space and security. From the invention of the chimney to the internet's open data, the film investigates the implications of our growing digital footprint. The host undergoes various challenges, including being stalked, hacked, and living in a smart home, to understand privacy in the 21st century. The script also discusses the importance of proactive data management and the need for robust cybersecurity measures to protect personal and corporate information.

Takeaways

  • 🔒 Digital privacy is often overlooked until a significant breach occurs, yet our increasingly connected world necessitates a reevaluation of how we approach privacy.
  • 🏠 Historically, privacy evolved from communal living spaces to personal rooms with the advent of the chimney, reflecting a growing appreciation for personal space and confidentiality.
  • 📸 The right to privacy was legally established in the late 1800s after intrusive photographs of high society were published without consent.
  • 📱 Rapid advancements in technology have outpaced our legal and societal understanding of privacy, particularly with devices that can broadcast personal information globally.
  • 🕵️‍♂️ Professional digital detectives can gather extensive personal information from publicly available online sources, highlighting the extent of our digital footprint.
  • 🌐 Geographic disparities in privacy awareness and security measures exist, with regions like the Middle East lagging behind in information security compared to Europe or the US.
  • 💻 Hacking demonstrations reveal how easily personal credentials can be stolen through phishing and spoofed websites, underscoring the need for vigilance.
  • 🔗 The consequences of hacking can range from destructive data breaches to uncovering corporate vulnerabilities that can be addressed for improvement.
  • 🗜️ Metadata, such as location and communication patterns, can reveal intimate details about individuals, even without accessing the content of their communications.
  • 🌐 The internet has become a vast marketplace for personal data, with companies trading information that was once considered private.
  • 🌏 Community-driven projects like SafeCast demonstrate the potential for technology to empower individuals to collect and control their own data for the collective good.

Q & A

  • What is the main focus of the film discussed in the script?

    -The main focus of the film is to explore digital privacy in the 21st century by undertaking various challenges around the world.

  • How has the concept of privacy evolved historically according to the script?

    -Historically, privacy evolved from communal living spaces to personal spaces with the invention of the chimney, and later with technological advancements, privacy concerns transitioned to digital spaces.

  • What is the role of Max, the professional digital detective, in the script?

    -Max is consulted to demonstrate how much personal information can be gathered from publicly available online sources using just a person's name.

  • What is the significance of the chimney in the context of privacy discussed in the script?

    -The chimney is significant as it allowed people to have personal spaces where they could lock themselves and their belongings, marking the beginning of an appreciation for privacy.

  • How does the script illustrate the potential of using personal information for psychological leverage?

    -The script illustrates this by showing how Max uses publicly available information to create a detailed profile that could be used to influence or manipulate an individual.

  • What is the 'right to privacy' mentioned in the script, and how was it established?

    -The 'right to privacy' refers to the legal concept that protects an individual's personal information from being publicly disclosed without their consent, which was established in the late 19th century by Warren and Brandeis.

  • How does the script suggest that companies often handle information policy?

    -The script suggests that companies often handle information policy as an afterthought, focusing on development first and addressing privacy concerns later.

  • What is the potential risk of having a large digital footprint as discussed in the script?

    -The potential risk of having a large digital footprint includes the possibility of being stalked, hacked, or having personal information used for malicious purposes.

  • What is the Morris worm mentioned in the script, and what was its impact?

    -The Morris worm was an early computer worm that exposed vulnerabilities in the internet, causing significant disruption and damage in 1988.

  • How does the script describe the process of hacking a computer?

    -The script describes hacking a computer through social engineering, such as using a fake website that looks like a legitimate one to trick a user into revealing their credentials.

  • What is the importance of metadata according to the script?

    -Metadata is important because it can reveal patterns about an individual's behavior, such as when they are at home or who they communicate with, which can be valuable for profiling and surveillance.

  • How does the script suggest that companies can protect themselves from cyber threats?

    -The script suggests that companies can protect themselves by implementing awareness training, using strong password policies, and being cautious of suspicious links or offers.

  • What is the potential of the Internet of Things (IoT) discussed in the script?

    -The script discusses the potential of IoT to make our lives easier by automating tasks and providing convenience, but also highlights the need for considering privacy and security in their design.

Outlines

00:00

🔒 The Evolution and Battle for Digital Privacy

The script discusses the historical context of privacy, from communal living spaces to the invention of the chimney that allowed personal space. It then transitions to modern concerns with digital privacy, emphasizing the lack of synchronization between technological advancements and privacy laws. The narrator describes a journey to understand privacy in the digital age, including being stalked, hacked, and living in a smart home that monitors every move. The script also touches on the ease with which a professional digital detective can uncover personal information just from a name, highlighting the vulnerability of our digital footprint.

05:02

💻 Hacking History and Modern Cyber Threats

This section delves into the history of hacking, from early telegraph pranks to modern cyber threats. It discusses how hacking has evolved with technology, leading to significant events like the Morris worm and the Love Letter worm. The script then shifts to a practical demonstration of hacking, where the narrator's computer is compromised to show the ease of cyber attacks. The discussion continues with the vulnerability of corporations to such attacks and the importance of awareness and preparedness, concluding with the annual gathering of hackers in Las Vegas to exchange skills and techniques.

10:06

🌐 The Power and Peril of Digital Surveillance

The script explores the potential for surveillance through digital means, discussing how companies can be vulnerable to hacking and the potential consequences of such breaches. It includes a penetration test scenario where hackers exploit human nature and the desire for free products to infiltrate corporate systems. The discussion then turns to the importance of awareness training and the recognition that convenience often comes at the cost of security. The narrative also touches on the challenges of removing information from the internet once it's been leaked, using the example of Barbara Streisand's attempt to remove images that backfired and increased their visibility.

15:08

📡 Community Tech and the Collective Good

This part of the script focuses on how technology can be harnessed for collective good, using the example of SafeCast, a community-built Geiger counter used to map radiation levels after the Fukushima nuclear disaster. It discusses the importance of privacy in data collection and how SafeCast ensures the anonymity of its volunteers. The script also touches on the broader implications of the Internet of Things (IoT), suggesting that while it holds great potential, it also requires careful consideration of privacy and data management.

20:11

🏠 Smart Homes: The Future of Convenience and Privacy

The script discusses the rise of the Internet of Things (IoT) and its potential applications in smart homes. It explores the benefits of IoT in terms of convenience and efficiency, particularly for an aging population. However, it also raises concerns about privacy implications, as smart homes collect vast amounts of personal data. The discussion includes potential security risks, such as hackers gaining access to personal information, and the need for developers and consumers to prioritize privacy in the design and use of IoT devices.

25:15

🌟 The Crossroads of Digital Advancement and Privacy

In this final section, the script reflects on the crossroads we face as digital systems become more integrated into our lives. It raises questions about the permanence of data storage, the need for regulation, and how we can protect our digital legacy. The discussion emphasizes the importance of ethical data use and the responsibility each individual and business has in managing their security. The script concludes by highlighting that while digital systems offer significant advantages, we must be vigilant in how we manage and regulate them to safeguard our privacy.

Mindmap

Keywords

💡Digital privacy

Digital privacy refers to the right of individuals to have control over their personal information, particularly in the digital world. It is a central theme of the video, as it explores how advancements in technology have made it increasingly difficult to maintain control over one's personal data. The script mentions digital privacy in the context of celebrity nude leaks and corporate email scandals, highlighting the potential consequences of privacy breaches.

💡Digital footprint

A digital footprint is the trail of data left by an individual's online activities. The video script uses the term to describe the vast amount of information that can be gathered about a person based on their online presence. It's illustrated when the digital detective uses the narrator's name to find numerous personal details, showing how much of our lives we willingly share online.

💡Hacking

Hacking is the unauthorized access to computer systems with the intent to exploit or cause harm. The video discusses hacking as a significant threat to digital privacy, providing historical context from the first phone line hackers to modern-day cyber attacks. It also shows how easily a person's computer can be hacked, emphasizing the need for better security measures.

💡Data breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The script mentions the devastating consequences of data breaches for businesses, such as financial losses and damage to reputation. It serves as a reminder of the importance of robust cybersecurity measures to protect sensitive data.

💡Cybersecurity

Cybersecurity encompasses the technologies, processes, and practices designed to protect systems, networks, and data from cyberattacks. The video emphasizes the importance of cybersecurity, especially with the increasing reliance on digital systems. It suggests that companies often prioritize development over security, leading to potential vulnerabilities.

💡Internet of Things (IoT)

The Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. The video discusses IoT in the context of smart homes and the potential privacy implications of these devices collecting personal data.

💡Smart home

A smart home is a residence that uses IoT technology to provide domestic services that are convenient, efficient, and sometimes conscious of the residents' needs. The video explores the concept of smart homes, suggesting that while they can improve quality of life, especially for the elderly, they also pose potential privacy risks due to the data they collect.

💡Metadata

Metadata is data that describes other data, providing information about a certain piece of data's context. In the video, metadata is discussed in relation to digital communications, such as phone calls and messages, where it can reveal patterns and habits, such as when a person is likely to be at home, even if the content of the communication is encrypted.

💡Cryptography

Cryptography is the practice and study of secure communication in the presence of third parties. The video touches on the historical use of cryptography, such as by potters in the Middle East to protect their glaze formulas, and its importance in protecting sensitive information in the digital age.

💡Data protection

Data protection involves safeguarding stored data from unauthorized access, use, or disclosure. The video highlights the importance of data protection, especially in the context of businesses handling sensitive customer information. It suggests that companies need to have policies in place from the start to control their data footprint.

💡Digital侦探

A digital detective is a professional who specializes in investigating cybercrimes and protecting online reputations. In the video, the digital detective demonstrates how much personal information can be gathered legally and ethically, highlighting the ease with which our digital privacy can be compromised.

Highlights

Digital privacy is often overlooked until high-profile leaks occur.

The level of connectedness on the internet has reached unprecedented levels.

Privacy in the 21st century is under scrutiny through various challenges.

Historical perspective on privacy shows a shift from communal living to personal spaces.

The chimney as a revolutionary technology that allowed for personal space.

The rich have always had better control over their privacy.

The birth of the right to privacy through a legal case in 1890s Boston.

Modern technology has put personal information at risk despite privacy laws.

A professional digital detective can gather extensive personal information from public sources.

Social media footprints can reveal personal habits and locations.

Online data can be used to create psychological leverage.

Companies often prioritize technology over information policy.

Data breaches can have devastating consequences for businesses.

Historical hacking incidents reveal the evolution of cyber threats.

Hackers today are both a threat and a valuable asset to corporations.

A simple typo in a URL can lead to a full system compromise.

Hackers can exploit USB devices to gain access to computers.

Awareness training is key to preventing cyber attacks.

Incident-handling plans are crucial for businesses facing data breaches.

Ancient practices of cryptography highlight the long-standing need for confidentiality.

The Kama Sutra recommended encrypting lovers' messages for privacy.

21st-century data is exploited by governments and corporations.

Preventative techniques for digital privacy are taught by organizations like Tactical Tech.

Metadata can reveal patterns about individuals, such as locations and habits.

Companies are not transparent about their use of metadata.

Trading data is not new, but the internet has amplified its scale.

SafeCast uses community-built Geiger counters to map radiation levels after Fukushima.

Smart homes are being developed with a focus on health and safety, particularly for the aging population.

The Internet of Things (IoT) is expanding into various industries, raising privacy concerns.

Smart homes can track activities and habits, potentially leading to privacy breaches.

IoT devices need to consider security at the design level to ensure privacy.

As IoT becomes more prevalent, ethical use of data will be crucial for its success.

The responsibility for security and privacy starts with individuals and businesses.

Transcripts

play00:04

Digital privacy doesn't always make headline news

play00:07

unless celebrity nudes are leaked

play00:10

or compromising corporate emails are made public.

play00:13

But our relationship to the internet has reached

play00:16

an unprecedented level of connectedness.

play00:19

In this new environment, the state of privacy deserves a closer look.

play00:24

In this film I'm going to travel the world to undergo challenges

play00:28

that will explore our digital life in the 21st century.

play00:32

I'll be stalked, I'll be hacked, I'll fight to get leaked documents back.

play00:37

I'll dive into open data and then I'll live in a futuristic home that will monitor my every move.

play00:44

All to examine 21st century privacy.

play00:48

But how did we get here?

play00:49

Before the 1600s most people's homes were communal.

play00:52

Life orientated around a central fireplace.

play00:55

There was very little privacy or personal space.

play00:59

And then a revolutionary new technology, the chimney.

play01:04

People could lock themselves and their things in personal spaces.

play01:07

They began to appreciate their privacy

play01:09

and expect that what happened behind closed doors stayed there.

play01:14

The rich have always had better control over their privacy.

play01:17

In 1890s Boston, Warren and Brandeis were attorneys for the high society.

play01:23

So, the next tech innovation came along.

play01:26

Their clients had grown accustomed to letting their hair down

play01:29

behind closed doors.

play01:30

When photos of their parties landed on the front-pages of gossip rags,

play01:35

they were suitably outraged and sued them.

play01:37

They won and the right to privacy was born.

play01:43

Now, that was fine until the next big tech innovation came along

play01:47

and put a device into our homes and our pockets

play01:49

that lets us air our dirty laundry to the world.

play01:53

Our attitudes and the law haven't caught up yet.

play02:00

I'm in Los Angeles to meet Max, a professional digital detective,

play02:04

who works with businesses and celebrities to protect their online reputations.

play02:08

I gave him just my name and then challenged him

play02:11

to gather as much information about me

play02:13

from what I'd willingly shared online.

play02:17

- You ready to go through the box? - I'm a bit nervous, to be fair.

play02:20

Let's walk you through it. This is scratching the surface.

play02:25

This is essentially a couple of hours of work.

play02:28

That's pretty deep.

play02:30

You have a pretty sizeable digital footprint

play02:32

and most of this represents media that you put out yourself.

play02:35

You might say to me, "Well, my life is an open book, I'm not worried about you revealing any information."

play02:40

But if I'm looking to get you to do something you might not want to do,

play02:45

I'm going to use anything at my disposal

play02:48

to create some sort of psychological leverage.

play02:52

- All right. What is that? - No we get into your social media footprint.

play02:56

Right. OK.

play02:57

These are all terrible pictures that I took with silly hair and...

play03:01

Lots and lots of selfies.

play03:03

And places that you go that you yelp about.

play03:06

Did I yelp?

play03:08

So your physical location starts to reveal itself, documenting yourself

play03:10

and capturing clues that you might not have intended.

play03:12

All of this I've intended. Absolutely all of this I've intended.

play03:16

You've got a grin on your face. That says we're about to dive into...

play03:20

Yes. OK. So now we're getting...

play03:23

How did you find all of my addresses?

play03:27

Because you did a registration. Because you signed a document.

play03:32

Your previous addresses, pieces of ownership.

play03:35

- Yes. - And photographs from the inside.

play03:37

Wow. Oh, my gosh.

play03:39

- Because now that's on Airbnb. - A walk-through of your spaces.

play03:43

Yes. My assets.

play03:45

I'm gaining more and more personal information, including...

play03:48

That's my business addresses, tax exemptions,

play03:52

all of my company business.

play03:54

Yes. Your worth. Your finances.

play03:58

This goes into a larger question

play04:00

of how companies are treating their technology and their policy

play04:03

if they even have a policy.

play04:05

In many cases I've seen it's an afterthought.

play04:08

In start-up mode, many companies, they hire their developers

play04:12

and then the information policy comes much, much later.

play04:16

But doing it from the beginning, as you can see when you register that domain,

play04:20

when you start creating these corporations, you're starting that footprint.

play04:23

You need to control that from the beginning

play04:26

And so what we're looking at here is a pile of things that have been indexed

play04:30

Then, over time, as software gets more sophisticated, they'll get more searchable and obtainable.

play04:35

We cast long digital shadows

play04:37

imagine the footprint left by a business with hundreds of employees all with the company email address

play04:43

all contributing to the online reputation.

play04:45

And this is just data willingly put in the public domain.

play04:48

But what happens when data that isn't for public consumption ends up in the wrong hands?

play04:53

Information we assume is secure: like financial details,

play04:57

credit card numbers, health records, business correspondence,

play05:02

When a business falls victim to a sensitive data breach the consequences can be particularly devastating.

play05:09

In order to get a better idea of this threat, I'm going to face it head on.

play05:13

I'm going to get my Guardian computer hacked.

play05:18

The first hacker struck at a live telegraph event in 1903.

play05:22

John Fleming was not at all pleased that prankster and magician Nevil Maskelyne

play05:26

chose to insert insulting Morse code into his fancy demo.

play05:31

Modern-day hacking started with a phone line.

play05:33

Freakers, as they were known, spent the 1970s making free international phone calls.

play05:39

In 1981, however, the first freaker was convicted in the US for hacking,

play05:44

but this hack helped to expose the holes in the phone system.

play05:48

In 1988 the Morris worm hit an early version of the internet,

play05:52

exposing vulnerabilities in this technology.

play05:55

In 2000 the Love Letter worm infected 10% of the world's internet-connected computers,

play06:01

causing almost $9 billion in damages worldwide.

play06:05

It was a casually created joke by two friends in the Philippines.

play06:10

In recent years the new breed of geeks are being hired by governments, financial systems and corporations

play06:16

to both attack and defend.

play06:19

In order to get a better idea of this threat, I'm travelling to Las Vegas.

play06:23

Here, annually, for the past 20 years international hackers have been gathering

play06:28

to show off their skills and to exchange techniques.

play06:32

We already know what can be learned about me through a legal search,

play06:35

but what can be uncovered with specialist skills?

play06:39

With my Guardian computer I'm visiting two hackers, can they hack my laptop?

play06:45

What is the security situation like in the Middle East, say, compared with Europe or the US?

play06:50

I think the whole region is somewhere between 5 to 10 years behind,

play06:55

as far as awareness of the importance of information security.

play06:59

Mainly because the media doesn't really talk about it.

play07:01

In the States, you turn on any TV channel

play07:04

and there's a story about a big hack because these things happen and are publicised.

play07:08

Yes, I've just got an email from my director.

play07:11

He says there's a good article on the front-page of the Guardian.

play07:15

So... Oh, Lord, there's nothing but bad news down here, is there?

play07:19

- That's the world for you. - It is, isn't it?

play07:25

Except there's a cool picture from NASA.

play07:28

As you're browsing through the Guardian,

play07:30

I just stole your credentials, so I have your email address... .com

play07:34

and the password is...

play07:37

- which is a nice Guns N' Roses song. - Thank you very much!

play07:39

I'm actually compromising your whole machine. I could have downloaded files.

play07:44

I could do a rickroll, which is redirecting your browser.

play07:48

- Never Gonna Give You Up. - I just sent you to Rick Astley.

play07:52

You did.

play07:54

How did you crack my computer?

play07:55

The website you're on is not actually the Guardian.

play07:58

It looks like the Guardian.

play07:59

No it is, but if you look at it carefully, which people don't really do, on the URL,

play08:03

it actually says "theguardlian", so I added an "L" in there.

play08:07

- Yes, I... - Yes, you did. It was added?

play08:11

No, I actually registered the website, the guardlian.com.

play08:14

- That's available? - It was. Not any more.

play08:17

And so I cloned a live version of the actual Guardian website,

play08:22

so you wouldn't know you're not there.

play08:24

No, it looks exactly, I mean, it looks like the Guardian.

play08:26

It's enough to take control of your whole computer

play08:29

because you actually gave me access, just clicking on the link.

play08:32

I clicked through to the link

play08:35

from a person who sent me an email whom I trust.

play08:38

Well, your Facebook, your LinkedIn is out there

play08:42

and we can find out who you're associated with.

play08:44

Then we can get their email out of their LinkedIn or Facebook.

play08:47

It's a very easy fake.

play08:49

Is it as easy to do this to company computers?

play08:52

It's probably easier because out of 100 or 1,000 people,

play08:55

you know, it's more than probable that at least some of them will click the link.

play08:59

Every year, international hackers converge in Las Vegas

play09:02

to attend a series of conferences - Def Con, BSides and Black Hat.

play09:06

Over a few weeks they exchange the latest hacking and security tricks and techniques.

play09:12

We're here in Vegas, kind of in the belly of the beast.

play09:15

Are there any examples of this kind of exploitation happening in the wild?

play09:22

Sure, in the old days, and by old days I mean five years ago,

play09:25

we used to do a lot of USB-based attacks

play09:28

where we would drop them around parking lots and that was really common.

play09:32

So what I want you to do is plug that in.

play09:36

For one, you don't ever want to stick anything into your computer

play09:39

that you don't actually know what it is.

play09:42

At this point I can do anything I want to your computer.

play09:46

I can do a key logger. I can download and upload files.

play09:51

You can see here that we're here in the C:/Users/Aleksdirectory.

play09:55

We noticed you have some business files and some personal files.

play09:59

- I do, yes. - We're going to go ahead and download those

play10:02

to our computer.

play10:05

I don't want you to have that.

play10:08

Now we can do a lot of things.

play10:10

I could take screen shots from your camera.

play10:12

- Of me? - Of you.

play10:13

We can record the sound.

play10:15

And then we're able to download a file to your computer.

play10:20

It's moving.

play10:22

And set it to your desktop background.

play10:25

That's a fantastic picture, guys.

play10:29

- I've been hacked. - Correct.

play10:32

What about for corporations? How are they vulnerable with this kind of thing?

play10:35

We've done a number of penetration tests where we've gone to our local computer store.

play10:40

We've bought 10 or 20 keyboards and slotted one of these devices in

play10:43

in every single keyboard and packed them up in a box and just sent them to the company.

play10:47

And what we've done is put a fake letter in there that says,

play10:50

"Hey, we're from HP. We want you to check out our new keyboard.

play10:54

"We're hoping if we give you these 20 free models

play10:56

"you'll buy 10,000 of them down the road because they're so great.

play11:00

"Please try these out."

play11:02

Nobody resists free stuff.

play11:03

If you make it expensive enough and nice enough, people will use it.

play11:08

But humans are humans. Is there anything companies can do?

play11:11

I would say basically it's awareness training.

play11:13

You can have all the firewalls you want

play11:15

and all the password policies.

play11:17

If they're just going to get online and click on any link, then it renders all that moot.

play11:22

Sometimes we have to sacrifice some convenience for safety.

play11:26

If it's too good to be true, either in an email format

play11:29

or something you found or something somebody sent you, it probably is.

play11:35

Wow! It was quite unsettling to see how easy it was to get hacked.

play11:39

But the consequences of getting hacked aren't always destructive.

play11:42

Sometimes it ends up exposing corporate vulnerabilities or flaws

play11:46

that a business can address and improve upon.

play11:49

Certainly from this hack the Guardian will be more astute with its domain registration.

play11:53

Thankfully none of my personal or the Guardian's business data was subsequently leaked online.

play11:59

But what if it had been?

play12:00

How can we start to take control?

play12:03

And what can we do to get information we never wanted to be on the internet removed?

play12:10

There are clearly examples where taking action to remove content from the internet

play12:13

can have negative consequences.

play12:16

So, there's an example where Barbara Streisland had some photos

play12:19

of her beachfront property published online in a public archive.

play12:22

She tried to sue the photographer to take the images down

play12:25

and the result of that was a much larger public outcry.

play12:28

And the image went effectively viral online as a result of the action she'd taken.

play12:32

So the very first thing is just to be conscious that if you've put something on the internet

play12:36

there's no guarantee that it stays secure and under your control.

play12:41

I think companies need to have some sort of incident-handling plan

play12:44

to know when something does occur, and it will,

play12:47

how they are going to respond to that so it isn't a panic in the business at that time.

play12:51

I guess what we see in many companies is that they've moved to adopt the new technologies

play12:55

because they bring business benefit, but they've not thought through - necessarily - the risks.

play12:59

How do you ensure that information doesn't make you vulnerable?

play13:03

It really depends where the data is, so if it's linked through somewhere like Google, Twitter, Facebook,

play13:10

there are removal procedures you can go through.

play13:12

But if your data is on a Russian hacker site somewhere,

play13:16

they're unlikely to respond to a take-down request.

play13:18

The best you can do is try to mitigate the consequences.

play13:22

So, for businesses and individuals, once the information is out,

play13:26

it seems nearly impossible to take back control of it.

play13:31

Since the earliest days of human communication, we quickly learn the importance of confidentiality.

play13:38

It's been good business.

play13:40

3,000 years ago in the Middle East potters used cryptography

play13:43

to keep their glaze formula secret from competitors.

play13:47

Particularly during conflict.

play13:49

Protecting correspondence has always been of the utmost importance.

play13:54

But it wasn't just military and business information we sought to protect.

play13:58

In 400 BC the writers of the Kama Sutra recommended that lovers encrypt their messages

play14:04

to keep them from prying eyes.

play14:07

Now in the 21st century we're exchanging more business and personal information than ever before,

play14:13

though we've relinquished control of this data to governments and corporations.

play14:19

Often instead of safekeeping this material, we've found that they're exploiting it.

play14:26

To learn about preventative techniques my next stop is Berlin where I'm meeting Stephanie Hankey.

play14:32

Her organisation provides tips, tools and techniques to individuals, such as journalists and activists

play14:37

whose lives depend upon retaining control of their digital privacy.

play14:43

If you're interviewing people, it may be just as important for you as a journalist that somebody from the outside

play14:48

can't see who you're talking to.

play14:49

Let's say about a phone call that we might have, we might think it needs to be encrypted,

play14:53

so people don't know what we're talking about.

play14:55

And sometimes that's true but very often what's more important is that we're having a conversation,

play14:59

but also we talked last week and that today we talked for an hour.

play15:03

That's metadata.

play15:05

What other forms of data might be collected about me?

play15:08

You know, for expample, if you're walking around a city, in order for the phone to know where you are,

play15:11

to look at a map, you have to have location data on.

play15:14

If you look on your iPhone, in the System Services section...

play15:17

Lo and behold, down, somewhere buried in the menu.

play15:22

There's a frequent locations. Most people are quite surprised when they look at it

play15:25

because it gives a kind of overview of something. For example, it even It guesses what your home is.

play15:29

When you start to look at the patterns,

play15:31

then you can start to see things like probably when you come into the house after work,

play15:35

when you leave in the morning. Those kind of things.

play15:37

You can't stop that but what you can do sometimes is switch location services off, for example.

play15:41

So what are companies doing with this metadata?

play15:43

These companies are not yet very transparent about what they're doing with the data.

play15:46

Some of that is profiling and advertising and so on but some of it has gone much further.

play15:51

For example, LinkedIn is also using their large-scale analysis of the data

play15:55

to advise governments and that becomes very complicated

play15:59

because people are not thinking they're contributing to that sample.

play16:02

In the modern world, a huge amount of a information is collected about each of us

play16:06

as we go about our daily lives.

play16:08

Whether we disclose it willingly or unwittingly, this valuable data is now a commodity

play16:13

that is traded amongst a handful of companies.

play16:17

Trading data is hardly a new thing.

play16:20

We've always benefitted from sharing information.

play16:23

It's helped to advance civilisation.

play16:25

The internet is the latest in a long line of technologies

play16:28

that have ushered in great innovations and social change.

play16:32

Trade routes introduced mathematics and astronomy from Arabia,

play16:36

weapons and vaccinations from China

play16:38

and spices and philosophies from the subcontinent.

play16:41

The printing press blew apart traditional hierarchies,

play16:44

letting the people interpret and proclaim, rather than those in power.

play16:48

The telegraph brought the world infinitely closer together,

play16:52

totally disrupting business, governance and the judicial system.

play16:55

And every step of the way the powers that be tried to claw back control.

play17:01

Today there are three-billion people communicating through the internet.

play17:04

This latest network has given each of us the empowering ability

play17:08

to collaborate, share and exchange information rapidly and efficiently.

play17:15

What if there was a way to harness it for the collective good?

play17:19

I'm headed to Japan where I'm going to volunteer to test radiation levels

play17:23

using a community-built Geiger counter.

play17:27

I'll use my data to help map the fallout of the Fukushima nuclear disaster.

play17:34

After the disaster in March 2011, information about radiation hazards

play17:38

that was being released by the government

play17:40

was at best incomplete, often contradictory

play17:44

and ultimately not really reliable.

play17:47

So we felt it was one thing to say,

play17:50

"My government tells me radiation level is X. I guess I'll believe it."

play17:55

Or to go and measure it yourself.

play17:57

I mean, if you measure it yourself, then you really can have confidence in that data.

play18:00

So, SafeCast was really formed to allow citizens

play18:03

themselves to gather the information they needed and to disseminate it in a very free way.

play18:09

SafeCast Geiger kits are open-source.

play18:11

Through building the devices themselves, people learn how the technology works

play18:16

and as a consequence many have offered both hardware and software improvements.

play18:20

This has helped to rapidly evolve the design.

play18:24

People from all sorts of walks of life participate: anti-nuclear, pro-nuclear, teachers, housewives

play18:30

anyone can build it and submit data.

play18:33

How can organisations wisely protect the data that they're collecting?

play18:37

I think the most important thing that we found the need to protect is privacy.

play18:41

For instance, the privacy of volunteers. We allow them to participate anonymously.

play18:46

In Fukushima Prefecture there was concern that people

play18:50

would have radiation levels in their front yard publicised

play18:55

and that this could somehow affect them negatively

play18:57

and because of that, we decided to use a hardware hack

play19:01

to allow them to put the data in a grid of 100 metres

play19:05

that doesn't identify that data spot with a particular person's property.

play19:10

How much of Japan has been mapped?

play19:12

We argue that we have been able to provide a wider coverage

play19:16

of radiation surveys than the government has

play19:18

and this isbecause of the activities of very active volunteers.

play19:22

Certainly, Fukushima has been repeatedly mapped for three years or more.

play19:24

But there still are a few corners no volunteers have been to,

play19:29

so today we can go to a park in Koto Ward,

play19:32

called Kiyosumi Park, and we can check that out.

play19:40

We're looking at 0.1 microsieverts per hour.

play19:43

This is about normal. Pretty average for Tokyo.

play19:46

How does that compare though with, say, somewhere like the epicentre of the accident?

play19:51

This is a piece of a deck that one of our volunteers was building

play19:55

when the disaster happened in the town of Koriyama,

play19:57

which is one of the fairly radioactive places in Fukushima.

play20:03

- Woo! Listen to that! - Yes.

play20:05

You can hear it. It's like a scary noise.

play20:07

It's already now 10 times what it was...

play20:10

- This is a very radioactive sample. - That is significantly higher.

play20:14

And this is the degree of fallout that was everywhere in that area.

play20:17

Inside the highly radioactive places in Fukushima Daiichi reactor itself,

play20:22

it's 1,000 times higher, or more.

play20:25

We're getting to a point where technically, because of the hardware and software tools,

play20:29

things that were previously only possible

play20:32

if you were a government or a large research institution, now a highschool kid can do.

play20:38

This is going to get better, quicker, easier and cheaper.

play20:41

We are trying to show the potential of that.

play20:44

This is an example of the agile development organisations can use

play20:48

when they open up and engage their contributors.

play20:51

By introducing privacy measures, SafeCast has built confidence in their project

play20:55

and trust amongst their collaborators.

play20:57

This is an increasingly important consideration, as by 2020 it's estimated that there will be 30-billion things

play21:04

connected to the internet.

play21:07

I'll explore the privacy and data implications

play21:10

by spending 24 hours in a technology-laden smarthome.

play21:18

Technology liberates us to pursue things we would rather be doing.

play21:21

It always has done.

play21:23

Back in Iran, agriculture technologies let us domesticate barley, wheat and lentils,

play21:28

so we didn't have to constantly travel to put food in our stomachs.

play21:31

We've spent our lives since then looking to reduce the heavy lifting.

play21:35

The Industrial Revolution meant hand-production methods

play21:38

were given over to machines.

play21:40

People could move to the city where the new middle class could find other pursuits.

play21:45

When automation hit the scene we also gave the heavy thinking to these machines

play21:49

and they've become twice as smart every two years.

play21:53

We've travelled to space and 20 years later we have the same smarts in our pockets.

play21:58

We are now freer to want. Want cheaper and faster.

play22:03

We allow machines to do more of our work for us.

play22:05

70% of all trades made on the US stock market in 2011

play22:08

were made by algorithms, not people.

play22:13

We autofill, we store in the cloud, we find love with a swipe right.

play22:17

Algorithms and artificial intelligences process this information for us.

play22:24

However, today it seems we serve computers.

play22:27

Most of us spend more time gazing into our four-inch screens

play22:30

than into the eyes of our loved ones.

play22:33

Smartphones are setting us an endless stream of to-dos and check lists.

play22:38

In an attempte to alleviate this, companies are creating new connected products

play22:42

to sense, learn and ultimately predict our every need.

play22:45

Collectively, these products are known as IOT or the Internet Of Things.

play22:55

You may have heard of domestic applications of IOT -

play22:58

curtains that raise with you in the morning,

play23:00

fridges that restock themselves, but what about the toilets that check your health

play23:05

and notify you if you're pregnant?

play23:08

IOT is expanding across industries, from manufacturing to gardening,

play23:13

from energy to mobility.

play23:15

It's estimated that presently 1% of everything that could be connected to the internet is.

play23:22

Imagine a world where the other 99%

play23:24

are also constantly sensing, storing and communicating data

play23:30

about every aspect of our lives.

play23:32

What kind of hardware systems does the smarthome use?

play23:35

There are three kinds. First is the sensor to collect personal data.

play23:41

Second the data of the internal network of the house

play23:44

This is the tate of the network connectoin inside and outside of the house.

play23:48

How do you see smart homes changing people's lives in the future?

play23:52

We believe the keyword is health

play23:54

Now the technology of sensor has developed so we can collect data of each individual.

play24:01

We can research the causes of illness and accidents at home.

play24:06

By utilising the data we can develop the technology for safety and health.

play24:12

So in Japan a primary motivation for this technology

play24:16

is to provide a safer and more efficient environment,

play24:18

particularly for their ageing population.

play24:21

But are there any drawbacks?

play24:23

I just had the experience of being in a smarthome.

play24:26

Are there any potential privacy implications that I should be worried about?

play24:31

I think that there are already a number of privacy implications,

play24:35

just because it's possible to use various sensors

play24:39

to track your activities, to track your habits.

play24:41

In some cases, I have heard of incidences where you have a smarthome

play24:45

where there will be a camera built into a device

play24:48

to allow for various metrics to be measured.

play24:51

But unwittingly allowing hackers to, say, peer into your living room

play24:54

and so everything is a two-sided coin where there are pros,

play24:58

but if the security isn't addressed, they could easily be used for a con

play25:02

and people fail to realise that.

play25:06

Would you live in a smarthome or work in a smartoffice?

play25:10

Me, personally, I would love to because then I can get my hands dirty on all the devices -

play25:14

test them, find out issues.

play25:16

- Hack them. - Yes!

play25:19

But as a normal user, I would still be a little sceptical

play25:23

of what kind of devices I deploy.

play25:25

Because the vendors want to reach to the market quickly,

play25:29

they're not giving as much attention to the security.

play25:32

They just want to quickly build it up and ship it.

play25:35

So that's where the major problem lies.

play25:37

And then there are three major attacks that we are going to see.

play25:41

One is the controlling app, the mobile, the client side.

play25:44

One is the device itself.

play25:46

And one is the cloud where the whole user data is going to be saved.

play25:50

So we have to be very careful on what kind of data is being saved

play25:53

and how it is being saved.

play25:55

As soon as this gets mass adoption at the levels it will

play25:59

and as soon as more data gets online,

play26:02

how that's protected, how that could be erased,

play26:05

how that could be forgotten -

play26:06

these issues, at least from a Japan context, has not been debated.

play26:10

Around the world they're being addressed,

play26:12

but I think we're still in the infancy stage of what that really means.

play26:15

What should businesses be aware of when they're implementing IOT strategies?

play26:20

When you deal with IOT it's not an IT issue,

play26:25

it is a management and risk issue, it involves the entire company.

play26:29

With that said, it's very, very important

play26:31

that you do cyber security at the design level,

play26:34

like the automobile or the airplane.

play26:38

If you think about it, these are designed security first

play26:41

in a transparent, background manner, and that's where we need to get to.

play26:48

There's little doubt that the Internet Of Things is the future

play26:52

because we've sought out and embraced ways to make our lives easier.

play26:56

But it's clear developers and consumers

play26:58

need to think about privacy and not just as an afterthought.

play27:03

It might be useful for navigation for my car to know my location,

play27:06

but does it need access to my social media accounts?

play27:11

Does the information that is collected by these devices

play27:13

need to be stored forever?

play27:16

If most of us strive to live in the moment,

play27:18

then perhaps so too should our data.

play27:21

With these devices entering our homes and offices,

play27:24

building trust through ethical use of our personal and professional data

play27:28

will become crucial for these technologies to truly succeed.

play27:35

So as we adopt digital systems and products to make our lives easier

play27:39

we each produce exponential amounts of data about ourselves and our businesses.

play27:44

Some we willingly share but much of it we unwittingly contribute.

play27:49

We are incresingly placing our trust in third parties

play27:53

- does the data that's already out there need to be stored permanently?

play27:58

Do we need regulation to ensure encryption and data decay?

play28:02

How can we protect our legacy from being exposed and used against us?

play28:08

The responsibility for our security starts with us.

play28:11

It's the domain of personal and professional management.

play28:15

Today we are at a crossroad: adopting these systems give us a huge advantage,

play28:20

but we must take stock in how we manage and regulate them to protect us as individuals and as businesses.

Rate This

5.0 / 5 (0 votes)

関連タグ
Digital PrivacyCybersecurityInternet HistoryHackingData BreachSmart HomesInternet of ThingsCryptographyInformation AgePrivacy Control
英語で要約が必要ですか?