SlideShare a Scribd company logo
1 of 41
Download to read offline
Confessions	
  of	
  a	
  "Recovering"	
  Data	
  Broker	
  	
  
Responsible	
  Innova.on	
  in	
  the	
  Age	
  of	
  Big	
  Data	
  and	
  Big	
  Brother	
  

Jim	
  Adler	
  
Vice	
  President,	
  Products	
  
Metanau.x	
  
	
  
jimadler@metanau.x.com	
  
@jim_adler	
  
hDp://jimadler.me	
  
	
  
Markkula	
  Center	
  for	
  Applied	
  Ethics	
  
Feb	
  25	
  2014	
  

	
  
Plea

“Can’t	
  we	
  all	
  just	
  get	
  along?”	
  

−	
  Rodney	
  King	
  

Geeks	
  
High-­‐Tech	
  
Mercenary	
  

Social	
  
Entrepreneur	
  
Responsible	
  
Innovator	
  

Suits	
  

Tradi?onal	
  
Capitalist	
  

Wonks	
  
Lesson

Eclectic	
  generalists	
  drive	
  innovation.	
  

Richard	
  Feynman	
  
Quantum	
  Physics	
  
Steve	
  Jobs	
  
‘nuff	
  said	
  

Stephen	
  Hawking	
  
Cosmology	
  

Norio	
  Ohga	
  
Sony	
  President	
  
74	
  min	
  CD	
  

Temple	
  Grandin	
  
Animal	
  Handling	
  
Confession

I	
  am	
  not	
  an	
  attorney.	
  

Intelligence	
  
Geek	
  

Obsession	
  

Dweeb	
  
Nerd	
  
Dork	
  

Social	
  
Inep.tude	
  
Confession

You	
  can	
  often	
  do	
  more	
  good	
  from	
  the	
  
inside	
  than	
  the	
  outside.	
  

•  Founded	
  in	
  2003	
  
•  20B	
  public	
  records	
  
•  30M	
  visitors	
  per	
  month	
  
•  50M+	
  reports	
  sold	
  
Confession

The	
  “public”	
  data	
  supply	
  chain	
  of	
  you	
  

Payments	
  
Civil	
  
Suits	
  
Criminal	
  
Records	
  

Commercial

Risk	
  

Resumes	
  

Government

Public	
  
Posts	
  

Names	
  

Addresses	
  

Blogs	
  
Search	
  

Phone	
  
Numbers	
  

Collection
Self-Reported

Big Data
Engines

Marke.ng	
  
Directory	
  

Background	
  

Use
Confession

We	
  don’t	
  know	
  you	
  all	
  that	
  well.	
  

Billions	
  of	
  Records	
  

Millions	
  of	
  People	
  

Philip	
  
Collins	
  

375	
  People	
  

Jim	
  Adler	
  

213	
  Records	
  
37	
  People	
  

Carol	
  Brooks	
  
9800	
  Records	
  
1250	
  People	
  

Randolph	
  
Hutchins	
  
5	
  People	
  

Gwen	
  
Fleming	
  
2	
  People	
  

213	
  records	
  linked	
  
to	
  the	
  correct	
  37	
  Jim	
  Adlers	
  	
  
Jim	
  Adler	
  

Houston,	
  TX	
  
Age	
  70	
  

Jim	
  Adler	
  
McKinney,	
  TX	
  
Age	
  57	
  

Jim	
  Adler	
  
Has.ngs,	
  NE	
  
Age	
  32	
  
Jim	
  Adler	
  
Canaan,	
  NH	
  
Age	
  59	
  

Jim	
  Adler	
  
Redmond,	
  WA	
  
Age	
  50	
  
Jim	
  Adler	
  
Denver,	
  CO	
  
Age	
  48	
  
Confession

BANKING	
  
SERVICES	
  

Lots	
  of	
  uses	
  for	
  your	
  data	
  …	
  some	
  regulated.	
  

CALLER	
  ID	
  OF	
  HARASSING	
  
PHONE	
  CALLS	
  

ONLINE	
  SHOPPERS	
  
VERIFYING	
  ONLINE	
  SELLERS	
  

LEARNING	
  ABOUT	
  	
   ADOPTED	
  KIDS	
  SEEKING	
  THEIR	
  
BIOLOGICAL	
  PARENTS	
  
A	
  BUSINESS	
  

SOCIAL	
  NETWORKERS	
  LOOKING	
  TO	
  
EXPAND	
  THEIR	
  FRIENDS	
  LIST	
  

NON-­‐PROFIT	
  ORGANIZATIONS	
  
LOOKING	
  FOR	
  SUPPORTERS	
  

CHECKING	
  OUT	
  A	
  
PROSPECTIVE	
  TENANT	
  

THOSE	
  IN	
  LEGALLY	
  ENTANGLED	
  
LOOKING	
  FOR	
  COURT	
  RECORDS	
  

RESEARCHING	
  A	
  
PROSPECTIVE	
  EMPLOYEE	
  

ALUMNI	
  GROUPS	
  
ARRANGING	
  REUNIONS	
  

NETWORKERS	
  SEEKING	
  
BUSINESS	
  OPPORTUNITIES	
  

GENEALOGISTS	
  	
  CULTIVATING	
  
THEIR	
  FAMILY	
  TREE	
  

ANYONE	
  RETRIEVING	
  
COURT	
  RECORDS	
  
SHARING	
  

FIND	
  OWNER	
  OF	
  DOG’S	
  
RELATIVE	
  FOR	
  TRANSPLANT	
  

RESEARCH	
  

SALES	
  PROFESSIONALS	
  LOOKING	
  
FOR	
  NEW	
  PROSPECTS	
  

CHECKING	
  OUT	
  A	
  
PROSPECTIVE	
  DATE	
  

FIANCÉS	
  AND	
  THEIR	
  CURIOUS	
  
FAMILY	
  MEMBERS	
  

ENFORCEMENT	
  

SOCIAL	
  WORKERS	
  WHO	
  NEED	
  TO	
  KNOW	
  
MORE	
  ABOUT	
  THEIR	
  CLIENTS	
  

LAWYERS	
  NEEDING	
  QUICK	
  ACCESS	
  
TO	
  COURT	
  RECORDS	
  

BUSINESSES	
  THAT	
  NEED	
  TO	
  UPDATE	
  CONTACT	
  
INFORMATION	
  ON	
  CUSTOMERS	
  

ANYONE	
  CURIOUS	
  ABOUT	
  WHO'S	
  
EMAILING	
  OR	
  CALLING	
  THEM	
  

AIRLINES	
  TRYING	
  TO	
  
RETURN	
  LOST	
  LUGGAGE	
  

PROFESSIONALS	
  LEARNING	
  ABOUT	
  
COLLEAGUES	
  AT	
  CONFERENCES	
  

SINGLES	
  CURIOUS	
  ABOUT	
  THE	
  
PEOPLE	
  THEY	
  MEET	
  
INVESTIGATIVE	
  JOURNALISTS	
  
RUNNING	
  DOWN	
  LEADS	
  

RECONNECTING	
  OUT-­‐OF-­‐TOUCH	
  
FAMILY	
  MEMBERS	
  
LAW	
  

PARENTS	
  	
  ENSURING	
  WHO	
  
THEIR	
  KIDS	
  SAFETY	
  
FINDING	
  PEOPLE	
  THAT	
  HAVE	
  THE	
  
SAME	
  ILLNESS	
  AS	
  YOU	
  

ANYONE	
  WHO	
  NEED	
  ADDRESS	
  
HISTORIES	
  FOR	
  PASSPORTS	
  

CHECKING	
  OUT	
  A	
  PROSPECTIVE	
  SOCIAL	
  
NETWORK	
  CONNECTION	
  

FINDING	
  LONG-­‐LOST	
  FRIENDS,	
  MILITARY	
  
BUDDIES,	
  ROOMMATES,	
  OR	
  CLASSMATES	
  

REGULATED	
  
Confession

Opt-­‐out	
  doesn’t	
  always	
  mean	
  deletion.	
  

Jane Hampton
Jane Hampton

Jane Hampton

06/23/1998

123 Main

Peoria, IL

123 Main

Peoria, IL

jane@facebook.com

(309)555-8931
Lesson

Listen	
  to	
  your	
  toughest	
  critics.	
  
Lesson

Can	
  I	
  have	
  a	
  little	
  narcissism	
  with	
  my	
  
voyeurism?	
  

•  What	
  does	
  my	
  background	
  
check	
  say?	
  
•  Privacy	
  controls	
  
–  Suppress	
  single	
  address	
  or	
  
phone	
  number	
  

•  Comment	
  on	
  your	
  own	
  
public	
  profile	
  
Regulation

New	
  Data	
  Broker	
  Bill	
  Introduced	
  This	
  Month	
  

•  “Data	
  Broker	
  Accountability	
  and	
  Transparency	
  Act”	
  
•  Prohibits	
  “data	
  brokers”	
  from	
  using	
  decep?ve	
  means	
  to	
  collect	
  
informa.on	
  about	
  consumers.	
  
•  Transparency	
  to	
  consumers	
  about	
  informa.on	
  about	
  them.	
  
•  Consumers	
  can	
  correct	
  the	
  data.	
  
•  Opt-­‐out	
  of	
  having	
  their	
  data	
  collected.	
  
•  FTC	
  enforcement	
  
Lesson

When	
  towns	
  were	
  small,	
  personal	
  
anonymity	
  was	
  low	
  …	
  

“The	
  only	
  thing	
  
worse	
  than	
  being	
  
talked	
  about,	
  is	
  
not	
  being	
  talked	
  
about.”	
  
	
  

−	
  Oscar	
  Wilde	
  
Lesson

Urban	
  populations	
  grew	
  along	
  with	
  
personal	
  anonymity…	
  

“Good	
  Fences	
  
Make	
  Good	
  
Neighbors”	
  
	
  

−	
  Robert	
  Frost	
  
Confession

…	
  we’re	
  suffering	
  from	
  Privacy	
  Vertigo.	
  

120	
  

“Rockwell”	
  Era	
  

“Good	
  Fences”	
  Era	
  

Privacy Expectations !

100	
  

“Privacy	
  
Ver.go”	
  
Era	
  

80	
  

	
  	
  Onli
	
  	
  
nsity
ne	
  De

60	
  
40	
  
20	
  

Urban	
  Density	
  

0	
  
1850	
  

1890	
  

1930	
  

1970	
  

2010	
  
In	
  privacy	
  contexts,	
  Power	
  matters.	
  

Privacy	
  Rights	
  !	
  

Lesson

Peer	
  to	
  Peer	
  

Corpora.on	
  &	
  
Customer/Employee	
  

Government	
  &	
  
Ci.zen	
  

Power	
  Disparity	
  !	
  	
  

Your	
  God	
  &	
  You	
  
Lesson

How	
  to	
  unpack	
  Privacy?	
  Think	
  PPP.	
  

PERILS	
  
Mapping	
  Places-­‐Players-­‐Perils	
  Cases	
  

Private

Curtilage

Governments
Employers/Landlords/Insurers

Public

M O R E 	
   P L A Y E R 	
   P O W E R 	
   G A P 	
  

Lesson

Parents
Peers
M O R E 	
   P R I V A T E 	
   P L A C E S 	
  
Lesson

Places-­‐Players-­‐Perils	
  Cases	
  

M O R E 	
   P L A Y E R 	
   P O W E R 	
   G A P 	
  

US	
  deports	
  Bri?sh	
  
tourists	
  over	
  Tweets	
  

NSA	
  internet	
  ci?zen	
  
surveillance	
  

Georgia	
  teacher	
  
FBI	
  GPS	
  criminal	
  
fired	
  aXer	
  pos?ng	
   Google	
  privacy	
  
surveillance	
  
vaca?on	
  pics	
   policy	
  unifica?on	
  

"Girls	
  Around	
  Me"	
  
pulled	
  from	
  market	
  

Ethically
Challenging

Target	
  finds	
  out	
  
News	
  of	
  the	
  World	
  
teen	
  pregnant	
   Health	
  orgs	
  use	
  
phone	
  hacking	
  
before	
  parents	
   Twi[er	
  to	
  track	
  
illness	
  

Actress	
  sues	
  IMDB	
  
over	
  revealing	
  her	
  
age	
  
FB	
  user	
  sets	
  fire	
  to	
  
home	
  aXer	
  de-­‐
friending	
  

GM	
  OnStar	
  tracks	
  
users	
  

M O R E 	
   P R I V A T E 	
   P L A C E S 	
  

Woman	
  caught	
  
naked	
  by	
  Google	
  
Street	
  View	
  
Rutgers	
  student	
  
commits	
  suicide	
  
aXer	
  spied	
  by	
  
webcam	
  
M O R E 	
   P L A Y E R 	
   P O W E R 	
   G A P 	
  

Confession

Big	
  brother	
  is	
  watching	
  (duh).	
  

NSA	
  internet	
  
“We’re	
  being	
  asked	
  to	
  trust	
  
US	
  deports	
  Bri?sh	
  
ci?zen	
  
without	
  being	
  able	
  to	
  verify.”	
  
tourists	
  over	
  Tweets	
  
surveillance	
  
−	
  Alex	
  Howard	
  (big	
  data	
  journalist)	
   GPS	
  criminal	
  
Georgia	
  teacher	
  
FBI	
  
fired	
  aXer	
  pos?ng	
   Google	
  privacy	
  
vaca?on	
  pics	
   policy	
  unifica?on	
  

surveillance	
  

Target	
  finds	
  out	
  
News	
  of	
  the	
  World	
  
teen	
  pregnant	
   Health	
  orgs	
  use	
  
phone	
  hacking	
  
before	
  parents	
   Twi[er	
  to	
  track	
  
illness	
  

Pres.	
  Obama	
  calls	
  for	
  more	
  
transparency	
  in	
  FISA	
  court	
  and	
  
Woman	
  caught	
  
Actress	
  sues	
  IMDB	
  
surveillance	
  laws	
  
naked	
  by	
  Google	
  

"Girls	
  Around	
  Me"	
  
pulled	
  from	
  market	
  

over	
  revealing	
  her	
  
age	
  

FB	
  user	
  sets	
  fire	
  to	
  
home	
  aXer	
  de-­‐
friending	
  

GM	
  OnStar	
  tracks	
  
users	
  

Street	
  View	
  

Rutgers	
  student	
  
commits	
  suicide	
  
aXer	
  spied	
  by	
  
webcam	
  

NSA	
  chief	
  announces	
  plan	
  to	
  
replace	
  1,000	
  sysadmins	
  with	
  
machines	
  
M O R E 	
   P R I V A T E 	
   P L A C E S 	
  
Lesson

Technology	
  grows	
  exponentially.	
  	
  
Wisdom	
  grows	
  linearly.	
  

•  Gov’t	
  doesn’t	
  trust	
  
people	
  (at	
  least	
  
sysadmins)	
  but	
  does	
  
trust	
  machines	
  
•  LiDle	
  Transparency	
  	
  
•  Wisdom	
  is	
  hard	
  to	
  
come	
  by	
  
	
  
•  Sen.ent	
  (?)	
  brain	
  in	
  
the	
  cloud	
  in	
  <	
  20	
  
years	
  

Wisdom	
  

Knowledge	
  

Informa.on	
  

Data	
  
Prediction

A	
  head	
  in	
  the	
  clouds	
  <	
  20	
  years	
  

$100,000	
  

Human	
  Brain	
  
•  20,000	
  TFlops	
  
•  2,500	
  Terabytes	
  

More	
  than	
  $325M	
  per	
  year	
  
$27,100	
  
$13,500	
  

Cost	
  per	
  Month	
  (000s)	
  

$10,000	
  

$6,800	
  
$3,400	
  

Chris	
  Westbury,	
  University	
  of	
  Alberta	
  	
  

Less	
  than	
  $700K	
  per	
  year	
  

à	
  4	
  M	
  AWS	
  m1.large	
  nodes	
  

$1,700	
  

$1,000	
  

$850	
  
$420	
  
$210	
  

$100	
  

$100	
  
$53	
  
$26	
  
$13	
  

$10	
  

$7	
  
$3	
  

$2	
  
$1	
  

$1	
  

2012	
   2014	
   2016	
   2018	
   2020	
   2022	
   2024	
   2026	
   2028	
   2030	
   2032	
   2034	
   2036	
   2038	
   2040	
   2042	
  

Year	
  
Lesson

Big	
  data	
  inferences	
  are	
  not	
  thoughtcrimes.	
  
“…	
  the	
  essen.al	
  crime	
  that	
  
contained	
  all	
  others	
  in	
  itself.	
  
Thoughtcrime,	
  they	
  called	
  it.”	
  

	
  	
  
–	
  George	
  Orwell	
  

“Watch	
  your	
  thoughts,	
  they	
  become	
  words.	
  
Watch	
  your	
  words,	
  they	
  become	
  ac.ons.	
  
Watch	
  your	
  ac.ons,	
  they	
  become	
  habits.	
  
Watch	
  your	
  habits,	
  they	
  become	
  your	
  character.	
  
Watch	
  your	
  character,	
  it	
  becomes	
  your	
  des.ny.”	
  
	
  

	
  –	
  Lao	
  Tzu	
  
Confession

Target	
  knows	
  you’re	
  pregnant	
  and	
  when	
  
you’re	
  due.	
  So,	
  what’s	
  so	
  perilous?	
  
Confession

“To	
  Serve	
  Man”	
  is	
  a	
  cookbook.	
  

“If	
  you’re	
  not	
  
paying	
  for	
  the	
  
product,	
  you	
  are	
  
the	
  product.”	
  
	
  

−	
  Claire	
  Wolfe	
  
(paraphrased)	
  
Sometimes	
  you’re	
  in	
  a	
  public	
  place	
  when	
  
you	
  think	
  you’re	
  in	
  a	
  private	
  place.	
  

Confession



“Gaydar”
A 2009 MIT study found it was
possible to predict men’s sexual
orientation by analyzing the
gender and sexuality of their
social network contacts – even if
the rest of the information on
their profile was set to private.
Confession

John	
  Foreman’s	
  Excellent	
  Disney	
  
Adventure	
  
Felon	
  Classiier	
  

Sampling	
  

Linking	
  

250	
  M	
  
Defendants	
  

Cleaning	
  

Objec.ve	
  
If	
  someone	
  has	
  minor	
  offenses	
  
on	
  their	
  criminal	
  record,	
  	
  
do	
  they	
  also	
  have	
  felonies?	
  

15K	
  Labels	
  

15K	
  Predictors	
  

Feature	
  
Extrac.on	
  

Learner	
  

Model	
  

Bloomberg	
  ar.cle:	
  hDp://bloom.bg/1eMtnug	
  	
  
How	
  does	
  the	
  Felon	
  Classiier	
  work?	
  
Gender	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  

Eye	
  Color	
  

Ta[oos	
  

Male	
  (+0.1)	
  

Blue	
  

2	
  +	
  

Female	
  

Brown	
  (+1.2)	
  

<	
  2	
  (+0.1)	
  

Green	
  

Criminal	
  Offenses	
  

Score	
  

Over	
  
Threshold	
  
of	
  3.5?	
  

Likely	
  	
  
Felon?	
  

	
  
	
   Traffic	
  only	
  (-­‐0.5)	
  
4	
  or	
  fewer	
  
misdemeanors	
  
8	
  or	
  fewer	
  
misdemeanors	
  

YES	
  

0.9

NO	
  

NO	
  

Hazel	
  
	
  
	
   Male	
  
Female	
  (-­‐0.5)	
  

Blue	
  

2	
  +	
  (+1.3)	
  

Traffic	
  only	
  

Brown	
  

<	
  2	
  

4	
  or	
  fewer	
  
misdemeanors	
  (+1.9)	
  

Green	
  

8	
  or	
  fewer	
  
misdemeanors	
  

YES	
  

4.4

NO	
  

YES	
  

Hazel	
  (+1.7)	
  

Bloomberg	
  ar.cle:	
  hDp://bloom.bg/1eMtnug	
  	
  
Blog	
  widget:	
  hDp://jimadler.me	
  	
  
Confession

Classiiers	
  depend	
  on	
  policy	
  as	
  much	
  as	
  
technology.	
  

False	
  Negative	
  Rate	
  

A N A R C H Y 	
  

100.0%	
  

80.0%	
  

60.0%	
  

40.0%	
  

Threshold:	
  1.1	
  
FP	
  Rate:	
  	
  1%	
  	
  
FN	
  Rate:	
  40%	
  	
  
Threshold:	
  0.66	
  
FP	
  Rate:	
  	
  5%	
  	
  
FN	
  Rate:	
  22%	
  	
  

Threshold:	
  -­‐1.82	
  
FP	
  Rate:	
  	
  19%	
  	
  
FN	
  Rate:	
  0%	
  	
  

20.0%	
  

0.0%	
  
0.0%	
  

5.0%	
  

10.0%	
  

False	
  Positive	
  Rate	
  
T Y R A N N Y 	
  

15.0%	
  

20.0%	
  
Ruling

NYC	
  Stop	
  &	
  Frisk	
  Found	
  Unconstitutional	
  

90% of Criminals
are Minorities
Minorities
50%
Criminals

“The	
  city	
  …	
  believes	
  that	
  
blacks	
  and	
  Hispanics	
  
should	
  be	
  stopped	
  at	
  the	
  
same	
  rate	
  as	
  their	
  
propor.on	
  of	
  the	
  local	
  
criminal	
  suspect	
  
popula.on.”	
  

−	
  US	
  District	
  Judge	
  Shira	
  Scheindlin	
  	
  

All NYC Residents
Lesson

“Half	
  the	
  money	
  I	
  spend	
  on	
  advertising	
  is	
  wasted;	
  
the	
  trouble	
  is	
  I	
  don't	
  know	
  which	
  half.”	
  
Bayes’	
  Rule	
  
PMinority is a Criminal =

Minorities
50%

10% of
Criminals
are Not
Minorities

Criminals
5%

90% of
Criminals
are
Minorities

PCriminal is a Minority
PCriminal
PMinority

PMinority is a Criminal =

90%
5% = 9%
50%

PMinority is NOT a Criminal = 100 − PMinority is a Criminal
= 91%

All NYC Residents

If	
  it’s	
  not	
  ok	
  to	
  stop	
  99%	
  of	
  the	
  general	
  popula.on	
  for	
  nothing,	
  
why	
  is	
  it	
  ok	
  to	
  stop	
  91%	
  of	
  minori.es	
  for	
  nothing?	
  
Lesson

When	
  might	
  Stop	
  &	
  Frisk	
  be	
  OK?	
  

Bayes’	
  Rule	
  
PMinority is a Criminal =
Asians
10%
Criminals
5%

PCriminal is a Minority
PCriminal
PMinority

PMinority is a Criminal =

90%
5% = 45%
10%

PMinority is NOT a Criminal = 100 − PMinority is a Criminal
= 55%

All NYC Residents

If	
  it’s	
  not	
  ok	
  to	
  stop	
  99%	
  of	
  the	
  general	
  popula.on	
  for	
  nothing,	
  
is	
  it	
  ok	
  to	
  stop	
  55%	
  of	
  minori.es	
  for	
  nothing?	
  
Lesson

What	
  about	
  Newark’s	
  Stop	
  &	
  Frisk?	
  
hDp://www.ny.mes.com/2014/02/25/nyregion/newark-­‐
stop-­‐and-­‐frisk-­‐data-­‐is-­‐analyzed.html	
  	
  

Bayes’	
  Rule	
  
Minorities
50%
Criminals
20%

PMinority is a Criminal =

PCriminal is a Minority
PCriminal
PMinority

PMinority is a Criminal =

90%
20% = 36%
50%

PMinority is NOT a Criminal = 100 − PMinority is a Criminal
= 64%
All Newark Residents

If	
  it’s	
  not	
  ok	
  to	
  stop	
  96%	
  of	
  the	
  general	
  popula.on	
  for	
  nothing,	
  
is	
  it	
  ok	
  to	
  stop	
  64%	
  of	
  minori.es	
  for	
  nothing?	
  
Lesson

Hilary	
  Mason’s	
  Maxim	
  

Math	
  +	
  Code	
  =	
  Awesome	
  

Quants
Making	
  a	
  killing	
  on	
  Wall	
  Street	
  but	
  s.ll	
  can’t	
  impress	
  the	
  chicks	
  
Weakonomics.com	
  
Lesson

Corollary	
  to	
  Mason’s	
  Maxim	
  

Values	
  *	
  (Math	
  +	
  Code)	
  =	
  Awesome	
  
Prediction

“The	
  beatings	
  will	
  continue	
  until	
  morale	
  
improves.”	
  

Overton	
  Window	
  
Unthinkable

Acceptable
Radical
Facebook Newsfeed

Ad Targeting
Facebook Beacon
Pre-crime
Skynet

Popular
Sensible

Policy
Lesson

Living	
  within	
  a	
  Filter	
  Bubble	
  
(with	
  apologies	
  to	
  Eli	
  Pariser)	
  

…	
  but	
  then	
  we	
  
reshape	
  our	
  tools	
  …	
  

“We	
  shape	
  	
  
our	
  tools	
  …	
  	
  

…	
  and	
  thereawer	
  
our	
  tools	
  shape	
  us.”	
  
−	
  Marshall	
  McLuhan	
  
Lesson

“No	
  one	
  here	
  gets	
  out	
  alive.”	
  

−	
  Jim	
  Morrison	
  

Listen,	
  
Learn	
  

Geeks	
  

Suits	
  

Wonks	
  

Scru.nize,	
  
Incen.vize	
  

Adapt,	
  
Invent	
  
Questions?	
  
	
  
Jim	
  Adler	
  
	
  
www.metanau.x.com	
  
jimadler@metanau.x.com	
  
@jim_adler	
  
	
  
	
  

More Related Content

What's hot

Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Social Media & Employment Law - TAPS 2012
Social Media & Employment Law - TAPS 2012Social Media & Employment Law - TAPS 2012
Social Media & Employment Law - TAPS 2012andrew_schnitzel
 
Social Media &amp; the Law for Nonprofits
Social Media &amp; the Law for NonprofitsSocial Media &amp; the Law for Nonprofits
Social Media &amp; the Law for NonprofitsKennethELiu
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Msgibbons1cyber bullying
Msgibbons1cyber bullyingMsgibbons1cyber bullying
Msgibbons1cyber bullyingkatie1999
 
WHAT THE $#*&?!
WHAT THE $#*&?!WHAT THE $#*&?!
WHAT THE $#*&?!Mike Ekey
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...Scott Mills
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
What pornography really is
What pornography really isWhat pornography really is
What pornography really isMuhammad Sherif
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police DepartmentsTurell Group
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...iCAADEvents
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social MediaDavid Cain
 
Bill Boorman, Founder, #tru
Bill Boorman, Founder, #truBill Boorman, Founder, #tru
Bill Boorman, Founder, #truTALiNT Partners
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)Felipe Prado
 

What's hot (20)

Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Social Media & Employment Law - TAPS 2012
Social Media & Employment Law - TAPS 2012Social Media & Employment Law - TAPS 2012
Social Media & Employment Law - TAPS 2012
 
Social Media &amp; the Law for Nonprofits
Social Media &amp; the Law for NonprofitsSocial Media &amp; the Law for Nonprofits
Social Media &amp; the Law for Nonprofits
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Msgibbons1cyber bullying
Msgibbons1cyber bullyingMsgibbons1cyber bullying
Msgibbons1cyber bullying
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
WHAT THE $#*&?!
WHAT THE $#*&?!WHAT THE $#*&?!
WHAT THE $#*&?!
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
What pornography really is
What pornography really isWhat pornography really is
What pornography really is
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police Departments
 
Health: The Stats of Pornography
Health: The Stats of Pornography Health: The Stats of Pornography
Health: The Stats of Pornography
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Bill Boorman, Founder, #tru
Bill Boorman, Founder, #truBill Boorman, Founder, #tru
Bill Boorman, Founder, #tru
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Macomb Legal News 4-7
Macomb Legal News 4-7Macomb Legal News 4-7
Macomb Legal News 4-7
 
Litmus: Gender On The Net
Litmus: Gender On The NetLitmus: Gender On The Net
Litmus: Gender On The Net
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)
 

Viewers also liked

Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkpii2011
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICJim Fenton
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalJim Fenton
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password RequirementsJim Fenton
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerRobb Boyd
 
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesDigital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesWeb Trainings Academy
 

Viewers also liked (7)

Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalk
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTIC
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest Proposal
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data Broker
 
Digital Marketing PPT
Digital Marketing PPTDigital Marketing PPT
Digital Marketing PPT
 
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesDigital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
 

Similar to Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators

Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Jim Adler
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for LitigationMedpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsJohn Blue
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Big Data for a Better World
Big Data for a Better WorldBig Data for a Better World
Big Data for a Better Worldleadinghands
 
Posthuman literacies: reframing relationships between information, technology...
Posthuman literacies: reframing relationships between information, technology...Posthuman literacies: reframing relationships between information, technology...
Posthuman literacies: reframing relationships between information, technology...IL Group (CILIP Information Literacy Group)
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Toronto Metropolitan University
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014protected7000
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 

Similar to Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators (20)

Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
Wolfram Data Summit: Data Feast, Privacy Famine: What Is a Healthy Data Diet?
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
 
Big Data for a Better World
Big Data for a Better WorldBig Data for a Better World
Big Data for a Better World
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Posthuman literacies: reframing relationships between information, technology...
Posthuman literacies: reframing relationships between information, technology...Posthuman literacies: reframing relationships between information, technology...
Posthuman literacies: reframing relationships between information, technology...
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Privacy
PrivacyPrivacy
Privacy
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 
willweeverhaveprivacyonline
willweeverhaveprivacyonlinewillweeverhaveprivacyonline
willweeverhaveprivacyonline
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 

Recently uploaded

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Recently uploaded (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators

  • 1. Confessions  of  a  "Recovering"  Data  Broker     Responsible  Innova.on  in  the  Age  of  Big  Data  and  Big  Brother   Jim  Adler   Vice  President,  Products   Metanau.x     jimadler@metanau.x.com   @jim_adler   hDp://jimadler.me     Markkula  Center  for  Applied  Ethics   Feb  25  2014    
  • 2. Plea “Can’t  we  all  just  get  along?”   −  Rodney  King   Geeks   High-­‐Tech   Mercenary   Social   Entrepreneur   Responsible   Innovator   Suits   Tradi?onal   Capitalist   Wonks  
  • 3.
  • 4. Lesson Eclectic  generalists  drive  innovation.   Richard  Feynman   Quantum  Physics   Steve  Jobs   ‘nuff  said   Stephen  Hawking   Cosmology   Norio  Ohga   Sony  President   74  min  CD   Temple  Grandin   Animal  Handling  
  • 5. Confession I  am  not  an  attorney.   Intelligence   Geek   Obsession   Dweeb   Nerd   Dork   Social   Inep.tude  
  • 6. Confession You  can  often  do  more  good  from  the   inside  than  the  outside.   •  Founded  in  2003   •  20B  public  records   •  30M  visitors  per  month   •  50M+  reports  sold  
  • 7. Confession The  “public”  data  supply  chain  of  you   Payments   Civil   Suits   Criminal   Records   Commercial Risk   Resumes   Government Public   Posts   Names   Addresses   Blogs   Search   Phone   Numbers   Collection Self-Reported Big Data Engines Marke.ng   Directory   Background   Use
  • 8. Confession We  don’t  know  you  all  that  well.   Billions  of  Records   Millions  of  People   Philip   Collins   375  People   Jim  Adler   213  Records   37  People   Carol  Brooks   9800  Records   1250  People   Randolph   Hutchins   5  People   Gwen   Fleming   2  People   213  records  linked   to  the  correct  37  Jim  Adlers     Jim  Adler   Houston,  TX   Age  70   Jim  Adler   McKinney,  TX   Age  57   Jim  Adler   Has.ngs,  NE   Age  32   Jim  Adler   Canaan,  NH   Age  59   Jim  Adler   Redmond,  WA   Age  50   Jim  Adler   Denver,  CO   Age  48  
  • 9. Confession BANKING   SERVICES   Lots  of  uses  for  your  data  …  some  regulated.   CALLER  ID  OF  HARASSING   PHONE  CALLS   ONLINE  SHOPPERS   VERIFYING  ONLINE  SELLERS   LEARNING  ABOUT     ADOPTED  KIDS  SEEKING  THEIR   BIOLOGICAL  PARENTS   A  BUSINESS   SOCIAL  NETWORKERS  LOOKING  TO   EXPAND  THEIR  FRIENDS  LIST   NON-­‐PROFIT  ORGANIZATIONS   LOOKING  FOR  SUPPORTERS   CHECKING  OUT  A   PROSPECTIVE  TENANT   THOSE  IN  LEGALLY  ENTANGLED   LOOKING  FOR  COURT  RECORDS   RESEARCHING  A   PROSPECTIVE  EMPLOYEE   ALUMNI  GROUPS   ARRANGING  REUNIONS   NETWORKERS  SEEKING   BUSINESS  OPPORTUNITIES   GENEALOGISTS    CULTIVATING   THEIR  FAMILY  TREE   ANYONE  RETRIEVING   COURT  RECORDS   SHARING   FIND  OWNER  OF  DOG’S   RELATIVE  FOR  TRANSPLANT   RESEARCH   SALES  PROFESSIONALS  LOOKING   FOR  NEW  PROSPECTS   CHECKING  OUT  A   PROSPECTIVE  DATE   FIANCÉS  AND  THEIR  CURIOUS   FAMILY  MEMBERS   ENFORCEMENT   SOCIAL  WORKERS  WHO  NEED  TO  KNOW   MORE  ABOUT  THEIR  CLIENTS   LAWYERS  NEEDING  QUICK  ACCESS   TO  COURT  RECORDS   BUSINESSES  THAT  NEED  TO  UPDATE  CONTACT   INFORMATION  ON  CUSTOMERS   ANYONE  CURIOUS  ABOUT  WHO'S   EMAILING  OR  CALLING  THEM   AIRLINES  TRYING  TO   RETURN  LOST  LUGGAGE   PROFESSIONALS  LEARNING  ABOUT   COLLEAGUES  AT  CONFERENCES   SINGLES  CURIOUS  ABOUT  THE   PEOPLE  THEY  MEET   INVESTIGATIVE  JOURNALISTS   RUNNING  DOWN  LEADS   RECONNECTING  OUT-­‐OF-­‐TOUCH   FAMILY  MEMBERS   LAW   PARENTS    ENSURING  WHO   THEIR  KIDS  SAFETY   FINDING  PEOPLE  THAT  HAVE  THE   SAME  ILLNESS  AS  YOU   ANYONE  WHO  NEED  ADDRESS   HISTORIES  FOR  PASSPORTS   CHECKING  OUT  A  PROSPECTIVE  SOCIAL   NETWORK  CONNECTION   FINDING  LONG-­‐LOST  FRIENDS,  MILITARY   BUDDIES,  ROOMMATES,  OR  CLASSMATES   REGULATED  
  • 10. Confession Opt-­‐out  doesn’t  always  mean  deletion.   Jane Hampton Jane Hampton Jane Hampton 06/23/1998 123 Main Peoria, IL 123 Main Peoria, IL jane@facebook.com (309)555-8931
  • 11. Lesson Listen  to  your  toughest  critics.  
  • 12. Lesson Can  I  have  a  little  narcissism  with  my   voyeurism?   •  What  does  my  background   check  say?   •  Privacy  controls   –  Suppress  single  address  or   phone  number   •  Comment  on  your  own   public  profile  
  • 13. Regulation New  Data  Broker  Bill  Introduced  This  Month   •  “Data  Broker  Accountability  and  Transparency  Act”   •  Prohibits  “data  brokers”  from  using  decep?ve  means  to  collect   informa.on  about  consumers.   •  Transparency  to  consumers  about  informa.on  about  them.   •  Consumers  can  correct  the  data.   •  Opt-­‐out  of  having  their  data  collected.   •  FTC  enforcement  
  • 14. Lesson When  towns  were  small,  personal   anonymity  was  low  …   “The  only  thing   worse  than  being   talked  about,  is   not  being  talked   about.”     −  Oscar  Wilde  
  • 15. Lesson Urban  populations  grew  along  with   personal  anonymity…   “Good  Fences   Make  Good   Neighbors”     −  Robert  Frost  
  • 16. Confession …  we’re  suffering  from  Privacy  Vertigo.   120   “Rockwell”  Era   “Good  Fences”  Era   Privacy Expectations ! 100   “Privacy   Ver.go”   Era   80      Onli     nsity ne  De 60   40   20   Urban  Density   0   1850   1890   1930   1970   2010  
  • 17. In  privacy  contexts,  Power  matters.   Privacy  Rights  !   Lesson Peer  to  Peer   Corpora.on  &   Customer/Employee   Government  &   Ci.zen   Power  Disparity  !     Your  God  &  You  
  • 18. Lesson How  to  unpack  Privacy?  Think  PPP.   PERILS  
  • 19. Mapping  Places-­‐Players-­‐Perils  Cases   Private Curtilage Governments Employers/Landlords/Insurers Public M O R E   P L A Y E R   P O W E R   G A P   Lesson Parents Peers M O R E   P R I V A T E   P L A C E S  
  • 20. Lesson Places-­‐Players-­‐Perils  Cases   M O R E   P L A Y E R   P O W E R   G A P   US  deports  Bri?sh   tourists  over  Tweets   NSA  internet  ci?zen   surveillance   Georgia  teacher   FBI  GPS  criminal   fired  aXer  pos?ng   Google  privacy   surveillance   vaca?on  pics   policy  unifica?on   "Girls  Around  Me"   pulled  from  market   Ethically Challenging Target  finds  out   News  of  the  World   teen  pregnant   Health  orgs  use   phone  hacking   before  parents   Twi[er  to  track   illness   Actress  sues  IMDB   over  revealing  her   age   FB  user  sets  fire  to   home  aXer  de-­‐ friending   GM  OnStar  tracks   users   M O R E   P R I V A T E   P L A C E S   Woman  caught   naked  by  Google   Street  View   Rutgers  student   commits  suicide   aXer  spied  by   webcam  
  • 21. M O R E   P L A Y E R   P O W E R   G A P   Confession Big  brother  is  watching  (duh).   NSA  internet   “We’re  being  asked  to  trust   US  deports  Bri?sh   ci?zen   without  being  able  to  verify.”   tourists  over  Tweets   surveillance   −  Alex  Howard  (big  data  journalist)   GPS  criminal   Georgia  teacher   FBI   fired  aXer  pos?ng   Google  privacy   vaca?on  pics   policy  unifica?on   surveillance   Target  finds  out   News  of  the  World   teen  pregnant   Health  orgs  use   phone  hacking   before  parents   Twi[er  to  track   illness   Pres.  Obama  calls  for  more   transparency  in  FISA  court  and   Woman  caught   Actress  sues  IMDB   surveillance  laws   naked  by  Google   "Girls  Around  Me"   pulled  from  market   over  revealing  her   age   FB  user  sets  fire  to   home  aXer  de-­‐ friending   GM  OnStar  tracks   users   Street  View   Rutgers  student   commits  suicide   aXer  spied  by   webcam   NSA  chief  announces  plan  to   replace  1,000  sysadmins  with   machines   M O R E   P R I V A T E   P L A C E S  
  • 22. Lesson Technology  grows  exponentially.     Wisdom  grows  linearly.   •  Gov’t  doesn’t  trust   people  (at  least   sysadmins)  but  does   trust  machines   •  LiDle  Transparency     •  Wisdom  is  hard  to   come  by     •  Sen.ent  (?)  brain  in   the  cloud  in  <  20   years   Wisdom   Knowledge   Informa.on   Data  
  • 23. Prediction A  head  in  the  clouds  <  20  years   $100,000   Human  Brain   •  20,000  TFlops   •  2,500  Terabytes   More  than  $325M  per  year   $27,100   $13,500   Cost  per  Month  (000s)   $10,000   $6,800   $3,400   Chris  Westbury,  University  of  Alberta     Less  than  $700K  per  year   à  4  M  AWS  m1.large  nodes   $1,700   $1,000   $850   $420   $210   $100   $100   $53   $26   $13   $10   $7   $3   $2   $1   $1   2012   2014   2016   2018   2020   2022   2024   2026   2028   2030   2032   2034   2036   2038   2040   2042   Year  
  • 24. Lesson Big  data  inferences  are  not  thoughtcrimes.   “…  the  essen.al  crime  that   contained  all  others  in  itself.   Thoughtcrime,  they  called  it.”       –  George  Orwell   “Watch  your  thoughts,  they  become  words.   Watch  your  words,  they  become  ac.ons.   Watch  your  ac.ons,  they  become  habits.   Watch  your  habits,  they  become  your  character.   Watch  your  character,  it  becomes  your  des.ny.”      –  Lao  Tzu  
  • 25. Confession Target  knows  you’re  pregnant  and  when   you’re  due.  So,  what’s  so  perilous?  
  • 26. Confession “To  Serve  Man”  is  a  cookbook.   “If  you’re  not   paying  for  the   product,  you  are   the  product.”     −  Claire  Wolfe   (paraphrased)  
  • 27. Sometimes  you’re  in  a  public  place  when   you  think  you’re  in  a  private  place.   Confession “Gaydar” A 2009 MIT study found it was possible to predict men’s sexual orientation by analyzing the gender and sexuality of their social network contacts – even if the rest of the information on their profile was set to private.
  • 28. Confession John  Foreman’s  Excellent  Disney   Adventure  
  • 29. Felon  Classiier   Sampling   Linking   250  M   Defendants   Cleaning   Objec.ve   If  someone  has  minor  offenses   on  their  criminal  record,     do  they  also  have  felonies?   15K  Labels   15K  Predictors   Feature   Extrac.on   Learner   Model   Bloomberg  ar.cle:  hDp://bloom.bg/1eMtnug    
  • 30. How  does  the  Felon  Classiier  work?   Gender                                   Eye  Color   Ta[oos   Male  (+0.1)   Blue   2  +   Female   Brown  (+1.2)   <  2  (+0.1)   Green   Criminal  Offenses   Score   Over   Threshold   of  3.5?   Likely     Felon?       Traffic  only  (-­‐0.5)   4  or  fewer   misdemeanors   8  or  fewer   misdemeanors   YES   0.9 NO   NO   Hazel       Male   Female  (-­‐0.5)   Blue   2  +  (+1.3)   Traffic  only   Brown   <  2   4  or  fewer   misdemeanors  (+1.9)   Green   8  or  fewer   misdemeanors   YES   4.4 NO   YES   Hazel  (+1.7)   Bloomberg  ar.cle:  hDp://bloom.bg/1eMtnug     Blog  widget:  hDp://jimadler.me    
  • 31. Confession Classiiers  depend  on  policy  as  much  as   technology.   False  Negative  Rate   A N A R C H Y   100.0%   80.0%   60.0%   40.0%   Threshold:  1.1   FP  Rate:    1%     FN  Rate:  40%     Threshold:  0.66   FP  Rate:    5%     FN  Rate:  22%     Threshold:  -­‐1.82   FP  Rate:    19%     FN  Rate:  0%     20.0%   0.0%   0.0%   5.0%   10.0%   False  Positive  Rate   T Y R A N N Y   15.0%   20.0%  
  • 32. Ruling NYC  Stop  &  Frisk  Found  Unconstitutional   90% of Criminals are Minorities Minorities 50% Criminals “The  city  …  believes  that   blacks  and  Hispanics   should  be  stopped  at  the   same  rate  as  their   propor.on  of  the  local   criminal  suspect   popula.on.”   −  US  District  Judge  Shira  Scheindlin     All NYC Residents
  • 33. Lesson “Half  the  money  I  spend  on  advertising  is  wasted;   the  trouble  is  I  don't  know  which  half.”   Bayes’  Rule   PMinority is a Criminal = Minorities 50% 10% of Criminals are Not Minorities Criminals 5% 90% of Criminals are Minorities PCriminal is a Minority PCriminal PMinority PMinority is a Criminal = 90% 5% = 9% 50% PMinority is NOT a Criminal = 100 − PMinority is a Criminal = 91% All NYC Residents If  it’s  not  ok  to  stop  99%  of  the  general  popula.on  for  nothing,   why  is  it  ok  to  stop  91%  of  minori.es  for  nothing?  
  • 34. Lesson When  might  Stop  &  Frisk  be  OK?   Bayes’  Rule   PMinority is a Criminal = Asians 10% Criminals 5% PCriminal is a Minority PCriminal PMinority PMinority is a Criminal = 90% 5% = 45% 10% PMinority is NOT a Criminal = 100 − PMinority is a Criminal = 55% All NYC Residents If  it’s  not  ok  to  stop  99%  of  the  general  popula.on  for  nothing,   is  it  ok  to  stop  55%  of  minori.es  for  nothing?  
  • 35. Lesson What  about  Newark’s  Stop  &  Frisk?   hDp://www.ny.mes.com/2014/02/25/nyregion/newark-­‐ stop-­‐and-­‐frisk-­‐data-­‐is-­‐analyzed.html     Bayes’  Rule   Minorities 50% Criminals 20% PMinority is a Criminal = PCriminal is a Minority PCriminal PMinority PMinority is a Criminal = 90% 20% = 36% 50% PMinority is NOT a Criminal = 100 − PMinority is a Criminal = 64% All Newark Residents If  it’s  not  ok  to  stop  96%  of  the  general  popula.on  for  nothing,   is  it  ok  to  stop  64%  of  minori.es  for  nothing?  
  • 36. Lesson Hilary  Mason’s  Maxim   Math  +  Code  =  Awesome   Quants Making  a  killing  on  Wall  Street  but  s.ll  can’t  impress  the  chicks   Weakonomics.com  
  • 37. Lesson Corollary  to  Mason’s  Maxim   Values  *  (Math  +  Code)  =  Awesome  
  • 38. Prediction “The  beatings  will  continue  until  morale   improves.”   Overton  Window   Unthinkable Acceptable Radical Facebook Newsfeed Ad Targeting Facebook Beacon Pre-crime Skynet Popular Sensible Policy
  • 39. Lesson Living  within  a  Filter  Bubble   (with  apologies  to  Eli  Pariser)   …  but  then  we   reshape  our  tools  …   “We  shape     our  tools  …     …  and  thereawer   our  tools  shape  us.”   −  Marshall  McLuhan  
  • 40. Lesson “No  one  here  gets  out  alive.”   −  Jim  Morrison   Listen,   Learn   Geeks   Suits   Wonks   Scru.nize,   Incen.vize   Adapt,   Invent  
  • 41. Questions?     Jim  Adler     www.metanau.x.com   jimadler@metanau.x.com   @jim_adler      

Editor's Notes

  1. NSA sphereBut it&apos;s for a good reason -- keep us safe. Security and privacy play the roles of the pig and the chicken at breakfast. Like the pig, security requires commitment, Privacy, like the chicken, is merely involved.Privacy loses to security by default … unless we are vigilant.For security, the peril is often felt immediatelyWith privacy, the peril is often felt much later. Why we discount privacy perils so much – the present cost of a distant future disaster is zero.Privacy and Civil LIberties Oversight Board. (PCLOB)Data, information, knowledge, wisdomNext: Not so sure this is wise …Ref“An individual who breaks a law that conscience tells him is unjust, and who willingly accepts the penalty of imprisonment in order to arouse the conscience of the community over its injustice, is in reality expressing the highest respect for the law” ― Martin Luther King Jr.