Sie sind auf Seite 1von 7

By DAVID WRÍOIIT,

MICHAEL FRIEDEWALD,
WlM SCHREURS,
MICIHEL VERLINDEN,
SERGE GUTWIRTH,
YVES PÜNIE,
IOANNIS MAGHIROS,
ELENA VILDJIOUNAITE, and
PETTERI ALAHUHTA

IHE ILIMON OF SECURITY


A fictwnal ¿cenaría of dady Ufe tn a uvrlc) networked
wilh ambient mtelligence dliutrates thc i)ark sute of the
technolagy and the need for appropnate ,<afei]iiar()¿.

/ hile most stakeholders paint the promise of


./ ambient intelligence (Aml) in sunny colors, there is
/ in fact a dark side to Aml. In a way, this dark side
í is inherent in the very nature of Aml. Intclligent
>'' networks embedded every\vhere will enable data
' aggregators to acquire a lot more personal information,
far more than in today's world, greatly magnifying the xisk
of abuse ofthat dati. )
lllujtration b\ lohn H. Ho\v:irJ \

COMMUNICATIONS OFTHEACM Msrch 2008/Vof. 5 !. f


}x

ost Aml scenarios illustrate its • Considerations re: listing on the TSE.

M benefits. The dark scenarios, ' (Hausmann)


developed by the SWAMI {Safe-
guards in a World of Ambienr Kevin Switzer, vice president for operarions, speaks.
Intelligence) 1 projecr, are differ- "We've had complaints from the Customs and
ent as they point out the risks that must be rnediated Immigration folks about the shortage and reliabihty
if Aml is to be a ruture success story. of our data on people corning into the States, ít
The scenario we present here hinges on the trien of mainly concerns people from developing countries.
data from a multlnatronal company. The company With our profiling technologies, we are able to iden-
sufFers from the illusion of security—that is, the belief tify anyone who might be a security risk or disposed
it has implemented more than adequate security mea- to anti-social behavior. Unfortunately, most devel-
sures—only to discover it has not. oping countries have no Aml networks, which
makes it impossíble to build up the same kind of
A DMRK SCENARIO detailed profiles of individuáis like we can hcre in "*
The Data Mining Corporation {DMC) has an the U.S., Europe, or Japan. So the immigration
almost perfect busiriess model. It coilects data about authorities have been rnaking threatening noises
individuáis from hündredsjpf sources and then sells ábout refusing entry to peopie frorn countries with-
the aggregated data_back_to many of those sources. out Aml networks." Switzer seems concerned, but
Its principal sourees (and clients) include Insurance -then smÜes. "I think we have a golden opportunity
companies, retaii chajns, media conglomerates, here. We can set up Aml nenvorks in those countries
credit-reponing agencies, mobile phone companies, as long as-we are trie' ones to collect and_process the _ .
law enforcement agencies, custorns and immigration data. You'd thínk most countries would j u m p at the
authorities, and imelligence agencies. chance to have nenvorks put in place at virtually no
Arnong the ways DMC~has managed to sidestep or little cost to thern, but some of the counrries are
legislative and regulatory constraints on transferTof quibbling with us."
personal data ís through mergers with or acquisittons "Quibbling?" asks the president, "What do you
of companies with their own extensive databases. mean?"
DMC is headquaitered in Miami, but now has major "Quibbling about control of the data. They say if
subsidiarles in London and Tokyo. It is listed on the we control the data, it's tantamount to signing their
New York and London Stock Exchanges and is con- sovereignty over to us. But we've been working on a
sidering a listing on the Tokyo Stock Exchange. deal where we copy for them the data we collect...
Scene 1: Management board meeting. The company welli some ofT it. at least. Our inteiligencc agencies
secretary stands cióse to the iris scanner. The door would not w ant us to hand over everythmg, ñor do
opens and he enters the boardroom. The presiden:, we have to. We can offer the raw data to the develop-
airead}- there, nods a siight greeting to the company ing countries. but they won't know if or hovv weYe
secreta^ who can see his boss is preoccupied. She is processed the data, especially since we do the process-
watching the boardroom video dispjay, which depicts ing here in the U.S. or in the U.K.. outside their jurís-
her vice presidents coming down the corridor toward diction. Theyli have to settle for what we give them."
the boardroom. A few seconds later, the vice presi- "Okay, that sounds good to me. Any objections?"
dents enter one by one and take their seats. she asks the others, who remain siient: "No? Okay,
"Okay, let's get on with ir," says the president. then, Jacques, it's your turn. What's the latcst on the
"Show the agenda." The agenda appears on the large theft at our London office?''
wafer-thin video screen on the wall opposite the pres- Perrier, vice president for security, shrfts uncom-
ident. Three Ítems are usted: fortably in his chair. "Well. as everyonc here knows,
we have a regular monthly audit of UMC's data pro-
• Data frorn developing countries. (Switzer) cessing activiry. From the last audit, we discovcred
• Theft of data. (Perrier) that there had been a second back-up of data imme-
diately after the first, but we can't idemiry exactly the
device to which the data was backed up..."
''But yon know who made the second hack-up?"
asks the president.
'T.mrn... uh... \cs. lt secms hktlv :h,n tluxe oí rnv
back-up, of course, but we haven't been able to con- "If we were exposed, it would be a complete disas-
tact them. It seems all three left on bolidays a few ter," says MacDonaJd, the VP for public affairs.
hours after the second back-up was made. They were "Among other things, it would show our chents that
supposed to have returned three days ago, but they the profiles of our own employees are not reüable
haven't reported for work and they haven't answered because we weren't able to predict that these few bad
our calis." appíes were going to abscond with copies of our
The president is getting angry. "And why don't you records."
know where they are? Surely you can track them vía Max Court, DMC's general counseí, speaks up. "If
their location implants. Everybody has to haye a loca- we were exposed? Are you suggesting we should with-
tion ímplant. lí's a condition of employment ín our hold informatíon about this theft from the pólice and
company, just like any critical infrastructure like those whose files have been copíed?"
banks or nuclear power companies." "Of course,1' says MacDonald. "It's obvious, isn't it?
- "Yes, but their implanta are inoperable. They couíd I'd hate to imagine what it would do to our share price
have been surgically removed," says Perder. . and our- plans for a lísting on the Tokyo Stock
—And what about the sensor networfo in their Exchange."
Ahornes and cars?" - Scene 2: The Oíd Batky; two years later. BBCl news
"Yes," says Perrier. "Líke other employees, theyVe anchor; "And nowwego to our repórter, Miles Dav-
agreed that we can check rheir home-systems~and enport, who's been at the O!d Bailey today, attending
we've done that. There's obviously nobócíy in their the trial Jnvolving the Data M.ining Corporation ancf
apartments, and their cars have been stationary since hs directors. What's the latest, Miles? Has the jury
they left on holidays..." • returned with a verdict?"
"Have you checked the surveillance systems?" asks Miles Daverrport: "Thanks, Serena. No, the jury
the president. "You can't go anywhere in London hasn't returned yet, but an announcement ís expected
without beíng caught by surveillance cameras h-un- in the next few minutes."
dreds of times a day." BBC presenten "Miles, can, you just recap for our
"Yes, we've been reviewing the data frorn the sur- viewers what this trial's been all about? And why is it
veillance systems, too," says Perrier. "But they haven't so Ímportant? u
shown up on those either. We've also checked with the Miles: "Sure,. Serena. It all started two years ago
airlines and railways and car rental agencies to see when The Financial Times broke a story about the
where they might have gone. Now we know they left theft of personal information on about 16 milíion
for Costa Rica, but then the trail goes cold. As Kevin people in the U.S. and the U.K. All this data was héíd
has just pointed out, the developing countries don't by DMC, the world's largest data miner. DMC dis-
have the kind of Amí infrastructure needcd to track covered that someone had broken into its supercom-
people, so they could really be anywhere. We've also- puters but it didn't say anything to anybody.1 Then
been checking- with the 4G companies, but 50 far. there was a b¡g spike in the number of identity theft
there's been no data recovered on use of their cases. Peopie were seeing all kinds of parchases .on
mobiles." their monthly statements for things they hadn't
"Í don't understand how they could have got past bought. A lot more people and companies were
our own security systems," says the president. "We reporting that they were being blackmailed with
have access control to prevent unauthorized employ- threats of releases of embarrassing information. The
ees from copying or manipularon of data." FT got wind of this, and was able to trace the source
"That's true," says Petrier. "The snag Ís that they back to a theft of data from DMC.
were authorized. Quite a few employees have partial "At first, DMC denied everything, and then said
access, so if three or four with access to diffcrcnt bits they wouldn't comment on it because the theft was
collaborate, as these three appear to have done, they under investigation. Wben its share price began sky-
are able to get virtuaily full access to the data/' diving on Wall Street and in London, DMC had to
"Even so," says the president, "how did they get the cali off plans for a listing on the Tokyo Stock
data outside our headquarters?" Exchange. For awhile, it looked like DMC was going
"With today's technology, its easy to copy vast bust, but the U.S. government stepped in and
amotints of data in seconds onto high-capaciry optical
storage deviccs no larger trmn a deck of phiying cards, _
vvhich makcs them easy to conceal on the \VLIV our oí -m;r : < r „ ;,i( „.• S L; ; K-,- \.\-<^,,<.r-* \, \ '\,,\d ot~<;., .¡r,-., h-t-¡ (•••-- n.=--
t h c b u i l d i n u . It'*. hard to break i n t o DMC offi^.s, but i 5 "" 1 " "V!;:;'; , ;". '*•'"' •• •" • V ; ' ' ' " \ " - • • ' - ' -•'•'• •'';/•
ir <• not lurd in <xt out. . . u-.'.
propped up the company. They said that national ANALYSIS
securiry was involved, and they could not aüow the Here, we present a methodological structure for ana/
company to go bust." b'2'ng tms scenario, which couíd also be applied to
BBC presenter: "Personalized servjces are great, of the construcción and analysis of many technology-
course; they save us lots of time. And so are the oriented scenarios.
improvements in our security, hke knowing when we Situation, The objective of this scenario is to depict
are near crimináis or suicide bomhers, but isn't there what is called the "illusíon of security" in an Aml
a dark side?" world a decade from now, when ambíent imelligence
Miles: "Well, yes, there is. We have to trust com- has become pervasive in developed countríes (but not
pañíes like DMC to keep our data safe, secure, and developing comunes), when most people embrace the
accurate. But íiow we know that our data is not personalization of services and the supposedíy
secure. DMC not only failed to protect our data, they enhanced security resulting from the applícation of
were actually setling it to governmehts who were Aml. Although Aml offers powerful new technolo-
hunting for people v/ith behavioral dysfunctions in gies for security appHcations, such technologies can be
case they were likely to commit a serious ctime or an undermined by determirTed people.
act of terrorism. They ve also been sellingihe data to This dark scenario is~a trend or reference scenario
other companie_s_who were using the data to spam because ¡tstarts from the present and projects forward
just about everybody in the U.S. antjjiere in the on the basis of to-be-expecte"d Frends and events. It is
U.K. DMC clairoed ihey couldn't be held responsi- intended to be realisticór descriptive rather than, for
ble for what their clíents did with the data." 3 instance, normative-or extreme.
BBC presenter: "Thanks for that recap, Miles, but The scenario concerns tne theft of personal infor-
weren't there some other issues that carne out during mation held by a data aggregator (DMC) by three-
the trial?'1 rogue employees. Theft of identity occurs now, but
Miles: "There certainly were, .Serena. People are the difference between such cr-imes today and in the
entitled to see their records, but most people didn't ruture is the scale of the data involved. Aml wíll make-
even know about DMC, let alone the fact that they it possible to gather orders of magnitude more infor^
had buílt up such extensivo records on every one of mation about virtuaJly every person in America,
us. So, some consumer activist groups banded Europe, and Japan. The íuture is also marked by an
together to sue DMC for negligence. People had ño increasing concentration in the control of personal
idea just how pervasive ambient intelligence had data. Thus, the risks to individuáis are much greater
become. We heard that in many instances the data when something goes wrong.
coming from so many difierent ambient tecbnology Aml technologies used in the scenario. The scenario
networks was often in conflict or didn't make any makes reference to severa! Aml or Amí-related tech-
sense. DMC countered that its proprietary software nologies, inciuding:
contams an algorithm for comparing data from dif-.
ferent sources to maximize reliabihty and its predic- • Biometrics, such as the iris scanners that grant
tive capability, but under intense questioning from admission to the boardroom;
the prosecution, they admitted they could never • Networked sensors/actuators, such as those that
elimínate unreliability ñor could their predictions of detect human presence in cars or homes;
who míght be a terrorist or criminal be 100% cer- * Speech recognición and voice activation, such as
tam. • the system in the boardroom that recognizes a
BBC presenter: "And the DMC directors, what's command from the president of operations to
gomg to happen to them?" show the agenda;
Miles: "We'll fmd out aftcr the jury comes hack • Surveillance technologies inciuding video canv
with the verdict. The DMC president, however, has eras, keylogging software, location implants, bio-
already resigncd, but she went out with a golden para- metrics, and networkcd sensors, that are uscd to
chute—a severance package worth a cool $100 mil- monitor where employees are and what they are
non—and now she's apparentty livme, in Cosra Rica. doing;
_ _ __ • I n t c l l i g e n t software that can analyze past bchavior
a
>¡ \v Viñrt •(...KHihvu T.. !':U,KS //-, ',•, • '<,• í T;v>,f -ipn' io .w-. • c>f.,]! nd prt'íercnces in order to predict nceds and per-
r~ V^'lf'""!"" -. ''i' ; -|-"""-" "' '•'":'•"' '''•'"'• *•"''"'- ¿""'•'••'^ ' •< .i"¡"iu-
1 In thr :i i:i 1 Mr 1
sonali/c sen'iccs (which TV prou;nim to watch,
•*- •'' ; '. ! ¡', •.. -• -• •*. • - i : ' . •: •' • • • • ' j .• i 1 p^.-ui, ; , ;- v<- which prnducrs to buy), somcthiní; Serena, the
' " ' '
• Networked RFIDs, sensors, and actuators for or social forces. DMC's managernent are primanly
garhering data about people and the products driven by the proílt motive, a desire for scale (such as
they have or services they use. These and other to be the market leader, to swaílow or overwhelrn
AmI technologies greatly facilítate profiling of vir- competitors) and to créate a situation where their
tually everyone; and clients are dependent on DMC services and products.
• Fourth-generation mobile phones, which com- A second driver must be market demand, that is,
bine today.s PDA capabilitíes with third-genera- there are many companies and governmental agencies
tion mobile technology (and much else). Such that want the processed data that DMC has been sup-
multimedia personal devices provide a wide range plymg.
of services (and collect vast data), but 4G net- A third driver, not so dissimilar from the first, is
works are not available every\vhere, especially not that the data thieves are also impeüed by the profit
in developing countries, like Costa Rica, to which motive.
rhe data thieves and, later, the DMC president A fourth driver is respect for the , v. This is
decide to decamp. (partly) indicated when DMC's gent .-1 coun_sel
expresses some disbelíef at the suggestion that DMC
Applications, The AmI technologies referenced in sHbuld cover up the data theft from both the pólice
the scenario are used in various applications, includ- ancl those whose files have been copied. In-Scene 2,
ing: respect for and redress through the iaw is the key'drP
ver. _ ~~
"•* Security: DMC has instituted various secunty Yet another driver can be identified,.£ucb as the
measures, such as access control (rb offices and media's desire for a good story, which has the benefit
software systems), key iogging, proprietary soft- of raising public awareness about the pervasíveness of
ware, employee monitoring ancS so on, to ensure AmI.
the securíty of the personal data it collects and The scenario raises several issues: -
processes. Digital divide. The developed countries have AmI
• Surveillance: Video cameras and ofher surveillance networks and the developing countrjgs don't. There is
¿;, .W technologies keep watch on vinuaUy everyone, a risk that this will lead to discrimination against
. especially in the streets and shops of London (and developing countries. Intelligence agencies andjmmi-
other cities), but increasingiy in their homes too. gration authorities may not admit visitors and emi-
• Such technologies can be used to ctetect whether grants from countries without the AmI nerworks
someone exceeds the speed limits or pilfers ítems needed to genérate detailed profiíes and a determina-
from the shops, but also whether they engage in tion as to whether a person could be a securiry 'risk.
terrorism on the Underground. The digital divide íssue radiates in many directions
_ • Im'rnigration control, counterterrorism and policmg: and prompts manv questions. Will the quest for per-
AmI nerworks are used to compile personal data fect securiry reaily-protect our societies? Recent devel-
and profile would-be visitors and immigrants to opments suggest we are as much at nsk from
help officiaís assess whether they presem a secu- homegrown terrorists as from those in developing
rity risk or might behave in a socially dysfunc- countries. Also, if immigration is restricted from
tional way. developing countnes without Amí nerworks, won't
• Personalization of services and targeted marketing: our "developed" societies somehow be impoverished
With the prevaíence of AmI nerworks, and the because we wili lack the views and experiences of
vast amount of personal data they genérate, ser- those who know what it's like to íive on both sídes of
vice providers can individúate their services to the digital divide? If immigration is restricted, espe-
ncw levéis of specificity. cially on the grounds of a lack of AmI-generated data,
• Critical infriistructure protectwn: Iris hard to get won't we inflame resentment in deveiopmg countnes?
inro the DiMC offices (but not so hard to get Concentraüon of power. DMC is the clear market
out). AmI sensors and actuators, hiornetncs, and leader in the aggregatíon and processing of AmI-gen-
other access control measures are used to protect erated data. It has a wide range of powerful clients.
critica! infrastructure, such as DMC, banks, pub- When there is a risk that DMC mrght collapse, the
i i c u t i h t y networks, ^ovenimcnt offices. governrnent steps in to prop up the company. When
governmenrs and client industries are so dependent
on a single market player, they are at risk of hcmg held
ho.stage. ]',vcn ¡f the company prok-s^ a-spL-cr for i h c
\,\\\. rhe re is ,1 d i s t i n c t n s k , \vhat e\ cr ¡i^ ckx huvd i n u ' i i -
tions, that it will act in a monopolistic way ("Power so that they did not need to fear theft by insiders? We
tends to cotrupt."). High technology companies may are told that it was difficult to get into DMC offices,
fly under the radar screen of competition authorities but not difficult to get out. DMC's security defenses
for a long time before they are noticed, by which time seemed primarily aimed at preventing breaches at its
they may have, Üke DMC, accumulated too much perimeter.
power. The company was rather less focused on the enerny
withín, henee the-three employees (who had autho-

T
he concentration of power manífests rized access to the data) were able to collaborate, to
itself in other ways in the scenario. copy the files and exit the premises without being
DMC says it is willing to establish challenged. Further, it seems to have been relatively
Aml networks in spme developing easy for them to remove their location implants and
countries as long as DMC controls to disappear without a trace. But t'^e three employee
them. Developing countries, concerned about their data thieves are not the only miscre • rs at DMC. The
soverei^nty, will "have to settle for what we give sénior executives also behaved un .hically and ille-
them," says Switzer. Also, employees-kaye "agreed" gally by not informing the pólice and theif-customers
that DMC can check their home sensor nerworks, about the data theft, ~
that is, if they want a Job at DMC, they must agree. Henee, we can conclude that an illusion oTsecurity
Similarly, employees must bear location implants. prevailed at DMG-and, perhaps, more widely within
Lack of public awareness. Despite the convenience socíety as a who 1 e.,The_illusion is fed byfrTe implicit
of personalized services and enhancements in security assumption that vafious Aml technologies and proce-
made possible by Ainl, most people have not com- dures will form -zn adequate defense against miscre-
prehended just how pervasive Aml has become, ñor ants. Unfortunately, no matter how strong these
of the scale and volume of data being generated about technologies and procedures may be, they may stilí
them by Aml networks. In the scenario, public aware- fail, especialíy against insiders acting in concert {both
ness is íncreased as a result of the investigative report- the employees and the executives).
ing and media- coverage of the theft of data from At the societal level, we may assume that laws and
DMC, the resulting tria!, and the high-íevel politicaJ regulatioris will pcotect us, but this scenario suggests
intervention to stave off DMC collapse. Aroused that even there we suffer from the ¡Ilusión of secu-
public awareness may forcé changes in legislative or rity—it takes a class action suit to bring DMC to jus-.
regulatory oversight. Henee, public awareness and the tíce. Market forres that might otherwise punish
pressure of public opinión, stoked by the media, have DMC are undermined because government decides
utility as a safeguard against abuse. Unfortunately, that DMC cannofgo to the wall. DMC has managed
such pressure is-almost always reactive. to acquire so much power—partly through its propri-
The ¿Ilusión of security. Most pepple are wiíling to etary technology and partly through its rnarket dom-
trade some of their privacy for better security. The ínance-—and has come to play so big a role in
scenario suggests that terrorism has become suffí- (ironically) national security that government cannot
cíently serious that the intelligence agencies and allow it to go under. But if DMC was unable to detect
immigration authorities are becoming unwilling to the security risk posed by three of its own employees,
admit foreigners uniess they have detailed informa- isn't the government's confidence in DMC technol-
lion on each individual. Similarly, DMC employees ogy mispLti-cd?
seem willing to have location implants and surveil- The iílusion of security is also fed by unwarranted
íance equipment installed not only in their offices but trust. The issue of trust is not directly raised in tnis
in their homes and cars. They probably see this as scenario, but it is not far away. One would think that
oeneficial in security terms. a data aggregator, processor, and reseller like DMC
It is ironic that DMC and its ditectors face a class would have some obíigatíon to inform people when-
action lawsuit on the grounds that they were negli- ever it sells data to others or takes over another com-
gent in securing personal data. Security would seem pany with persona] data records. But this has not
to be one of DMC's key strengths, one of its key sell- occurred. It seems that DMC clicnts, the intelligence
ing points. DMC can hardly believe that irs many agencies and immigration authoriues, are content
.security measures—video surveillance, biomerrics, that individuáis are not mformed about what infor-
''.'A'-logging software, access control measures, regular marion DMC has on them, even if the law dictares
-mdits, employee implants and so on—could fail. But othervvise.
¡he quesrion is: have DMC executives done enougrí? California and a numlx-r of oiher stares liave stria
\Y,is their proíitmu, oi employees suHleiently n^orous l.iws requiring char companies do míorní individuáis
\ \ h c n their data h.i.s bcirn cornpromised—but that supported by public hjnding. Designen of nc\v tech-
does not mean that they will. Comphance will depend nology should be required to factor in data protectfon
as much on corporate culture and, espccially, erhics as in any new Aml atchicectures and networks. Lcgisla-
on legal dctcrrents. Thus, to sorne extent, even laws tíon and rcgulation will probably be necessary, and
and rcgulauons can instilí an ¡Ilusión of secunty. one can predict that will elicit prorests from those in
favor oí deregulation and gerting the government off
CONCLUSIÓN their backs. So be k.
The principal conclusión we draw frorn this am- íf civil liberty advocares have had concerns about
ele—from the dark scenario and rhe analysis—-is encroachments upon our privacy in the ernerging sur-
that, although we can expect amazing advances in veillance society, they will be positively apoplectic if
the deveiopment and deployment of ambient tech- Aml, already being implemented in a somewhat
nologies, there is a risk that corporate ethics in the piecemeal fashion, becomes as pervasive as its sup-
year 2018 wiil not be so different from those preva- porters believe ít will. To anticípate this future, ratKer
lent in the year 2008, which is tb say that some corn- than react to it, appropriate safeguards should be
panies will be good corporate cítizens and some agreed añtljmt in place. Now is not too soon to start.
won't. Simílarly, sorne companies wiil have rogue To that end, the authors hope this article will stimu-
empioyees just as they do today who are capable of late interesting discussions and constructive debates
undermining what might be perceived as strong on the issues Ít raises, including corporate~ethics and
security "(technologically, procedurally, legálly). A privacy in the Aml space; surveillance rechnolo^ies—
principal difference between today's woríd aad that from convenience to a false sense of security! the role
• depicted for the year 2018 could be that jecurity of horror stories and dark scenarios in~übiquitous
concerns about terrorism and antisocial behavior computing; and the risks resulting from unwarranted
will be such that unless individuáis have really trust. As Thomas Jefferson said, "The pnce of free-
detailed profiles compiled from data from Aml net- dom is eternal vigilance." B
vvorks, they may be barred from entering a devel-
oped country. Also, while people may .welcome the
convenience from personalízation of servíces and the DAVID WWGHT (david.wrighc@tnlareralresearch.com) |s managing-
panner of Trilateral Research & Consulting LLP, based ¡n London,
ubiquic)' of surveillance technologies, they may be
UJC '
lulled into a false sense of security. MlCHAEL PRIEDEWALD (m.friedewald@isi.fraunhofer.de) is a sénior
As mentioned in the introductíon to this artícle, scienfisr and project manager in the Department of EmergTng Tech-
there have been few "dark" scenarios put forward by
Research, Karlsruhe, Germany.
Aml expercs and aficionados. The SWAMI project WlM SCHREURS (wim.schreurs@vub-ac.be) is a researcher at Vríje
has taken a deliberateíy contrarían, position with
regard to scenarios that show the "sunny" side of Aml. MlCHIEL VERLINDEN (michiel-verlinden@gmail.com) is an atturney
While the authors are as enthusiastic as anyone about at the Brussels Par.
SERGE GUTWIRTH (serge.gunvinh@vub.ac.be) is A professor of law
the potentiai of Aml, advances in surveillance tech-
nologies, biometrics, and fourth-generation mobile YVES PUNIE (Yves-Punie@ec.europa.cu) is sénior researcher at [he
systems, they believe the Aml cornmunity, policy- institure for Prospective Technological Smdies (IPTS) in Seviile, Spain.
makers, and society must be a)en to possible abuses of The IPTS is pan of the European Cammission's Joint Research Centre
(JRQ.
the technology. Cons'tructíng enanos and using an lOANNIS MAGHIROS (Ioannis.Maghiros@ec.europa.eu) is principal
analyrical structure along the ;nes as" noted in this ¡ST scientific officer at the ÍPTS.
arríele offer a useful way of stimulating dialogue about ELENA VILDJIOUNAITE (Elena.Vildjiounaite@vtt.fi) is a researcher
such possible abuses-as well as other technology issues. at the VTT Technical Research Centre of Finland in Oulu.
PETTERI ALAHUHTA (Petteri.Alahiihta@vtt.fi) is a technology
Identifying possible abuses is the first step in devis- manager in the Mobile Interaction Knowledge Centre of VTT
¡ng safeguards. Almost certainíy, a mix of safeguards Technical Research Centre of Finland.
wiil be needed—technological, socioeconomic, legal,
and regulatory and even cultural safeguards can be
envisaged.4 As a mínimum, the SWAMI consortlum
advocares a privacy impact assessment for any projects

COMMUNICATIONS OF THE ACM March 20í

Das könnte Ihnen auch gefallen