Privacy-Preserving Surveillance Project

The Privacy-Preserving Surveillance Project

Following the events of September 11, 2001, many in the American public falsely believe they must choose between safety and privacy. Work in the Data Privacy Lab on homeland security, law-enforcement, and intelligence tools has sought to develop technologies that improve these efforts while provably protecting the privacy of citzens.

See testimony: "Privacy Technologies for Homeland Security", Testimony before the Privacy and Integrity Advisory Committee of the Department of Homeland Security (“DHS”), Boston, MA, June 15, 2005. (Testimony and Appendices)

Below are some of the problems we are tackling.

  1. The Credential Validation Problem
    How can we match the person presenting the credential to the subject of the credential?

    Answers depend in part on the particulars of the credentials and the purpose for which they are used. See Social Security numbers, Identity Theft, Identity Angel, Sweeney Identity Phone.

  2. Observing Suspicious Behavior
    How can we observe daily life and automatically identify suspicious behavior when it occurs?

    Answers depend in part on the recording of daily life and which behaviors are considered suspicious. See Video Surveillance, Counting people in publicly available web cams, Selective Revelation, Bio-terrorism Surveillance.

  3. Provably Anonymous Data
    How can we share (within existing legal frameworks) field-structured data with provable guarantees of privacy protection while the data remain practially useful?

    See Bio-terrorism Surveillance, Selective Revelation, Risk Assessment Server, Datafly, Identifiability Server, Privacy Appliance, Distributed Surveillance.

  4. Distributed Surveillance
    How can a network of data holders answer a question without the data being shared or individual values revealed and the answer be the same as could be computed if the data had been shared?

    See Distributed Surveillance.

  5. The Watchlist Problem
    Given a set of data holders (having transactional information on hotel reservations, car rentals, airline travelers, etc.) and a government list of people to watch, how can the data holders notify thegovernment of appearances of people on the list appearing within the transactions without: (1) people who are not the subjects on the list being falsely matched; (2) the list being provided to the data holders; and, (3) information about people not on the list being provided to the government?

    See Towards a Privacy-Preserving Watchlist Solution.

  6. National Economic Vulnerabilties
    What technology tools can reduce economic vulnerabilities available over the Internet that could be used by criminals or terrorists to harm the nation's economic prosperity?

    See Identity Angel, Social Security numbers, Defeating Fraudulent Email Schemes.

  7. Connect the dots (with privacy)
    How can we learn sensitive and strategic information from disparate fragments of information with privact protections?

    See Privacy-Enhanced Linking, Selective Revelation, Risk Assessment Server.

Keywords: homeland security, law-enforcement, intelligence analysis, link analysis, information extraction, anonymization, surveillance, information fusion, tracking, "connect the dots", surveillance cameras, identity theft, fraudulent scams, email scams, link analysis

Related Publications


In the News


Related Links


Copyright © 2011. President and Fellows Harvard University.   |   IQSS   |    Data Privacy Lab   |    [info@dataprivacylab.org]