문서 편집 토론 이전 판 역링크 문서 이름 바꾸기 목차 암호 논쟁 - 엿보기 사회의 여명 암호기술의 의미 암호 기술 규제 수출제한 백도어와 감청 공인인증서 문제 신분확인 문화 - 엿보기 사회의 시초 익명권 실제 엿보기 사회에서 엿보기 문화로 웹에 행위가 기록되기 시작하다. 무선전화 및 스마트폰 - 휴대용 감시장치 Locationgate 이미지 인식 기술 RFID 정부가 눈을 뜨다 사회 곳곳에 감시가 이루어 지다 사물인터넷, 웨어러블 위험성 데이터의 수집, 분석, 교환 그리고 데이터 골드러쉬 소셜 네트워크 사람사이의 관계가 기록되다 정부의 관심 민주화 도구로서의 가능성 표현의 자유 보호대상에서 통제자로 인공지능, 자율주행 공유경제 대안으로서의 블록체인 법제도와 그 한계 감시사회와 사생활의 자유 상업화의 바람 속에서, 인터넷은 감시기술을 중심으로 발전합니다. 상품 판매, 망 이용대금 부여와 망 관리를 보다 효율적으로 하고자 하는 기업의 욕구는 컴퓨터에 일정한 자취 내지 기록을 남기는 방향으로 인터넷을 이끕니다. 이런 방향의 발전은 다음 단계로 맞춤형 추천 또는 광고를 위해서 개인의 인터넷 사용내역을 기록하기 시작합니다. 스마트폰의 확산으로 모든 개인은 물리적으로 기계를 소지하고 다닙니다. 그 결과 개개인의 이동 내역은 물론 건강 상태까지 모든 행동을 기록하기 시작합니다. 소셜네트워크는 개인에 대한 정보를 넘어 개인 사이의 관계에 대한 정보를 기록합니다. 개인에 대한 모든 기록은 데이터베이스화 되고 분석될 뿐 아니라, 분석 결과를 가지고 개개인을 자극하고 그 결과를 다시 기록하고 분석하여 정교하게 발전합니다. 인공지능은 이러한 사람 사이의 데이터를 분석하는데 최적화 되어 발전합니다. 이른바 기계(Mind Control Machine)가 사람의 마음을 조정할 수 있게 됩니다. 편집 암호 논쟁 - 엿보기 사회의 여명 편집 암호기술의 의미 Hal Abelson, et al., The Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption, 1998 The deployment of key recovery systems designed to facilitate surreptitious government access to encrypted data and communications introduces substantial risks and costs. Key recovery systems are inherently less secure, more costly, and more difficult to use than similar systems without a recovery feature. Eben Moglen, So Much For Savages, Comments on Encryption Policy, NYU Law School, November 19, 1998 (revised). The methods of communication are new, but the principles -in whatever language you express them, and it's your choice- are very familiar indeed. Ronald L. Rivest, Chaffing and Winnowing: Confidentiality without Encryption, MIT Lab for Computer Science, April 24, 1998. As a consequence of the existence of chaffing and winnowing, one can argue that attempts by law enforcement to regulate confidentiality by regulating encryption must fail, as confidentiality can be obtained effectively without encryption and even sometimes without the desire for confidentiality by the two communicants. David Chaum, Achieving Electronic Privacy, Scientific American, August 1992 I have developed an extension of digital signatures, called blind signatures, that can restore privacy. Before sending a note number to the bank for signing, Alice in essence multiplies it by a random factor. Recent innovations in microelectronics make this vision practical by providing personal “representatives” that store and manage their owners' pseudonyms, credentials and cash. Max Eddy, Crypto Wars: Why the Fight to Encrypt Rages On, October 10, 2016 Encryption systems are also at work in nearly every facet of modern technology, 편집 암호 기술 규제 수출제한 National Research Council, Cryptography's Role in Securing the Information Society, May 1996 U.S. national policy should be changed to support the broad use of cryptography in ways that take into account competing U.S. needs and desires for individual privacy, international economic competitiveness, law enforcement, national security, and world leadership. Encryption Export Control Regulations, 15 C.F.R. sect. 742.15, as of January 1, 1999 Licenses are required for exports and reexports to all destinations, except Canada, for items controlled under ECCNs having an “EI” (for “encryption items”) under the “Control(s)” paragraph. Anti-virus Software and Info-War, New York Times, January 30, 1997 The United States Government wants to deprive the residents of those seven nations of anti-virus software because the Pentagon has determined that it might want to use computer viruses as a weapon to attack the data centers of their governments. Head of Cyber-Terrorism Panel Says Encryption Rules May Be Needed, New York Times, November 6, 1997 the key to national security, Marsh said, is strong encryption coupled with a back-door access for law enforcement officials to sensitive communications. John Markoff, White House May Tighten Data Exports, New York Times, November 24, 1997 The Clinton Administration is debating whether to further tighten controls on the export of electronic data scrambling systems by narrowing a special exemption that has let financial institutions export the strongest encryption technology. Jeri Clausing, Congress Faces List of Internet Issues, New York Times, January 28, 1998. The bill being backed by virtually everyone but the FBI to ease export restrictions on encryption technology and prohibit any mandatory third-party decryption systems was nearly gutted in the fall Jeri Clausing, New Encryption Legislation Billed as a Compromise, New York Times, May 13, 1998. It is the first, however, to lay out comprehensive privacy protections for computer data and communications while also trying to appease law enforcement agencies by creating a new encryption research cente Jeri Clausing, Encryption Debate Heats Up in Washington, New York Times, June 9, 1998 Industry and privacy advocates are seeking legislation to lift the current export controls on strong encryption software. The administration, however, at the urging of the FBI, has insisted that any easing of export controls must be coupled with a key-recovery system Carl S. Kaplan, Is Software Like a Can Opener or a Recipe?, New York Times, July 17, 1998 Judge Gwin concluded that encryption source code is not deserving of First Amendment protection because it is not “expressive” but rather is an “inherently functional” device Bernstein v. Dept of State from EFF archive After four years and one regulatory change, the Ninth Circuit Court of Appeals ruled that software source code was speech protected by the First Amendment and that the government's regulations preventing its publication were unconstitutional. Jeri Clausing, Lawmakers Renew Encryption Battle, New York Times, February 26, 1999 Since strong encryption is widely available worldwide, efforts to control its spread through export controls will ultimately prove fruitless, benefiting no one but America's competitors Jeri Clausing, Senator Ends Opposition to Encryption Software Exports, New York Times, April 2, 1999 Senator McCain announced this week that he would join Senators Conrad Burns, Patrick J. Leahy and Ron Wyden in sponsoring a bill that would replace the Administration's current prohibitions on the export of strong encryption with a review process Jeri Clausing, Former Allies May Back Different Encryption Bills, New York Times, April 6, 1999 Sobel said the criminal provision of SAFE “creates a dangerous precedent…We feel that opens the door to more domestic controls, saying the use of this technology is a suspect activity. Peter Wayner, Court Calls Encryption Rules Unconstitutional, New York Times, May 7, 1999 the federal export regulations “operate as a prepublication licensing scheme that burdens scientific expression” and thus were prohibited by the First Amendment. Steven Lee Myers, Justice Dept. Proposes Bill to Fight Computer Encryption, New York Times, August 20, 1999 The legislation, which the department has drafted and hopes to submit to Congress soon, would allow investigators to request special permission from judges to enter suspects' homes or offices to search computers for passwords or encryption programs as a prelude to more invasive searches or wiretaps, the officials said. John Markoff, A Mysterious Component Roils Microsoft, New York Times, September 4, 1999 A cryptographer for a Canadian software firm, dissecting a piece of Microsoft security software, made an unexpected find: an element in the Windows operating system labeled “NSAKey.” Peter Wayner, Why a Small Software Label Raised Eyebrows, New York Times, September 4, 1999 Most critics are still worried about the possibility that the technique would allow whoever holds this second key to slip broken encryption software onto someone's computer. Sara Robinson, News Analysis: Internet Code-Cracking Project Shows Need for Stronger Locks, New York Times, September 6, 1999 The researchers showed only that locks of a certain strength, known as R.S.A. 512-bit encryption codes, could be broken. Jeri Clausing, White House Eases Export Controls on Encryption, New York Times, September 17, 1999 The new regulations will allow American companies to ship encryption products of any strength around the world to commercial firms, individuals and other non-government users after a one-time technical review by an interagency panel. 편집 백도어와 감청 Jeri Clausing, New Fight Over Encryption Rules, September 21, 1999 The proposal would commit $80 million over the next four years to a research center to help law enforcement agencies learn how to crack codes on their own. It would also establish a legal framework that would give investigators access to spare keys to encrypted data that are stored with third parties. In addition, it would guarantee the protection of industry trade secrets when companies assist officers trying to access the encrypted communications of suspected criminals. Bruno Giussani, Dutch Law Goes Beyond Enabling Wiretapping To Make It a Requirement, New York Times, April 14, 1998 Providers of public telecommunications networks and public telecommunications services shall not make their telecommunications networks and telecommunications services available to users unless they can be wiretapped. Reuters, Tracking of Swiss Mobile Phone Users Starts Row, InfoBeat, December 28, 1997 Swiss police have secretly tracked the whereabouts of mobile phone users via a telephone company computer that records billions of movements going back more than half a year Stephen Labaton, New Rules Expand Ability of Police to Monitor Talk on Cell Phones, New York Times, August 28, 1999 the federal government Friday announced new technical standards for cellular phones that will broadly expand the ability of law enforcement agents to monitor conversations and locate criminal suspects. Niall Mckay, European Parliament Debates Wiretap Proposal, New York Times, May 7, 1999 Enfopol would require Internet service providers, telephone companies and satellite-based communications companies to provide an electronic “back door” for law enforcement agencies to use to access communications. John Markoff, U.S. Drafting Plan for Computer Monitoring System, New York Times, July 28, 1999 a sophisticated software system to monitor activities on nonmilitary Government networks and a separate system to track networks used in crucial industries like banking, telecommunications and transportation. Tim Weiner, Author of Computer Surveillance Plan Tries to Ease Fears, New York Times, August 16, 1999 “It would not be monitoring privately owned and operated systems, only Government computers,” Mr. Clarke said. “And it would not violate people's privacy rights.” Declan McCullogh, Cell Phone Crypto Penetrated, Wired News, December 6, 1999 Because of Biryukov and Shamir's real-time attack against A5/1 and our group's 15 millisecond attack against A5/2, all the GSM voice privacy ciphers used worldwide can be broken by an attacker with just a single PC and some radio hardware, Saul Hansell, Phorm’s All-Seeing Parasite Cookie, NY Times, April 7, 2008 One interesting aspect of the plans by Phorm, a company building an advertising targeting system, is that it has found a way to make cookies do what so many feared they could: track every page you visit on the Internet. Faisal Enayat Khan, Sweden sets sights on new snoop law, The Local, June 11, 2008 If passed, the new law will enable Sweden's National Defence Radio Establishment (Försvarets Radioanstalt - FRA) to scan all the outgoing and incoming communication crossing Sweden’s borders. The legislation will also require all telecom operators in Sweden to bring their systems into line with FRA’s surveillance system. Laura Margottini, Snoop software makes surveillance a cinch, New Scientist, August 23, 2008 the system integrates tasks typically done by separate surveillance teams or machines, pooling data from sources such as telephone calls, email and internet activity, bank transactions and insurance records. It then sorts through this mountain of information using software that Siemens dubs “intelligence modules”. Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, University of Colorado Law School, August 30, 2008 ISP can necessarily access even more because it owns and operates the only point on the network which sits between a user and the rest of the Internet The new unified law should regulate all monitoringwithout distinguishing between whether the monitoring is of content or not in the merged new law, the “rights and property” and “rendition of service” exceptions should be split into incident response and long-term monitoring exception Declan McCullagh, U.N. agency eyes curbs on Internet anonymity, Cnet News, September 12, 2008 A United Nations agency is quietly drafting technical standards, proposed by the Chinese government, to define methods of tracing the original source of Internet communications and potentially curbing the ability of users to remain anonymous. Manisha Ganguly, WhatsApp vulnerability allows snooping on encrypted messages, The Guardian, 13 January 2017 WhatsApp can effectively continue flipping the security keys when devices are offline and re-sending the message, without letting users know of the change till after it has been made, providing an extremely insecure platform 편집 공인인증서 문제 강일용, 바보야, 문제는 액티브X가 아니라 공인인증서야, 아이티 동아, 2014. 3. 25. 외국 은행 대부분이 이렇게 자체 개발한 보안 방식을 적용해 삼중, 사중 보안을 취하고 있다. 반면 국내 은행은 정부가 지정해준 공인인증서에만 보안을 기대고 있다. Elaine Ramirez, South Korea's Online Banking System Is Stuck In 1996, Forbes, Nov 30, 2016 There’s protection for banks, so there’s no reason to innovate 편집 신분확인 문화 - 엿보기 사회의 시초 편집 익명권 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995) Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. Buckley v. American Constitutional Law Foundation, Inc., 525 U.S. 182 (1999) Colorado’s current badge requirement discourages participation in the petition circulation process by forcing name identification without sufficient cause. Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, UCLA Law Review, Vol. 57, p. 1701, 2010, August 13, 2009 Yet reidentification science exposes the underlying promise made by these laws that anonymization protects privacy as an empty one, as broken as the technologists’ promises. When they identify harm that outweighs these benefits, they should regulate, focusing on narrow contexts and specific sectors rather than trying to regulate broadly across industries. 개인임을 특정할수 있는 정보 개념의 발전과정과 문제점에 관하여 1731- 1741 참조. 헌법재판소 2012. 8. 23. 2010헌마47·252, 인터넷 공간에서 이루어지는 익명표현은 인터넷이 가지는 정보전달의 신속성 및 상호성과 결합하여 현실 공간에서의 경제력이나 권력에 의한 위계구조를 극복하여 계층·지위·나이·성 등으로부터 자유로운 여론을 형성함으로써 다양한 계층의 국민 의사를 평등하게 반영하여 민주주의가 더욱 발전되게 한다. 따라서 비록 인터넷 공간에서의 익명표현이 부작용을 초래할 우려가 있다 하더라도 그것이 갖는 헌법적 가치에 비추어 강하게 보호되어야 한다. Sobel, Richard, The degradation of political identity under a national identification system, Boston University journal of science & technology law, 01/01/2002 By transforming individuals' identities from the inherent qualities of persons who have and deserve dignity and general protection under the Constitution to attributes represented by numbers, cards, and places in databanks, the process degrades the moral value of political and personal identity as an intrinsic quality of personhood. 편집 실제 Peter Wayner, Traveling the Web Invisibly, Through a One-Way Mirror, New York Times, November 5, 1997 One of the most impressive such schemes is the Lucent Personalized Web Assistant developed by Yossi Matias, a researcher at Bell Labs. His software strips out personalized identifications and prevents Web sites from tracking surfers' movements or creating dossiers about them. Ian Goldberg and David Wagner, TAZ Servers and the Rewebber Network Enabling Anonymous Publishing on the World Wide Web, First Monday, April 1998 We situate around the world a number of nodes which we call “rewebbers” (collectively, these nodes are known as the “rewebber network”). Each node is essentially an HTTP proxy which understands “nested” URLs We therefore create a virtual namespace called the .taz namespace, and we create new servers called “TAZ servers” to resolve this namespace. John Schwartz, Corporate Case in Ohio Raises Questions on Internet Anonymity, New York Times, October 17, 2000 the civil liberties groups argue that at the very moment the power of the Internet is helping to create the biggest marketplace of ideas the world has ever seen, powerful companies will be able to squelch online speech by using the courts as a “private detective service” to unmask critics Associated Press, Anonymous Net Posting Not Protected, October 17, 2000 a Florida appeals court declared Monday that Internet service providers must divulge the identities of people who post defamatory messages on the Internet. Nate Anderson, "Anonymized" data really isn't and here's why not, Ars Technica, September 8, 2009 almost all information can be “personal” when combined with enough other relevant bits of data. Paul Ohm, Netflix's Impending (But Still Avoidable) Multi-Million Dollar Privacy Blunder, freedom-to-tinker.com, September 21st, 2009 The new contest is going to present the contestants with demographic and behavioral data, and they will be asked to model individuals’ “taste profiles,” the company said. T.C. Sottek, New York state lawmakers challenge anonymous online speech with proposed bill, theverge.com, May 22, 2012 New York state lawmakers Dean Murray (R) and Thomas O'Mara (R) have proposed bills that would either unmask anonymous commenters by public request, or force website administrators to delete anonymous comments. Dominic Rushe, Router That Anonymises Internet Activity Raises $300,000 on Kickstarter, The Guardian, October 14, 2014 it turns out there are a lot more regular users. 주성호, 휴대폰유통점 '신분증 스캐너' 방통위에 가처분신청,, 뉴스1,2016/12/02 정부가 이달부터 휴대폰 개통시 명의도용을 막기 위해 신분증 스캐너 사용을 의무화 편집 엿보기 사회에서 엿보기 문화로 편집 웹에 행위가 기록되기 시작하다. Amitai Etzioni, Some Privacy, Please, for E-Mail, New York Times, November 23, 1997 While statistics differ, various surveys agree that more than a third of corporations regularly monitor their employees electronically, Bill Helling, Web-Site Sensitivity to Privacy Concerns, First Monday, February 1998 the Web has become more sensitive to the privacy concerns of its users while, at the same time, increasingly resorting to the employment of privacy-threatening registration and cookies. It Isn't Just Big Brother Who Is Watching, CyberTimes, January 12, 1998 Workers in Virginia, Texas and California said they had been dismissed or disciplined for the content of their Web pages, even though the pages are maintained with their own computers, time and money Philip Shenon, Navy and America Online Settle Case on Gay Privacy, New York Times, June 12, 1998 America Online, which divulged the sailor's real name to the Navy, agreed to pay him damages for violating his privacy. Under the Navy's part of the agreement, the 36-year-old sailor will retire with full benefits and with tens of thousands of dollars to pay his legal fees. Jeri Clausing, Intel Alters Plan Said to Undermine PC Users' Privacy, New York Times, January 26, 1999 Intel.. announced last week that each of its new Pentium III chips would have an identifying serial number that would enhance the security of electronic commerce and guard against software piracy. Peter Wayner, NEWS ANALYSIS: Debate on Intel Chip Misses Piracy Issue, New York Times, January 30, 1999 We've got enough experience with Social Security numbers to know that this will become like information flypaper. Everything will stick to this number John Markoff, A Growing Compatibility Issue in the Digital Age: Computers and Their Users' Privacy, New York Times, March 3, 1999 From computers to cellular phones to digital video players, everyday devices and software programs increasingly embed telltale identifying numbers that let them interact. John Markoff, Microsoft to Alter Software in Response to Privacy Concerns, New York Times, March 7, 1999 Windows number is tied to an individual's name, to identifying numbers on the hardware in his computer and even to documents that he creates. Joel Brinkley, FTC Says GeoCities Violated Privacy Rules, New York Times, August 14, 1998 GeoCities misled its customers, both children and adults, by not telling the truth about how it was using their personal information Saul Hansell, Big Web Sites to Track Steps of Their Users, New York Times, August 16, 1998 it places a unique identifying number on the computer hard drive of every person who visits one of the participating sites. That way the system can keep track of all the sites visited by that computer, regardless of the identity of its user. David F. Gallagher, Amazon Tries to Ease Privacy Worries, New York Times, August 30, 1999 The purchase circles, which Amazon.com introduced on Aug. 20, comprise thousands of best-seller lists that enable customers to browse and see what books, music and videos are popular among various groups of people – by categories that include geography, employer, university or professional organization. Sara Robinson, CD Software Is Said to Monitor Users' Listening Habits, New York Times, November 1, 1999 RealJukebox, which can copy music to a user's hard drive and download it from the Internet as well as play it, gathers information on what music users are playing and recording. Sara Robinson, RealNetworks to Stop Collecting User Data, New York Times, November 2, 1999 The information, which includes the user's music preferences, the type of portable player installed on the computer and the number of songs stored on the user's hard drive, is tagged with a unique number, known as a Globally Unique Identifier, which is assigned to the user when the software is registered. Bob Tedeschi, E-Commerce Report: Critics Press Legal Assault on Tracking of Web Users, New York Times, February 6, 2000 Privacy concerns are increasing because DoubleClick's new Abacus Alliance service.. has begun combining its online data with information gleaned from consumers' offline purchases from major retailers, catalog companies and publishers. Jeffrey Rosen, The Eroded Self, New York Times, April 30, 2000 In cyberspace, there is no real wall between public and private. And the version of you being constructed out there - from bits and pieces of stray data - is probably not who you think you are. Wired News, Privacy Group Drops Amazon, September 14, 2000 The changes included notice that customers' personal information could be shared with other companies Constance L. Hays, What Wal-Mart Knows About Customers' Habits, New York Times, November 14, 2004 Plenty of retailers collect data about their stores and their shoppers, and many use the information to try to improve sales. Brett Winterford, Logged in or out, Facebook is watching you, ZDNet.au, December 4, 2007 social networking site Facebook is able to track the buying habits of its users on affiliated third-party sites even when they are logged out of their account or have opted out of its controversial “Beacon” tracking service. Chris Soghoian, Debunking Google's log anonymization propaganda, Cnet, Sep. 11, 2008 The simple truth is that any IP anonymization technique, no matter how strong or weak, is simply a waste of time, if cookie values are not also anonymized. Chris Jay Hoofnagle & Nathan Good, The Web Privacy Census, berkeley-center-for-law-technology, October 2012, Percentage of cookies set by a third party host : 84.7% 편집 무선전화 및 스마트폰 - 휴대용 감시장치 Andrew Brandt, Soon, Your Cell Phone May Be Tracking You, PC World, April 2004 ULocate is among the first of the new cell phone tracking services. Once you sign up, you can find a phone's last known location, see the path it has traveled, and get the average speed at which it moved from one place to another. John Leyden, Smart Phone Predicts Owner's Behavior, The Register, November, 25 2004 the “smarter smartphone” learns about people's preferences..This information would be sent to a server which processes data and returns suggestions or reminders. James Kanter, Greek cellphones tapped, International Herald Tribune, February 3, 2006 Greek government officials said Thursday that 100 cellphone lines, including one belonging to Prime Minister Costas Karamanlis, were tapped during the 2004 Athens Games. Adam Sherwin, The Facebook tool which turns your mobile phone into a snoop, Times Online UK, April 1, 2008 The Social Network Integrated Friend Finder (Sniff) is a new application, accessed via Facebook or mobile phone, which could bring an end to frantic “Where r u?” text messages. Reuters, Mexico to fingerprint phone users in crime fight, February 9, 2009 mobile phone companies will have a year to build up a database of their clients, complete with fingerprints…The plan also requires operators to store all cell phone information such as call logs, text and voice messages, for one year. Chris Soghoian, Obama's BlackBerry brings personal safety risks, CNet, February 12, 2009 The news coverage and analysis by armchair security experts thus far has failed to focus on the real threat: attacks against President Obama's location privacy, and the potential physical security risks that come with someone knowing the president's real-time physical location. Stephen Baker, Mapping a New, Mobile Internet, Business Week, February 26, 2009. The phone in your hand is the bridge between the virtual and real worlds Cade Metz, Google taps your IP address for Starbucks targeting, The Register, April 7, 2009 “When you search on Google, we will guess where you are and show results near you,” the post reads. “In most cases, we match your IP address to a broad geographical location.” Nathan Eagle, Inferring friendship network structure by using mobile phone data, National Academy of Sciences, July 1, 2009 we demonstrate the power of collecting not only communication information but also location and proximity data from mobile phones over an extended period Casey Johnston, Cell phones show human movement predictable 93% of the time, Ars Technica, Feb 23, 2010 Regardless of how widely they traveled, the researchers could adequately predict their locations, down to the specific tower, 93 percent of the time. Mike Masneck, Replay Six Months Of A German Politician's Life Thanks To His Mobile Phone Data, Techdirt, March 29, 2011 Somewhat eye-opening in how much information can be put together concerning your life with access to such phone data… David Harley, Every picture tells a story, SC Magazine, April 13, 2011 you can harvest information about someone's location at the time a picture was taken that you can build on to establish a bigger picture of their movements and activities. Mike Elgan, Snooping: It's not a crime, it's a feature, Computerworld, April 16, 2011 Host Leo Laporte and his panel shocked listeners by unmasking three popular apps that activate your phone's microphone to collect sound patterns from inside your home, meeting, office or wherever you are. Richard H. Thaler, Show Us the Data. (It’s Ours, After All.), NY Times, April 23, 2011 If a business collects data on consumers electronically, it should provide them with a version of that data that is easy to download and export to another Web site. Robert Lee Hotz, The Really Smart Phone, Wall Street Journal, April 23, 2011 People can get this god's-eye view of human behavior. 김종대, 위치기반서비스 2라운드, 실내에서도 길눈이 밝아진다, LG경제연구소, 2013. 12. 16. 개인의 니즈를 파악하기 위해서는 개인의 성향과 개인이 처한 상황에 대한 정보가 필요하다. 그 중에서도 개인이 처한 상황을 정확히 알아내는 것이 보다 중요하다. 개인이 필요로 하는 정보는 개인의 성향보다 개인이 처한 상황에 의존적이 되는 경향이 크기 때문이다 Douglas MacMillan, Foursquare Now Tracks Users Even When the App Is Closed, Wall Street Journal, August 6, 2014 Tracking user whereabouts could arm Foursquare with more valuable data it can sell to partners and advertisers as it searches for new streams of revenue. Alex Hern, Your battery status is being used to track you online, Guardian, 2 August, 2016 The combination of battery life as a percentage and battery life in seconds provides offers 14m combinations, providing a pseudo-unique identifier for each device. Sam Biddle, Apple Logs Your iMessage Contacts and May Share Them With Police, The Intercept, 2016-09-28 a list of the people you choose to associate with can be just as sensitive as your messages with those people. 김경미, KT, 로밍 정보로 해외 감염병 차단 서비스, 중앙일보, 2016. 11. 16. 가입자의 로밍 정보를 확인해 감염병 오염 국가를 방문한 고객의 정보 만을 질병관리본부에 실시간으로 제공 Violet Blue, 2016's biggest privacy threat: Your phone, engadget, 12. 16. 2016 We've been boxed into this privacy nightmare by our smartphones, which literally don't allow us to have a functional phone unless we formally agree to its legally binding Terms of Service. 편집 Locationgate Charles Arthur, iPhone keeps record of everywhere you go, The Guardian, April 20, 2011 Security researchers have discovered that Apple's iPhone keeps track of where you go and saves every detail of it to a secret file on the device which is then copied to the owner's computer when the two are synchronised. Declan McCullag, Android data tied to users? Some say yes, CNET, April 22, 2011 That depends in large part on whether Google anonymizes the location information and device ID that it collects from Android devices–and, especially, how long data is kept. Declan McCullagh, Microsoft collects locations of Windows phone users, CNET, April 25, 2011 Windows Phone 7.. transmits to Microsoft a miniature data dump including a unique device ID, details about nearby Wi-Fi networks, and the phone's GPS-derived exact latitude and longitude. Ian Paul, iPhone Records Location Data No Matter What, Report Says, PCWorld, April 25, 2011 your iOS device will keep on recording cell tower and Wi-Fi access points even if you turn off your device's location-finding capabilities, Gregg Keizer, Florida, N.Y. Consumers Sue Apple Over Location Tracking, Computerworld, April 25, 2011 accusing Apple of fraud, deceptive business practices and several additional violations of federal and state laws. Lex Friedman, Apple responds to concerns about iPhone location data, Infoworld, April 27, 2011 The crux of Apple's point is that the data being gathered isn't where you've been, but rather the locations of wireless hotspots and cell towers across the country. Chris Foresman, Google Faces $50 Million Lawsuit Over Android Location Tracking, Wired, May 1, 2011 the location data that Android devices send to Google “several times per hour” is tied to a unique (though random) device ID. Ryan Kim, Why Android Location Data Is So Important to Google, NY Times, May 2, 2011 if major handset makers such as Motorola chose to pay for Skyhook’s location technology over Google’s own free software, the search company ran the risk of having an imperfect picture of Wi-Fi locations. Robert Lemos, Mac OS X Yosemite sends location, search data to Apple, Ars Technica, October 20, 2014 whenever a user queries Spotlight. 편집 이미지 인식 기술 얼굴 인식 기술 James Randerson, Face recognition technique aids security - and lookalike searches, The Guardian, January 26, 2008 Scientists have developed a “face averaging” technique which dramatically improves the success rate of computer face-recognition systems a Airports trial facial recognition, BBC News, April 25, 2008 Holders of new UK and EU biometric passports will pass through unmanned gates that will scan their faces and match them to records. Christopher Hope, Mug shots at the touch of a button for police, Telegraph.co.uk, March 20, 2008 ”…could allow CCTV cameras to trigger an alert when they film a known criminal“ Dana Oshiro, Picasa 3.5: Ruining Your Good Name with Face Recognition Tagging, Read Write Web, September 22, 2009 The service is so good at finding your mug and tagging it that wild photos from yesteryear can resurface and wreak havoc on your reputation. Ellen Messmer, FBI Turns Up Faster, More Accurate Fingerprint Identification System, CIO, March 8, 2011 The AFIT replacement prepares the way for going beyond fingerprint identification to other biometrics, including latent palm prints and facial recognition Darlene Storm, How to trick facial recognition & lie to your smartphone, Computerworld, blog, March 29, 2011 A smart device in the future might know when NOT to blurt out the truth. Mark Milian, Google making app that would identify people's faces, CNN, March 31, 2011 Google has had the technical capabilities to implement this type of search engine for years. 박태우, 사진 한장으로 신원파악 경찰 ‘족집게 기술’ 쓰나, 한겨례 신문, 2011. 7. 19. 경찰은 대전지방경찰청과 한국전자통신연구원이 양해각서(MOU)를 맺고 2008년부터 안면인식기술 시스템인 ‘휴먼인식기술’을 개발하고 있다는 사실은 인정했다. Megan Geuss, Facebook Facial Recognition Could Get Creepy, PC World, April 26, 2011 Facial recognition is especially troubling because cameras are ubiquitous and we routinely show our faces. 권혜미, 어디서든 긴장해라, CCTV가 지켜보니까, bloter.net, 2014.03.26 통합관제센터는 서로 다른 공공기관이 다양한 목적에 따라 설치·운영하고 있는 영상정보처리 기기들을 통합적으로 연계해 집중화된 시설에서 관리하는 체계를 말한다. 현재 대부분의 기초지방자치단체가 통합관제센터를 운영하고 있다 Cyrus Farivar, "Facebook’s facial recognition will one day find you, even while facing away, Ars Technica, Jun 24, 2015 “It's interesting that they're designing their algorithm to include cues that humans use to identify people: how you stand, how you style your hair. Ben Sobel, Facial recognition technology is everywhere. It may not be legal., The Washington Post, June 11, 2015 Facebook may have created the world’s largest privately held data base of faceprints Andrew Blake, Can you see me now? ‘Privacy Visor’ goggles trick facial recognition tech, Washington Times, August 12, 2015 I do believe anti-surveillance fashion and wearables have a chance at becoming mainstream Ava Kofman, Study: Face Recognition Systems Threaten the Privacy of Millions, The Intercept, October 18, 2016 It doesn’t just track our phones or computers. It tracks our flesh and our bones. This is a tracking technology unlike anything our society has ever seen. You don’t even need to touch anything Ananya Bhattacharya, A court will decide whether Facebook used you to violate the privacy of all your friends, Quartz, October 26, 2016 if companies fail to get consent from users before storing biometric information, they can be subject to a $5,000 fine, plus $1,000 in damages Sean Hargrave, Facial recognition a powerful ad tool or privacy nightmare?, The Guradian, 17 August 2016 “The new data privacy laws are very specific about any biometrics belonging to a new, distinct type of data deemed as extra sensitive Catherine Chapman, Facial Recognition Technology Raises Privacy Concerns, ABC news, Nov 6 2016 It can know that it's a face. Then, there's facial detection, knowing who it is. The next step is knowing what the feeling is, that's facial expression.” April Glaser, Facebook Is Using an “NRA Approach” to Defend Its Creepy Facial Recognition Programs, Slate, Aug. 4 2017 Facebook users should pay attention: When you tag a friend in a photo, that’s feeding a massive facial recognition dataset. 김경환, 경찰-소방-정부-시, CCTV 통합운영…스마트도시 만든다, 머니투데이, 2017.11.23 이 시스템이 구축되면 경찰의 경우 여러 지역을 거쳐 도주하는 범인을 잡기 위해 서울시내 전역의 CCTV영상을 자치구에 일일이 요청하지 않아도 112센터에서 접속 권한을 갖고 한번에 보고 대처할 수 있게 된다. 타투 Matt Burgess, FBI is building 'tattoo recognition technology' to catch criminals, Wired, 03 Jun 2016 Tattoos, according to the EFF, represent a “free speech that we wear on our skin” and attempting to track them and identify them using automated means raises free speech concerns under the First Amendment. 편집 RFID Declan McCullagh, RFID Tags: Big Brother in small packages, C|Net News.com, January 13, 2003 we could be tracked because we'll be wearing, eating and carrying objects that are carefully designed to do so. The privacy threat comes when RFID tags remain active once you leave a store. Bob Violino, The History of RFID Technology, RFID Journal, Jan 16, 2005 to identify which planes belonged to the enemy Kim Zetter, School RFID Plan Gets an F, Wired News, Feb. 10, 2005 requires students to wear identification badges embedded with radio frequency, or RFID, chips. Jim Rapoza, Security Getting Trampled in the Rush to RFID, eWeek.com, Mar. 7, 2005 this push for RFID in so many sensitive areas of peoples lives confuses me because the risks are so high and the rewards seem so minimal. Jacqueline Emigh, RSA Finds More Flaws in RFID, eWeek.com, Mar. 23, 2005 they were able to circumvent the tags built-in security enough to buy gasoline and turn on a cars ignition. Mark Baard, RFID Cards Get Spin Treatment, Wired News, Mar. 29, 2005 The Homeland Security Department is playing word games to dodge the privacy debate raging over RFID tags Beth Bacheldor, RFID Takes Root in Bangladesh, RFID Journal, Jan. 15, 2008 hands-free access control and employee-tracking systems, as well as asset management, are the most popular applications businesses are asking for. Steve Boggan Cracked it, The Guardian, Nov 17, 2006 the key to opening up the secure chip was contained in the passports themselves 이경규, 미국법상 상품의 위치정보와 소비자 보호, 정보법학 11권 2호(2007) 마케팅 차원에서 이루워지는 끊임없는 소비자 정보 분석·가공은 더욱 정밀해 질 것이다. 인맥관계·성적취향·정치적 성향등의 민감한 정보들이 DB화 될 것이다 Sharon Gaudin, RFID tech turned into spy chips for clandestine surveillance, Computerworld, March 20, 2008 They can be scattered on a floor, so when someone walks through a room, entryway or warehouse, the tags will stick to their shoes or pants cuffs. Dan Goodin, (USA) Passport RFIDs cloned wholesale by $250 eBay auction spree, The Register, February 2, 2009 the technology employs no encryption and can be read from distances of more than a mile, the tags are highly susceptible to cloning and tracking, Mitch Betts, Footwear, Fashion Driving RFID Growth, February 21, 2011 Macy's, J.C. Penney and Wal-Mart are leading the way in item-level RFID, Roy Furchgott, Peace of Mind, From a Dubious Threat, NY Times, April 25, 2011 wallets meant to block RFID signals given off Maggie Astor, Microchip Implants for Employees? One Company Says Yes, The New York Times, JULY 25, 2017 A microchip implanted today to allow for easy building access and payments could, in theory, be used later in more invasive ways: to track the length of employees’ bathroom or lunch breaks, for instance, without their consent or even their knowledge. 편집 정부가 눈을 뜨다 Ryan Singel, U.S. Cell-Phone Tracking Clipped, Wired News, October 28, 2005 When the government seeks to turn a mobile telephone into a means for contemporaneously tracking the movements of its user, the delicately balanced compromise that Congress has forged between effective law enforcement and individual privacy requires a showing of probable cause Electronic Frontier Foundation, Cellphone Tracking Cases (USA v. Pen Register), EFF.org Ellen Nakashima, Cellphone Tracking Powers on Request, The Washington Post, Nov 23, 2007 Federal officials are routinely asking courts to order cellphone companies to furnish real-time tracking data so they can pinpoint the whereabouts of drug traffickers, fugitives and other criminal suspects, according to judges and industry lawyers. Saul Hansell, One Subpoena Is All It Takes to Reveal Your Online Life, New York Times, July 7, 2008 Google was ordered by a court to turn over records of activity on YouTube, including the user names and Internet Protocol (IP) addresses of people who watched videos. Matthew Sparkes, Government proposes email and internet tracking, PCPro, August 13, 2008 The Government will store “a billion incidents of data exchange a day” as details of every text, email and browsing session in the UK are recorded under new proposals published yesterday. Siobhan Gorman, Satellite-Surveillance Program to Begin Despite Privacy Concerns, Wall Street Journal, October 1, 2008 The program is designed to provide federal, state and local officials with extensive access to spy-satellite imagery 교육행정정보시스템(NEIS)-갈등을 넘어 교육정보화의 새로운 총아로 : 참여정부 정책보고서2-37 : 참여정부정책보고서 완성본(2008) NEIS는 학생 상담 내용뿐만 아니라 성적, 각종 행동 특성, 몸무게, 키, 학부모 주소 및 이름 등과 같이 학생과 학부모 2000만 명의 개인정보 200여 항목을 담고 있기 때문에 이 같은 정보들이 이익을 추구하는 기업 등에 의해 상업적으로 이용될 수 있고, 또한 국가가 이를 국민통제 수단으로 이용할 수 있다 Robert Pear, Privacy Issue Complicates Push to Link Medical Data, NY Times, January 17, 2009 President-elect Barack Obama’s plan to link up doctors and hospitals with new information technology, as part of an ambitious job-creation program, is imperiled by a bitter, seemingly intractable dispute over how to protect the privacy of electronic medical records. Jesse McKinley, Marriage Ban Donors Feel Exposed by List, NY Times, January 18, 2009 So chilling, apparently, that supporters have filed suit in Federal District Court in Sacramento seeking a preliminary injunction of a state election law that requires donors of $100 or more to disclose their names, addresses, occupations and other personal information. Christopher Soghoian, 8 Million Reasons for Real Surveillance Oversight, paranoia.dubfire.net, December 1, 2009 Internet service providers and telecommunications companies play a significant, yet little known role in law enforcement and intelligence gathering. Kim Zetter, Feds ‘Pinged’ Sprint GPS Data 8 Million Times Over a Year, Wired, December 1, 2009 The manager also revealed the existence of a previously undisclosed web portal that Sprint provides law enforcement to conduct automated “pings” to track users. Through the website, authorized agents can type in a mobile phone number and obtain global positioning system (GPS) coordinates of the phone. Jim Harper, The Government Can Monitor Your Location All Day Every Day Without Implicating Your Fourth Amendment Rights, The Technology Liberation Front, February 11, 2010 the Obama administration has argued that Americans enjoy no “reasonable expectation of privacy” in theiror at least their cell phones’whereabouts. Michael Isikoff, The Snitch in Your Pocket, Newsweek, Feb 19, 2010 the FBI and other law-enforcement outfits have been obtaining more and more records of cell-phone locations – without notifying the targets or getting judicial warrants establishing “probable cause Darlene Storm, U.S. Gov't to Thank for Phone-Wiping Panic Button, PC World, March 30, 2011 If a cell phone is confiscated by police or government agency, the panic button app will wipe the cell phone's address book, history, text messages and broadcast the arrest as an emergency alert to fellow activists. Declan McCullagh, How police have obtained iPhone, iPad tracking logs, CNET, April 21, 2011 Law enforcement agencies have known since at least last year that an iPhone or iPad surreptitiously records its owner's approximate location, and have used that geolocation data to aid criminal investigations. Matthew Lasar, The gadgets police use to snarf cell phone data, Ars Techica, April 25, 2011 The device was “immediately associated” with Diaz's person, and therefore the warrantless search was valid, the California Supreme Court opined in January. Declan McCullagh, Cops to Congress: We need logs of American's test message Cnet, December 3, 2012 AT&T, Verizon Wireless, Sprint, and other wireless providers would be required to record and store information about Americans' private text messages for at least two years, according to a proposal that police have submitted to the U.S. Congress. Tom Warren, Microsoft, like Google, tips off police for child porn arrest, The Verge, August 7, 2014 Google, Twitter, and Facebook all use Microsoft’s PhotoDNA tech, helping to build up a database of illegal photos. 김태훈, 폰도 망명해야 하나, 주간경향, 2014. 11. 25. 경찰과 방송통신위원회, 이통사 및 제조사 등은 협의를 거쳐 2012년 10월 이후 출시된 국내산 스마트폰 단말기는 이통사가 원격으로 해당 기능을 강제로 켤 수 있게 만들었다. David Yee, Video Surveillance: Abusing Power or Protecting the Public?, IVN.us, Aug. 21, 2015 We create very precise diaries of our actions on social media and the government does the same with the growing power of surveillance technology. Fokke Obbema, Marije Vlaskamp & Michael Persson, China rates its own citizens - including online behaviour, Volkskrant, April 25, 2015 the Social Credit System, attributing to each of its 1,3 billion citizens a score for his or her behavior Jay Stanley, Shotspotter CEO Answers Questions on Gunshot Detectors in Cities, ACLU Blog, May 5, 2015 As a general principle any computers that serve important public functions should be required to have their source code made public Charles Platiau, 'To build a better life': Chicago's new data-collecting sensors stir privacy concerns, Reuters, 30 Aug, 2016 The Array of Things…contain low resolution cameras, microphones and various air quality sensors, along with sensors that detect use of WiFi and Bluetooth devices within a 100-foot range. Brian Wheeler, Police surveillance: The US city that beat Big Brother, BBC, 29 September 2016 It is still based around a bank of screens, but the camera feeds are augmented by data from weather reports, shipping movements, social media chatter, email records, emergency calls and other data sources. 이재운, 안전처, 소셜 데이터 활용 14억 쏟아 붓고도 활용은 미미, 디지털 타임즈, 2016-10-07 트위터를 실시간으로 수집·분석해 71개 재난안전유형으로 분류한 후 재난이슈를 모니터링 Paul Cote Jay, Police mass texting to public in murder investigation raises privacy fears,http://www.cbc.ca/news/cbc-news-online-news-staff-list-1.1294364 CBC News, Oct 27, 2016 The numbers were obtained from a cell tower near the Ottawa discount store, in what is known as a “phone tower dump.” Jennifer Levitz and Zusha Elinson, Boston Police Plan to Monitor Internet for Threats Draws Criticism, The Wall Street Journal, Dec. 3, 2016 They’re public posts, they’re not anything that’s private, 편집 사회 곳곳에 감시가 이루어 지다 Mats Lewan, Worker-monitoring tool now eyeing student cheaters, CNet News, February 13, 2009 Norwegian high school students can now use state-provided laptops during exams. But they'd better not access notes, chat with friends, or surf the Web. Cheating will be detected immediately John Leland, Technology helps elderly live independently, International Herald Tribune, February 16, 2009 Technologies like eNeighbor come with great promise of improved care at lower cost and the backing of large companies like Intel and General Electric. Evan Ratliff, Gone Forever: What Does It Take to Really Disappear?, Wired, August 13, 2009 Even as anonymization technology improves, to the benefit of fugitives, “the ability to pull data from remote locations and cross-reference that data has increased even faster,” Adam Cohen, A Casualty of the Technology Revolution: ‘Locational Privacy’, New York Times, August 31, 2009 A little-appreciated downside of the technology revolution is that, mainly without thinking about it, we have given up “locational privacy.” Deborah Yao, Web-monitoring software gathers data on kid chats, Associated Press, September 5, 2009 Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages – and sell the marketing data gathered. Dana Oshiro, Picasa 3.5: Ruining Your Good Name with Face Recognition Tagging, Read Write Web, September 22, 2009 Say goodbye to your controlled web presence and say hello to Picasa 3.5. Google released Picasa 3.5 with a slew of new features including facial recognition and name-based batch tagging, faster geo-tagging and better web uploading functionality. Talk Talk to introduce controversial virus alert system, BBC News, November 25, 2010 The Virus Alert system keeps an eye on the websites customers visit to stop them accidentally going to places riddled with viruses. Ki Mae Heussner, So Much for Privacy? New Sites Share Every Step You Take Online, ABC News, March 31, 2011 As you surf through news stories, video clips and shopping sites, these services, which plug directly into your Web browser, allow you to share your “clickstream” with friends Verne G. Kopytoff, Yahoo Will Keep Search Queries for 18 Months, blogs, NY Times, April 18, 2011 With the change in policy, Yahoo goes from keeping data the shortest amount of time compared to its rivals to one of the longest. Google retains data for nine months, while Microsoft’s policy is to keep data for six months. Ki Mae Heussner, Are You Being Secretly Recorded at Work?, ABC News, April 19, 2011 I am actually more surprised when there isn't digital evidence than when there is. Thomas Lowenthal, IP address can now pin down your location to within a half mile, Ars Technica, April 22, 2011 The researchers, led by Yong Wang, used a variety of statistical techniques to combine data from 163 public ping servers and 136 traceroute servers into a precise estimate of the range of possible physical locations for a particular IP address. Grant Gross, Trial Version of CAD Software Includes Spyware, PC World, April 28, 2011 The lawsuit alleges that TransMagic and ITCA use an anticopying and licensing software package called Sheriff, from vendor Licensing Technologies, which allows users of the package to record user activities to log files. Kevin Fogarty, Furniture Company Accused of Webcam-Spying on Customers, PCWorld, May 3, 2011 PC Rental Agent is a remote-monitoring agent that allows PC rental companies to monitor all the activity on a rented PC, including taking pictures using the webcam. Allan Dodds Frank, Lydia Cacho Blasts Facebook, The Daily Beast, October 21, 2011 Every picture uploaded by Facebook users is run through a program called 'Photo DNA' to look for possible matches with offenders. The company saves the data and makes referrals to law-enforcement agencies. 김영미, 전자주민카드 추진과정에서 나타난 갈등에 관한 소고, 2011. 12. 20. 주민등록증이 없이는 살아갈 수 있지만 전자주민카드가 없으면 정상적인 생활을 영위할 수 없다고 할 수 있다. Chris Woodyard and Jayne O'Donnell, Your car may be invading your privacy, USA TODAY, March 25, 2013 Electronic data recorders, Infotainment systems and on-board computers, Transponders Craig Timberg, How one man’s private files ended up on Apple’s iCloud without his consent, The Washington Post, October 30, 2014 Apple has taken local files on my computer not stored in iCloud and silently and without my permission uploaded them to their servers Julia Angwin, Own a Vizio Smart TV? It’s Watching You, ProPublica, Nov. 9, 2015 Vizio’s Smart TVs track your viewing habits and share it with advertisers, who can then find you on your phone and other devices. Alison Flood, Men make up their minds about books faster than women, study finds, Guardian, Tuesday 8 March 2016 it uses a piece of JavaScript in the ebooks to look at readers’ habits: when they pick up, complete or abandon a title. David Welch, Your Car’s Been Studying You Closely and Everyone Wants the Data, Bloomberg, July 12, 2016 Everyone is trying to control the screens in the car 장재진, 아빠의 감시 ‘판옵티콘’ 된 스마트폰에 아이들 ‘탈옥’ 시도, 한국일보, Oct 13, 2016 우리 사회는 일탈의 책임을 청소년들에게 돌리고 있기 때문에 감시가 효율적인 수단이라고 인식된다 Patrick Foster, BBC to deploy detection vans to snoop on internet users, Telegraph, 6 August 2016 how the BBC would carry out its surveillance was a technique known as “packet sniffing”, Glen Luke Flanagan, They’re watching you, but who’s watching them? Body cams raise issues, The State, August 21, 2016 Such questions are addressed by a scorecard put out earlier this month by two human rights groups 신지민, 판결 콜 택시 운전기사 동의 없이 '위치정보' 다른 회사에 제공 콜 서비스업체에 손배 판결, 법률신문, 2016. 10. 12. B씨가 운영한 시스템은 자동으로 고객의 위치와 가장 가까운 차량에 배차를 요청하기 위해 1분 주기로 콜 서비스 회원의 모든 차량의 위치 정보를 수집한 후 그 데이터를 메인 서버에 저장 김재섭, 네이버 이번엔 웹브라우저로 구글에 도전장, 한겨례, 2016. 12. 1. “누리꾼들을 더 오래 붙잡아 광고 수익을 극대화하는 동시에 누리꾼들의 이용 행태를 분석해 서비스를 정교화하는 전략 Proprietary Surveillance, The Free Software Foundation it also spread dramatically away from the keyboard, in the mobile computing industry, in the office, at home, in transportation systems, and in the classroom. Violet Blue, The FBI recommends you cover your laptop's webcam, for good reason, Engadget, 09. 23. 2016 the going price for access to a woman's webcam was priced at $1 per girl, whereas computer webcams belonging to men cost $1 – for one hundred. Catherine Chapman, Police Body Cams Spark Concerns About Privacy, Mass Surveillance, NBC News, Dec 4 2016 the police get to determine solely what the public gets to see and they have the ability to only release videos that show them in the best light or promotes their perspective, that's the definition of propaganda Carly Page, Privacy groups: Amazon Go takes invasive technologies to a 'whole new level', The Inquirer, 06 December 2016 When you’re done shopping, you can just leave the store. Shortly after, we’ll charge your Amazon account and send you a receipt. Matt Hamblen, Singapore’s ‘city brain’ project is groundbreaking -- but what about privacy?, Computerworld, Dec 12, 2016 Connectivity of data is where the 'smart' comes from. There's a lot to consider, but ultimately it is much more cost-effective to do it in a centralized way 임유경, "내 노트 본다고?"…에버노트 사용자들 뿔났다, ZDNet, 2016. 12. 15. 변경된 정책에는 제품의 서비스 향상을 위해 에버노트 일부 직원들이 사용자가 작성한 콘텐츠에 접근해서 그 내용을 읽어 볼 수 있다는 내용이 들어갔다. Cara McGoogan Danielle Demetriou, Peace sign selfies could let hackers copy your fingerprints , Telegraph, 12 January 2017 fingerprints can be easily recreated from photos taken up to three metres away without the need for advanced technology Gennie Gebhart, Spying on Students: School-Issued Devices and Student Privacy, EFF, April 13, 2017 technology providers are spying on studentsand school districts, which often provide inadequate privacy policies or no privacy policy at all, are unwittingly helping them do it. Ms. Smith, New research details the privacy implications of email tracking, CSO, Oct 1, 2017 About 30 percent of emails leak the recipient’s email address to one or more of these third parties when they are viewed. 편집 사물인터넷, 웨어러블 Al Sassco,Fitness Trackers are Changing Online Privacy and It's Time to Pay Attention, CIO.com, August 14, 2014 However, wearables are different.. because of the kinds and volume of data they collect Eugene Mandel, How the Napa earthquake affected Bay area sleepers, Jawbone.com Blog, August 25, 2014 This study was based on thousands of UP wearers in the Bay Area who track their sleep using UP by Jawbone. Nest Cam smart camera is 'always on' even when 'off', BBC, 25 November 2015 the device's light-emitting diode (LED) turns off but the camera continues to function. Christina Warren, What Nest's product shutdown says about the Internet of Things, Mashable, 2016. 4. 4. the total shutdown assumes that the Revolv could in no way exist or operate without connecting to a centralized server and that it would be impossible to use the hub in a local-only mode. Ms. Smith, Devil in the details: Dirty little secrets of the Internet of Things, Network World, Apr 10, 2016 Over time, those costs will be more than what you paid for the device, so the “sustainable” model is to keep collecting every little piece of data about you and then finding a way to profit from it. 손경호, 페북이 사용자 대화 내용까지 추적한다고?, ZDNet, 2016. 5. 26. 페이스북이 스마트폰에 내장된 마이크로폰(마이크)을 통해 사용자들의 대화 내용까지 엿들을 수 있는 것으로 의심된다 Nicole Perlroth, Hackers Trawl User Data in Hopes a Small Target Will Lead to a Big One, The New York Times, SEPT. 23, 2016 It may sound like a crazy collection of unrelated information. But it is not that difficult to make connections among seemingly random bits of information using data-sifting technology. Laura Hautala, Why it was so easy to hack the cameras that took down the web, C|net, October 24, 2016 Tom Mendelsohn, Sweden’s highest court bans drones with cameras - ArsTechnica, Oct 25, 2016 they are capable of spying on things that are otherwise out of sight of their pilot, and are therefore illegal. 강동철, AI·사물인터넷이 모든 산업 바꿔… 미래 20년, 생각만해도 흥분된다, 조선닷컴, 2016.10.27 1조 개가 넘는 기기에서 생산되는 막대한 데이터는 IT(정보기술)뿐만 아니라 쇼핑·교통·헬스케어·금융 등 현존하는 모든 산업을 완전히 재편할 것 Bruce Schneier, Your WiFi-connected thermostat can take down the whole Internet. We need new regulations, The Washington Post, November 3, 2016 The government could impose minimum security standards on IoT manufacturers, forcing them to make their devices secure even though their customers don’t care. They could impose liabilities on manufacturers, allowing companies like Dyn to sue them if their devices are used in DDoS attacks. 박수진, 안영춘, 빅데이터 업체 “19일 광화문광장 74만 집계”, 한겨례, 2016-11-20 워크인사이트는 휴대폰 무선신호(와이파이, 블루투스 등)를 감지할 수 있는 ‘조이스퀘어’라는 센서를 매장 안에 설치해 매장 밖 유동인구, 방문객, 체류시간 등을 웹 대시보드로 확인 오희나, 미래부, "빅데이터로 소비동향 한 달 빨리 파악한다", 이데일리, 2016. 11. 21 매월 2억 건의 신한카드 결제 빅데이터를 활용해 소비동향 파악 기간을 4~5일로 대폭 단축 목정민, 사물인터넷 기술 활용…보험상품 개발 나선다, 경향신문, 2016.12.02 SK텔레콤은 고객의 동의 아래 로라망을 통해 차량 운행 정보와 부품 상태 등을 수집 및 분석해 메리츠화재에 제공할 계획이다 Ephrat Livni, Watchdogs say that what your child tells a “smart” doll is being recorded and monitored, Quartz, December 11, 2016 Two internet-connected toys have been called out by international consumer protection groups for turning over data collected from conversations with children to companies without parents’ permission. CHRISTOPHER MELE, Bid for Access to Amazon Echo Audio in Murder Case Raises Privacy Concerns, The New York Times, DEC. 28, 2016 Once it detects the wake word, according to Amazon, the Echo starts streaming audio to the cloud, where it is secured until the customer permanently deletes it. Adi Robertson, Microsoft HoloLens could help you find your keys, and also stalk your every move, The Verge, Dec 30, 2016 what’s really interesting isn’t the idea of HoloLens tracking an object. It’s HoloLens learning what items matter to you and choosing what to follow, before you ever worry about losing something. 편집 위험성 Jay Stanley and Barry Steinhardt, Bigger Monster, Weaker Chains, The Growth of an American Surveillance Society, ACLU Technology and Liberty Program, January 2003 the danger stems not just from a single government program, but from a number of parallel developments in the worlds of technology, law, and politics. You’re Leaving a Digital Trail. What About Privacy?, New York Times, November 29, 2008 Now, with the Internet, wireless sensors, and the capability to analyze an avalanche of data, a person’s profile can be drawn without monitoring him or her directly. Bruce Schneier, It's Time to Drop the 'Expectation of Privacy' Test, Wired, March 26, 2009 The problem is, in today's information society, that definition test will rapidly leave us with no privacy at all. Carolyn Johnson, Project 'Gaydar', The Boston Globe, September 20, 2009 just by looking at a person’s online friends, they could predict whether the person was gay. Cory Doctorow, What The Internet Knows About You: your browser is giving away your history, BoingBoing , September 2, 2009 The app is an example of using browser history detection to determine personal preferences of Web browser users Hello, Big Brother: Digital sensors are watching us, USA Today, January 26, 2011 government agencies and corporations will find it difficult to resist tapping deeper into sensor data. Roger Grimes, Privacy matters again, so you'd better prepare, Infoworld, May 3, 2011 people are feeling increasingly touchy about how their data and their very privacy is used and abused Julian Assange, Who Should Own the Internet?, New York Times, December 4, 2014 At their core, companies like Google and Facebook are in the same business as the U.S. government’s National Security Agency. Acquisti, Alessandro; Gross, Ralph; and Stutzman, Fred (2014) ” Face Recognition and Privacy in the Age of Augmented Reality,” Journal of Privacy and Confidentiality: Vol. 6: Iss. 2, Article 1. Our results show the ability of identifying strangers online(on a dating site where individuals protect their identities by using pseudonyms) and offline(in a public space), based on photos made publicly available on a social network site, and then inferring additional and sensitive information about them. Kaveh Waddell, How Surveillance Stifles Dissent on the Internet, The Atlantic, Apr 5, 2016 people who said they think government surveillance is justified about two-thirds of the respondents were likeliest to alter their behavior after they were reminded about government surveillance 정유경, ‘유세차’가 가는 곳, 빅데이터는 알고 있다, 한겨례, 2017-04-29 통계·지리정보를 결합한 빅데이터 분석은 구글트렌드 같은 인터넷 기반 분석보다 정확하고, 특히 당 조직력이 받쳐준다면 강력한 힘을 발휘한다. 이번 대선을 기점으로 빅데이터 선거운동이 본격화될 것 같다 박재현, {구글 데우스} 구글은 알고 있다, 내가 모르는 나의 과거를, 한국일보, 2017. 7. 15. 결혼 같은 중요한 선택을 앞두고 갈피를 잡지 못할 때 “태어난 순간부터 모든 것을 지켜본” 구글이 “87%의 확률로 존이 더 만족스러울 거야”라고 대신 판단해 줄 날이 올 수 있다는 것이다 편집 데이터의 수집, 분석, 교환 그리고 데이터 골드러쉬 Arthur R. Miller, The National Data Center And Personal Privacy, The Atlantic, Nov, 1967 But such a Data Center poses a grave threat to individual freedom and privacy. With its insatiable appetite for information, its inability to forget anything that has been put into it, a central computer might become the heart of a government surveillance system that would lay bare our finances, our associations, or our mental and physical health to government inquisitors or even to casual observers Declan McCullagh, Perspective: the flip side of database snooping, C|Net News.com, February 7, 2005 “Law enforcement and intelligence services don't need to design their own surveillance systems from scratch,” O'Harrow writes. “They only have to reach out to the companies that already track us so well.” Tom Owad, Data Mining 101: Finding Subversives with Amazon Wishlists, Applefritter.com, January 4, 2006 an individual with access to the internet can still develop a fairly sophisticated profile of hundreds of thousands of U.S. citizens using free and publicly available resources. Here's an example.. Steve Boggan Q. What could a boarding pass tell an identity fraudster about you? A. Way too much, The Guardian, May 3, 2006 We logged on to the BA website, bought a ticket in Broer's name and then, using the frequent flyer number on his boarding pass stub, without typing in a password, were given full access to all his personal details - including his passport number, the date it expired, his nationality (he is Dutch, living in the UK) and his date of birth. Michael Barbaro and Tom Zeller Jr, A Face Is Exposed for AOL Searcher No. 4417749, NY Times, Aug 9, 2006 The number was assigned by the company to protect the searcher’s anonymity, but it was not much of a shield. Ryan Singel, FBI Mined Grocery Store Records to Find Iranian Terrorists, CQ Reports, Wired, November 06, 2007 the FBI sifted through customer data collected by San Francisco-area grocery stores in 2005 and 2006, hoping that sales records of Middle Eastern food would lead to Iranian terrorists. Chris Soghoian, Did credit card companies collaborate with the FBI's grocery data mining program?, CNet, November 7, 2007 agents contacted the major credit card companies (Visa, Mastercard and American Express), gave them a list of all of the middle eastern markets in the Bay area, and asked for the names and addresses of every person who had purchased anything at any of the stores. Juan Carlos Perez, Facebook's Beacon More Intrusive Than Previously Thought, PC World, Nov 30, 2007 Beacon will report back to Facebook on members' activities on third-party sites that participate in Beacon even if the users are logged off from Facebook and have declined having their activities broadcast to their Facebook friends Louise Story, To Aim Ads, Web Is Keeping Closer Eye on You, NY Times, March 10, 2008 Five large Web operations Yahoo, Google, Microsoft, AOL and MySpace record at least 336 billion transmission events in a month, not counting their ad networks. Jonathan Richards, CIA enlists Google's help for spy work, Times Online UK, March 31, 2008 US intelligence agencies are using Google's technology to help its agents share information about their suspects Peter Whoriskey, Every Click You Make, Washington Post, April 4, 2008 the new monitoring, known as “deep-packet inspection,” enables a far wider view – every Web page visited, every e-mail sent and every search entered. Stephen Baker, The Numerati, August 1, 2008 They're rummaging through mountains of data, looking for patterns of our behavior so that they can predict what we might want to buy, who we're likely to vote for, what job we'd do better than our colleagues. Ron Lieber, A (Very) Watchful Eye on Credit Card Spending, NY Times, January 30, 2009. It has also been looking at how you spend your money, searching for patterns or similarities to other customers who have trouble paying their bills. Miguel Helft, Google to Offer Ads Based on Interests, NY Times, March 11, 2009 Google’s foray into behavioral targeting may represent the most visible result so far of the company’s integration of DoubleClick, an advertising technology company that it acquired a year ago. Stephanie Clifford, Online Age Quiz is a Window for Drug Makers, NY Times, March 25, 2009 Pharmaceutical companies pay RealAge to compile test results of RealAge members and send them marketing messages by e-mail. Jack Marshall, Phorm Launches Korean Trial Despite Concerns in U.K., ClicKz, March 30, 2009 Phorm, the ISP-level behavioral targeting company..is launching a trial of its technology with Korea’s largest ISP, Korea Telecom. Melena Ryzik, Mapping the Cultural Buzz: How Cool Is That?, NY Times, April 6, 2009 For the buzz project, snapshots from more than 6,000 events 300,000 photos in all were categorized according to event type, controlled for overly celebrity-driven occasions and geo-tagged at the street level Maha Atal, Advertisers Target Hyper-Social Internet Users, Forbes.com, May 18, 2009 The proprietary core of the technology is the behavioral economic model the company uses to determine the relative value of shares to views and thus prioritize users who spread the message over those who simply watch. Steve Lohr, How Privacy Vanishes Online, NY Times, Mar 16, 2010 Computer scientists and policy experts say that such seemingly innocuous bits of self-revelation can increasingly be collected and reassembled by computers to help create a picture of a person’s identity 오길영, 감청의 상업화와 그 위법성, 민주법학 제43호, 2010. 7, 419-465쪽. 쿠키를 납치하는 행위 그 자체만을 두고 볼 때 , 이에 대한 법적 평가는 무엇이라 할 수 있는가 ? 묵시적 동의가 인정되지 않는 한 , 통신비밀보호법 제 2 조 제 7 호상의 ‘ 감청 ’ 에 해당한다 . Kaptein, Maurits, Adaptive Persuasive Messages In An E-Commerce Setting: The Use Of Persuasion Profiles, Eindhoven University Of Technology(2-4), 2010 First, one should be able to manipulate content presentation such that multiple influence strategies can be implemented. Second, one needs to be able to identify individual consumers. Third, it needs to be possible to measure the outcome of the persuasive attempt and update subsequent product presentations accordingly. Rachael King, Sentiment Analysis Gives Companies Insight Into Consumer Opinion, Business Week, March 1, 2011 MOBI is part of an emerging technology that can tell a company almost instantaneously how people are feeling about a particular business, executive, product, stock, or advertising campaign. Paul Krill, Big Data mining: Who owns your social network data?, InfoWorld, March 9, 2011 When Big Data tools analyze information available on the Web, do they really have the right to do so without permission of the owner? Jaikumar Vijayan, Obama Administration Calls for New Privacy Law, CIO, March 16, 2011 any legislation should be based on a set of fair information practice principles and give the U.S. Federal Trade Commission enforcement authority. Larry Dignan, Get ready for neuromarketing: Advertising just got creepier, ZDNet, March 21, 2011 This gadget, dubbed the Mynd, looks like your typical EEG headset, but this one is designed to monitor consumers' “deep subconscious responses” to gauge the reaction to advertising and other media content. Lucas Mearian, Big data to drive a surveillance society. Computerworld, March 24, 2011 As real-time and batch analytics evolve using big data processing engines such as Hadoop, corporations will be able to track our activities, habits and locations with greater precision than we ever thought possible. Elinor Mills, Who is Epsilon and why does it have my data?, CNET, April 6, 2011 They are in the business of managing customer data and helping companies integrate that data and communicate more effectively with customers Tomio Geron, Can The U.N. Use Big Data To Respond To Global Disasters?, blogs, Forbes, April 26, 2011 the U.N. launched a project, Global Pulse, that is designed to take some tips from private industry to analyze a wide range of “big data” and help governments better predict and respond to crises. Eli Pariser, Welcome to the Brave New World of Persuasion Profiling, Wired, April 26, 2011 Persuasion profiling potentially offers quick, easily transferable, targeted access to your personal psychological weak spots. Mark Sherman, Court questions limits on use of prescription data, Associated Press, April 26, 2011 The Supreme Court cast doubt today on efforts by states to limit drug manufacturers’ use of information about the prescription drugs that doctors like to prescribe. AP, Belgium Probes Google Street View Data Sweep, April 21, 2011 Google acknowledged last year that vehicles taking photographs for the mapping service in several European countries also collected data from unencrypted wireless networks. Jordan Robertson, Customers stay despite high-profile data breaches, Associated Press, May 1, 2011 We love it, we use it, we expect it to work, and we've woven it into our daily lives, professionally, socially and personally. But we really don't trust it, and we do get upset when our data is lost or stolen Cristen Conger, Can You Disappear on the Web?, ABC News, May 7, 2011 Once you put something out the Internet, it's going to stick around for a long time to come. Vindu Goel, How Facebook Sold You Krill Oil, New York Times, August 2, 2014 the more targeted the pitch, the higher the cost for reaching each 1,000 people Atockar, Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset, Neustar Research, September 15, 2014 Using this freely-obtainable, easily-created map, one can find out where many of Hustler’s customers live Jonathan Mayer, The Turn-Verizon Zombie Cookie, webpolicy.org, January 14, 2015 If a user’s ID cookie is missing, simply reconstruct it from their Verizon header. Cohen, Julie E., The Biopolitical Public Domain (September 28, 2015). consumers as resources to be themselves cultivated, processed, and consumed the problem is..more fundamentally that it subordinates considerations of human wellbeing to the priorities and values of powerful market actors Eben Moglen and Mishi Choudhary, Zuckerberg Nobly Carries White Man's Burden: Poor Indians' Data Packets, Indian Express, October 30, 2015 an attempt to buy the de-anonymised packets of the Indian poor at a bulk rate, Dan Goodin, Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC, Ars Technica, Nov 13, 2015 The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. 이호기/전설리, 넷플릭스·우아한형제들, 취향 꿰뚫은 빅데이터로 소비패턴 바꿔, 한국경제, 2016. 2. 9. 하우스 오브 카드는 넷플릭스 가입자의 콘텐츠 선호도와 일시정지·되감기 등 재생 기록, 검색 기록, 위치·이용 단말기 정보, 주중·주말 시청 행태 등 막대한 양의 정보를 자체 개발한 알고리즘으로 분석해 탄생 장재현 김종대, 테크놀로지, 보험 산업을 바꾸고 있다, LG경제연구원, 2016. 4. 11. 최 근 ICT 기술 발전에서 주목할 만한 부분은 웨어러블, 스마트카 등 IoT 기기들이 확산됨에 따라 이제까지는 얻을 수 없었던 개인별 실시간 데이터를 쉽게 확보할 수 있게 되었다는 점, 그리고 인공지능 기술이 발전되면서 빅데이터를 보다 정확하고 빠르게 분석할 수 있게 되었다는 점이다. Mark Scott, Rise of Ad-Blocking Software Threatens Online Revenue, The New York Times, MAY 30, 2016 The use of ad-blocking software has divided the online world. Jonah M. Kessel and Paul Mozur, How China Is Changing Your Internet, The New York Times, Aug 9, 2016 Julia Angwin, Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking, ProPublica, October 22, 2016 browsing habits “may be” combined with what the company learns from the use Gmail and other tools. Brian Fung, How a single Internet provider could end up making money off you several times over, The Switch, October 31, 2016 Selling her a mobile data plan, Convincing her to pay for premium content on top of that plan, Watching how the customer engages with that content, Showing them ads tailored to her engagement, Selling that engagement data to third parties Blair Hanley Frank, Salesforce tries to block Microsoft's LinkedIn acquisition, PCWorld, Sep 29, 2016 By gaining ownership of LinkedIn’s unique dataset of over 450 million professionals in more than 200 countries, Microsoft will be able to deny competitors access to that data, and in doing so obtain an unfair competitive advantage. 검색량이 표심을 보여준다?…구글 트렌드로 본 미 대선, KBS News, 2016. 11. 9. 전화 설문조사는 주위 이목을 고려해 속에 없는 말도 할 수 있지만 내 방 키보드 앞에 앉아 거짓말을 하는 사람은 없다 박용훈 , “퍼포먼스 마케팅의 핵심은 내부 데이터 가치의 극대화”, 블로터, 2016. 11. 22 광고 식별을 위해서 구글과 애플은 광고용 가상의 유니크 아이디 값을 만들었습니다. 안드로이드에서는 구글 애드버타이징 아이디(GA ID), iOS는 IDFA(ID For Advertising)이 있고, 모든 모바일광고의 성과 측정은 광고용 유니크 아이디를 활용합니다 송혜리, 구매자 마음 읽고 추천해주는 `스마트매치`, 디지털 타임즈, 2016-12-04 세계최대 쇼핑몰인 아마존 매출의 35%, 미국 최대 VOD 서비스업체인 넷플렉스 매출의 75%, 세계최대 비즈니스 인맥사이트인 링크드인 사용자 중 50%가 추천을 통한 매출과 구직활동 김태진, AI시대, 데이터 거래소-저작권료 생긴다, ZDNet, 2016. 12. 15. 개방형 플랫폼 형태의 데이터 거래소 구축을 추진할 계획이고 데이터의 비식별화 지원과 데이터 결합을 자유롭게 시험할 수 있는 데이터 프리존도 운영할 계획 Jack Nicas, Privacy Groups Seek Regulatory Review of Google Privacy Policy, The Wall Street Journal, Dec. 19, 2016 The complaint.. centers on Google’s request in June that users opt-in to new privacy settings that enable Google to combine their browsing histories with their search histories to show more personalized ads. Evan Niu, European regulators are mad at Facebook and WhatsApp over sharing data, Business Insider, Dec. 20, 2016 At the time, Facebook told the Commission that it would be very challenging from a technical perspective to reliably match user accounts in an automated way STEVE LOHR, Data Could Be the Next Tech Hot Button for Regulators, The New York Times, JAN . 8, 2017 IBM estimates that 70 percent of the world’s data is not out on the public web, but in private databases, often to protect privacy or trade secrets. Tamsin Shaw, Invisible Manipulators of Your Mind, The New York Review of Books, April 20, 2017 The behavioral techniques that are being employed by governments and private corporations do not appeal to our reason; they do not seek to persuade us consciously with information and argument. Rather, these techniques change behavior by appealing to our nonrational motivations, our emotional triggers and unconscious biases. 편집 소셜 네트워크 편집 사람사이의 관계가 기록되다 Melody Joy Kramer, Forfeiting privacy, one post at a time, Daily Pennsylvanian.com, November 30, 2005 Every blog entry you make and every social networking site you belong to .. can easily be stored on someone's hard drive Jessi Hempel with Paula Lehman, The MySpace Generation, Business Week, December 12, 2005 they're already creating new forms of social behavior that blur the distinctions between online and real-world interactions. Nate Anderson, Google + Facebook + alcohol = trouble, Ars Technica, January 19, 2006 Predators can come to you and that's what they don't think when they post those things. CBS, MySpace: Your Kids' Danger?, CBS Evening News, February 6, 2006 When they think MySpace, they think other teenagers. They don't think there are adults pretending to be teenagers on there.“ Maria Aspan, How Sticky Is Membership on Facebook? Just Try Breaking Free, New York Times, February 11, 2008. The retention of old accounts on Facebook’s servers seems like another effort to hold onto and provide its ad partners with as much demographic information as possible. Brian Stelter, Facebook's users ask who owns information, International Herald Tribune, February 17, 2009. Facebook would retain users’ content and licenses after an account was terminated. Randall Stross, When Everyone’s a Friend, Is Anything Private?, New York Times, March 7, 2009 Facebook sets few restrictions by default on what third-party software can see in a network of friends. Social sites dent privacy efforts, BBC News, March 27, 2009 one third of those who are on both Flickr and Twitter can be identified from the completely anonymous Twitter graph Lawrence Latif, Facebook temporarily halts its latest privacy blunder, The Inquirer, January 18, 2011 Updates to its database allowed developers, once given permission by users, access to users' addresses and telephone numbers. Zeljka Zorz, Private info on Facebook increasingly used in court, Help Net Security, February 2, 2011 when it comes to personal injury cases. Kashmir Hill, Can Facebook-Addicted Congressmen Force Themselves to Crack Down on the Social Network?, Forbes, February 16, 2011 Increasingly, if you want to get elected or sell a product, you have to be on Facebook, Rhea Wessel, Activist Investors Turn to Social Media to Enlist Support, NY Times, March 24, 2011 It has the potential to move groups of shareholders from passive administrators to active participants Randy Abrams, Facebook Retains Right to Exploit Minors, ESET Threat Blog, March 25, 2011 Facebook has automatically opted you in so that at any moment they can share your profile picture with advertisers Emma Barnett, Facebook policy chief admits site needs to improve deletion tools for a minority of users, The Telegraph, March 25, 2011 as soon as they published the information, it was no longer private. Miguel Helft & Matt Richtel, Facebook Prepares to Add Friends in Washington, NY Times, March 28, 2011 One of the big points is to show lawmakers that Facebook is important to their own campaigns..Once that fact is established, Congress will not touch Facebook. Rafe Needleman, Zapoint constructs resumes from social networks, CNET, March 28, 2011 people continually self-report and publicize a lot of work-related skills data. Adam Thierer, On Facebook “Normalizing Relations” with Washington, The Technology Liberation Front, March 29, 2011 coming to Washington has a tendency to change a company’s focus and disposition, and not for the better Byron Acohido, Social-media tools used to target corporate secrets, USA Today, March 30, 2011 Elite cybercriminals are tapping into search engines and social networks to help them target specific employees for social-engineering trickery Dj Walker-Morgan, Cree.py application knows where you've been, The H, March 30, 2011 uses geolocation data from social networks and image hosting services Fahmida Y. Rashid, Sophos Demands Facebook Make Security, Privacy Default Settings, eWeek, April 18, 2011 Claire Cain Miller, Filtering the Social Web to Present News Items, NY Times, April 24, 2011 people can find and piece together publicly available content from Twitter, Flickr, Facebook, YouTube and other sites. Linton Weeks, Privacy 2.0: We Are All Celebrities Now (First of two parts) NPR, April 26, 2011 the problems associated with privacy are large and systemic, owing partly to the rise of commercial and governmental information gathering..and partly also to the spread of technologies that routinely record what we do. Linton Weeks, Privacy 2.0: The Garbo Economy (Second of two parts), NPR, April 27, 2011 They will pay for lives which take them off the grid Nick Bilton, Facebook Hires Duo Behind Daytum, a Personal Data Site, NY Times, April 27, 2011 elegant and intuitive tool for counting and communicating personal statistics. Caitlin Roper, Sites That Share Your Chrome Cache, Wired, April 26, 2011 Mark Zuckerberg’s Clickstream Brian Stelter & Jennifer Preston, Turning to Social Networks for News, NY Times, May 2, 2011 we should be cautious about turning over all of our conversations to privately held companies that are in business for their shareholders Michal Kosinski, David Stillwell, and Thore Graepel, Private traits and attributes are predictable from digital records of human behavior,, PNAS, April 9, 2013, vol. 110, no. 15 Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes…African Americans and Caucasian Americans were correctly classified in 95% of cases, and males and females were..93%…Christians and Muslims were..82%..Democrats and Republicans (85%). Sexual orientation was easier to distinguish among males (88%) than females (75%) Austin Carr, Facebook's Plan To Own Your Phone, FastCompany.com, 06. 16, 2014 If deployed widely, App Links would create a knitwork that would connect users to every delicious service and chunk of knowledge they desire without going through a mobile web browser. Alejandro Llorente et al, Social media fingerprints of unemployment, arXiv:1411.3140, November 12, 2014 we provide a proof of concept for the use of social media individual digital fingerprints to infer city-level behavioral measure Nancy Scola, People Love Spying On One Another: A Q & A With Facebook Critic Eben Moglen, Washington Post, November 19, 2014 Facebook allows them to spy on their friends in return for giving everything up to the boy with the peephole in the middle. Adrienne LaFrance, Facebook and the New Colonialism, The Atlantic, February 11, 2016 Facebook became the de facto Internet for many people because it did the most profoundly useful thing the Internet can do: Connect people. James Stewart, Facebook Has 50 Minutes of Your Time Each Day. It Wants More., New York Times, May 5, 2016 A crucial initiative is improving its News Feed, tailoring it more precisely to the needs and interests of its users, based on how long people spend reading particular posts Kashmir Hill, Facebook recommended that this psychiatrist’s patients friend each other, Fusion, August 29, 2016 All these patients likely have Lisa’s number in their phones, so an algorithm analyzing this network of phone contacts might reasonably assume all these people are connected Brittany Magelssen, Study examines effect of privacy controls on Facebook behavior, EurekAlert, 30-Nov-2016 Facebook users, on average, increased their use of wall posts and decreased their use of private messages in periods after the change in privacy controls. 안하늘, 페이스북은 당신이 현재 연애 중인지 아닌지 알고 있다, 아시아경제, 2017.01.03 페이스북은 빅데이터 분석을 통해 이 모든 사실을 추론 편집 정부의 관심 Tom Espiner, Gov't may track all UK Facebook traffic, ZDNet UK, March 18, 2009 a large number of people don't use ISPs' systems to communicate, instead using online services including webmail and social-networking sites Kashmir Hill, How the C.I.A. Perfects its Social Media Monitoring Technologies, Forbes, November 24, 2010 That’s part of the reason why the C.I.A. created a venture capital arm ten years back, called In-Q-Tel. Darren Pauli, National biometric pub list use 'explodes', ZDNet, February 1, 2011 Pubs and clubs are signing up in droves to national and state biometrics databases that capture patron fingerprints, photos and scanned driver licences in efforts to curb violence. Facebook and Google fight French police's data demands, The Telegraph, April 7, 2011 keep extensive files on users for a year. Andy Greenberg, Feds: “Unread” Privacy Policy Lets Us Nab WikiLeakers’ Twitter Data, Forbes, April 8, 2011 Twitter’s privacy policywhich allows authorities to lift data like users’ IP addresses Ed Oswald, Julian Assange: Facebook is an 'Appalling Spying Machine', PCWorld, May 2, 2011 Facebook and other sites all have built-in methods for U.S. intelligence personnel to snoop on users of the site Brent Skorup, Cops scan social media to help assess your ‘threat rating’, Reuters Blog, December 12, 2014 Commercial, criminal and social media information, including..any comments that could be construed as offensive, all contribute to the threat score. Rich McCormick, Twitter reportedly told analytics company to stop supplying information to US intelligence agencies, The Verge, May 8, 2016 Twitter has a policy banning third-party companies such as Dataminr from selling information to government bodies for the purposes of surveillance. Martin Kaste, Police Searches Of Social Media Face Privacy Pushback, October 15, 2016 it doesn't occur to police that they shouldn't be searching public data the same way a marketing company does. Sophia Cope, U.S. Customs and Border Protection Wants to Know Who You Are on TwitterBut It’s a Flawed Plan, EFF, August 22, 2016 CBP specifically seeks “information associated with your online presenceProvider/PlatformSocial media identifier” 편집 민주화 도구로서의 가능성 Mary Beth Sheridan, Social media curbs pose hurdle for U.S., Washington Post, January 29, 2011 the American government has been especially eager to promote Internet freedom in countries like Iran and China with which it has tense relationships. Tom Krazit, Google, Twitter build Speak to Tweet for Egyptians, CNET, January 31, 2011 a service for tweeting without an Internet connection. Sam Gustin, Social Media Sparked, Accelerated Egypt’s Revolutionary Fire, Wired.com, February 11, 2011 the U.S. intelligence community has fully grasped the power of social media in catalyzing pro-democracy movements worldwide. Forrester Research in Best Practices. Social Networks: Good Or Evil?, CIO, February 17, 2011 Perhaps more disturbing is the potential for repressive regimes to use our emerging social and corporate networks to aid in the repression of free speech Caroline McCarthy, Amid unrest, a hard new look at online anonymity, CNET, February 22, 2011 What Facebook did..was bring the idea of “real identity” to the mainstream Internet Verne G. Kopytoff, Sites Like Twitter Absent From Free Speech Pact, NY Times, March 6, 2011 the effort known as the Global Network Initiative has failed to attract any corporate members beyond the original three, Dylan Tweney, Al Jazeera English Plans Show Centered on Social Networking, Wired.com, March 6, 2011 The democratization of the Arab world is directly related to the democratization of the media Jennifer Preston, Ethical Quandary for Social Sites, NY Times, March 27, 2011 how to accommodate the growing use for political purposes while appearing neutral and maintaining the practices and policies that made these services popular in the first place. Facebook drops 'intifada' page for promoting violence, BBC.com, March 29, 2011 direct calls for violence or expressions of hate Kyle Almond, How one voice can tell the story of an entire movement, CNN, April 1, 2011 Successful revolutions require some form of mass mobilization to challenge established power, Austin Considine, For Activists, Tips on Safe Use of Social Media, NY Times, April 1, 2011 The eye gets focused on the goal and not the process Hayley Tsukayama, Facebook and free speech: it’s complicated, Washington Post, April 21, 2011 now we're allowing too much, maybe, free speech in countries that haven't experienced it before. 편집 표현의 자유 보호대상에서 통제자로 Steven Greenhouse, Labor Panel to Press Reuters Over Reaction to Twitter Post, NY Times, April 6, 2011 employees have the right to criticize or disparage their companies or supervisors as part of a conversation aimed at improving working conditions, Cory Doctorow, Facebook celebrates royal wedding by nuking 50 protest groups, Boing Boing, April 29, 2011 capricious management and the ease of mining it for social graphs Associated Press, No place for hate speech on Facebook: Mark Zuckerberg, News18, February 27, 2016 Until recently in Germany, I don't think we were doing a good enough job Deepa Seetharaman, New Challenge for Social Media: Policing Violent Live Videos, The Wall Street Journal, July 10, 2016 It is hard to tell if a video is going to run afoul of a site’s standards when it is unfolding in real time. 정채희, 가짜뉴스 파문의 실체? 돈벌이에 놀아난 구글·페북, 디지털 타임즈, 2016. 11. 29. 국내 포털은 전문가로 구성된 뉴스제휴평가위원회(이하 뉴스제휴평가위)의 뉴스 제공사업자 검증 작업과 관련 규정, 단계별 심사를 거쳐 뉴스를 노출하기 때문에 가짜 뉴스 사이트가 검색 결과에 노출될 확률이 극히 적다 Sarah Jeong, Terror Scanning Database For Social Media Raises More Questions than Answers, http://motherboard.vice.com/en_us/about Motherboard, December 9, 2016 Facebook, Microsoft, Twitter, and YouTube announced a new partnership to create a “shared industry database” that identifies “content that promotes terrorism 편집 인공지능, 자율주행 Robert A. Burton, How I Learned to Stop Worrying and Love A.I., New York Times, September 21, 2015 Let’s give machines the status of a separate species with a distinctly different type of intellect one that is superior in data crunching but is devoid of emotional reasoning. Not better, not worse, just different. Josh Constine, Facebook’s new DeepText AI categorizes everything you write, techcrunch, Jun 1, 2016 When DeepText identifies a sentence it thinks means you need a ride, it will suggest you use Messenger transportation integrations with services like Uber and Lyft. 김영혁, 자동차의 ‘서비스화’ 시작되고 있다, LG경제연구원, 2016. 3. 22. 운전자가 필요 없는 자율주행자동차는 차량 공유의 개념을 한층 받아들이기 쉽게 만들어 사람들이 자동차를 ‘소유’의 대상에서 이동성이라는 ‘경험’을 제공해주는 일종의 공공재로 인식하게 만들 수 있다 Hiawatha Bray, Is digital justice colorblind?, Boston Globe, May 25, 2016 COMPAS, a “risk assessment” program used in courtrooms throughout the United States, produces outcomes that are biased against African-American defendants 김현재, "인공지능으로 제2 댈러스 사태 사전 탐지 가능", 연합뉴스, 2016. 7. 12. 인공지능을 통해 미리 소요나 테러 사태 등을 예견할 수 있도록 하는 이른바 'iAWACS'(인터넷+공중조기경보기)를 개발해 폭력사태 탐지 자경활동 Alina Selyukh, Tech Giants Team Up To Tackle The Ethics Of Artificial Intelligence, NPR, September 28, 2016 the effort to essentially ensure AI's trustworthiness: driving research toward technologies that are ethical, secure and reliable Chris Smith, Google’s Assistant is amazing if you don’t like privacy or encryption, BGR, Oct 5, 2016 there’s one huge drawback to having a computer try to guess your next actions and predict what you’re going to look for: It has to know everything about you. Keith Naughton, Driverless Cars, Bloomberg, Oct 20, 2016 carmakers see a future in which autonomous “transport pods,” often provided by ridesharing services like Uber or Lyft, supplant the tradition of two owner-operated cars in every garage 송민섭, 연구 'AI 판사'의 판결 정확도는 79%, 세계일보, 2016. 10. 24. 인권 관련 사건 584건의 소장 및 제출 증거, 인권 침해가 자주 발생하는 상황에 관한 알고리즘을 만들었다 When A.I. Matures, It May Call Jürgen Schmidhuber ‘Dad’, The New York Times, John Markoff, NOV. 27, 2016 Is artificial intelligence an engineering discipline, or a godlike field on the cusp of creating a new superintelligent species? Joan Lowy, Government to require cars be able to talk to each other, The Washington Post, December 13, 2016 Vehicle-to-vehicle communications, or V2V, enables cars to transmit their locations, speed, direction and other information ten times per second. DAISUKE WAKABAYASHI, Google Parent Company Spins Off Self-Driving Car Business, The New York Times, DEC. 13, 2016 The challenge for Google is to devise a successful strategy for making money from self-driving cars. Unlike Uber, it doesn’t have a ride-hailing service that can generate fares at least not yet. And unlike Tesla or other automakers, it doesn’t have an auto manufacturing background to build cars or a network to sell them. Why Google, Microsoft and Amazon love the sound of your voice, Bloomberg , Jing Cao and Dina Bass, December 13, 2016 When you tell your phone to search for something, play a song or guide you to a destination, chances are a company is recording it GIDEON LEWIS-KRAUS, The Great A.I. Awakening, The New York Times, DEC. 14, 2016 they don’t assume that “consciousness” is some special, numinously glowing mental attribute..They just believe instead that the complex assortment of skills we call “consciousness” has randomly emerged from the coordinated activity of many different simple mechanisms BILL VLASIC, Detroit Auto Show Reveals a Google-Designed Van That Could Steer the Industry, The New York Times, JAN. 8, 2017 Waymo is positioning itself as a mega-supplier to the industry, and a turnkey solution to transforming conventional cars into driverless models. Stephanie Mlot, MIT: Uber, Lyft Vital in Reducing Congestion, PCMagazine, January 4, 2017 A new MIT study suggests ride-sharing services could eliminate 75 percent of the vehicles on public roads, without significantly impacting travel time. Adam Liptak, Sent to Prison by a Software Program’s Secret Algorithms, The New York Times, MAY 1, 2017 Mr. Loomis “was free to question the assessment and explain its possible flaws.” But it is a little hard to see how he could do that without access to the algorithm itself. Tom Simonite, Apple Just Joined Tech’s Great Race to Democratize AI, The Wired, 06.06.17. Today’s tech giants see AI as the next great platform, which makes the race to democratize it at least as much about the bottom line as the common good. Tom Simonite, Google and Microsoft Can Use AI to Extract Many More Ad Dollars from Our Clicks, The Wired, 08.31.17 John Cosley, director of marketing for Microsoft search advertising, described ads as “perhaps by far the most lucrative application of AI [and] machine learning in the industry.” 이광수, 하드웨어 시장 진출하는 구글…데이터 확보 목적, 뉴스핌, 2017. 10. 17. 구글이 온라인 플랫폼으로만 남아있을 경우 데이터수집 역량이 순수 하드웨어 제조사들보다 낮아질 가능성이 있다, 이러한 위기감의 발로가 구글이 하드웨어 사업을 본격적으로 시작하도록 했을 것으로 추정된다 편집 공유경제 Mark Scott, In Europe, Is Uber a Transportation Service or a Digital Platform?, The New York Times, NOV. 27, 2016 If the court decides that Uber is a transportation service, the company will have to obey Europe’s often onerous labor and safety rules, and comply with rules that apply to traditional taxi association Ryan Calo, Alex Rosenblat, The Taking Economy: Uber, Information, and Power, Columbia Law Review, Vol. 117, 2017, 22 Mar 2017 By virtue of sitting between consumers and providers of services, however, sharing economy firms have a unique capacity to monitor and nudge all participants including people whose livelihood may depend on the platform. NOAM SCHEIBER, How Uber Uses Psychological Tricks to Push Its Drivers’ Buttons, The New York Times, April 1, 2017 using big data and algorithms to manage workers will not simply be a niche phenomenon. It may become one of the most common ways of managing the American labor force. *원호연, ‘앱’ 이용 늘자…따라 커진 특수고용노동자들의 ‘절규’, 헤럴드경제, 2017-04-07 * 스마트폰 앱을 통해 이들에 대한 통제는 보다 간접적이면서도 교묘해지고 있다. 편집 대안으로서의 블록체인 Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. 한수연, 블록체인, 비트코인을 넘어 세상을 넘본다, LG경제연구원, 2016. 8. 3. 블록체인이 가져올 변화의 본질은 ‘거래 승인 권한과 정보의 민주화(Democratization)’로 요약할 수 있다 노승환, 블록체인發 금융혁명 (中) / 금융넘어 전산업으로 확산되는 블록체인, 매일경제, 2016.10.24 참여한 구성원이 개별 데이터를 검증하고 저장하는 블록체인 특성상 정보의 임의 조작이 어렵기 때문에 모든 국민에게 정보를 공개하는 것과 같은 효과가 있다 Anders Brownworth, Blockchain 101 - A Visual Demo, YouTube, Nov 5, 2016 This is a very basic visual introduction to the concepts behind a blockchain. We introduce the idea of an immutable ledger using an interactive web demo Sandeep Soni, After Internet, it's Blockchain Internet 2.0, Entrepreneur India, February 5, 2017 What makes blockchain so acutely disruptive is the data that every transaction, every comment, every click, every website visit, every Google search that we as consumers generate remains under our control stored in the blocks, secured via cryptography and timestamped, and traceable. Toyota Research Institute, Toyota Research Institute Explores Blockchain Technology for Development of New Mobility Ecosystem, May 22, 2017 to develop applications and proofs of concept for three areas of the new mobility ecosystem: driving/testing data sharing, car/ride share transactions and usage-based insurance. Muneeb Ali etc, Blockstack: A New Decentralized Internet, May 16, 2017 We remove any trust points from the middle of the network and use blockchains to secure critical data bindings. Joshep Young, Anonymous Deliveries: Canada Introduces Blockchain, Tor-Based Delivery System, The Cointelegraph, 2017. 7. 18. In this work, we present a Blockchain-based physical delivery system called Lelantos that within a realistic threat model, offers customer anonymity, fair exchange and merchant customer unlinkability. Teddy Wayne, Grandpa Had a Pension. This Generation Has Cryptocurrency, The New York Times, AUG. 3, 2017 “It’s not just about making money,” he said. “We like the idea of not only changing the world, but saving the world. Frisco d'Anconia, Copyright Issues and Censorship - Key Reasons Why Internet Needs Blockchain, The cointelegraph, SEP 03, 2017 While all of the aforementioned projects are not a definite solution to censorship problem, they are providing citizens with the tools their need to protect themselves from it while building the basis for what can one day become a truly free and open Internet. STEVEN JOHNSON, Beyond the Bitcoin Bubble, The New York Time, JAN. 16, 2018 We spent our first years online in a world defined by open protocols and intellectual commons; we spent the second phase in a world increasingly dominated by closed architectures and proprietary databases. Nathaniel Popper, How the Blockchain Could Break Big Tech’s Hold on A.I., The NewYork Times, October 24, 2018 The goal, Mr. McConaghy said, is to “decentralize access to data before it’s too late. 편집 법제도와 그 한계 Jeri Clausing, U.S. and Europe Reach Tentative Pact on Personal Data, New York Times, February 24, 2000 For more than two years it has been negotiating to get the EU to accept a “safe harbor” plan that would allow companies that agree to follow specific standards to be exempt from potential legal action or data cutoffs generated by the directives. Stephen Labaton, U.S. Is Said to Seek New Law to Bolster Internet Privacy, New York Times, May 19, 2000 the Federal Trade Commission has decided to ask Congress for authority to impose tough consumer privacy safeguards, government officials said today. Maha Atal & Damian Kahya, Google's Legal Battles, New Statesman, August 20, 2009 Google uses information we provide to serve us the right advertisements at the right time. Gregg Keizer, FTC calls out Google's Chrome over Do Not Track, Computerworld, April 20, 2011 The bulk of Google's revenue comes from its online advertising business, which could be affected by Do Not Track. 대법원 2011. 9. 2. 선고 2008다42430 전원합의체 판결 비록 이 사건 개인신상정보가 이미 불특정 다수인에게 공개되고 있는 정보라고 하더라도..위와 같이 산출된 인맥지수는 법조인 간의 친밀도라는 사적이고 인격적인 정보를 내용으로 하는 전혀 별개의 새로운 가치를 갖는 정보이다. 그리고..인맥지수 서비스 보호를 통하여 정보주체인 원고들의 동의 없이 자유롭게 인맥지수를 공개할 수 있도록 함으로써 달성되는 공적 가치의 보호 필요성이 높다고 할 수도 없다. 대법원 2012. 1. 12. 선고 2010도2212 판결 방문자의 싸이월드 고유 아이디(tid), 방문 일시, 접속 IP, 이름, 그 전에 방문한 미니홈피의 운영자 이름 등 피고인 2가 유료회원들에게 제공한 방문자 접속기록은..정보통신망법 제49조의 ‘타인의 비밀’에 해당한다 Kuner, Christopher, The European Commission's Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law (February 6, 2012). Bloomberg BNA Privacy and Security Law Report (2012) February 6 2012, pages 1-15 The European Commission’s recent proposal for a General Data Protection Regulation attempts a similar revolution in European data protection law by seeking to shift its focus away from paper-based, bureaucratic requirements and towards compliance in practice, harmonization of the law, and individual empowerment. 대법원 2014. 7. 24. 선고 2012다49933 판결 개인정보자기결정권의 보호대상이 되는 개인정보는 개인의 신체, 신념, 사회적 지위, 신분 등과 같이 개인의 인격주체성을 특징짓는 사항으로서 그 개인의 동일성을 식별할 수 있게 하는 일체의 정보라고 할 수 있고, 반드시 개인의 내밀한 영역에 속하는 정보에 국한되지 않고 공적 생활에서 형성되었거나 이미 공개된 개인정보까지 포함한다. Koops, Bert-Jaap, The Trouble with European Data Protection Law (August 29, 2014). International Data Privacy Law, doi: 10.1093/idpl/ipu023, Forthcoming; Tilburg Law School Research Paper No. 04/2015. In several crucial respects, data protection law is currently a dead letter. The current legal reform will fail to revive it, since its three main objectives are based on fallacies. Simon Sharwood, Watch out: Samsung's TV is watching YOU as you watch it, The Register, February 9, 2015 they also use their voice recognition capabilities to tell unspecified third parties what you're saying Conor Dougherty, Jay Edelson, the Class Action Lawyer Who May Be Tech's Least Friended Man, New York Times, April 4, 2015 the biggest lift to the kind of data privacy litigation he does came from Edward J. Snowden…Those revelations have, in his opinion, made judges much more sympathetic to privacy plaintiffs. '경품 미끼로 개인정보 장사' 홈플러스 1심서 무죄(종합), 연합뉴스) 방현덕, 2016. 1. 8. 홈플러스의 경품응모권에 '개인정보가 보험회사 영업에 활용될 수 있다'는 내용 등 법률상 고지사항이 모두 적혀 있으며, 개인정보 제삼자 유상판매사실을 고객에 통지하지 않은 점은 검찰 주장과 달리 법적 의무가 아니라고 밝혔다. Kieren McCarthy, Senate marks Data Privacy Day with passage of critical bill for Safe Harbor, January 28, 2016 The Act will extend the same privacy rights that US citizens enjoy to European citizens 이수지, 독일 법원, 사용자 동의 없는 페이스북 '좋아요' 버튼 사용 금지 판결, 뉴시스, 2016. 3. 10. '좋아요' 버튼 사용을 통해 개인정보가 노출될 수있다 Joe Mullin, Privacy lawsuit over Gmail will move forward, arsTechnica, Aug 16, 2016 he plaintiffs are seeking to represent only users who do not use Gmail and have never had a Gmail account, but have still had the content of their emails scanned because they interacted with Gmail users. Wendy Davis, Wireless Carriers Press FCC To Allow 'Pay-For-Privacy' Schemes, August 19, 2016 U-Verse customers in those cities who agree to accept AT&T's “Internet Preferences” ad-targeting program can purchase 1-GB service for $70 a month. Customers who don't want to participate in Internet Preferences are charged $99 a month for the same service. Lucian Armasu, EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That, Tom’s Hardware, October 7, 2016 it doesn’t even make European authorities the ones responsible for ensuring EU citizens’ rights are protected against privacy violations by the American companies or government. 임정환, 개인 정보 털어가는 美 기업… ‘프라이버시 실드’ 도입 시급, 문화일보, 2016. 10. 11. 방통위 및 우리 정부에서 할 수 있는 조치는 전무한 상황 Cecilia Kang, Broadband Providers Will Need Permission to Collect Private Data, New York Times, OCT. 27, 2016 The new rules require broadband providers to obtain permission from subscribers to gather and give out data on their web browsing, app use, location and financial information. Evan Schuman, The FCC’s new privacy rules are toothless, Computerworld, Oct 31, 2016, If the FCC wanted to truly protect privacy, it would have prohibited ISPs from including this opt-in as part of the agreement to provide services David Kravets , The most absurd Internet privacy class-action settlement ever, Ars Technica, Aug 30, 2016 Girard said Yahoo gets to continue to scan e-mail. But Yahoo will do it lawfullywhen the e-mail communications are at rest on Yahoo serversinstead of unlawfully, while the e-mails are in transit. 고현실, 스마트폰 앱 무차별 개인 정보 접근 차단, 연합뉴스, 2016/11/25 접근 권한을 필수적 권한과 선택적 권한으로 구분하고, 필수적 권한이 아닌 경우 이용자가 접근 여부를 선택할 수 있도록 이혜리, 세월호 1주기 집회 때 차벽·물대포 쓴 경찰에 손배소송 패소, 경향신문, 2016.11.30 “(경찰이) 폐쇄회로(CC)TV 영상 송출을 차단한 사실은 인정되지만 이를 이용해 집회 참가자들을 감시했다는 증거가 없다”며 “그렇다고(감시를 했다고) 하더라도 홍모씨가 직접 감시를 당했다거나 유출됐었다고 볼 수 없다 김준억, CCTV·블랙박스에 원치 않게 찍힌 영상 삭제요구 쉬워진다, 연합뉴스, 2016/12/15 '개인영상정보 보호법' 제정안을 입법 예고한다 Ryan Gallagher, In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance, The Intercept, 2016-12-21 the European Court of Justice declared that the “general and indiscriminate retention” of data about people’s communications and locations was inconsistent with privacy rights. European Commission, Commission proposes high level of privacy rules for all electronic communications and updates data protection rules for EU institutions, 10 January 2017 Privacy rules will now also cover new providers of electronic communications services Andy Greenberg, How One of Apple's Key Privacy Safeguards Falls Short, Wired, 09.15.17 “They're saying 'yes, we implement differential privacy, trust us, but we’re not going to tell you at what level we do it,'” Korolova says. “By virtue of not revealing what their parameters are, they're kind of breaking any real commitment.” 편집