Tag Archives: data privacy

Feds: We can read all your email, and you’ll never know

Clark D. Cunningham, Georgia State University

Fear of hackers reading private emails in cloud-based systems like Microsoft Outlook, Gmail or Yahoo has recently sent regular people and public officials scrambling to delete entire accounts full of messages dating back years. What we don’t expect is our own government to hack our email – but it’s happening. Federal court cases going on right now are revealing that federal officials can read all your email without your knowledge.

As a scholar and lawyer who started researching and writing about the history and meaning of the Fourth Amendment to the Constitution more than 30 years ago, I immediately saw how the FBI versus Apple controversy earlier this year was bringing the founders’ fight for liberty into the 21st century. My study of that legal battle caused me to dig into the federal government’s actual practices for getting email from cloud accounts and cellphones, causing me to worry that our basic liberties are threatened.

A new type of government search

The federal government is getting access to the contents of entire email accounts by using an ancient procedure – the search warrant – with a new, sinister twist: secret court proceedings.

The earliest search warrants had a very limited purpose – authorizing entry to private premises to find and recover stolen goods. During the era of the American Revolution, British authorities abused this power to conduct dragnet searches of colonial homes and to seize people’s private papers looking for evidence of political resistance.

To prevent the new federal government from engaging in that sort of tyranny, special controls over search warrants were written into the Fourth Amendment to the Constitution. But these constitutional provisions are failing to protect our personal documents if they are stored in the cloud or on our smartphones.

Fortunately, the government’s efforts are finally being made public, thanks to legal battles taken up by Apple, Microsoft and other major companies. But the feds are fighting back, using even more subversive legal tactics.

Searching in secret

To get these warrants in the first place, the feds are using the Electronic Communications Privacy Act, passed in 1986 – long before widespread use of cloud-based email and smartphones. That law allows the government to use a warrant to get electronic communications from the company providing the service – rather than the true owner of the email account, the person who uses it.

And the government then usually asks that the warrant be “sealed,” which means it won’t appear in public court records and will be hidden from you. Even worse, the law lets the government get what is called a “gag order,” a court ruling preventing the company from telling you it got a warrant for your email.

You might never know that the government has been reading all of your email – or you might find out when you get charged with a crime based on your messages.

Microsoft steps up

Much was written about Apple’s successful fight earlier this year to prevent the FBI from forcing the company to break the iPhone’s security system.

But relatively little notice has come to a similar Microsoft effort on behalf of customers that began in April 2016. The company’s suit argued that search warrants delivered to Microsoft for customers’ emails are violating regular people’s constitutional rights. (It also argued that being gagged violates Microsoft’s own First Amendment rights.)

Microsoft’s suit, filed in Seattle, says that over the course of 20 months in 2015 and 2016, it received more than 3,000 gag orders – and that more than two-thirds of the gag orders were effectively permanent, because they did not include end dates. Court documents supporting Microsoft describe thousands more gag orders issued against Google, Yahoo, Twitter and other companies. Remarkably, three former chief federal prosecutors, who collectively had authority for the Seattle region for every year from 1989 to 2009, and the retired head of the FBI’s Seattle office have also joined forces to support Microsoft’s position.

The feds get everything

This search warrant clearly spells out who the government thinks controls email accounts – the provider, not the user. U.S. District Court for the Southern District of New York

It’s very difficult to get a copy of one of these search warrants, thanks to orders sealing files and gagging companies. But in another Microsoft lawsuit against the government a redacted warrant was made part of the court record. It shows how the government asks for – and receives – the power to look at all of a person’s email.

On the first page of the warrant, the cloud-based email account is clearly treated as “premises” controlled by Microsoft, not by the email account’s owner:

“An application by a federal law enforcement officer or an attorney for the government requests the search of the following … property located in the Western District of Washington, the premises known and described as the email account [REDACTED]@MSN.COM, which is controlled by Microsoft Corporation.”

The Fourth Amendment requires that a search warrant must “particularly describe the things to be seized” and there must be “probable cause” based on sworn testimony that those particular things are evidence of a crime. But this warrant orders Microsoft to turn over “the contents of all e-mails stored in the account, including copies of e-mails sent from the account.” From the day the account was opened to the date of the warrant, everything must be handed over to the feds.

The warrant orders Microsoft to turn over every email in an account – including every sent message. U.S. District Court for the Southern District of New York

Reading all of it

In warrants like this, the government is deliberately not limiting itself to the constitutionally required “particular description” of the messages it’s looking for. To get away with this, it tells judges that incriminating emails can be hard to find – maybe even hidden with misleading names, dates and file attachments – so their computer forensic experts need access to the whole data base to work their magic.

If the government were serious about obeying the Constitution, when it asks for an entire email account, at least it would write into the warrant limits on its forensic analysis so only emails that are evidence of a crime could be viewed. But this Microsoft warrant says an unspecified “variety of techniques may be employed to search the seized emails,“ including “email by email review.”

The right to read every email. U.S. District Court for the Southern District of New York

As I explain in a forthcoming paper, there is good reason to suspect this type of warrant is the government’s usual approach, not an exception.

Former federal computer-crimes prosecutor Paul Ohm says almost every federal computer search warrant lacks the required particularity. Another former prosecutor, Orin Kerr, who wrote the first edition of the federal manual on searching computers, agrees: “Everything can be seized. Everything can be searched.” Even some federal judges are calling attention to the problem, putting into print their objections to signing such warrants – but unfortunately most judges seem all too willing to go along.

What happens next

If Microsoft wins, then citizens will have the chance to see these search warrants and challenge the ways they violate the Constitution. But the government has come up with a clever – and sinister – argument for throwing the case out of court before it even gets started.

The government has asked the judge in the case to rule that Microsoft has no legal right to raise the Constitutional rights of its customers. Anticipating this move, the American Civil Liberties Union asked to join the lawsuit, saying it uses Outlook and wants notice if Microsoft were served with a warrant for its email.

The government’s response? The ACLU has no right to sue because it can’t prove that there has been or will be a search warrant for its email. Of course the point of the lawsuit is to protect citizens who can’t prove they are subject to a search warrant because of the secrecy of the whole process. The government’s position is that no one in America has the legal right to challenge the way prosecutors are using this law.

Far from the only risk

The government is taking a similar approch to smartphone data.

For example, in the case of U.S. v. Ravelo, pending in Newark, New Jersey, the government used a search warrant to download the entire contents of a lawyer’s personal cellphone – more than 90,000 items including text messages, emails, contact lists and photos. When the phone’s owner complained to a judge, the government argued it could look at everything (except for privileged lawyer-client communications) before the court even issued a ruling.

The federal prosecutor for New Jersey, Paul Fishman, has gone even farther, telling the judge that once the government has cloned the cellphone it gets to keep the copies it has of all 90,000 items even if the judge rules that the cellphone search violated the Constitution.

Where does this all leave us now? The judge in Ravelo is expected to issue a preliminary ruling on the feds’ arguments sometime in October. The government will be filing a final brief on its motion to dismiss the Microsoft case September 23. All Americans should be watching carefully to what happens next in these cases – the government may be already watching you without your knowledge.

The Conversation

Clark D. Cunningham, W. Lee Burge Chair in Law & Ethics; Director, National Institute for Teaching Ethics & Professionalism, Georgia State University

This article was originally published on The Conversation. Read the original article.

Share Button

After the NSA hack: Cybersecurity in an even more vulnerable world

Nir Kshetri, University of North Carolina – Greensboro

Cybersecurity just got even more difficult. Charis Tsevis/flickr, CC BY-NC-ND

Cybersecurity just got even more difficult. Charis Tsevis/flickr, CC BY-NC-ND

It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). A few days ago, reports began emerging of claims by a hacking group called the Shadow Brokers that it had breached the network of, and accessed critical digital content from, computers used by the Equation Group. This attracted more than the usual amount of attention because the Equation Group is widely believed to be a spying element of the NSA.

It is possible – perhaps even likely – that Shadow Brokers is a group of hackers linked to the Russian government.

Shadow Brokers posted online some examples of the data it said it had stolen, including scripts and instructions for breaking through firewall protection. Cybersecurity analysts poring over that information are confident that the material is in fact from Equation Group. This news raises a bigger question: What are the consequences if the Equation Group – and by extension the NSA – were actually hacked?

What has been breached?

The NSA holds a massive amount of data, including information on U.S. citizens’ and foreign nationals’ phone calls, social connections, emails, web-browsing sessions, online searches and other communications. How much data? NSA’s Utah data center alone is reported to have a storage capacity of 5 zetabytes – 1 trillion gigabytes. However, judging from what has been made public of what has been stolen by Shadow Brokers, this massive data trove has not been breached.

Hacked: the world’s best cyberintelligence agency. National Security Agency

But the NSA’s other key digital asset is a collection of very sophisticated, often custom-designed, hacking, analysis and surveillance software. The agency uses these tools to break into computer networks at home and abroad to spy on specific targets and the public at large.

The Shadow Brokers have claimed to have copies of this software and information on security vulnerabilities the NSA uses in its attacks, including instructions for breaking into computer networks. If true, these would be of very high strategic value to someone seeking to defend against cyberattacks, or wanting to conduct their own.

What is the Equation Group?

The Equation Group has been closely watched since its existence was first revealed in an early 2015 report by security researchers at Kaspersky Lab, a Russian-based computer security company. Cyberattacks using the Equation Group’s signature methods have been carried out since 2001, using extremely specific customized techniques.

In addition to engineering the attacks to ensure a very low risk of detection, they maintain a close watch on their targets to ensure their surveillance does in fact go undetected. And the number of targets they choose is very small – tens of thousands of computers as opposed to the hundreds of thousands or even tens of millions of machines hacked in other major attacks.

Equation Group’s targets included government and diplomatic institutions, companies in diverse sectors as well as individuals in more than 30 countries.

Kaspersky Lab reports that China and Russia are among the countries most infected by the Equation Group’s hacking tools. Among the alleged targets were the Russian natural gas company Gazprom and the airline Aeroflot. Likewise, China’s major mobile companies and universities were allegedly victimized by the NSA.

Who hacks whom?

Cyberweapons and their capabilities are becoming an increasing part of international relations, forming part of foreign policy decisions and even sparking what has been called a “cyber arms race.”

The Shadow Brokers attack may be a part of this global interplay. The U.S. government is considering economic sanctions against Russia, in response to the alleged cyberattack on the Democratic National Committee computers by two Russian intelligence agencies. Those same attackers are believed to have been behind the 2015 cyberattacks on the White House, the State Department and the Joint Chiefs of Staff.

If the material Shadow Brokers have stolen can link cyberattacks on Gazprom, Aeroflot and other Russian targets with the NSA, Russia can argue to the international community that the U.S. is not an innocent victim, as it claims to be. That could weaken support for its sanctions proposal.

Russia and China, among other adversaries, have used similar evidence in this way in the past. Edward Snowden’s revelation of the U.S. PRISM surveillance program, monitoring vast amounts of internet traffic, became an important turning point in China-U.S. cyberrelations. Commenting on the NSA’s alleged hacking of China’s major mobile companies and universities, an editorial in China’s state-run Xinhua News Agency noted: “These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyberattacks, has turned out to be the biggest villain in our age.”

In general, allegations and counterallegations have been persistent themes in Chinese-American interactions about cybercrimes and cybersecurity. China’s approach shifted toward more offensive strategies following Snowden’s revelation of the PRISM surveillance program. It is likely that this hack of cyberweapons may provide China and other U.S. adversaries with even more solid evidence to prove American involvement in cyberattacks against foreign targets.

Cyberattack tools now more widely available

There are other dangers too. Hackers now have access to extremely sophisticated tools and information to launch cyberattacks against military, political and economic targets worldwide. The NSA hack thus may lead to further insecurity of cyberspace.

The attack is also further proof of the cybersecurity industry’s axiom about the highly asymmetric probabilities of successful attack and successful defense: Attackers need to succeed only once; defenders have to be perfect every time. As sophisticated as NSA’s highly secure network is, the agency cannot ever fully protect itself from cyberattackers. Either these attackers have already gotten in, or some other group will be the first to do so in the future.

Actors with fewer financial and technical resources can compromise high-value targets. What will come of this attack remains to be seen, but the potential for profound and wide-ranging, even global, effects is clear.

The Conversation

Nir Kshetri, Professor of Management, University of North Carolina – Greensboro

This article was originally published on The Conversation. Read the original article.

Share Button

Spying’s New Frontier: Private Firm Collects Data on ‘Every American Adult’

“We have data on that 21-year-old who’s living at home with mom and dad”

By Nadia Prupis, staff writer for Common Dreams. Published 8-5-2016

One company has pioneered the powerful new industry known as data-fusion. (Photo: Janne Hellsten/flickr/cc)

One company has pioneered the powerful new industry known as data-fusion. (Photo: Janne Hellsten/flickr/cc)

The fight for internet privacy has focused much of its attention on government surveillance, but mass data collection is done by private companies as well—and one such firm has “centralized and weaponized” all that information for its customers, Bloomberg reports on Friday.

In fact, it has already built a profile on “every American adult,” Bloomberg writes. Continue reading

Share Button

Abu Dhabi announces launch of Israeli-installed mass surveillance system

The Internet of Things applies unique identifiers to objects, people to be followed, and provides large amounts of data on all aspects of an individual’s movements and activities based on the surveillance equipment used.

By Rori Donaghy. Published 7-15-2016 by openDemocracy

Astronaut photo of Abu Dhabi on the Persian Gulf, taken from the International Space Station, 2011. Photo: NASA via Wikimedia Commons

Astronaut photo of Abu Dhabi on the Persian Gulf, taken from the International Space Station, 2011. Photo: NASA via Wikimedia Commons

Authorities in Abu Dhabi announced on Wednesday the launch of an emirate-wide surveillance system, which Middle East Eye previously revealed was installed by an Israeli-owned security company.

The Abu Dhabi Monitoring and Control Centre (ADMCC) said the new Falcon Eye surveillance system “links thousands of cameras spread across the city, as well as thousands of other cameras installed at facilities and buildings in the emirate”. Continue reading

Share Button

Three Years After Snowden, Bipartisan Coalition Demands Congress End Warrantless Spying

“The Snowden leaks caused a sea change in the policy landscape related to surveillance,” writes watchdog, from the recent passage of the USA Freedom Act to the coming showdown in Congress over Section 702.

By Lauren McCauley, staff writer for Common Dreams. Published 6-6-2016

"There can be no renewal of Section 702 unless warrantless surveillance of Americans’ private lives is stopped," declared bipartisan coalition End702. (Photo: Gage Skidmore/cc/flickr)

“There can be no renewal of Section 702 unless warrantless surveillance of Americans’ private lives is stopped,” declared bipartisan coalition End702. (Photo: Gage Skidmore/cc/flickr)

Three years ago on Monday, the world was shattered by news that the United States was conducting sweeping, warrantless surveillance of people, heads of state, and organizations across the globe.

To mark the anniversary of those revelations, brought forth by a then-unknown contractor working for the National Security Administration (NSA), a coalition of public interest groups have launched a new campaign fighting for the expiration of the law that the government claims authorizes its mass spying. Continue reading

Share Button

Supreme Court Quietly Approves Rule to Give FBI ‘Sprawling’ Hacking Powers

Absent action by Congress, the rule change will go into effect in December

By Nadia Prupis, staff writer for Common Dreams. Published 4-29-2016

The rule would allow a federal judge to issue a warrant for any target using anonymity software like Tor to browse the internet. (Photo: Ben Watkin/flickr/cc)

The rule would allow a federal judge to issue a warrant for any target using anonymity software like Tor to browse the internet. (Photo: Ben Watkin/flickr/cc)

The U.S. Supreme Court on Thursday quietly approved a rule change that would allow a federal magistrate judge to issue a search and seizure warrant for any target using anonymity software like Tor to browse the internet.

Absent action by U.S. Congress, the rule change (pdf) will go into effect in December. The FBI would then be able to search computers remotely—even if the bureau doesn’t know where that computer is located—if a user has anonymity software installed on it. Continue reading

Share Button

Leaked Encryption Draft Bill ‘Ignores Economic, Security, and Technical Reality’

“This bill makes effective cybersecurity illegal.”

By Andrea Germanos, staff writer for Common Dreams. Published 4-8-2016

"This bill is a clear threat to everyone's privacy and security," said Neema Singh Guliani, legislative counsel with the ACLU. (Photo: Laura Bittner/flickr/cc)

“This bill is a clear threat to everyone’s privacy and security,” said Neema Singh Guliani, legislative counsel with the ACLU. (Photo: Laura Bittner/flickr/cc)

A draft of a proposed bill mandating companies give, under a court order, the government access to encrypted data is being derided by technology experts as “ludicrous,” as it “ignores technical reality” and threatens everyone’s security.

The Hill reports that it obtained a discussion draft of the legislation, and others have posted the purported 9-page draft online.

The bill’s proposers, Senators Richard Burr (R-North Carolina), Chair of the Senate Intelligence Committee, and Dianne Feinstein (D-California), top Democratic on the committee, neither disavowed the document nor confirmed its legitimacy, the Wall Street Journal reports. Continue reading

Share Button

Chomsky, Snowden, Greenwald on Privacy in the Age of Surveillance

Panel discussion challenges the rhetoric that national security requires that governments can access individual communications.

By Lauren McCauley, staff writer for Common Dreams. Published 3-26-2016

Photo via Facebook

Photo via Facebook

What is privacy and what is an individual’s right to it?

That is the question that renowned linguist and MIT professor Noam Chomsky, National Security Agency (NSA) whistleblower Edward Snowden, and Intercept co-founding editor Glenn Greenwald sought to answer on Friday evening as the three (virtually) shared a stage for a panel discussion at the University of Arizona in Tuscon.

Coming amid the FBI’s public battle against Apple as well as days after the bombings in Brussels last week, which have spurred another round of calls for heightened security and surveillance, the conversation challenged the rhetoric that national security requires that governments can access individual communications. Continue reading

Share Button

ACLU Sounds Alarm as Obama Administration Plans Quiet NSA Expansion

“Before we allow them to spread that information further in the government, we need to have a serious conversation about how to protect Americans’ information.”

By Nadia Prupis, staff writer for Common Dreams. Published 2-26-2016

The new draft rules would loosen restrictions on what the intelligence community can access, without applying privacy protections, the New York Times reports. (Photo: Digitale Gesellschaft/flickr/cc)

The new draft rules would loosen restrictions on what the intelligence community can access, without applying privacy protections, the New York Times reports. (Photo: Digitale Gesellschaft/flickr/cc)

Civil liberties advocates slammed reports on Friday that the Obama administration is poised to authorize the National Security Agency (NSA) to share more of its private intercepted communications with other U.S. intelligence agencies without expanding privacy protections.

“Before we allow them to spread that information further in the government, we need to have a serious conversation about how to protect Americans’ information,” Alex Abdo, a staff attorney with the ACLU’s Speech, Privacy and Technology Project, told the New York Times.

The change would loosen restrictions on access to the communications that are collected in mass data sweeps, including emails and phone calls, the Times reported, citing “officials familiar with the deliberations.”

As Times reporter Charlie Savage explains, the new rules would give intelligence agencies access not just to phone calls and emails, but also to “bulk collection of satellite transmissions, communications between foreigners as they cross network switches in the United States, and messages acquired overseas or provided by allies.”

“That also means more officials will be looking at private messages—not only foreigners’ phone calls and emails that have not yet had irrelevant personal information screened out, but also communications to, from, or about Americans that the N.S.A.’s foreign intelligence programs swept in incidentally,” he writes.

The draft rules have yet to be released to the public. Brian P. Hale, a spokesperson for the Office of the Director of National Intelligence, which oversees the government’s intelligence community, told the Times, “Once these procedures are final and approved, they will be made public to the extent consistent with national security.”

Share Button

In FBI versus Apple, government strengthened tech’s hand on privacy

Written by Rahul Telang. Published 2-25-2016 by The Conversation.

The ongoing fight between Apple and the FBI over breaking into the iPhone maker’s encryption system to access a person’s data is becoming an increasingly challenging legal issue.

With a deadline looming, Apple filed court papers explaining why it is refusing to assist the FBI in cracking a password on an iPhone used by one of the suspects in the San Bernardino shooting. CEO Tim Cook has declared he will take the case all the way to the Supreme Court.

The tech company now wants Congress to step in and define what can be reasonably demanded of a private company, though perhaps it should be careful what it wishes for, considering lawmakers have introduced a bill that compels companies to break into a digital device if the government asks.

But there is an irony to this debate. Government once pushed industry to improve personal data privacy and security – now it’s the tech companies who are trumpeting better security. My own research has highlighted this interplay among businesses, users and regulators when comes to data security and privacy.

For consumers, who in coming years will see ever more of their lives take place in the digital realm, this heightened attention on data privacy is a very good thing.

The heart of the case is the phone of a suspect in the San Bernardino shootings. Reuters

The business case for better privacy grows

Not too long ago, everyone seemed to be bemoaning that companies aren’t doing enough to protect customer security and privacy.

The White House, for example, published a widely cited report saying that the lack of online privacy is essentially a market failure. It highlighted that users simply are in no position to control how their data are collected, analyzed and traded. Thus, a market-based approach to privacy will be ineffective, and regulations were necessary to force firms to to protect the security and privacy of consumer data.

The tide seems to have turned. Repeated stories on data breaches and privacy invasion, particularly from former NSA contractor Edward Snowden, appears to have heightened users’ attention to security and privacy. Those two attributes have become important enough that companies are finding it profitable to advertise and promote them.

Apple, in particular, has highlighted the security of its products recently and reportedly is doubling down and plans to make it even harder for anyone to crack an iPhone.

Whether it is through its payment software or operating system, Apple has emphasized security and privacy as an important differentiator in its products. Of course, unlike Google or Facebook, Apple does not make money using customer data explicitly. So it may have more incentives than others to incorporate these features. But it competes directly with Android and naturally plays an important role in shaping market expectation on what a product and service should look like.

These features possibly play an even more critical role outside the U.S. where privacy is under threat not only from online marketers and hackers but also from governments. In countries like China, where Apple sells millions of iPhones, these features potentially are very attractive to end users to keep their data private from prying eyes of authorities.

Consumers are demanding more security, something Apple has taken to heart. Reuters

Regulators hum a different tune

It is clear that Apple is offering strong security to its users, so much so that FBI accuses it of using it as a marketing gimmick.

It seems we have come a full circle in the privacy debate. A few years ago, regulators were lamenting how businesses were invading consumers’ privacy, lacked the proper incentives to do so and how markets needed stronger rules to make it happen. Today, some of the same regulators are complaining that products are too secure and firms need to relax it in some special cases.

While the legality of this case will likely play out over time, we as end users can feel better that in at least in some markets, companies are responding to a growing consumer demand for products that more aggressively protect our privacy. Interestingly, Apple’s mobile operating system, iOS, offers security by default and does not require users to “opt-in,” a common option in most other products. Moreover, these features are available to every user, whether they explicitly want it or not, suggesting we may be moving to a world in which privacy is fundamental.

Apple CEO Tim Cook has promised to take the fight all the way to the Supreme Court if he must. Reuters

Data sharing gets complicated

At its core, this debate also points to a larger question over how a public-private partnership should be structured in a cyberworld and how and when a company needs to share details with either the government or possibly with other businesses for the public good.

When Google servers were breached in China in 2010, similar questions arose. United States government agencies wanted access to technical details on the breach so it could investigate the perpetrators more thoroughly to unearth possible espionage attempts by Chinese hackers. The breach appeared to be aimed at learning the identities of Chinese intelligence operatives in the U.S. that were under surveillance.

Information sharing on data breaches and security infiltration is something the government has widely encouraged, last year passing the Cybersecurity Information Sharing Act of 2015 to encourage just that.

Unfortunately, various government agencies themselves have become self-interested parties in this game. In particular, the Snowden disclosures revealed that many government agencies conduct extensive surveillance on citizens, which arguably not only undermine our privacy but compromise our entire information security infrastructure.

These agencies, including the FBI in the current case, may have good intentions, but all of this has finally given profit-maximizing companies the right incentives they need to do what the regulators once wanted. Private businesses now have little incentive to get caught up in the bad press that usually follows disclosures like Snowden’s, so it’s no wonder they want to convince their customers that their data are safe and secure, even from the government.

With cybersecurity becoming a tool for government agencies to wage war with other nation-states, it is no surprise that companies want to share less, not more, even with their own governments.

The battle ahead

This case is obviously very specific. I suspect that, in this narrow case, Apple and law enforcement agencies will find a compromise.

But the Apple brand has likely strengthened. In the long run, its loyal customers will reward it for putting them first.

However, this question is not going away anywhere. With the “Internet of things” touted as the next big revolution, more and more devices will capture our very personal data – including our conversations.

This case could be a precedent-setting event that can reshape how our data are stored and managed in the future. But at least for now, some of the companies appear to be – or least say they want to be – on our side in terms protecting our privacy.

About the Author:
 is Professor of Information Systems and Management, Carnegie Mellon University.

Share Button