Law in the Internet Society

View   r15  >  r14  >  r13  >  r12  >  r11  >  r10  ...
TWikiGuestFirstEssay 15 - 07 Oct 2020 - Main.ClaireCaton
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Deleted:
<
<
The Internet Society’s Nuclear Option

In class, we have discussed the importance of privacy and the risks of surveillance in an era of increasingly sophisticated behavior recording, prediction, and manipulation. As a society, we are becoming increasingly entrenched in a burgeoning ecosystem of surveillance capitalism.

Many agree that a fundamental redirect is in order; the broadly unregulated, widespread capture of behavioral data should be restricted or even prohibited worldwide. Ideally, we might even eliminate all previously collected behavioral information

However, as I reflect upon the current state of the Internet Society, I cannot ignore the nonzero possibility that the war to preserve the privacy of behavioral data and prevent sophisticated behavioral influence has already been lost.

Within Google’s servers alone lay my proudest academic works, intimate secrets from my darkest moments, my tasks for the day, my plans for the year, a scatterplot of my social footprint, an extensive record of my movements, and contact information for every human I know. Facebook, Amazon, and Bank of America hold powerful data profiles of me as well. Add to that datasets compiled by the U.S. government and other state entities.

I write this as a relatively well informed, well educated, and concerned citizen. My dismal tale of ignorant surrender and subsequent inaction is all too common. Around the globe various corporate and government entities hold massive troves of personal information regarding billions of humans.

Unfortunately, the deletion of this behavioral data strikes me as a functional impossibility. Such valuable digital information will not be destroyed by force. Considering the power of the parties who hold it and the existential threat that deletion would present, they will not cooperate either. We must also consider the general lack of support for such action at this time and the logistical difficulties inherent in such an effort. Accordingly, I assume that the behavioral data that has been collected will remain indefinitely.

Next, I consider the possibility that we can limit the capture of behavioral data to its present state.

Even if I completely unplug today, I have already leaked extensive information. The power of this data in combination with present-day tools is evident in societal changes as fundamental as declining sex drive and the swaying of national elections.

With such immense value, behavioral-data-driven tools will continue to advance even in the absence of new data collection.

The best-case scenario appears to be an incremental slowdown of behavioral data collection over several years with significant dissent by parties that are unmoved by widespread concern and have sufficient leverage to withstand external pressures (e.g. Communist Party of China).

Considering these dynamics, I am concerned that a data-collection slowdown may be insufficient to eliminate threats of social control. Accordingly, it seems prudent to consider an alternate plan of action in case of continued progression into a surveillance-centric ecosystem.

Society’s current path is one in which the Parasite with the Mind of God is under construction…or simply undergoing perpetual renovations. Theorists such as Ray Kurzweil and Nick Bostrom believe that society is en route to creating superintelligent artificial intelligence, a digital system that is capable of outperforming humanity in all intellectual endeavors. Such a machine strikes me as the natural conclusion of a society in a feedback loop of data capture for observation, analysis, and influence.

Bostrom further claims that superintelligent A.I. “is the last invention that man need ever make” as it may execute any further self-enhancements and will be sufficiently intelligent to thwart attempts at intervention.

If we continue on this path, we must decide who should be in control of this ultimate project and what procedures will guide the decision-making process.

At present, the frontrunners in the race for big data and sophisticated machine learning seem to be Big Tech and national governments. Neither group embodies the goals or procedures that I want guiding such a project of ultimate importance.

Both are shrouded in secrecy and exist within competitive spaces that cultivate racing behavior. “Move fast and break stuff.” “It’s better to ask for forgiveness that to request permission.” As these tools become more powerful and the societal impact more drastic, such behavior becomes increasingly dangerous.

To avoid a future shaped by today’s likely candidates and their inherent flaws, I advocate the establishment of a socialized multinational AI research project that is subject to public input and oversight and is less constrained by capitalist and political forces. A unified global public project strikes me as the best opportunity to cultivate sufficient resources to surpass the efforts of Big Tech and national governments.

Even if such a project were initiated imminently, the hour is late and the competition is fierce. Thus, drastic action must be considered. Legislation granting data portability rights could be extremely helpful, allowing individuals to obtain their personal data from service providers and, in turn, share that information with the socialized project. Similarly, legislation that protects adversarial interoperability in the software industry could catalyze transitions away from predatory products upon which the public has become dependent. If necessary to achieve competitive dominance, further data collection on a consensual basis may be pursued.

While the collection and processing of behavioral information is inherently risky, an international socialized model may greatly reduce the risks of our present private and national models.

I do not advocate any surrender in the fight for privacy. I simply support the development of contingency plans. An arms race is afoot in both the private and public sector with many convinced that surveillance is the key to future dominance. In humanity’s failure to denuclearize, I see an inability of modern society to relinquish powerful tools of control and I fear that digital surveillance may be similarly destined to proliferate.

 \ No newline at end of file
Added:
>
>
1st draft of the 1st essay
 \ No newline at end of file

TWikiGuestFirstEssay 14 - 11 Jan 2020 - Main.JieLin
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
The Internet Society’s Nuclear Option

TWikiGuestFirstEssay 13 - 12 Oct 2019 - Main.AndrewIwanicki
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Changed:
<
<
Even before I walk into the apartment where I am babysitting the family is watching me. They’re not home but they see me on the “Ring” and text, “I see the nanny let you in.” Suddenly they appear on their video Alexa without warning and without me answering to explain the bedtime procedures for their 3-year-old. At bedtime she wants to listen to music. Almost immediately her parents have turned it on from their phones. While sitting at a concert 60 blocks south they ignore Billy Joel, instead watching and listening to their daughter and me.
>
>
The Internet Society’s Nuclear Option
 
Changed:
<
<
Constant parent surveillance started in my generation. Friends got busted for lying about their whereabouts when their parents tracked their phones. Sneak in after curfew? Good luck. Your phone, the “Ring,” the cameras inside are the nosiest neighbors. For concerned parents the gadgets of the internet age allow for a type of helicoptering like never before.
>
>
 
Changed:
<
<
What if we told these concerned parents that with a few lines of python anyone can watch? Or that there are websites listing webcams that are set to the default passwords (or without passwords) that anyone on the internet can access?
>
>
In class, we have discussed the importance of privacy and the risks of surveillance in an era of increasingly sophisticated behavior recording, prediction, and manipulation. As a society, we are becoming increasingly entrenched in a burgeoning ecosystem of surveillance capitalism.
 
Added:
>
>
Many agree that a fundamental redirect is in order; the broadly unregulated, widespread capture of behavioral data should be restricted or even prohibited worldwide. Ideally, we might even eliminate all previously collected behavioral information
 
Changed:
<
<

Hacking is Easy

>
>
However, as I reflect upon the current state of the Internet Society, I cannot ignore the nonzero possibility that the war to preserve the privacy of behavioral data and prevent sophisticated behavioral influence has already been lost.
 
Changed:
<
<
Accessing someone’s unsecured webcam isn’t difficult and sites like Shodan and Insecam make this easier. Bots randomly scan for unsecured devices, something that can be done across the entire internet in a matter of hours. If one runs a quick search on Shodan she can find a slew of web servers that use the username and password admin/admin or that can be accessed through a password found by googling “manufacturer default credentials.” These default credentials are conveniently assembled on ispyconnect.com’s “user guide.” Still other cameras can be accessed through known vulnerabilities such as Boa webcams. Boa has a vulnerability that allows you to reset the admin password. In 2015, security firm Rapid tested nine popular baby monitors for security. Eight of the nine got an F, the ninth a D minus. Despite the reporting on this in 2015, nothing has changed.
>
>
Within Google’s servers alone lay my proudest academic works, intimate secrets from my darkest moments, my tasks for the day, my plans for the year, a scatterplot of my social footprint, an extensive record of my movements, and contact information for every human I know. Facebook, Amazon, and Bank of America hold powerful data profiles of me as well. Add to that datasets compiled by the U.S. government and other state entities.
 
Changed:
<
<
There have been accounts of mothers catching hackers hijacking the cameras. One mother noticed her baby monitor moving without anyone controlling it. She realized it was scanning the room and landing on her bed. Everyone who was supposed to have control was in the same room not moving the device. Others reported their baby monitors talking. One particularly disturbing case involves a hacker yelling at babies on baby cams.
>
>
I write this as a relatively well informed, well educated, and concerned citizen. My dismal tale of ignorant surrender and subsequent inaction is all too common. Around the globe various corporate and government entities hold massive troves of personal information regarding billions of humans.
 
Changed:
<
<
If peeping Toms on the internet are watching through baby monitors, what comes next? Surely those who lived in Stalin’s Soviet Union would find bringing a device into your home that anyone can access foolish. Even if you aren’t worried about your own government, there is nothing stopping other countries from peeping too. This can allow for more targeted advertising, election campaigning, perfect price discrimination. Even if governments or companies aren’t themselves watching, the dangers of commodification of personal information are real.
>
>
Unfortunately, the deletion of this behavioral data strikes me as a functional impossibility. Such valuable digital information will not be destroyed by force. Considering the power of the parties who hold it and the existential threat that deletion would present, they will not cooperate either. We must also consider the general lack of support for such action at this time and the logistical difficulties inherent in such an effort. Accordingly, I assume that the behavioral data that has been collected will remain indefinitely.
 
Changed:
<
<
The dangers of these insecure devices goes beyond concerns of creeps or the hypothetical 1984 sounding concerns of the government or companies watching, they can bring down the internet. In 2016 DNS provider Dyn was attacked by Mirai botnets which took down sites including Netflix, Twitter, and Spotify largely using IoT? devices (such as baby monitors) infected with malware. Hackers took complete control of the monitor. Further, baby monitors can grant a hacker access to the home network to get information from computers.
>
>
Next, I consider the possibility that we can limit the capture of behavioral data to its present state.
 
Added:
>
>
Even if I completely unplug today, I have already leaked extensive information. The power of this data in combination with present-day tools is evident in societal changes as fundamental as declining sex drive and the swaying of national elections.
 
Changed:
<
<

The Law

>
>
With such immense value, behavioral-data-driven tools will continue to advance even in the absence of new data collection.
 
Changed:
<
<
As is common with the law and the internet, the law hasn’t caught up with the baby monitors. Some have noted the right to privacy should apply here. What is more of a violation of privacy than someone watching you in your bedroom? Seeming natural applications of existing laws don’t go far enough to solve the problem. While applying peeping Tom laws to those watching over baby monitors could prosecute some people and give some justice to victims, avoiding prosecution wouldn’t be hard and it wouldn’t solve the problem. Security experts have proposed other solutions including regulation of baby monitors, allowing victims to sue the baby monitor companies, and hacking back.
>
>
The best-case scenario appears to be an incremental slowdown of behavioral data collection over several years with significant dissent by parties that are unmoved by widespread concern and have sufficient leverage to withstand external pressures (e.g. Communist Party of China).
 
Changed:
<
<
Security experts have called on the government to get involved by regulating IoT? devices. Mikko Hypponen, chief research officer for F-Secure, for example, compared leaking WiFi? passwords to devices catching on fire: it shouldn’t happen and the government should make sure it doesn’t. Experts have proposed civil and criminal penalties for creating unsecure devices and laws requiring buyers to change the default password before the device can be used. Others, however, believe regulation would be useless because U.S. regulations won’t affect other countries.
>
>
Considering these dynamics, I am concerned that a data-collection slowdown may be insufficient to eliminate threats of social control. Accordingly, it seems prudent to consider an alternate plan of action in case of continued progression into a surveillance-centric ecosystem.
 
Changed:
<
<
Some have proposed allowing victims of baby monitor hacks to sue manufacturers or sellers of the monitors. The Mirai attack shows the widespread hacking of these devices and suggests the possibility of a class action suit. If companies are hit with hefty fines they would be incentivized to send shoddy security for IoT? devices the way of lead paint.
>
>
Society’s current path is one in which the Parasite with the Mind of God is under construction…or simply undergoing perpetual renovations. Theorists such as Ray Kurzweil and Nick Bostrom believe that society is en route to creating superintelligent artificial intelligence, a digital system that is capable of outperforming humanity in all intellectual endeavors. Such a machine strikes me as the natural conclusion of a society in a feedback loop of data capture for observation, analysis, and influence.
 
Changed:
<
<
Still others have proposed a more radical solution: hacking back. Rob Graham, security researcher and hacker, suggested the NSA launch a proactive strike to knock compromised IoT? devices offline. Graham sees this as a solution to U.S. legislation being useless overseas. While that may be true, there are likely other Constitutional concerns with the NSA hacking into people’s devices to knock them offline.
>
>
Bostrom further claims that superintelligent A.I. “is the last invention that man need ever make” as it may execute any further self-enhancements and will be sufficiently intelligent to thwart attempts at intervention.
 
Added:
>
>
If we continue on this path, we must decide who should be in control of this ultimate project and what procedures will guide the decision-making process.
 
Changed:
<
<

Conclusion

>
>
At present, the frontrunners in the race for big data and sophisticated machine learning seem to be Big Tech and national governments. Neither group embodies the goals or procedures that I want guiding such a project of ultimate importance.
 
Deleted:
<
<
This paper discussed the security concerns of hackers accessing baby monitors and what this could mean for commodification of personal data and access by companies and governments as well as widespread attacks. Other concerns with baby monitors go beyond the scope of this paper: children growing up constantly surveilled and the ethics of spying on your babysitter, to name a couple. Parents have begun to worry about sharing about their children on Instagram. A class action suit is currently going against Disney for scraping data from children’s video games. It is time parents become concerned about the safety devices they bring into their homes.
 \ No newline at end of file
Added:
>
>
Both are shrouded in secrecy and exist within competitive spaces that cultivate racing behavior. “Move fast and break stuff.” “It’s better to ask for forgiveness that to request permission.” As these tools become more powerful and the societal impact more drastic, such behavior becomes increasingly dangerous.

To avoid a future shaped by today’s likely candidates and their inherent flaws, I advocate the establishment of a socialized multinational AI research project that is subject to public input and oversight and is less constrained by capitalist and political forces. A unified global public project strikes me as the best opportunity to cultivate sufficient resources to surpass the efforts of Big Tech and national governments.

Even if such a project were initiated imminently, the hour is late and the competition is fierce. Thus, drastic action must be considered. Legislation granting data portability rights could be extremely helpful, allowing individuals to obtain their personal data from service providers and, in turn, share that information with the socialized project. Similarly, legislation that protects adversarial interoperability in the software industry could catalyze transitions away from predatory products upon which the public has become dependent. If necessary to achieve competitive dominance, further data collection on a consensual basis may be pursued.

While the collection and processing of behavioral information is inherently risky, an international socialized model may greatly reduce the risks of our present private and national models.

I do not advocate any surrender in the fight for privacy. I simply support the development of contingency plans. An arms race is afoot in both the private and public sector with many convinced that surveillance is the key to future dominance. In humanity’s failure to denuclearize, I see an inability of modern society to relinquish powerful tools of control and I fear that digital surveillance may be similarly destined to proliferate.

 \ No newline at end of file

TWikiGuestFirstEssay 12 - 08 Oct 2019 - Main.AyeletBentley
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Changed:
<
<
Even before I walk into the apartment where I am babysitting the family is watching me. They’re not home but they see me on the “Ring” and text, “I see the nanny let you in.” Suddenly they appear on their video Alexa without warning and without me answering to explain the bedtime procedures for their 3-year-old. At bedtime she wants to listen to “Uncle Moishe.” Almost immediately her parents have turned it on from their phones. While sitting at a concert 60 blocks south they ignore Billy Joel, instead watching and listening to their daughter and me.
>
>
Even before I walk into the apartment where I am babysitting the family is watching me. They’re not home but they see me on the “Ring” and text, “I see the nanny let you in.” Suddenly they appear on their video Alexa without warning and without me answering to explain the bedtime procedures for their 3-year-old. At bedtime she wants to listen to music. Almost immediately her parents have turned it on from their phones. While sitting at a concert 60 blocks south they ignore Billy Joel, instead watching and listening to their daughter and me.
 Constant parent surveillance started in my generation. Friends got busted for lying about their whereabouts when their parents tracked their phones. Sneak in after curfew? Good luck. Your phone, the “Ring,” the cameras inside are the nosiest neighbors. For concerned parents the gadgets of the internet age allow for a type of helicoptering like never before.

TWikiGuestFirstEssay 11 - 08 Oct 2019 - Main.AyeletBentley
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Added:
>
>
Even before I walk into the apartment where I am babysitting the family is watching me. They’re not home but they see me on the “Ring” and text, “I see the nanny let you in.” Suddenly they appear on their video Alexa without warning and without me answering to explain the bedtime procedures for their 3-year-old. At bedtime she wants to listen to “Uncle Moishe.” Almost immediately her parents have turned it on from their phones. While sitting at a concert 60 blocks south they ignore Billy Joel, instead watching and listening to their daughter and me.

Constant parent surveillance started in my generation. Friends got busted for lying about their whereabouts when their parents tracked their phones. Sneak in after curfew? Good luck. Your phone, the “Ring,” the cameras inside are the nosiest neighbors. For concerned parents the gadgets of the internet age allow for a type of helicoptering like never before.

What if we told these concerned parents that with a few lines of python anyone can watch? Or that there are websites listing webcams that are set to the default passwords (or without passwords) that anyone on the internet can access?

Hacking is Easy

Accessing someone’s unsecured webcam isn’t difficult and sites like Shodan and Insecam make this easier. Bots randomly scan for unsecured devices, something that can be done across the entire internet in a matter of hours. If one runs a quick search on Shodan she can find a slew of web servers that use the username and password admin/admin or that can be accessed through a password found by googling “manufacturer default credentials.” These default credentials are conveniently assembled on ispyconnect.com’s “user guide.” Still other cameras can be accessed through known vulnerabilities such as Boa webcams. Boa has a vulnerability that allows you to reset the admin password. In 2015, security firm Rapid tested nine popular baby monitors for security. Eight of the nine got an F, the ninth a D minus. Despite the reporting on this in 2015, nothing has changed.

There have been accounts of mothers catching hackers hijacking the cameras. One mother noticed her baby monitor moving without anyone controlling it. She realized it was scanning the room and landing on her bed. Everyone who was supposed to have control was in the same room not moving the device. Others reported their baby monitors talking. One particularly disturbing case involves a hacker yelling at babies on baby cams.

If peeping Toms on the internet are watching through baby monitors, what comes next? Surely those who lived in Stalin’s Soviet Union would find bringing a device into your home that anyone can access foolish. Even if you aren’t worried about your own government, there is nothing stopping other countries from peeping too. This can allow for more targeted advertising, election campaigning, perfect price discrimination. Even if governments or companies aren’t themselves watching, the dangers of commodification of personal information are real.

The dangers of these insecure devices goes beyond concerns of creeps or the hypothetical 1984 sounding concerns of the government or companies watching, they can bring down the internet. In 2016 DNS provider Dyn was attacked by Mirai botnets which took down sites including Netflix, Twitter, and Spotify largely using IoT? devices (such as baby monitors) infected with malware. Hackers took complete control of the monitor. Further, baby monitors can grant a hacker access to the home network to get information from computers.

The Law

As is common with the law and the internet, the law hasn’t caught up with the baby monitors. Some have noted the right to privacy should apply here. What is more of a violation of privacy than someone watching you in your bedroom? Seeming natural applications of existing laws don’t go far enough to solve the problem. While applying peeping Tom laws to those watching over baby monitors could prosecute some people and give some justice to victims, avoiding prosecution wouldn’t be hard and it wouldn’t solve the problem. Security experts have proposed other solutions including regulation of baby monitors, allowing victims to sue the baby monitor companies, and hacking back.

Security experts have called on the government to get involved by regulating IoT? devices. Mikko Hypponen, chief research officer for F-Secure, for example, compared leaking WiFi? passwords to devices catching on fire: it shouldn’t happen and the government should make sure it doesn’t. Experts have proposed civil and criminal penalties for creating unsecure devices and laws requiring buyers to change the default password before the device can be used. Others, however, believe regulation would be useless because U.S. regulations won’t affect other countries.

Some have proposed allowing victims of baby monitor hacks to sue manufacturers or sellers of the monitors. The Mirai attack shows the widespread hacking of these devices and suggests the possibility of a class action suit. If companies are hit with hefty fines they would be incentivized to send shoddy security for IoT? devices the way of lead paint.

Still others have proposed a more radical solution: hacking back. Rob Graham, security researcher and hacker, suggested the NSA launch a proactive strike to knock compromised IoT? devices offline. Graham sees this as a solution to U.S. legislation being useless overseas. While that may be true, there are likely other Constitutional concerns with the NSA hacking into people’s devices to knock them offline.

Conclusion

This paper discussed the security concerns of hackers accessing baby monitors and what this could mean for commodification of personal data and access by companies and governments as well as widespread attacks. Other concerns with baby monitors go beyond the scope of this paper: children growing up constantly surveilled and the ethics of spying on your babysitter, to name a couple. Parents have begun to worry about sharing about their children on Instagram. A class action suit is currently going against Disney for scraping data from children’s video games. It is time parents become concerned about the safety devices they bring into their homes.

 \ No newline at end of file

Revision 15r15 - 07 Oct 2020 - 19:31:03 - ClaireCaton
Revision 14r14 - 11 Jan 2020 - 18:38:04 - JieLin
Revision 13r13 - 12 Oct 2019 - 00:11:36 - AndrewIwanicki
Revision 12r12 - 08 Oct 2019 - 12:52:49 - AyeletBentley
Revision 11r11 - 08 Oct 2019 - 00:54:27 - AyeletBentley
Revision 10r10 - 07 Oct 2019 - 04:22:41 - EungyungEileenChoi
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM