Unauthorized Disclosure

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1884 Experts worldwide ranked by ideXlab platform

Kelly Caine - One of the best experts on this subject based on the ideXlab platform.

  • CVPR Workshops - Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images
    2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017
    Co-Authors: Nishant Vishwamitra, Kelly Caine
    Abstract:

    Computer vision can lead to privacy issues such as Unauthorized Disclosure of private information and identity theft, but it may also be used to preserve user privacy. For example, using computer vision, we may be able to identify sensitive elements of an image and obfuscate those elements thereby protecting private information or identity. However, there is a lack of research investigating the effectiveness of applying obfuscation techniques to parts of images as a privacy enhancing technology. In particular, we know very little about how well obfuscation works for human viewers or users' attitudes towards using these mechanisms. In this paper, we report results from an online experiment with 53 participants that investigates the effectiveness two exemplar obfuscation techniques: "blurring" and "blocking", and explores users' perceptions of these obfuscations in terms of image satisfaction, information sufficiency, enjoyment, and social presence. Results show that although "blocking" is more effective at de-identification compared to "blurring" or leaving the image "as is", users' attitudes towards "blocking" are the most negative, which creates a conflict between privacy protection and users' experience. Future work should explore alternative obfuscation techniques that could protect users' privacy and also provide a good viewing experience.

Ramadoss Balakrishnan - One of the best experts on this subject based on the ideXlab platform.

  • CIT - A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment
    2016 IEEE International Conference on Computer and Information Technology (CIT), 2016
    Co-Authors: G. S. Smrithy, Ramadoss Balakrishnan
    Abstract:

    Big data and cloud computing are the two top IT initiatives that are in the mind for industries across the globe. Both innovations keep on evolving. As a delivery model for IT services, cloud computing has the potential to enhance agility and productivity while enabling greater efficiencies and reducing costs. As a result a number of enterprises are building efficient and agile cloud environments, and cloud providers continue to expand service offerings. Many cloud providers offer online collaboration service which is basically loosely-coupled in nature. Online anomaly detection aims to detect anomalies in data flowing in a streaming fashion. Such stream data is commonplace in today's cloud centric collaborations which enables participating domains to dynamically interoperate through sharing and accessing of information. Accordingly to forestall Unauthorized Disclosure of the shared resources and conceivable misappropriation, there is a need to identify anomalous access requests. To the best of our knowledge, the detection of anomalous access requests in cloud-based collaborations through non-parametric statistical technique has not been studied in earlier works. This paper proposes an online anomaly detection algorithm based on Kolmogorov-Smirnov goodness of fit test to detect anomalous access requests in cloud environment at runtime.

  • BigData - Online anomaly detection using non-parametric technique for big data streams in cloud collaborative environment
    2016 IEEE International Conference on Big Data (Big Data), 2016
    Co-Authors: G. S. Smrithy, Sathyan Munirathinam, Ramadoss Balakrishnan
    Abstract:

    Big Data and cloud computing are complementary technological paradigms with a core focus on scalability, agility, and on-demand availability. The rise of cloud computing and cloud data stores have been a precursor and facilitator to the emergence of big data. Cloud computing turns traditional siloed computing assets into shared pools of resources that are based on an underlying internet foundation. As a result a number of enterprises are building efficient and agile cloud environments, and cloud providers continue to expand service offerings. Many cloud providers offer online collaboration service which is basically loosely-coupled in nature. Online anomaly detection aims to detect anomalies in data flowing in a streaming fashion. Such stream data is commonplace in today's cloud centric collaborations which enables participating domains to dynamically interoperate through sharing and accessing of information. Accordingly to forestall Unauthorized Disclosure of the shared resources and conceivable misappropriation, there is a need to identify anomalous access requests. To the best of our knowledge, the detection of anomalous access requests in cloud-based collaborations through non-parametric statistical technique has not been studied in earlier works. This paper proposes an online anomaly detection algorithm based on non-parametric statistical technique to detect anomalous access requests in cloud environment at runtime.

Franks, Mary Anne - One of the best experts on this subject based on the ideXlab platform.

  • Redefining “Revenge Porn” Reform: A View From the Front Lines
    UF Law Scholarship Repository, 2019
    Co-Authors: Franks, Mary Anne
    Abstract:

    The legal and social landscape of “revenge porn” has changed dramatically in the last few years. Before 2013, only three states criminalized the Unauthorized Disclosure of sexually explicit images of adults and few people had ever heard the term “revenge porn.” As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term “revenge porn” had been added to the Merriam-Webster Dictionary. I have had the privilege of playing a role in many of these developments. In 2013, I argued that nonconsensual pornography required a federal criminal response and drafted a model statute to this effect. That statute served as the template for what eventually became the federal Intimate Privacy Protection Act of 2016, as well as for numerous state laws criminalizing nonconsensual pornography. As the Legislative and Tech Policy Director of the Cyber Civil Rights Initiative, I have worked with tech industry leaders, legislators, attorneys, victims, and advocates to develop policies and solutions to combat this abuse. This Article is an account from the front lines of the legislative, technological, and social reform regarding this evolving problem

  • Revenge Porn Reform: a View From the Front Lines
    University of Miami School of Law Institutional Repository, 2017
    Co-Authors: Franks, Mary Anne
    Abstract:

    The legal and social landscape of revenge porn has changed dramatically in the last few years. Before 2013, only three states criminalized the Unauthorized Disclosure of sexually explicit images of adults and few people had ever heard the ternm revenge porn. As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term revenge porn had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in many of these developments. In 2013, I argued that nonconsensual pornography required a federal criminal response and drafted a model statute to this effect. That statute served as the template for what eventually became the federal Intimate Privacy Protection Act of 2016, as well as for numerous state laws criminalizing nonconsensual pornography. As the Legislative and Tech Policy Director of the Cyber Civil Rights Initiative, I have worked with tech industry leaders, legislators, attorneys, victims, and advocates to develop policies and solutions to combat this abuse. This Article is an account from the front lines of the legislative, technological, and social reform regarding this evolving problem

Christopher Soghoian - One of the best experts on this subject based on the ideXlab platform.

  • A Lot More than a Pen Register, and Less than a Wiretap
    Yale Journal of Law and Technology, 2015
    Co-Authors: Stephanie Pell, Christopher Soghoian
    Abstract:

    In June 2013, through an Unauthorized Disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden Disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology—one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program. During that time, this technology has steadily and significantly expanded the government’s surveillance capabilities in a manner and to a degree to date largely unnoticed and unregulated. Indeed, it has never been explicitly authorized 1 “A little more than kin, and less than kind.” WILLIAM SHAKESPEARE, HAMLET act 1, sc. 2. 2 The authors would like to thank Susan Freiwald and Jim Green for their feedback and assistance. * Principal, SKP Strategies, LLC; Non-resident Fellow at Stanford Law School’s Center for Internet and Society; former Counsel to the House Judiciary Committee; former Senior Counsel to the Deputy Attorney General, U.S. Department of Justice; former Counsel to the Assistant Attorney General, National Security Division, U.S. Department of Justice; and former Assistant U.S. Attorney, Southern District of Florida. ** Principal Technologist, Speech, Privacy & Technology Project, American Civil Liberties Union; Visiting Fellow, Information Society Project, Yale Law School. The opinions expressed in this article are this author’s alone, and do not reflect the official position of his employer. 1 Pell and Soghoian: A Lot More than a Pen Register, and Less than a Wiretap Published by Yale Law School Legal Scholarship Repository, 2014 16 YALE J.L. & TECH. 134 (2013) 2013-2014 135 by Congress for law enforcement use. This technology, commonly called the StingRay, the most well-known brand name of a family of surveillance devices, enables the government, directly and in real-time, to intercept communications data and detailed location information of cellular phones—data that it would otherwise be unable to obtain without the assistance of a wireless carrier. Drawing from the lessons of the StingRay, this Article argues that if statutory authorities regulating law enforcement surveillance technologies and methods are to have any hope of keeping pace with technology, some formalized mechanism must be established through which complete, reliable and timely information about new government surveillance methods and technologies can be brought to the attention of Congress. 2 Yale Journal of Law and Technology, Vol. 16 [2014], Iss. 1, Art. 4 http://digitalcommons.law.yale.edu/yjolt/vol16/iss1/4 A LOT MORE THAN A PEN REGISTER, AND LESS THAN A WIRETAP 136 I. INTRODUCTION 136 II. A BRIEF DESCRIPTION OF A STINGRAY AND ITS CAPABILITIES 144 III. IN BETWEEN OR BEYOND THE REACH OF STATUTORY LANGUAGE....... 148 A. Real-time Cell Phone Tracking and Secrecy 149 B. The StingRay and Secrecy 154 1. The 1995 Digital Analyzer Magistrate Opinion 157 2. 2012 StingRay Magistrate Opinion 160 IV. WARNINGS FOR LEGISLATORS 163 V. SUGGESTIONS FOR REFORM 165 VI. CONCLUSION 169

  • a lot more than a pen register and less than a wiretap what the stingray teaches us about how congress should approach the reform of law enforcement surveillance authorities
    Yale Journal of Law and Technology, 2014
    Co-Authors: Stephanie K Pell, Christopher Soghoian
    Abstract:

    In June 2013, through an Unauthorized Disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden Disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology — one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program. During that time, this technology has steadily and significantly expanded the government’s surveillance capabilities in a manner and to a degree to date largely unnoticed and unregulated. Indeed, it has never been explicitly authorized by Congress for law enforcement use. This technology, commonly called the StingRay, the most well-known brand name of a family of surveillance devices, enables the government, directly and in real-time, to intercept communications data and detailed location information of cellular phones — data that it would otherwise be unable to obtain without the assistance of a wireless carrier. Drawing from the lessons of the StingRay, this Article argues that if statutory authorities regulating law enforcement surveillance technologies and methods are to have any hope of keeping pace with technology, some formalized mechanism must be established through which complete, reliable and timely information about new government surveillance methods and technologies can be brought to the attention of Congress.

Nishant Vishwamitra - One of the best experts on this subject based on the ideXlab platform.

  • CVPR Workshops - Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images
    2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017
    Co-Authors: Nishant Vishwamitra, Kelly Caine
    Abstract:

    Computer vision can lead to privacy issues such as Unauthorized Disclosure of private information and identity theft, but it may also be used to preserve user privacy. For example, using computer vision, we may be able to identify sensitive elements of an image and obfuscate those elements thereby protecting private information or identity. However, there is a lack of research investigating the effectiveness of applying obfuscation techniques to parts of images as a privacy enhancing technology. In particular, we know very little about how well obfuscation works for human viewers or users' attitudes towards using these mechanisms. In this paper, we report results from an online experiment with 53 participants that investigates the effectiveness two exemplar obfuscation techniques: "blurring" and "blocking", and explores users' perceptions of these obfuscations in terms of image satisfaction, information sufficiency, enjoyment, and social presence. Results show that although "blocking" is more effective at de-identification compared to "blurring" or leaving the image "as is", users' attitudes towards "blocking" are the most negative, which creates a conflict between privacy protection and users' experience. Future work should explore alternative obfuscation techniques that could protect users' privacy and also provide a good viewing experience.