open source physical security can we have both privacy
play

Open Source Physical Security: Can we have both privacy and - PowerPoint PPT Presentation

Open Source Physical Security: Can we have both privacy and safety? Chris Peterson Foresight Institute www.foresight.org Please check the logic "The best weapon of a dictatorship is secrecy, but the best weapon of a democracy


  1. Open Source Physical Security: Can we have both privacy and safety? Chris Peterson Foresight Institute www.foresight.org

  2. Please check the logic

  3. "The best weapon of a dictatorship is secrecy, but the best weapon of a democracy should be the weapon of openness." —Niels Bohr

  4. No Secret Software for Public Voting Data! The E-voting mess — We could have nipped it in the bud.

  5. The Future • It’s not just electronic • It’s material as well • Molecules matter as much as bits • A big part of the future — and the future of freedom — is nanotech

  6. Nanotech: 3 stages Materials Devices Systems

  7. One molecule Nanotech can do it now too

  8. Nanotech- based sensors “The detector generates a continuous 'spectrum' of information about any chemical agents in its presence...” “ easily programmable ”

  9. Sewer monitoring has begun “The test doesn’t screen people directly but instead seeks out evidence of illicit drug abuse in drug residues and metabolites excreted in urine and flushed toward municipal sewage treatment plants.”

  10. “We found a drug molecule — Everybody out for a breath check!”

  11. Things worth detecting: weapons of mass destruction • Explosives, chemicals, nukes — today • Bioweapons – in early stages — nasty, but delicate and hard to control) • Nanoweapons — later — like bioweapons, but tougher and more controllable)

  12. Technological Advance Cost of WMD comes down $ GDP per capita goes up Time

  13. Fear + poor WMD data = Sudan pharmaceutical plant, August 1998

  14. Result: more surveillance Electronic, video, biological, chemical Being integrated into national system

  15. Transparency vs privacy DC doesn’t notice our debates — they just move forward

  16. Top-down approach to bottom-up problem • Centralized • Mandatory • Monolithic • Limited in participation • Secretive • Leads toward Surveillance State

  17. Bottom-up physical security • Decentralized • Minimal “Track the • Voluntary/privatized problem, not the • Experimental people” • Collaborative • Open • Transparent

  18. Who can figure out whether & how to collect public sensing data? • Need a community that understands the relationships between: • Security • Privacy • Functionality • Freedom

  19. Graphic: Gina Miller

  20. Open Source Physical Security: What would it be like? • Open source style development • Citizen controlled • Privacy oriented • Verifiably limited • Detects materials of concern • Does not track individuals or nonweapons (e.g. drugs)

  21. What might we regard as worth detecting? • Real problems • Anthrax (NYC, DC, FL 2001) • Sarin (Tokyo, 1995) • Ricin (London 2002, Las Vegas 2008)

  22. Who gets the data? • Communities negotiate • Mutual data exchange, e.g. anthrax within 100 km • Agreements on how to treat the data • “Communities” size can vary from household to nation, depending on what is detected (e.g., TNT vs nukes)

  23. Proposed law in New York City that will require people to get a license before they can buy chemical, biological, or radiological attack detectors Do we not have a “freedom to sense”?

  24. “Who would have guessed that the folks with the pocket protectors would turn out to be the ones with the right stuff?” —LA Times

  25. Mechanical geek Electrical geek

  26. Graphic: Gina Miller

  27. NO SECRET SOFTWARE FOR PUBLIC SENSING DATA! Open Source Physical Security

  28. or

  29. • Email me: BOF tonight peterson @ foresight.org 8:30 PM • BOF tonight, 8:30 pm • Foresight Vision Weekend, Nov. 15-16, Silicon Valley No Secret Software for Public Sensing Data!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend