Talks on Technology Science (ToTS) and Topics in Privacy (TIP)
This is the schedule of weekly talks on Technology Science from expert researchers, public interest groups, and others on the social impact of technology and its unforseen consequences.
Join us on most Friday mornings 10:30 AM - 12 PM at CGIS Knafel, Room K354 (1737 Cambridge St, Cambridge, MA).
|1/27||Michael Sulmeyer and Ben Buchanan, Harvard University||Hacking the Election: The Cybersecurity Threats to Votes and Voters|
|2/10||Arvind Narayanan, Princeton University||How Are You Tracked Online?|
|2/17 (K262)||Alvaro Bedoya, Georgetown University||The Perpetual Line-Up: Unregulated Use of Facial Recognition by the Police in America|
|2/24||Samer Hassan, Berkman Klein Center||Law Is Code: Blockchain as a regulatory technology|
|3/3||Arnon Rosenthal, MITRE||Human-in-the-loop rulesets for legalese, alerts, and access control|
|3/10||No talk||No talk - Spring Recess|
|3/17||No talk||No talk - Spring Recess|
|3/24||Julia Angwin, ProPublica||Algorithmic Accountability|
|4/7||J. Nathan Matias, MIT||Reducing the Spread of Fake News: Coordinating Humans to Nudge AI Behavior|
|4/28||Carrie Goldberg, attorney||The Weaponization of Tech|
Hacking the Election: The Cybersecurity Threats to Votes and Voters
The debate on election hacking is raging. In this talk, we discuss both Russian cyber operations and on weaknesses in the American electoral system. We will provide a framework for contextualizing recent Russian activity, adding greater context to today’s headlines. We will also discuss technical weaknesses in voting infrastructure that urgently need to be remediated and outline potential mechanisms for doing so. As part of this discussion, we’ll address the debate around the “critical infrastructure” designation and its benefits and limits.
Speakers: Ben Buchanan is a Postdoctoral Fellow at Harvard University’s Cybersecurity Project, where he conducts research on the intersection of cybersecurity and statecraft. His first book, The Cybersecurity Dilemma, will be published by Oxford University Press in February 2017. Previously, he has written on attributing cyber attacks, deterrence in cyber operations, cryptography, election cybersecurity, and the spread of malicious code between nations and non-state actors. He received his PhD in War Studies from King’s College London, where he was a Marshall Scholar, and earned masters and undergraduate degrees from Georgetown University.
Michael Sulmeyer is the Belfer Center's Cyber Security Project Director at the Harvard Kennedy School. He recently concluded several years in the Office of the Secretary of Defense, serving most recently as the Director for Plans and Operations for Cyber Policy. He was also Senior Policy Advisor to the Deputy Assistant Secretary of Defense for Cyber Policy. In these jobs, he worked closely with the Joint Staff and Cyber Command on a variety of efforts to counter malicious cyber activity against U.S. and DoD interests.
How Are You Tracked Online?
When you browse the web, hidden “third parties” collect a large amount of data about your behavior. This data feeds algorithms to target ads to you, tailor your news recommendations, and sometimes vary prices of online products. The network of trackers comprises hundreds of entities, but consumers have little awareness of its pervasiveness and sophistication. In this talk I'll discuss the findings and experiences of the Princeton Web Transparency and Accountability Project , which continually monitors the web to uncover what user data companies collect, how they collect it, and what they do with it. We do this via a largely automated monthly “census” of the top 1 million websites, in effect “tracking the trackers”. Our tools and findings have proven useful to regulators and investigatory journalists, and have led to greater public awareness, the cessation of some privacy-infringing practices, and the creation of new consumer privacy tools. But the work raises many new questions. For example, should we hold websites accountable for the privacy breaches caused by third parties? I'll conclude with a discussion of such tricky issues and make recommendations for public policy and regulation of privacy. See paper at http://randomwalker.info/publications/webtap-chapter.pdf
Speaker: Arvind Narayanan is an Assistant Professor of Computer Science at Princeton. He leads the Princeton Web Transparency and Accountability Project to uncover how companies collect and use our personal information. Narayanan also leads a research team investigating the security, anonymity, and stability of cryptocurrencies as well as novel applications of blockchains. He co-created a Massive Open Online Course as well as a textbook on Bitcoin and cryptocurrency technologies. His doctoral research showed the fundamental limits of de-identification, for which he received the Privacy Enhancing Technologies Award. Narayanan is an affiliated faculty member at the Center for Information Technology Policy at Princeton and an affiliate scholar at Stanford Law School's Center for Internet and Society.
The Perpetual Line-Up: Unregulated Use of Facial Recognition by the Police in America
People often think of face recognition technology as some science fiction future. In reality, half of all American adults are in a police or FBI face recognition network. Police face recognition technology is much more pervasive than people realize -- yet it is not subject to any meaningful system of regulation. In this talk, Alvaro Bedoya will discuss The Perpetual Line-Up, the Center's recent year-long investigation into police use of face recognition. In a world where we have no (formal) reasonable expectation of privacy in public, what protections does the Fourth Amendment provide for your face and police technologies that track it? Does the First Amendment protect us against the scanning of faces in a protest, or does it also provide few protections? How should judges and policymakers address face recognition systems' apparent demographic bias in enrollment and accuracy?
Speaker : Alvaro Bedoya is the founding Executive Director of Georgetown Law’s Center on Privacy & Technology. He is an expert on digital privacy issues, including face recognition, commercial data collection, and government surveillance, with a focus on their impact on communities of color. Prior to joining the Center, he served as Chief Counsel to Senator Al Franken and to the U.S. Senate Judiciary Subcommittee on Privacy, Technology and the Law. In that capacity, Alvaro advised Senator Franken on oversight investigations into major Internet and technology companies and in crafting geolocation privacy, cybersecurity and NSA reform legislation. Alvaro is a graduate of Harvard College and Yale Law School.
Law Is Code: Blockchain as a regulatory technology
“Code is law” refers to the idea that, with the advent of digital technology, code has progressively established itself as the predominant way to regulate the behavior of Internet users. Yet, while computer code can enforce rules more efficiently than legal code, it also comes with a series of limitations, mostly because it is difficult to transpose the ambiguity and flexibility of legal rules into a formalized language which can be interpreted by a machine. The Blockchain, the decentralized technology behind Bitcoin, is getting plenty of attention as a new paradigm with multiple implications. In fact, with the blockchain-based "smart contracts", code is assuming an even stronger role in regulating people’s interactions over the Internet, as many contractual transactions get transposed into smart contract code. In this talk, I will discuss the shift from the traditional notion of “code is law” (i.e., code having the effect of law) to the new conception of “law is code” (i.e., law being defined as code). More in http://firstmonday.org/ojs/index.php/fm/article/view/7113
Speaker: Samer Hassan (PhD) is an activist and researcher, Fellow at the Berkman Center for Internet & Society (Harvard University) and Associate Professor at the Universidad Complutense de Madrid (Spain). Currently focused on decentralized collaboration, he has carried out research in decentralized systems, social simulation and artificial intelligence from positions in the University of Surrey (UK) and the American University of Science & Technology (Lebanon). Coming from a multidisciplinary background in Computer Science and Social Sciences, he has more than 45 publications in those fields. Engaged in free/open source projects, he co-founded the Comunes Nonprofit and the Move Commons webtool project. He's an accredited grassroots facilitator and has experience in multiple communities and grassroots initiatives. He's involved as UCM Principal Investigator in the EU-funded P2Pvalue project on building decentralized web-tools for collaborative communities and social movements. His research interests include Commons-based peer production, decentralized architectures, blockchain-based decentralized autonomous organizations, online communities, grassroots social movements & cyberethics. Follow Samer on Twitter: @samerP2P
Human-in-the-loop rulesets for legalese, alerts, and access control
Rulesets give a powerful knowledge capture formalism, but many problems resist full formalization. So we should aim for partial success. Rules are a means of knowledge capture, a next step after schemas and ontologies. But to reach their potential, we must devise ways to specify and operate “imperfect” systems, assisted by humans. This talk describes three ways that rulesets can partially automate customers’ routine tasks to support incremental and agile systems: 1) use a mix of rules, encapsulated English prose, and stored answers to express complex policies; 2) principled ways to automate part of the run time processing, so that rulesets can be flexible about what information they receive without re-programming; and 3) explaining to users what rules apply in their situation. Compliance is a natural initial application; eventually the approach might also be used for regulations and laws.
Speaker: Arnon Rosenthal has consulted and published in data sharing and administration, databases, clouds, data security, policy based systems, and graph algorithms. He has (according to ResearchGate) 150+ publications, and 4000+ citations. His work tries to address many sides of a problem simultaneously, clarify and decompose the challenges, understand the pragmatics, simplify, and generalize components of a solution, for a realistically imperfect world. He has worked at The MITRE Corporation, and Computer Corporation of America, and Sperry Research, was a visiting researcher at IBM Almaden Research and ETH Zurich, and a faculty member at University of Michigan (Ann Arbor). He holds a Ph.D. from the University of California, Berkeley.
|3/10||No talk - Spring Recess|
|3/17||No talk - Spring Recess|
Machines are making a lot of decisions that used to be made by humans. Machines now help us make individual decisions, such as which news we read and the ads we see. They also make societal decisions, such as which neighborhoods get a heavier police presence and which receive more attention from political candidates. Journalist Julia Angwin talks about the challenges of holding machines accountable for their decisions. Read https://www.propublica.org/series/machine-bias
Speaker: Julia Angwin is a senior reporter at ProPublica. From 2000 to 2013, she was a reporter at The Wall Street Journal, where she led a privacy investigative team that was a finalist for a Pulitzer Prize in Explanatory Reporting in 2011 and won a Gerald Loeb Award in 2010. Her book "Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance," was published by Times Books in 2014, and was shortlisted for Best Business Book of the Year by the Financial Times. Also in 2014, Julia was named reporter of the year by the Newswomen’s Club of New York. In 2003, she was on a team of reporters at The Wall Street Journal that was awarded the Pulitzer Prize in Explanatory Reporting for coverage of corporate corruption. She is also the author of “Stealing MySpace: The Battle to Control the Most Popular Website in America” (Random House, March 2009). She earned a B.A. in mathematics from the University of Chicago and an MBA from the Graduate School of Business at Columbia University.
Reducing the Spread of Fake News: Coordinating Humans to Nudge AI Behavior
How can we we pro-socially influence machine behavior without access to code or training data? In a recent study, a community with 15m+ subscribers tested the effect of encouraging fact checking on the algorithmic spread of unreliable news, discovering that adjustments in the wording of this "AI nudge" could reduce the scores that shape the algorithmic spread of unreliable news by 2x. We found that we can persuade algorithms to behave differently by nudging people to behave differently.
How can we think about the politics and ethics of systematically influencing black box systems from the outside? This AI nudge was conducted using CivilServant, novel software that supports communities to conduct their own policy experiments on human and machine behavior–independently of online platforms. In this talk, hear the results of our experiment on reducing the spread of unreliable news, alongside reflections on the history and future of democratic policy experimentation.
Speaker: J. Nathan Matias is a Ph.D. candidate at the MIT Media Lab Center for Civic Media, an affiliate at the Berkman-Klein Center at Harvard, and founder of CivilServant. He conducts independent, public interest research on flourishing, fair, and safe participation online. His recent work includes research on online harassment prevention, harassment reporting, volunteer moderation online (PDF), behavior change toward equality (PDF), and online social movements (PDF).
Nathan has extensive experience in tech startups, nonprofits, and corporate research, including SwiftKey, Microsoft Research, and the Ministry of Stories. His creative work and research have been covered extensively by international press, and he has published data journalism and intellectual history in the Atlantic, Guardian, PBS, and Boston Magazine.
The Weaponization of Tech
Every day, millions of us log into our social media profiles without fully understanding that these sites aid in the manipulative abuse and destruction of people’s lives. It’s time to face the facts - technology is a very effective weapon for users to dox, leak, blackmail, humiliate, extort, abuse, and instigate violence against others. So why aren’t tech companies proactively dealing with it and protecting their loyal users?
Speaker: Carrie Goldberg, Esq. is a victims’ rights lawyer in Brooklyn. She litigates for victims of online harassment, sexual assault and blackmail. She is most known for work involving revenge porn – representing victims in court, fighting for criminal and civil laws on a local, state and federal level, and agitating major tech companies.