Beruflich Dokumente
Kultur Dokumente
REPORT TO THE PRESIDENT
ThePresidentsCouncilofAdvisorsonScienceandTechnology(PCAST)isanadvisorygroupof
theNationsleadingscientistsandengineers,appointedbythePresidenttoaugmentthescience
and technology advice available to him from inside the White House and from cabinet
departments and other Federal agencies. PCAST is consulted about, and often makes policy
recommendationsconcerning,thefullrangeofissueswhereunderstandingsfromthedomains
of science, technology, and innovation bear potentially on the policy choices before the
President.
FormoreinformationaboutPCAST,seewww.whitehouse.gov/ostp/pcast
CoChairs
JohnP.Holdren
AssistanttothePresidentfor
ScienceandTechnology
Director,OfficeofScienceandTechnology
Policy
EricS.Lander
President
BroadInstituteofHarvardandMIT
ViceChairs
WilliamPress
RaymerProfessorinComputerScienceand
IntegrativeBiology
UniversityofTexasatAustin
MaxineSavitz
VicePresident
NationalAcademyofEngineering
Members
S.JamesGates,Jr.
JohnS.TollProfessorofPhysics
Director,CenterforStringandParticle
Theory
UniversityofMaryland,CollegePark
RosinaBierbaum
Dean,SchoolofNaturalResourcesand
Environment
UniversityofMichigan
ChristineCassel
PresidentandCEO
NationalQualityForum
MarkGorenberg
ManagingMember
ZettaVenturePartners
ChristopherChyba
Professor,AstrophysicalSciencesand
InternationalAffairs
Director,ProgramonScienceandGlobal
Security
PrincetonUniversity
SusanL.Graham
PehongChenDistinguishedProfessor
EmeritainElectricalEngineeringand
ComputerScience
UniversityofCalifornia,Berkeley
i
ShirleyAnnJackson
President
RensselaerPolytechnicInstitute
CraigMundie
SeniorAdvisortotheCEO
MicrosoftCorporation
RichardC.Levin(throughmidApril2014)
PresidentEmeritus
FrederickWilliamBeineckeProfessorof
Economics
YaleUniversity
EdPenhoet
Director,AltaPartners
ProfessorEmeritus,BiochemistryandPublic
Health
UniversityofCalifornia,Berkeley
MichaelMcQuade
SeniorVicePresidentforScienceand
Technology
UnitedTechnologiesCorporation
BarbaraSchaal
MaryDellChiltonDistinguishedProfessorof
Biology
WashingtonUniversity,St.Louis
ChadMirkin
GeorgeB.RathmannProfessorofChemistry
Director,InternationalInstitutefor
Nanotechnology
NorthwesternUniversity
EricSchmidt
ExecutiveChairman
Google,Inc.
DanielSchrag
SturgisHooperProfessorofGeology
Professor,EnvironmentalScienceand
Engineering
Director,HarvardUniversityCenterfor
Environment
HarvardUniversity
MarioMolina
DistinguishedProfessor,Chemistryand
Biochemistry
UniversityofCalifornia,SanDiego
Professor,CenterforAtmosphericSciences
attheScrippsInstitutionofOceanography
Staff
MarjoryS.Blumenthal
ExecutiveDirector
AshleyPredith
AssistantExecutiveDirector
KnatokieFord
AAASScience&TechnologyPolicyFellow
ii
SusanL.Graham
PehongChenDistinguishedProfessor
EmeritainElectricalEngineeringand
ComputerScience
UniversityofCalifornia,Berkeley
WilliamPress
RaymerProfessorinComputerScienceand
IntegrativeBiology
UniversityofTexasatAustin
WorkingGroupMembers
S.JamesGates,Jr.
JohnS.TollProfessorofPhysics
Director,CenterforStringandParticle
Theory
UniversityofMaryland,CollegePark
EricS.Lander
President
BroadInstituteofHarvardandMIT
CraigMundie
SeniorAdvisortotheCEO
MicrosoftCorporation
MarkGorenberg
ManagingMember
ZettaVenturePartners
MaxineSavitz
VicePresident
NationalAcademyofEngineering
JohnP.Holdren
AssistanttothePresidentforScienceand
Technology
Director,OfficeofScienceandTechnology
Policy
EricSchmidt
ExecutiveChairman
Google,Inc.
WorkingGroupStaff
MarjoryS.Blumenthal
ExecutiveDirector
PresidentsCouncilofAdvisorsonScience
andTechnology
MichaelJohnson
AssistantDirector
NationalSecurityandInternationalAffairs
iii
iv
Eric S. Lander
Co-chair, PCAST
John P. Holdren
Co-chair, PCAST
Table of Contents
ThePresidentsCouncilofAdvisorsonScienceandTechnology............................................i
PCASTBigDataandPrivacyWorkingGroup...........................................................................ii
TableofContents..................................................................................................................vii
ExecutiveSummary................................................................................................................ix
1.Introduction........................................................................................................................1
1.1Contextandoutlineofthisreport............................................................................1
1.2Technologyhaslongdriventhemeaningofprivacy................................................3
1.3Whatisdifferenttoday?..........................................................................................5
1.4Values,harms,andrights.........................................................................................6
2.ExamplesandScenarios....................................................................................................11
2.1Thingshappeningtodayorverysoon....................................................................11
2.2Scenariosofthenearfutureinhealthcareandeducation.....................................13
2.2.1Healthcare:personalizedmedicine.............................................................13
2.2.2Healthcare:detectionofsymptomsbymobiledevices..............................13
2.2.3Education....................................................................................................14
2.3Challengestothehomesspecialstatus................................................................14
2.4Tradeoffsamongprivacy,security,andconvenience............................................17
3.Collection,Analytics,andSupportingInfrastructure........................................................19
3.1Electronicsourcesofpersonaldata.......................................................................19
3.1.1Borndigitaldata......................................................................................19
3.1.2Datafromsensors.......................................................................................22
3.2Bigdataanalytics....................................................................................................24
3.2.1Datamining.................................................................................................24
3.2.2Datafusionandinformationintegration....................................................25
3.2.3Imageandspeechrecognition....................................................................26
3.2.4Socialnetworkanalysis...............................................................................28
3.3Theinfrastructurebehindbigdata........................................................................30
3.3.1Datacenters................................................................................................30
3.3.2Thecloud....................................................................................................31
4.TechnologiesandStrategiesforPrivacyProtection.........................................................33
4.1Therelationshipbetweencybersecurityandprivacy.............................................33
4.2Cryptographyandencryption................................................................................35
vii
4.2.1WellEstablishedencryptiontechnology.....................................................35
4.2.2Encryptionfrontiers....................................................................................36
4.3Noticeandconsent................................................................................................38
4.4Otherstrategiesandtechniques............................................................................38
4.4.1Anonymizationordeidentification............................................................38
4.4.2Deletionandnonretention........................................................................39
4.5Robusttechnologiesgoingforward.......................................................................40
4.5.1ASuccessortoNoticeandConsent............................................................40
4.5.2ContextandUse..........................................................................................41
4.5.3Enforcementanddeterrence......................................................................42
4.5.4OperationalizingtheConsumerPrivacyBillofRights.................................43
5.PCASTPerspectivesandConclusions................................................................................47
5.1Technicalfeasibilityofpolicyinterventions...........................................................48
5.2Recommendations.................................................................................................49
5.4FinalRemarks.........................................................................................................53
AppendixA.AdditionalExpertsProvidingInput...................................................................55
SpecialAcknowledgment......................................................................................................57
viii
Executive Summary
Theubiquityofcomputingandelectroniccommunicationtechnologieshasledtotheexponential
growthofdatafrombothdigitalandanalogsources.Newcapabilitiestogather,analyze,disseminate,
andpreservevastquantitiesofdataraisenewconcernsaboutthenatureofprivacyandthemeansby
whichindividualprivacymightbecompromisedorprotected.
Afterprovidinganoverviewofthisreportanditsorigins,Chapter1describesthechangingnatureof
privacyascomputingtechnologyhasadvancedandbigdatahascometothefore.Thetermprivacy
encompassesnotonlythefamousrighttobeleftalone,orkeepingonespersonalmattersand
relationshipssecret,butalsotheabilitytoshareinformationselectivelybutnotpublicly.Anonymity
overlapswithprivacy,butthetwoarenotidentical.Likewise,theabilitytomakeintimatepersonal
decisionswithoutgovernmentinterferenceisconsideredtobeaprivacyright,asisprotectionfrom
discriminationonthebasisofcertainpersonalcharacteristics(suchasrace,gender,orgenome).Privacy
isnotjustaboutsecrets.
ConflictsbetweenprivacyandnewtechnologyhaveoccurredthroughoutAmericanhistory.Concern
withtheriseofmassmediasuchasnewspapersinthe19thcenturyledtolegalprotectionsagainstthe
harmsoradverseconsequencesofintrusionuponseclusion,publicdisclosureofprivatefacts,and
unauthorizeduseofnameorlikenessincommerce.Wireandradiocommunicationsledto20thcentury
lawsagainstwiretappingandtheinterceptionofprivatecommunicationslawsthat,PCASTnotes,have
notalwayskeptpacewiththetechnologicalrealitiesoftodaysdigitalcommunications.
Pastconflictsbetweenprivacyandnewtechnologyhavegenerallyrelatedtowhatisnowtermedsmall
data,thecollectionanduseofdatasetsbyprivateandpublicsectororganizationswherethedataare
disseminatedintheiroriginalformoranalyzedbyconventionalstatisticalmethods.Todaysconcerns
aboutbigdatareflectboththesubstantialincreasesintheamountofdatabeingcollectedand
associatedchanges,bothactualandpotential,inhowtheyareused.
Bigdataisbigintwodifferentsenses.Itisbiginthequantityandvarietyofdatathatareavailabletobe
processed.And,itisbiginthescaleofanalysis(termedanalytics)thatcanbeappliedtothosedata,
ultimatelytomakeinferencesanddrawconclusions.Bydataminingandotherkindsofanalytics,non
obviousandsometimesprivateinformationcanbederivedfromdatathat,atthetimeoftheir
collection,seemedtoraiseno,oronlymanageable,privacyissues.Suchnewinformation,used
appropriately,mayoftenbringbenefitstoindividualsandsocietyChapter2ofthisreportgivesmany
suchexamples,andadditionalexamplesarescatteredthroughouttherestofthetext.Eveninprinciple,
however,onecanneverknowwhatinformationmaylaterbeextractedfromanyparticularcollectionof
bigdata,bothbecausethatinformationmayresultonlyfromthecombinationofseeminglyunrelated
datasets,andbecausethealgorithmforrevealingthenewinformationmaynotevenhavebeen
inventedatthetimeofcollection.
Thesamedataandanalyticsthatprovidebenefitstoindividualsandsocietyifusedappropriatelycan
alsocreatepotentialharmsthreatstoindividualprivacyaccordingtoprivacynormsbothwidely
ix
xi
xii
TheWhiteHouseOfficeofScienceandTechnologyPolicy
NITRDreferstotheNetworkingandInformationTechnologyResearchandDevelopmentprogram,whose
participatingFederalagenciessupportunclassifiedresearchinadvancedinformationtechnologiessuchas
computing,networking,andsoftwareandincludebothresearchandmissionfocusedagenciessuchasNSF,NIH,
NIST,DARPA,NOAA,DOEsOfficeofScience,andtheD0Dmilitaryservicelaboratories(see
http://www.nitrd.gov/SUBCOMMITTEE/nitrd_agencies/index.aspx).
2
xiii
xiv
1. Introduction
InawidelynotedspeechonJanuary17,2014,PresidentBarackObamachargedhisCounselor,JohnPodesta,
withleadingacomprehensivereviewofbigdataandprivacy,onethatwouldreachouttoprivacyexperts,
technologists,andbusinessleadersandlookathowthechallengesinherentinbigdataarebeingconfrontedby
boththepublicandprivatesectors;whetherwecanforgeinternationalnormsonhowtomanagethisdata;and
howwecancontinuetopromotethefreeflowofinformationinwaysthatareconsistentwithbothprivacyand
security.3ThePresidentandCounselorPodestaaskedthePresidentsCouncilofAdvisorsonScienceand
Technology(PCAST)toassistwiththetechnologydimensionsofthereview.
ForthistaskPCASTsstatementofworkreads,inpart,
PCASTwillstudythetechnologicalaspectsoftheintersectionofbigdatawithindividualprivacy,in
relationtoboththecurrentstateandpossiblefuturestatesoftherelevanttechnologicalcapabilities
andassociatedprivacyconcerns.
Relevantbigdataincludedataandmetadatacollected,orpotentiallycollectable,fromorabout
individualsbyentitiesthatincludethegovernment,theprivatesector,andotherindividuals.Itincludes
bothproprietaryandopendata,andalsodataaboutindividualscollectedincidentallyoraccidentallyin
thecourseofotheractivities(e.g.,environmentalmonitoringortheInternetofThings).
Thisisatallorder,especiallyontheambitioustimescalerequestedbythePresident.Theliteratureandpublic
discussionofbigdataandprivacyarevast,withnewideasandinsightsgenerateddailyfromavarietyof
constituencies:technologistsinindustryandacademia,privacyandconsumeradvocates,legalscholars,and
journalists(amongothers).IndependentlyofPCAST,butinformingthisreport,thePodestastudysponsored
threepublicworkshopsatuniversitiesacrossthecountry.Limitingthisreportschargetotechnological,not
policy,aspectsoftheproblemnarrowsPCASTsmandatesomewhat,butthisisasubjectwheretechnologyand
policyaredifficulttoseparate.Inanycase,itisthenatureofthesubjectthatthisreportmustberegardedas
basedonamomentarysnapshotofthetechnology,althoughwebelievethekeyconclusionsand
recommendationshavelastingvalue.
RemarksbythePresidentonReviewofSignalsIntelligence,January17,2014.http://www.whitehouse.gov/thepress
office/2014/01/17/remarkspresidentreviewsignalsintelligence
Gartner,Inc.,ITGlossary.https://www.gartner.com/itglossary/bigdata/
Barker,AdamandJonathanStuartWard,UndefinedByData:ASurveyofBigDataDefinitions,arXiv:1309.5821.
http://arxiv.org/abs/1309.5821
6
PCASTacknowledgesgratefullytheassistanceofseveralcontributorsattheNationalScienceFoundation,whohelpedto
identifyanddistillkeyinsightsfromthetechnicalliteratureandresearchcommunity,aswellasothertechnicalexpertsin
academiaandindustrythatitconsultedduringthisproject.SeeAppendixA.
5
Seipp,DavidJ.,TheRighttoPrivacyinAmericanHistory,HarvardUniversity,ProgramonInformationResourcesPolicy,
Cambridge,MA,1978.
8
Warren,SamuelD.andLouisD.Brandeis,"TheRighttoPrivacy."HarvardLawReview4:5,193,December15,1890.
9
Id.at195.
10
DigitalMediaLawProject,PublishingPersonalandPrivateInformation.http://www.dmlp.org/legalguide/publishing
personalandprivateinformation
11
Griswoldv.Connecticut,381U.S.479(1965).
12
Id.at48384.
13
Olmsteadv.UnitedStates,277U.S.438(1928).
14
McIntyrev.OhioElectionsCommission,514U.S.334,34041(1995).Thedecisionreadsinpart,Protectionsfor
anonymousspeecharevitaltodemocraticdiscourse.Allowingdissenterstoshieldtheiridentitiesfreesthemtoexpress
criticalminorityviews...Anonymityisashieldfromthetyrannyofthemajority....Itthusexemplifiesthepurposebehind
theBillofRightsandoftheFirstAmendmentinparticular:toprotectunpopularindividualsfromretaliation...atthehand
ofanintolerantsociety.
15
FederalTradeCommission,PrivacyOnline:FairInformationPracticesintheElectronicMarketplace,May2000.
16
GeneticInformationNondiscriminationActof2008,PL110233,May21,2008,122Stat881.
Intrusionuponseclusion.Apersonwhointentionallyintrudes,physicallyorotherwise(nowincluding
electronically),uponthesolitudeorseclusionofanotherpersonorherprivateaffairsorconcerns,can
besubjecttoliabilityfortheinvasionofherprivacy,butonlyiftheintrusionwouldbehighlyoffensiveto
areasonableperson.
Publicdisclosureofprivatefacts.Similarly,apersoncanbesuedforpublishingprivatefactsabout
anotherperson,evenifthosefactsaretrue.Privatefactsarethoseaboutsomeonespersonallifethat
havenotpreviouslybeenmadepublic,thatarenotoflegitimatepublicconcern,andthatwouldbe
offensivetoareasonableperson.
17
OneHundredTenthCongress,Privacy:Theuseofcommercialinformationresellersbyfederalagencies,Hearingbefore
theSubcommitteeonInformationPolicy,Census,andNationalArchivesoftheCommitteeonOversightandGovernment
Reform,HouseofRepresentatives,March11,2008.
18
Forexample,ExperianprovidesmuchofHealthcare.govsidentityverificationcomponentusingconsumercredit
informationnotavailabletothegovernment.SeeConsumerReports,Havingtroubleprovingyouridentityto
HealthCare.gov?Here'showtheprocessworks,December18,2013.
http://www.consumerreports.org/cro/news/2013/12/howtoproveyouridentityonhealthcare
gov/index.htm?loginMethod=auto
19
Warren,SamuelD.andLouisD.Brandeis,"TheRighttoPrivacy."HarvardLawReview4:5,193,December15,1890.
20
Prosser,WilliamL.,Privacy,CaliforniaLawReview48:383,389,1960.
21
Id.
22
(1)DigitalMediaLawProject,PublishingPersonalandPrivateInformation.http://www.dmlp.org/legal
guide/publishingpersonalandprivateinformation.(2)Id.,ElementsofanIntrusionClaim.http://www.dmlp.org/legal
guide/elementsintrusionclaim
Falselightorpublicity.Closelyrelatedtodefamation,thisharmresultswhenfalsefactsarewidely
publishedaboutanindividual.Insomestates,falselightincludesuntrueimplications,notjustuntrue
factsassuch.
Misappropriationofnameorlikeness.Individualshavearightofpublicitytocontroltheuseoftheir
nameorlikenessincommercialsettings.
ItseemslikelythatmostAmericanstodaycontinuetosharethevaluesimplicitintheseharms,evenifthelegal
language(bynowrefinedinthousandsofcourtdecisions)strikesoneasarchaicandquaint.However,new
technologicalinsultstoprivacy,actualorprospective,andacenturysevolutionofsocialvalues(forexample,
todaysgreaterrecognitionoftherightsofminorities,andofrightsassociatedwithgender),mayrequirea
longerlistthansufficedin1960.
AlthoughPCASTsengagementwiththissubjectiscenteredontechnology,notlaw,anyreportonthesubjectof
privacy,includingPCASTs,shouldbegroundedinthevaluesofitsday.Asastartingpointfordiscussion,albeit
onlyasnapshotoftheviewsofonesetoftechnologicallymindedAmericans,PCASTofferssomepossible
augmentationstotheestablishedlistofharms,eachofwhichsuggestsapossibleunderlyingrightintheageof
bigdata.
PCASTalsobelievesstronglythatthepositivebenefitsoftechnologyare(orcanbe)greaterthananynew
harms.Almosteverynewharmisrelatedtooradjacenttobeneficialusesofthesametechnology.23To
emphasizethispoint,foreachsuggestednewharm,wedescribearelatedbeneficialuse.
Invasionofprivatecommunications.Digitalcommunicationstechnologiesmakesocialnetworking
possibleacrosstheboundariesofgeography,andenablesocialandpoliticalparticipationonpreviously
unimaginablescales.Anindividualsrighttoprivatecommunication,securedforwrittenmailand
wirelinetelephoneinpartbytheisolationoftheirdeliveryinfrastructure,mayneedreaffirmationinthe
digitalera,however,whereallkindsofbitssharethesamepipelines,andthebarrierstointerception
areoftenmuchlower.(Inthiscontext,wediscusstheuseandlimitationsofencryptioninSection4.2.)
Invasionofprivacyinapersonsvirtualhome.TheFourthAmendmentgivesspecialprotectionagainst
governmentintrusionintothehome,forexampletheprotectionofprivaterecordswithinthehome;
tortlawoffersprotectionagainstsimilarnongovernmentintrusion.Thenewvirtualhomeincludes
theInternet,cloudstorage,andotherservices.Personaldatainthecloudcanbeaccessibleand
organized.Photographsandrecordsinthecloudcanbesharedwithfamilyandfriends,andcanbe
passeddowntofuturegenerations.Theunderlyingsocialvalue,thehomeasonescastle,should
logicallyextendtoonescastleinthecloud,butthisprotectionhasnotbeenpreservedinthenew
virtualhome.(WediscussthissubjectfurtherinSection2.3.)
Publicdisclosureofinferredprivatefacts.Powerfuldataanalyticsmayinferpersonalfactsfrom
seeminglyharmlessinputdata.Sometimestheinferencesarebeneficial.Atitsbest,targeted
advertisingdirectsconsumerstoproductsthattheyactuallywantorneed.Inferencesaboutpeoples
healthcanleadtobetterandtimeliertreatmentsandlongerlives.Butbeforetheadventofbigdata,it
couldbeassumedthattherewasacleardistinctionbetweenpublicandprivateinformation:eithera
factwasoutthere(andcouldbepointedto),oritwasnot.Today,analyticsmaydiscoverfactsthat
23
Oneperspectiveinformedbynewtechnologiesandtechnologymedicatedcommunicationsuggeststhatprivacyisabout
thecontinualmanagementofboundariesbetweendifferentspheresofactionanddegreesofdisclosurewithinthose
spheres,withprivacyandonespublicfacebeingbalancedindifferentwaysatdifferenttimes.See:LeysiaPalenandPaul
Dourish,UnpackingPrivacyforaNetworkedWorld,ProceedingsofCHI2003,AssociationforComputingMachinery,
April510,2003.
arenolessprivatethanyesterdayspurelyprivatesphereoflife.Examplesincludeinferringsexual
preferencefrompurchasingpatterns,orearlyAlzheimersdiseasefromkeyclickstreams.Inthelatter
case,theprivatefactmaynotevenbeknowntotheindividualinquestion.(Section3.2discussesthe
technologybehindthedataanalyticsthatmakessuchinferencespossible.)Thepublicdisclosureofsuch
information(andpossiblyalsosomenonpubliccommercialuses)seemsoffensivetowidelyshared
values.
Tracking,stalking,andviolationsoflocationalprivacy.Todaystechnologieseasilydeterminean
individualscurrentorpriorlocation.Usefullocationbasedservicesincludenavigation,suggesting
bettercommuterroutes,findingnearbyfriends,avoidingnaturalhazards,andadvertisingthe
availabilityofnearbygoodsandservices.Sightinganindividualinapublicplacecanhardlybeaprivate
fact.Whenbigdataallowssuchsightings,orotherkindsofpassiveoractivedatacollection,tobe
assembledintothecontinuouslocationaltrackofanindividualsprivatelife,however,manyAmericans
(includingSupremeCourtJusticeSotomayor,forexample24)perceiveapotentialaffronttoawidely
acceptedreasonableexpectationofprivacy.
Harmarisingfromfalseconclusionsaboutindividuals,basedonpersonalprofilesfrombigdata
analytics.Thepowerofbigdata,andthereforeitsbenefit,isoftencorrelational.Inmanycasesthe
harmsfromstatisticalerrorsaresmall,forexampletheincorrectinferenceofamoviepreference;or
thesuggestionthatahealthissuebediscussedwithaphysician,followingfromanalysesthatmay,on
average,bebeneficial,evenwhenaparticularinstanceturnsouttobeafalsealarm.Evenwhen
predictionsarestatisticallyvalid,moreover,theymaybeuntrueaboutparticularindividualsand
mistakenconclusionsmaycauseharm.Societymaynotbewillingtoexcuseharmscausedbythe
uncertaintiesinherentinstatisticallyvalidalgorithms.Theseharmsmayunfairlyburdenparticular
classesofindividuals,forexample,racialminoritiesortheelderly.
Foreclosureofindividualautonomyorselfdetermination.Dataanalysesaboutlargepopulationscan
discoverspecialcasesthatapplytoindividualswithinthatpopulation.Forexample,byidentifying
differencesinlearningstyles,bigdatamaymakeitpossibletopersonalizeeducationinwaysthat
recognizeeveryindividualspotentialandoptimizethatindividualsachievement.Buttheprojectionof
populationfactorsontoindividualscanbemisused.Itiswidelyacceptedthatindividualsshouldbeable
tomaketheirownchoicesandpursueopportunitiesthatarenotnecessarilytypical,andthatnoone
shouldbedeniedthechancetoachievemorethansomestatisticalexpectationofthemselves.Itwould
offendourvaluesifachildschoicesinvideogameswerelaterusedforeducationaltracking(for
example,collegeadmissions).Similarlyoffensivewouldbeafuture,akintoPhilipK.Dicksscience
fictionshortstoryadaptedbyStevenSpielberginthefilmMinorityReport,whereprecrimeis
statisticallyidentifiedandpunished.25
Lossofanonymityandprivateassociation.Anonymityisnotacceptableasanenablerofcommitting
fraud,orbullying,orcyberstalking,orimproperinteractionswithchildren.Apartfromwrongful
behavior,however,theindividualsrighttochoosetobeanonymousisalongheldAmericanvalue(as,
forexample,theanonymousauthorshipoftheFederalistpapers).Usingdatato(re)identifyan
individualwhowishestobeanonymous(exceptinthecaseoflegitimategovernmentalfunctions,such
aslawenforcement)isregardedasaharm.Similarly,individualshavearightofprivateassociationwith
groupsorotherindividuals,andtheidentificationofsuchassociationsmaybeaharm.
24
Iwouldaskwhetherpeoplereasonablyexpectthattheirmovementswillberecordedandaggregatedinamannerthat
enablestheGovernmenttoascertain,moreorlessatwill,theirpoliticalandreligiousbeliefs,sexualhabits,andsoon.
UnitedStatesv.Jones(101259),Sotomayorconcurrenceathttp://www.supremecourt.gov/opinions/11pdf/101259.pdf.
25
Dick,PhillipK.,TheMinorityReport,firstpublishedinFantasticUniverse(1956)andreprintedinSelectedStoriesof
PhilipK.Dick,NewYork:Pantheon,2002.
10
26
ElBoghdady,Dina,AdvertisersTuneIntoNewRadioGauge,TheWashingtonPost,October25,2004.
http://www.washingtonpost.com/wpdyn/articles/A600132004Oct24.html
27
AmericanCivilLibertiesUnion,YouAreBeingTracked:HowLicensePlateReadersAreBeingUsedToRecordAmericans
Movements,July,2013.https://www.aclu.org/files/assets/071613aclualprreportoptv05.pdf
28
Hardy,Quentin,HowUrbanAnonymityDisappearsWhenAllDataIsTracked,TheNewYorkTimes,April19,2014.
29
Rudin,Cynthia,Predictivepolicing:UsingMachineLearningtoDetectPatternsofCrime,Wired,August22,2013.
http://www.wired.com/insights/2013/08/predictivepolicingusingmachinelearningtodetectpatternsof
crime/.:www.wired.com/insights/2013/08/predictivedetectpattern
30
(1)Schiller,Benjamin,FirstDegreePriceDiscriminationUsingBigData,Jan.30.2014,BrandeisUniversity.
http://benjaminshiller.com/images/First_Degree_PD_Using_Big_Data_Jan_27,_2014.pdfand
http://www.forbes.com/sites/modeledbehavior/2013/09/01/willbigdatabringmorepricediscrimination/(2)Fisher,
WilliamW.WhenShouldWePermitDifferentialPricingofInformation?UCLALawReview55:1,2007.
11
TheUKfirmFeatureSpaceoffersmachinelearningalgorithmstothegamingindustrythatmaydetect
earlysignsofgamblingaddictionorotheraberrantbehavioramongonlineplayers.31
RetailerslikeCVSandAutoZoneanalyzetheircustomersshoppingpatternstoimprovethelayoutof
theirstoresandstocktheproductstheircustomerswantinaparticularlocation.32Bytrackingcell
phones,RetailNextoffersbricksandmortarretailersthechancetorecognizereturningcustomers,just
ascookiesallowthemtoberecognizedbyonlinemerchants.33SimilarWiFitrackingtechnologycould
detecthowmanypeopleareinaclosedroom(andinsomecasestheiridentities).
TheretailerTargetinferredthatateenagecustomerwaspregnantand,bymailinghercoupons
intendedtobeuseful,unintentionallydisclosedthisfacttoherfather.34
Theauthorofananonymousbook,magazinearticle,orwebpostingisfrequentlyoutedbyinformal
crowdsourcing,fueledbythenaturalcuriosityofmanyunrelatedindividuals.35
Socialmediaandpublicsourcesofrecordsmakeiteasyforanyonetoinferthenetworkoffriendsand
associatesofmostpeoplewhoareactiveontheweb,andmanywhoarenot.36
MaristCollegeinPoughkeepsie,NewYork,usespredictivemodelingtoidentifycollegestudentswhoare
atriskofdroppingout,allowingittotargetadditionalsupporttothoseinneed.37
TheDurkheimProject,fundedbytheU.S.DepartmentofDefense,analyzessocialmediabehaviorto
detectearlysignsofsuicidalthoughtsamongveterans.38
LendUp,aCaliforniabasedstartup,soughttousenontraditionaldatasourcessuchassocialmediato
providecredittounderservedindividuals.Becauseofthechallengesinensuringaccuracyandfairness,
however,theyhavebeenunabletoproceed.39,40
31
BurnMurdoch,John,UKtechnologyfirmusesmachinelearningtocombatgamblingaddiction,TheGuardian,August1,
2013.http://www.theguardian.com/news/datablog/2013/aug/01/ukfirmusesmachinelearningfightgamblingaddiction
32
Clifford,Stephanie,UsingDatatoStageManagePathstothePrescriptionCounter,TheNewYorkTimes,June19,2013.
http://bits.blogs.nytimes.com/2013/06/19/usingdatatostagemanagepathstotheprescriptioncounter/
33
Clifford,Stephanie,Attention,Shoppers:StoreIsTrackingYourCell,TheNewYorkTimes,July14,2013.
34
Duhigg,Charles,HowCompaniesLearnYourSecrets,TheNewYorkTimesMagazine,February12,2012.
http://www.nytimes.com/2012/02/19/magazine/shoppinghabits.html?pagewanted=all&_r=0
35
Volokh,Eugene,OutingAnonymousBloggers,June8,2009.http://www.volokh.com/2009/06/08/outinganonymous
bloggers/;A.Narayananetal.,OntheFeasibilityofInternetScaleAuthorIdentification,IEEESymposiumonSecurityand
Privacy,May2012.http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6234420
36
FacebooksTheGraphAPI(athttps://developers.facebook.com/docs/graphapi/)describeshowtowritecomputer
programsthatcanaccesstheFacebookfriendsdata.
37
Oneoffourbigdataapplicationshonoredbythetradejournal,Computerworld,in2013.King,Julia,UNtacklessocio
economiccriseswithbigdata,Computerworld,June3,2013.
http://www.computerworld.com/s/article/print/9239643/UN_tackles_socio_economic_crises_with_big_data
38
Ungerleider,Neal,ThisMayBeTheMostVitalUseOfBigDataWeveEverSeen,FastCompany,July12,2013.
http://www.fastcolabs.com/3014191/thismaybethemostvitaluseofbigdataweveeverseen.
39
CenterforDataInnovations,100DataInnovations,InformationTechnologyandInnovationFoundation,Washington,DC,
January2014.http://www2.datainnovation.org/2014100datainnovations.pdf
40
Waters,Richard,Dataopendoorstofinancialinnovation,FinancialTimes,December13,2013.
http://www.ft.com/intl/cms/s/2/3c59d58a43fb11e2844c00144feabdc0.html
12
Insightintothespreadofhospitalacquiredinfectionshasbeengainedthroughtheuseoflargeamounts
ofpatientdatatogetherwithpersonalinformationaboutuninfectedpatientsandclinicalstaff.41
Individualsheartratescanbeinferredfromthesubtlechangesintheirfacialcolorationthatoccurwith
eachbeat,enablinginferencesabouttheirhealthandemotionalstate.42
41
(1)Wiens,Jenna,JohnGuttag,andEricHorvitz,AStudyinTransferLearning:LeveragingDatafromMultipleHospitalsto
EnhanceHospitalSpecificPredictions,JournaloftheAmericanMedicalInformaticsAssociation,January2014.(2)
Weitzner,DanielJ.,etal.,ConsumerPrivacyBillofRightsandBigData:ResponsetoWhiteHouseOfficeofScienceand
TechnologyPolicyRequestforInformation,April4,2014.
42
Frazer,Bryant,MITComputerProgramRevealsInvisibleMotioninVideo,TheNewYorkTimesvideo,February27,2013.
https://www.youtube.com/watch?v=3rWycBEHn3s
13
2.2.3 Education
Drawingonmillionsoflogsofonlinecourses,includingbothmassiveopenonlinecourses(MOOCs)andsmaller
classes,itwillsoonbepossibletocreateandmaintainlongitudinaldataabouttheabilitiesandlearningstylesof
millionsofstudents.Thiswillincludenotjustbroadaggregateinformationlikegrades,butfinegrainedprofiles
ofhowindividualstudentsrespondtomultiplenewkindsofteachingtechniques,howmuchhelptheyneedto
masterconceptsatvariouslevelsofabstraction,whattheirattentionspanisinvariouscontexts,andsoforth.A
MOOCplatformcanrecordhowlongastudentwatchesaparticularvideo;howoftenasegmentisrepeated,
spedup,orskipped;howwellastudentdoesonaquiz;howmanytimesheorshemissesaparticularproblem;
andhowthestudentbalanceswatchingcontenttoreadingatext.Astheabilitytopresentdifferentmaterialto
differentstudentsmaterializesintheplatforms,thepossibilityofblind,randomizedA/Btestingenablesthegold
standardofexperimentalsciencetobeimplementedatlargescaleintheseenvironments.43
Similardataarealsobecomingavailableforresidentialclasses,aslearningmanagementsystems(suchas
Canvas,Blackboard,orDesire2Learn)expandtheirrolestosupportinnovativepedagogy.Inmanycoursesone
cannowgetmomentbymomenttrackingofthestudent'sengagementwiththecoursematerialsandcorrelate
thatengagementwiththedesiredlearningoutcomes.
Withthisinformation,itwillbepossiblenotonlytogreatlyimproveeducation,butalsotodiscoverwhatskills,
taughttowhichindividualsatwhichpointsinchildhood,leadtobetteradultperformanceincertaintasks,orto
adultpersonalandeconomicsuccess.Whilethesedatacouldrevolutionizeeducationalresearch,theprivacy
issuesarecomplex.44
Therearemanyprivacychallengesinthisvisionofthefutureofeducation.Knowledgeofearlyperformancecan
createimplicitbiases45thatcolorlaterinstructionandcounseling.Thereisgreatpotentialformisuse,ostensibly
forthesocialgood,inthemassiveabilitytodirectstudentsintohighorlowpotentialtracks.Parentsand
othershaveaccesstosensitiveinformationaboutchildren,butmechanismsrarelyexisttochangethose
permissionswhenthechildreachesmajority.
43
ForanoverviewofMOOCsandassociatedanalyticsopportunities,seePCASTsDecember2013lettertothePresident.
http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_edit_dec2013.pdf
44
Thereisalsouncertaintyabouthowtointerpretapplicablelaws,suchastheFamilyEducationalRightsandPrivacyAct
(FERPA).RecentFederalguidanceisintendedtohelpclarifythesituation.See:U.S.DepartmentofEducation,Protecting
StudentPrivacyWhileUsingOnlineEducationalServices:RequirementsandBestPractices,February2014.
http://ptac.ed.gov/sites/default/files/Student%20Privacy%20and%20Online%20Educational%20Services%20%28February%
202014%29.pdf
45
Cukier,Kenneth,andViktorMayerSchoenberger,"HowBigDataWillHauntYouForever,"Quartz,March11,2014.
http://qz.com/185252/howbigdatawillhauntyouforeveryourhighschooltranscript/
14
46
Nest,acquiredbyGoogle,attractedattentionearlyforitsdesignanditsuseofbigdatatoadapttoconsumerbehavior.
See:Aoki,Kenji,"NestGivestheLowlySmokeDetectoraBrain,"Wired,October,2013.
http://www.wired.com/2013/10/nestsmokedetector/all/
15
47
Reuters,AppleacquiresIsraeli3DchipdeveloperPrimeSense,November25,2013.
http://www.reuters.com/article/2013/11/25/usprimesenseofferappleidUSBRE9AO04C20131125
48
Id.
49
Google,Glassgestures.https://support.google.com/glass/answer/3064184?hl=en
50
Tene,Omer,andJulesPolonetsky,"ATheoryofCreepy:Technology,PrivacyandShiftingSocialNorms,"YaleJournalof
LawandTechnology16:59,2013,pp.59100.
16
51
Seereferencesatfootnote30.
17
18
emailandtextmessaging
inputviamouseclicks,taps,swipes,orkeystrokesonaphone,tablet,computer,orvideogame;thatis,
datathatpeopleintentionallyenterintoadevice
52
Suchdatabasesendureandformthebasisofcontinuingconcernamongprivacyadvocates.
Schemasareformaldefinitionsoftheconfigurationofadatabase:itstables,relations,andindices.Headersarethe
sometimesinvisibleprefacestoemailmessagesthatcontaininformationaboutthesendinganddestinationaddressesand
sometimestheroutingofthepathbetweenthem.
54
IntheInternetandsimilarnetworks,informationisbrokenupintochunkscalledpackets,whichmaytravel
independentlyanddependonmetadatatobereassembledproperlyatthedestinationofthetransmission.
53
19
GPSlocationdata
metadataassociatedwithphonecalls:thenumbersdialedfromorto,thetimeanddurationofcalls
dataassociatedwithmostcommercialtransactions:creditcardswipes,barcodereads,readsofRFID
tags(asusedforantitheftandinventorycontrol)
dataassociatedwithportalaccess(keycardorIDbadgereads)andtollroadaccess(remotereadsof
RFIDtags)
metadatathatourmobiledevicesusetostayconnectedtothenetwork,includingdevicelocationand
status
increasingly,datafromcars,televisions,appliances:theInternetofThings
Consumertrackingdataprovideanexampleofborndigitaldatathathasbecomeeconomicallyimportant.Itis
generallypossibleforcompaniestoaggregatelargeamountsofdataandthenusethosedataformarketing,
advertising,ormanyotheractivities.Thetraditionalmechanismhasbeentousecookies,smalldatafilesthata
browsercanleaveonauserscomputer(pioneeredbyNetscapetwodecadesago).Thetechniqueistoleavea
cookiewhenauserfirstvisitsasiteandthenbeabletocorrelatethatvisitwithasubsequentevent.This
informationisveryvaluabletoretailersandformsthebasisofmanyoftheadvertisingbusinessesofthelast
decade.Therehasbeenavarietyofproposalstoregulatesuchtracking,55andmanycountriesrequireoptin
permissionbeforethistrackingisdone.Cookiesinvolverelativelysimplepiecesofinformationthatproponents
representasunlikelytobeabused.Althoughnotalwaysawareoftheprocess,peopleacceptsuchtrackingin
returnforafreeorsubsidizedservice.56Atthesametime,cookiefreealternativesaresometimesavailable.57
Evenwithoutcookies,socalledfingerprintingtechniquescanoftenidentifyauserscomputerormobile
deviceuniquelybytheinformationthatitexposespublicly,suchasthesizeofitsscreen,itsinstalledfonts,and
otherfeatures.58Mosttechnologistsbelievethatapplicationswillmoveawayfromcookies,thatcookiesaretoo
simpleanidea,andthattherearebetteranalyticscomingandbetterapproachesbeinginvented.Theeconomic
incentivesforconsumertrackingwillremain,however,andbigdatawillallowformorepreciseresponses.
Trackingisalsotheenablingtechnologyofsomemorenefarioususes.Unfortunately,manysocialnetworking
appsbeginbytakingapersonscontactlistandspammingalltherecipientswithadvertisingfortheapp.This
techniqueisoftenabused,especiallybysmallstartupswhomayassessthevaluegainedbyreachingnew
customersasbeinggreaterthanthevaluelosttotheirreputationforhonoringprivacy.
55
FederalTradeCommission,FTCStaffRevisesOnlineBehavioralAdvertisingPrinciples,PressRelease,February12,2009.
http://www.ftc.gov/newsevents/pressreleases/2009/02/ftcstaffrevisesonlinebehavioraladvertisingprinciples
56
(1)Cf.TheWallStreetJournalsWhattheyknowseries(http://online.wsj.com/public/page/whattheyknowdigital
privacy.html).(2)Turow,Joseph,TheDailyYou:HowtheAdvertisingIndustryisDefiningyourIdentityandYourWorth,Yale
UniversityPress,2012.http://yalepress.yale.edu/book.asp?isbn=9780300165012
57
DuckDuckGoisanontrackingsearchenginethat,whileperhapsyieldingfewerresultsthanleadingsearchengines,is
usedbythoselookingforlesstracking.See:https://duckduckgo.com/
58
(1)Tanner,Adam,TheWebCookieIsDying.Here'sTheCreepierTechnologyThatComesNext,Forbes,June17,2013.
http://www.forbes.com/sites/adamtanner/2013/06/17/thewebcookieisdyingheresthecreepiertechnologythat
comesnext/(2)Acar,G.etal.,FPDetective:DustingtheWebforFingerprinters,2013.
http://www.cosic.esat.kuleuven.be/publications/article2334.pdf
20
59
FederalTradeCommission,AndroidFlashlightAppDeveloperSettlesFTCChargesItDeceivedConsumers,Press
Release,December5,2013.http://www.ftc.gov/newsevents/pressreleases/2013/12/androidflashlightappdeveloper
settlesftcchargesitdeceived
60
(1)FTCFileNo.1323087Decisionandorder.
http://www.ftc.gov/system/files/documents/cases/140409goldenshoresdo.pdf(2)FTCApprovesFinalOrderSettling
ChargesAgainstFlashlightAppCreator.http://www.ftc.gov/newsevents/pressreleases/2014/04/ftcapprovesfinal
ordersettlingchargesagainstflashlightapp
21
thevoiceand/orvideocontentofaphonecallbornanalogbutimmediatelyconvertedtodigitalbythe
phonesmicrophoneandcamera
personalhealthdatasuchasheartbeat,respiration,andgait,assensedbyspecialpurposedevices
(Fitbithasbeenaleadingprovider61)orcellphoneapps
cameras/sensorsintelevisionsandvideogamesthatinterpretgesturesbytheuser
videofromsecuritysurveillancecameras,mobilephones,oroverheaddrones
imaginginfraredvideothatcanseeinwhatpeopleperceiveastotaldarkness(andalsoseeevanescent
tracesofpastevents,socalledheatscars)
microphonenetworksincities,usedtodetectandlocategunshotsandforpublicsafety
cameras/microphonesinclassroomsandothermeetingrooms
ultrasonicmotiondetectors
medicalimaging,CT,andMRIscans,ultrasonicimaging
opportunisticallycollectedchemicalorbiologicalsamples,notablytraceDNA(todayrequiringslow,off
lineanalysis,butforeseeablymorenimble)
syntheticapertureradar(SAR),whichcanimagethroughcloudsand,undersomeconditions,seeinside
ofnonmetallicstructures
unintendedradiofrequencyemissionsfromelectricalandelectronicdevices
Whendataarebornanalog,theyarelikelytocontainmoreinformationthantheminimumnecessaryfortheir
immediatepurpose,forseveralvalidreasons.Oneisthatthedesiredinformation(signal)mustbesensedin
thepresenceofunwantedextraneousinformation(noise).Thetechnologiestypicallyworkbysensingthe
environment(signalplusnoise)withhighprecision,sothatmathematicaltechniquescanthenbeappliedthat
willseparatethetwoevenintheworstanticipatedcasewhenthesignalissmallestorthenoiseislargest.
Anotherreasonistechnologicalconvergence.Forexample,asthecamerasincellphonesbecomesmallerand
cheaper,theuseofidenticalcomponentsinotherproductsbecomesafavoreddesignchoice,evenwhenfull
imagesarenotneeded.WhereabigscreentelevisiontodayhasseparatesensorsforitsIRremotecontrol,
roombrightness,andmotiondetection(afeaturethatturnsoffthepicturewhennooneisintheroom),plusa
truevideocameraintheaddongameconsole,tomorrowsmodelmayintegrateallofthesefunctionsina
single,cheap,highresolution,IRsensitivecamera,afewmillimetersinsize.
61
See:http://www.fitbit.com/
22
62
Koonin,StevenE.,GregoryDoblerandJonathanS.Wurtele,UrbanPhysics,AmericanPhysicalSocietyNews,March,
2014.http://www.aps.org/publications/apsnews/201403/urban.cfm
63
Durand,Fredo,etal.,MITComputerProgramRevealsInvisibleMotioninVideo,TheNewYorkTimes,video,February
27,2013.https://www.youtube.com/watch?v=3rWycBEHn3s
64
Feldman,Ronen,TechniquesandApplicationsforSentimentAnalysis,CommunicationsoftheACM,56:4,pp.8289.
65
MayerSchnberger,ViktorandKennethCukier,BigData:ARevolutionThatWillTransformHowWeLive,Work,and
Think,Boston,NY:HoughtonMifflinHarcourt,2013.
23
Classificationalgorithmsattempttoassignobjectsoreventstoknowncategories.Forexample,a
hospitalmightwanttoclassifydischargedpatientsashigh,medium,orlowriskforreadmission.
Clusteringalgorithmsgroupobjectsoreventsintocategoriesbysimilarity,asinthecatexample
above.
Regressionalgorithms(alsocallednumericalpredictionalgorithms)trytopredictnumericalquantities.
Forexample,abankmaywanttopredict,fromthedetailsinaloanapplication,theprobabilityofa
default.
Associationtechniquestrytofindrelationshipsbetweenitemsintheirdataset.Amazonssuggested
productsandNetflixssuggestedmoviesareexamples.
Anomalydetectionalgorithmslookforuntypicalexampleswithinadataset,forexample,detecting
fraudulenttransactionsonacreditcardaccount.
Summarizationtechniquesattempttofindandpresentsalientfeaturesindata.Examplesincludeboth
simplestatisticalsummaries(e.g.,averagestudenttestscoresbyschoolandteacher),andhigherlevel
analysis(e.g.,alistofkeyfactsaboutanindividualasgleanedfromallwebpostingsthatmentionher).
66
NationalResearchCouncil,FrontiersinMassiveDataAnalysis,NationalAcademiesPress,2013.
(1)Thill,BrentandNicoleHayashi,BigData=BigDisruption:OneoftheMostTransformativeITTrendsOvertheNext
Decade,UBSSecuritiesLLC,October2013.(2)McKinseyGlobalInstitute,CenterforGovernment,andBusinessTechnology
Office,Opendata:Unlockinginnovationandperformancewithliquidinformation,McKinsey&Company,October2013.
68
Le,Q.V.etal.,BuildingHighlevelFeaturesUsingLargeScaleUnsupervisedLearning,
http://static.googleusercontent.com/media/research.google.com/en/us/archive/unsupervised_icml2012.pdf
69
Bramer,M.,PrinciplesofDataMining,Springer,2013.
67
24
70
Mitchell,TomM.,TheDisciplineofMachineLearning,TechnicalReportCMUML06108,CarnegieMellonUniversity,
July2006.
71
DARPA,forexample,hasaprojectinvolvingmachinelearningandothertechnologiestobuildmedicalcausalmodelsfrom
analysisofcancerliterature,leveragingthegreatercapacityofacomputerthanapersontoprocessinformationfroma
largenumberofsources.Seedescriptionathttp://www.darpa.mil/Our_Work/I2O/Programs/Big_Mechanism.aspx
72
Dataminingbreaksthebasicintuitionthatidentityisthegreatestsourceofpotentialharmbecauseitsubstitutes
inferenceforidentifyinginformationasabridgetogetatadditionalfacts.Barocas,SolonandHelenNissenbaum,Big
DatasEndRunAroundAnonymityandConsent,ChapterII,inLane,Julia,etal.,Privacy,BigData,andthePublicGood,
CambridgeUniversityPress,2014.
25
73
Manyika,J.etal.,BigData:Thenextfrontierforinnovation,competition,andproductivity,McKinseyGlobalInstitute,
2011.
74
NavarroArriba,G.andV.Torra,"Informationfusionindataprivacy:Asurvey,"InformationFusion,13:4,2012,pp.235
244.
75
Khaleghi,B.etal.,"Multisensordatafusion:Areviewofthestateoftheart,"InformationFusion,14:1,2013,pp.2844.
76
Lam,J.,etal.,"Urbansceneextractionfrommobilegroundbasedlidardata,"Proceedingsof3DPVT,2010.
77
Agarwal,S.,etal.,"BuildingRomeinaday,"CommunicationsoftheACM,54:10,2011,pp.105112.
78
WorkshoponFrontiersinImageandVideoAnalysis,NationalScienceFoundation,FederalBureauofInvestigation,
DefenseAdvancedResearchProjectsAgency,andUniversityofMarylandInstituteforAdvancedComputerStudies,January
2829,2014.http://www.umiacs.umd.edu/conferences/fiva/
26
Videosummarizationandscenechangedetection(thatis,pickingthesmallnumberofimagesthat
summarizeaperiodoftime)
Precisegeolocationinimageryfromsatellitesordrones
Imagebasedbiometrics
Humanintheloopsurveillancesystems
Reidentificationofpersonsandvehicles,thatis,trackingthesamepersonorvehicleasitmovesfrom
sensortosensor
Humanactivityrecognitionofvariouskinds
Semanticsummarization(thatis,convertingpicturesintotextsummaries)
Althoughsystemsareexpectedtobecomeabletotrackobjectsacrosscameraviewsanddetectunusual
activitiesinalargeareabycombininginformationfrommultiplesources,reidentificationofobjectsremains
hardtodo(achallengeforintercameratracking),asisvideosurveillanceincrowdedenvironments.
Althoughthedatatheyuseareoftencapturedinpublicareas,sceneextractiontechnologieslikeGoogleStreet
Viewhavetriggeredprivacyconcerns.PhotoscapturedforuseinStreetViewmaycontainsensitiveinformation
aboutpeoplewhoareunawaretheyarebeingobservedandphotographed.81
Socialmediadatacanbeusedasaninputsourceforsceneextractiontechniques.Whenthesedataareposted,
however,usersareunlikelytoknowthattheirdatawouldbeusedintheseaggregatedwaysandthattheirsocial
mediainformation(althoughpublic)mightappearsynthesizedinnewforms.82
Automatedspeechrecognitionhasexistedsinceatleastthe1950s,83butrecentdevelopmentsoverthelast10
yearshaveallowedfornovelnewcapabilities.Spokentext(e.g.,newsbroadcastersreadingpartofadocument)
cantodayberecognizedwithaccuracyhigherthan95percentusingstateofthearttechniques.Spontaneous
speechismuchhardertorecognizeaccurately.Inrecentyearstherehasbeenadramaticincreaseinthe
corpusesofspontaneousspeechdataavailabletoresearchers,whichhasallowedforimprovedaccuracy.
79
Forexample,NewarkAirportrecentlyinstalledasystemof171LEDlights(fromSensity[http://www.sensity.com/])that
containspecialchipstoconnecttosensorsandcamerasoverawirelesssystem.Thesesystemsallowforadvanced
automaticlightingtoimprovesecurityinplaceslikeparkinggarages,andindoingsocapturealargerangeofinformation.
80
Thiswasdiscussedattheworkshopcitedinfootnote78.
81
SuchconcernsarelikelytogrowascommercialsatelliteimagerysystemssuchasSkybox(http://skybox.com/)provide
thebasisformoreservices.
82
Billitteri,ThomasJ.,etal.SocialMediaExplosion:Dosocialnetworkingsitesthreatenprivacyrights?CQResearcher,
January25,2013,23:84104.
83
Juang,B.H.andLawrenceR.Rabiner,AutomatedSpeechRecognitionABriefHistoryoftheTechnologyDevelopment,
October8,2004.http://www.ece.ucsb.edu/Faculty/Rabiner/ece259/Reprints/354_LALIASRHistoryfinal108.pdf
27
84
WhereSpeechRecognitionisGoing,TechnologyReview,May29,2012.http://www.kurzweilai.net/wherespeech
recognitionisgoing
85
Wasserman,S.Socialnetworkanalysis:Methodsandapplications,CambridgeUniversityPress,8,1994.
86
See,forexample:(1)Backstrom,Lars,etal.,InferringSocialTiesfromGeographicCoincidences,Proceedingsofthe
NationalAcademyofSciences,2010.(2)Backsrom,Lars,etal.,WhereforeArtThoughR3579X?AnonymizedSocial
Networks,HiddenPatterns,andStructuralSteganography,InternationalWorldWideWebConference2007,Alberta,
Canada,May12,2007.
87
Avarietyoftoolsexistformanaging,analyzing,visualizingandmanipulatingnetwork(graph)datasets,suchas
Allegrograph,GraphVis,R,visoneandWolframAlpha.Some,suchasCytoscape,GephiandNetvizareopensource.
88
(1)Geetoor,L.andE.Zheleva,Preservingtheprivacyofsensitiverelationshipsingraphdata,Privacy,security,andtrust
inKDD,153171,2008.(2)Mislove,A.,etal.,AnanalysisofsocialbasednetworkSybildefenses,ACMSIGCOMM
ComputerCommunicationReview,2011.(3)Backstrom,Lars,etal.,FindMeIfYouCan:ImprovingGeographicPrediction
withSocialandSpatialProximity,Proceedingsofthe19thinternationalconferenceonWorldWideWeb,2010.(4)
Backstrom,L.andJ.Kleinberg,RomanticPartnershipsandtheDispersionofSocialTies:ANetworkAnalysisofRelationship
StatusonFacebook,Proceedingsofthe17thACMConferenceonComputerSupportedCooperativeWorkandSocial
Computing(CSCW),2014.
28
89
(1)Narayanan,A.andV.Shmatikov,Deanonymizingsocialnetworks,30thIEEESymposiumonSecurityandPrivacy,
173187,2009.(2)Crandall,DavidJ.,etal.,Inferringsocialtiesfromgeographiccoincidences,ProceedingsoftheNational
AcademyofSciences,107:52,2010.(3)Backstrom,L,C.DworkandJ.Kleinberg,WhereforeArtThouR3579X?Anonymized
SocialNetworks,HiddenPatterns,andStructuralSteganography,Proceedingsofthe16thIntl.WorldWideWeb
Conference,2007.(4)Saramki,Jari,etal.,"Persistenceofsocialsignaturesinhumancommunication,"Proceedingsofthe
NationalAcademyofSciences,111.3:942947,2014.
90
Fienberg,S.E.,"IsthePrivacyofNetworkDataanOxymoron?"JournalofPrivacyandConfidentiality,4:2,2013.
91
Krebs,V.E.,"Mappingnetworksofterroristcells,"Connections,24.3:4352,2002.
92
Sundsy,P.R.,etal.,"Productadoptionnetworksandtheirgrowthinalargemobilephonenetwork,"AdvancesinSocial
NetworksAnalysisandMining(ASONAM),2010.
93
Hodgson,Bob,AVitalNewMarketingMetric:TheNetworkValueofaCustomer,PredictiveMarketing:OptimizeYour
ROIWithAnalytics.http://predictivemarketing.com/index.php/avitalnewmarketingmetricthenetworkvalueofa
customer/
94
Backstrom,Larsetal,"Findmeifyoucan:improvinggeographicalpredictionwithsocialandspatialproximity,"
Proceedingsofthe19thinternationalconferenceonWorldWideWeb,2010.
95
Top20socialmediamonitoringvendorsforbusiness,Socialmedia.biz,http://socialmedia.biz/2011/01/12/top20
socialmediamonitoringvendorsforbusiness/
29
96
Apetabyteis1015bytes.OnepetabytecouldstoretheindividualgenomesoftheentireU.S.population.Thehuman
brainhasbeenestimatedtohaveacapacityof2.5petabytes.
97
McLellan,Charles,The21stCenturyDataCenter:AnOverview,ZDNet,April2,2013.http://www.zdnet.com/the21st
centurydatacenteranoverview7000012996/
98
See:http://accumulo.apache.org/
99
See:https://amplab.cs.berkeley.edu/software/
30
100
CloudSecurityAlliance,BigDataWorkingGroup:CommentonBigDataandtheFutureofPrivacy,March2014.
https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Comment_on_Big_Data_Future_of_Privacy.pdf
101
Qi,H.andA.Gani,"Researchonmobilecloudcomputing:Review,trendandperspectives,"DigitalInformationand
CommunicationTechnologyandit'sApplications(DICTAP),2012SecondInternationalConferenceon,2012.
31
102
Jeffery,K.etal.,"Avisionforbettercloudapplications,"Proceedingsofthe2013InternationalWorkshoponMultiCloud
ApplicationsandFederatedClouds,Prague,CzechRepublic,MODAClouds,ACMDigitalLibrary,April2223,2013.
32
identityandauthentication:Areyouwhoyousayyouare?
authorization:Whatareyouallowedtodo?
availability:Canattackersinterferewithauthorizedfunctions?
confidentiality:Candataorcommunicationsbe(passively)copiedbysomeonenotauthorizedtodoso?
integrity:Candataorcommunicationsbe(actively)changedormanipulatedbysomeonenot
authorized?
nonrepudiation,auditability:Canactions(paymentsmayprovidethebestexample)laterbeshownto
haveoccurred?
Goodcybersecurityenforcespoliciesthatarepreciseandunambiguous.Indeed,suchclarityofpolicy,
expressibleinmathematicalterms,isanecessaryprerequisitefortheHolyGrailofcybersecurity,provably
securesystems.Atpresent,provablesecurityexistsonlyinverylimiteddomains,forexample,forcertain
functionsonsomekindsofcomputerchips.Itisagoalofcybersecurityresearchtoextendthescopeof
provablysecuresystemstolargerandlargerdomains.Meanwhile,practicalcybersecuritydrawsonthe
emergingprinciplesofsuchresearch,butitisguidedevenmorebypracticallessonslearnedfromknownfailures
ofcybersecurity.Therealisticgoalisthatthepracticeofcybersecurityshouldbecontinuouslyimprovingsoas
tobe,inmostplacesandatmostofthetime,aheadoftheevolvingthreat.
Poorcybersecurityisclearlyathreattoprivacy.Privacycanbebreachedbyfailuretoenforceconfidentialityof
data,byfailureofidentityandauthenticationprocesses,orbymorecomplexscenariossuchasthose
compromisingavailability.
103
PCASThasaddressedissuesincybersecurity,bothinreviewingtheNITRDprogramsanddirectlyina2013report,
ImmediateOpportunitiesforStrengtheningtheNationsCybersecurity.
http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_cybersecurity_nov2013.pdf
33
104
Therearealsochoicesinthedesignandimplementationofsecuritymechanismsthataffectprivacy.Inparticular,
authenticationortheattempttodemonstrateidentityatsomelevelcanbedonewithvaryingdegreesofdisclosure.See,
forexample:ComputerScienceandTelecommunicationsBoard,WhoGoesThere:AuthenticationThroughtheLensof
Privacy,NationalAcademiesPress,2003.
105
Suchresearchcaninformeffortstoautomatethecheckingofcompliancewithpoliciesand/orassociatedauditing.
106
Thisfutureproofingremainshardtoachieve;PCASTscybersecurityreportadvocatedapproachesthatwouldbemore
durablethanthekindsofcheckliststhatareeasilyrenderedobsolete.See:
http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_cybersecurity_nov2013.pdf
107
See,forexample:(1)Breaux,TravisD.,andAshwiniRao,FormalAnalysisofPrivacyRequirementsSpecificationsfor
MultiTierApplications,21stIEEERequirementsEngineeringConference(RE2013),RiodeJaneiro,Brazil,July2013.
http://www.cs.cmu.edu/~agrao/paper/Analysis_of_Privacy_Requirements_Facebook_Google_Zynga.pdf(2)Feigenbaum,
Joan,etal.,TowardsaFormalModelofAccountability,NewSecurityParadigmsWorkshop2011,MarinCounty,CA,
September1215,2011.http://www.nspw.org/papers/2011/nspw2011feigenbaum.pdf
108
Landwehr,Carl,EngineeredControlsforDealingwithBigData,Chapter10,inLane,Julia,etal.,Privacy,BigData,and
thePublicGood,CambridgeUniversityPress,2014.
34
Datacanbestolen,ormistakenlyshared,beforetheyhavebeenencryptedoraftertheyhavebeen
decrypted.Manyattacksonsupposedlyencrypteddataareactuallyattacksonmachinesthatcontain
howeverbrieflyunencryptedplaintext.Forexample,inTargets2013breachofonehundredmillion
debitcardnumberandpersonalidentificationnumbers(PINs),thePINswerepresentinunencrypted
formonlyephemerally.Theywerestolennonetheless.111
Keysmustbeauthorized,generated,distributed,andused.Ateverystageofakeyslife,itispotentially
opentocompromiseormisusethatcanultimatelycompromisethedatathatthekeywasintendedto
protect.Nosystembasedonencryptionissecure,ofcourse,ifpersonswithaccesstoprivatekeyscan
becoercedintosharingthem.
109
Theuseofthistermincomputingoriginatedwithwhatisnowviewedasaclassicarticle:Brooks,FredP.,Nosilver
bulletEssenceandAccidentsofSoftwareEngineering,IEEEComputer20:4,April1987,pp.1019.
110
Attacksthatcompromisethehardwareorsoftwarethatdoestheencrypting(forexample,thepromulgationof
intentionallyweakcryptographystandards)canbeconsideredtobeavariantofattacksthatrevealplaintext.
111
KrebsonSecurity,collectedpostsonTargetdatabreach,2014.http://krebsonsecurity.com/tag/targetdatabreach/
35
112
PublickeyencryptionoriginatedthroughthesecretworkofBritishmathematiciansattheU.K.sGovernment
CommunicationsHeadquarters(GCHQ),anorganizationroughlyanalogoustotheNSA,andreceivedbroaderattention
throughtheindependentworkbyresearchersincludingWhitfieldDiffieandMartinHellmanintheUnitedStates.
113
Fisher,Dennis,FinalReportonDigiNotarHackShowsTotalCompromiseofCAServers,ThreatPost,October31,2012.
http://threatpost.com/finalreportdiginotarhackshowstotalcompromisecaservers103112/77170.
114
Itisnotpubliclyknownwhetherornottheearlier2010compromiseofserversbelongingtoVeriSign,amuchlargerCA,
ledtocompromisesofcertificatesorsigningauthorities.Bradley,Tony,VeriSignHacked:WhatWeDon'tKnowMightHurt
Us,PCWorld,February2,2012.
http://www.pcworld.com/article/249242/verisign_hacked_what_we_dont_know_might_hurt_us.html
115
Asamplereportcard:https://www.eff.org/deeplinks/2013/11/encryptwebreportwhosdoingwhat#cryptochart
116
Diffie,Whitfield,etal.,"AuthenticationandAuthenticatedKeyExchanges"Designs,CodesandCryptography2:2,June
1992,pp.107125.
36
117
(1)Dwork,Cynthia,DifferentialPrivacy,33rdInternationalColloquiumonAutomata,LanguagesandProgramming,
2006.(2)Dwork,Cynthia,AFirmFoundationforPrivateDataAnalysis,CommunicationsoftheACM,54.1,2011.
37
118
Gindin,SusanE.,NobodyReadsYourPrivacyPolicyorOnlineContract:LessonsLearnedandQuestionsRaisedbythe
FTC'sActionagainstSears,NorthwesternJournalofTechnologyandIntellectualProperty1:8,20092010.
38
119
Deidentificationcanalsobeseenasaspectrum,ratherthanasingleapproach.See:ResponsetoRequestfor
InformationFiledbyU.S.PublicPolicyCounciloftheAssociationforComputingMachinery,March2014.
120
Sweeney,etal.,IdentifyingParticipantsinthePersonalGenomeProjectbyName,HarvardUniversityDataPrivacyLab.
WhitePaper10211,April24,2013.http://dataprivacylab.org/projects/pgp/
39
121
See,forexample:RyanWhitwam,SnapSaveforiPhoneDefeatsthePurposeofSnapchat,SavesEverythingForever,PC
Magazine,August12,2013.http://appscout.pcmag.com/appleiosiphoneipadipod/314653snapsaveforiphone
defeatsthepurposeofsnapchatsaveseverythingforever
40
122
Abelson,HalandLalanaKagal,AccessControlisanInadequateFrameworkforPrivacyProtection,W3CWorkshopon
PrivacyforAdvancedWebAPIs12/13,July2010,London.http://www.w3.org/2010/apiprivacyws/papers.html
123
Mundie,Craig,PrivacyPragmatism:FocusonDataUse,NotDataCollection,ForeignAffairs,March/April,2014.
124
Nissenbaum,H.,PrivacyinContext:Technology,Policy,andtheIntegrityofSocialLife,StanfordLawBooks,2009.
41
125
Seereferencesatfootnote107andalso:(1)Weitzner,D.J.,etal.,InformationAccountability,Communicationsofthe
ACM,June2008,pp.8287.(2)Tschantz,MichaelCarl,AnupamDatta,andJeannetteM.Wing,FormalizingandEnforcing
PurposeRestrictionsinPrivacyPolicies.http://www.andrew.cmu.edu/user/danupam/TschantzDattaWing12.pdf
126
Forexample,atCarnegieMellonUniversity,LorrieCranordirectstheCyLabUsablePrivacyandSecurityLaboratory
(http://cups.cs.cmu.edu/).Also,see2ndInternationalWorkshoponAccountability:Science,TechnologyandPolicy,MIT
ComputerScienceandArtificialIntelligenceLaboratory,January2930,2014.
http://dig.csail.mit.edu/2014/AccountableSystems2014/
127
OracleseXtensibleAccessControlMarkupLanguage(XACML)hasbeenusedtoimplementattributebasedaccess
controlsforidentitymanagementsystems.(Personalcommunication,MarkGorenbergandPeterGuerraofBoozAllen)
128
OfficeoftheDirectorofNationalIntelligence,ICCIOEnterpriseIntegration&Architecture:TrustedDataFormat.
http://www.dni.gov/index.php/about/organization/chiefinformationofficer/trusteddataformat
42
PCASTendorsesassoundtheprinciplesunderlyingCPBR.Becauseoftherapidlychangingtechnologies
associatedwithbigdata,however,effectiveoperationalizationofCPBRisatrisk.Uptonow,debateoverhow
tooperationalizeCPBRhasfocusedonthecollection,storage,andretentionofdata,withanemphasisonthe
129
See:http://www.openstack.org/
43
44
130
Lawyersmayencouragecompaniestouseoverinclusivelanguagetocovertheunpredictableevolutionofpossibilities
describedelsewhereinthisreport,evenintheabsenceofspecificplanstousespecificcapabilities.
45
46
47
48
5.2 Recommendations
PCASTschargeforthisstudydoesnotaskittomakerecommendationsonprivacypolicies,butrathertomakea
relativeassessmentofthetechnicalfeasibilityofdifferentbroadpolicyapproaches.PCASTsoverallconclusions
aboutthatquestionareembodiedinthefirsttwoofourrecommendations:
Recommendation1.Policyattentionshouldfocusmoreontheactualusesofbigdataandlessonits
collectionandanalysis.
Byactualuses,wemeanthespecificeventswheresomethinghappensthatcancauseanadverseconsequence
orharmtoanindividualorclassofindividuals.Inthecontextofbigdata,theseevents(uses)arealmost
alwaysactionsofacomputerprogramorappinteractingeitherwiththerawdataorwiththefruitsofanalysisof
thosedata.Inthisformulation,itisnotthedatathemselvesthatcausetheharm,northeprogramitself(absent
anydata),buttheconfluenceofthetwo.Theseuseevents(incommerce,bygovernment,orbyindividuals)
49
131
Childpornographyisthemostuniversallyrecognizedexample.
NITRDreferstotheNetworkingandInformationTechnologyResearchandDevelopmentprogram,whoseparticipating
Federalagenciessupportunclassifiedresearchininadvancedinformationtechnologiessuchascomputing,networking,and
softwareandincludebothresearchandmissionfocusedagenciessuchasNSF,NIH,NIST,DARPA,NOAA,DOEsOfficeof
Science,andtheD0Dmilitaryservicelaboratories(seehttp://www.nitrd.gov/SUBCOMMITTEE/nitrd_agencies/index.aspx).
ThereisresearchcoordinationbetweenNITRDandFederalagenciesconductingorsupportingcorrespondingclassified
research.
132
50
133
DesigningaDigitalFuture:FederallyFundedResearchandDevelopmentinNetworkingandInformationTechnology
(http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcastnitrd2013.pdf[2012]and
http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcastnitrdreport2010.pdf[2010]).
134
FederalNetworkingandInformationTechnologyResearchandDevelopmentProgram,ReportonPrivacyResearch
WithinNITRD[NetworkingandInformationTechnologyResearchandDevelopment],NationalCoordinationOfficefor
NITRD,April23,2014.http://www.nitrd.gov/Pubs/Report_on_Privacy_Research_within_NITRD.pdf
135
TheSecureandTrustworthyCyberspaceprogramisthelargestfunderofrelevantresearch.See:
http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504709
136
InDecember2013,theNSFdirectoratessupportingcomputerandsocialsciencejoinedinsolicitingproposalsforprivacy
relatedresearch.http://www.nsf.gov/pubs/2014/nsf14021/nsf14021.jsp.
137
See:http://www.iarpa.gov/index.php/researchprograms/spar
138
NISTisresponsibleforadvancingtheNationalStrategyforTrustedIdentitiesinCyberspace(NSTIC),whichisintendedto
facilitatesecuretransactionswithinandacrosspublicandprivatesectors.See:http://www.nist.gov/nstic/
139
Pike,W.A.etal.,PNNL[PacificNorthwestNationalLaboratory]ResponsetoOSTPBigDataRFI,March2014.
51
140
AbasiscanbefoundinthenewestversionofthecurriculumguidanceoftheAssociationforComputingMachinery
(http://www.acm.org/education/CS2013finalreport.pdf).Givenallofthepressuresoncurriculum,progressaswith
cybersecuritymayhingeongrowthinprivacyrelatedresearch,businessopportunities,andoccupations.
141
AbeginningcanbefoundintheFederalGovernmentsFedRAMPprogramforcertifyingcloudservices.Initiatedto
addressFederalagencysecurityconcerns,FedRAMPalreadybuildsinattentiontoprivacyintheformofarequiredPrivacy
ThresholdAnalysisandinsomesituationsaPrivacyImpactAnalysis.TheofficeoftheU.S.ChiefInformationOfficer
52
providesguidanceonFederalusesofinformationtechnologythataddressesprivacyalongwithsecurity(see
http://cloud.cio.gov/).ItprovidesspecificguidanceonthecloudandFedRAMP(http://cloud.cio.gov/fedramp),including
privacyprotection(http://cloud.cio.gov/document/privacythresholdanalysisandprivacyimpactassessment).
53
54
PeterGuerra
BoozAllen
MichaelJordan
UniversityofCalifornia,Berkeley
PhilipKegelmeyer
SandiaNationalLaboratory
AngelosKeromytis
ColumbiaUniversity
ThomasKalil
OSTP
JonKleinberg
CornellUniversity
JuliaLane
AmericanInstitutesforResearch
CarlLandwehr
GeorgeWashingtonUniversity
DavidMoon
Ernst&Young
KeithMarzullo
NationalScienceFoundation
MarthaMinow
HarvardLawSchool
TomMitchell
CarnegieMellonUniversity
YochaiBenkler
Harvard
EleanorBirrell
CornellUniversity
CourtneyBowman
Palantir
ChristopherClifton
PurdueUniversity
JamesCosta
SandiaNationalLaboratory
LorrieFaithCranor
CarnegieMellonUniversity
DeborahEstrin
CornellNYC
WilliamW.(Terry)Fisher
HarvardLawSchool
StephanieForrest
UniversityofNewMexico
DanGeer
InQTel
DeborahK.Gracio
PacificNorthwestNationalLaboratory
EricGrosse
Google
55
DeirdreMulligan
UniversityofCalifornia,Berkeley
LeonardNapolitano
SandiaNationalLaboratory
CharlesNelson
OSTP
ChrisOehmen
PacificNorthwestNationalLaboratory
AlexSandyPentland
MassachusettsInstituteofTechnology
RenePeralta
NationalInstituteofStandardsandTechnology
AnthonyPhilippakis
GenomeBridge
TimothyPolk
OSTP
FredB.Schneider
CornellUniversity
GregShipley
InQTel
LaurenSmith
OSTP
FrancisSullivan
InstituteforDefenseAnalysis
ThomasVagoun
NITRDNationalCoordinationOffice
KonradVesey
IntelligenceAdvancedResearchActivity
JamesWaldo
Harvard
PeterWeinberger
Google,Inc.
DanielJ.Weitzner
MassachusettsInstituteofTechnology
NicoleWong
OSTP
JonathanZittrain
HarvardLawSchool
56
SpecialAcknowledgment
PCASTisespeciallygratefulfortherapidandcomprehensiveassistanceprovidedbyanadhocgroupof
staffattheNationalScienceFoundation(NSF),ComputerandInformationScienceandEngineering
Directorate.ThisteamwasledbyFenZhaoandEmilyGrumbling,whowereenlistedbySuzanne
Iacono.Drs.ZhaoandGrumblingworkedtirelesslytoreviewthetechnicalliterature,elicit
perspectivesandfeedbackfromarangeofNSFcolleagues,anditerateondescriptionsofnumerous
technologiesrelevanttobigdataandprivacyandhowthosetechnologieswereevolving.
NSFTechnologyTeamLeaders
FenZhao,AAASFellow,CISE
EmilyGrumbling,AAASFellow,Officeof
Cyberinfrastructure
AdditionalNSFContributors
RobertChadduck,ProgramDirector
AlmadenaY.Chtchelkanova,ProgramDirector
DavidCorman,ProgramDirector
57
JamesDonlon,ProgramDirector
JeremyEpstein,ProgramDirector
JosephB.Lyles,ProgramDirector
DmitryMaslov,ProgramDirector
MimiMcClure,AssociateProgramDirector
AnitaNikolich,Expert
AmyWalton,ProgramDirector
RalphWachter,ProgramDirector