When it comes to privacy and surveillance, our intuitions fail us. Our vulnerability is distributed, continuously changing and with significant impact. Through individual and collective actions, including a repertoire of digital and policy approaches, we can mitigate adverse tendencies.
2. Take away – Course 3
• Legal surveillance at unprecedented scale
• Borderline practices & breaches increase risks
• We often have an illusion of anonymity “for all practical purposes”
• Our digital traces enable mass-scale profiling
• Example: China’s “social credit score”
• Our metadata is data
• Identification is possible through easily available metadata patterns
• We have an illusion of control on our data flows
• Aggressive harvesting of private data
• Involuntary disclosures through legitimate intersected & aggregated data
• Breaches
• Privacy by design
3. Overview
Limits of individual intuitions
• Surveillance scale
• Population-wide processing
• Individualized-level data
• Time: durability
• Distributed vulnerability
• Concentrated power
• Impact
• Individual level
• Nudging, persuasion, manipulation
• (Invisible) discrimination
• Social level: elections
• Cultural level: the “hidden curriculum”
Importance of collective action
• Individual resistance
• Monitoring data flows
• Restricting data flows
• Collective action
• Addressing distributed
vulnerability
• Collective observation
• Exit, voice, loyalty
6. Scale
• Cambridge Analytica
• Psychological profiles of
voters – OCEAN model
• Approximatively 5,000 data
points on 220 million
Americans
• Behavioral microtargeting =
individualized advertising
with emotionally charged
content
7. Source: Goldberg, L. R. (1990). An alternative “description of personality”: The big-five factor structure. Journal of Personality & Social Psychology, 59, 1216–1229. From:
https://catalog.flatworldknowledge.com/bookhub/5?e=carpenter-ch02_s01
8. Profiling is…
the new normal
• Data harvesting
• Digital traces across platforms and
devices
• Online & offline integration
• Shadow profiles for non-users
• Profiling = Business as usual
• Platforms = infrastructure
13. nsfers observed between locations of Lumen users (left) and third-party server locations (right). Traffic frequently crosses international boundaries.
Power:
Concentration
21. Social impact
• Aggregated impact: elections
• Governmental policy: China’s citizen score
• Emerging social inequality
23. Cultural:
The hidden
curriculum
Your ID for a cookie…
Our data in exchange for better
treatment
• Customer loyalty becomes one
input of many for retailer
loyalty
• Our value changes with age,
family status, disease etc
• Product & price anxieties
• Data anxieties
24. Limits of our intuitions – take away
• Our vulnerability is distributed
• Our vulnerability is continuously changing
• Through our ageing
• Through their changing algorithms
• Individual vulnerabilities aggregate in…
• Social impact
• Cultural impact: normality of exchanging data for service
50. Importance of collective action – Take away
• Individual resistance must be networked with our significant others
• Because our vulnerability is distributed
• Collective action
• Developing and sharing protective tools
• Competition: encouraging alternative platforms & privacy solutions
• Voice
• Reporting breaches, threats, dark patterns
• Protesting our and others’ discrimination
• Protesting policies
• Supporting policies – such as support for the GDPR
51. References
• Narseo Vallina-Rodriguez, Srikanth Sundaresan. 2017. 7 in 10
smartphone apps share your data with third-party services
• Sean O'Kane. 2018. China will ban people with poor ‘social credit’
from planes and trains
• Maya Wang. 2017. China’s Chilling ‘Social Credit’ Blacklist
• Zeynep Tufekci, Facebook’s Surveillance Machine, New York Times,
2018