Theresa Payton

  • Aired:  01/21/14
  •  | Views: 18,481

"Privacy in the Age of Big Data" author Theresa Payton details the myriad ways in which technology threatens private information. (5:50)

[ APPLAUSE ]>> Jon: WELCOME BACK.

MY GUEST TONIGHT IS AN INTERNETSECURITY EXPERT WHO WAS ALSO THE

WHITE HOUSE CHIEF INFORMATIONOFFICER FROM 2006 TO 2008.

SHE HAS COAUTHORED A NEW BOOKCALLED "PRIVACY IN THE AGE OF

BIG DATA."

PLEASE WELCOME TO THE PROGRAMTHERESA PAYTON.

[CHEERS AND APPLAUSE]HELLO.

THANK YOU FOR BEING HERE.

>> THANKS FOR HAVING ME.

>> Jon: IT'S A SHAME -- ASHAME -- MS. PAYTON THAT THIS IS

NOT A MORE RELEVANT TOPIC.

REALLY.

>> YEAH.

>> Jon: COULD THERE BEANYTHING WITH THESE N.S.A.

REVELATIONS AND EVERYTHING GOINGON.

HOW LONG HAVE YOU BEEN WORKINGON THIS PROJECT?

>> ALMOST A YEAR.

>> Jon: AND HOW LONG HAVE THEY>KNOWN THAT YOU WERE WORKING ON

IT?

>> IMMEDIATELY.

>> Jon: PROBABLY BEFORE YOUWERE WORKING ON IT.

>> PROBABLY BEFORE I KNEW IT

MYSELF.

>> Jon: IN YOUR MIND WHAT ISTHE LARGEST THREAT TO EITHER OUR

PRIVACY OR SECURITY THROUGHTHESE ISSUES?

>> YOU KNOW, I THINK IT'S THENOT KNOWING WHEN DATA IS

COLLECTED ABOUT YOU SO THAT YOUCAN HAVE A VOICE IN SAYING WAIT

A MINUTE, DID I GIVE YOUPERMISSION TO COLLECT THAT AND

HOW ARE YOU GOING TO PROTECT IT?

YOU HAVE PEOPLE IN THE UK TRYINGTO BE GOOD CITIZENS THROWING

TRASH AWAY AND THEIR PHONESSCANNED AS THEY ARE THROWING

TRASH AWAY.

DID THEY KNOW THAT?

>> Jon: WAIT, WHEN YOU ARETHROWING IN, THE TRASH GUYS ARE

SCANNING IT.

HOW ARE THEY SCANNING THEIRPHONES?

>> THEY HAD A LITTLE READER ONTHE TRASH CAN SO AS LONG AS THEY

HAD PROXIMITY TO YOURPHONE THEY WERE ABLE

TO SCAN YOURPHONE AS YOU THREW AWAY TRASH.

>> Jon: WHO DID THAT?

>> A MARKETING COMPANY.

>> Jon: GET THE HELL OUT OFHERE.

>> YEAH.

>> Jon: IF YOU LIVE IN THISWORLD UNLESS YOU WERE GOING OFF

THE GRID AND GOD FORBID SHOP ATA BRICKS AND MORTAR

I MEAN -- I MEAN IT'S NOTGOING TO -- HOW DO YOU AVOID IT?

>> I THINK PART OF IT IS JUSTUNDERSTANDING SOME OF THE THINGS

THAT YOU CAN DO TO PROTECTYOURSELF.

FOR EXAMPLE IN THE CASE OF THEPHONE, NOW OF COURSE THIS TAKES

A SMART PHONE AND TURNS IT INTOA DUMB PHONE BUT YOU CAN TURN

OFF LOCATION, WiFi,BLUETOOTH SO YOU ARE NOT

BROADCASTING TO EVERYBODY WHOYOU ARE AND WHERE YOU ARE.

>> Jon: WHY NOT CALL THEM FROMHOME WHERE THE KITCHEN PHONE HAD

THE WIRE WHERE COULD YOU WALK TOTHE LIVING ROOM.

>> BUT THE FRIDGE MIGHT BEWATCHING YOU AND SENDING OUT

TEXT MESSAGES.

>> Jon: THIS IS THE POINT, ITCAN ALWAYS BE USED BY NEFARIOUS

INDIVIDUALS OR GROUPS, BUT IT ISPART OF THE WAY WE LIVE NOW.

IT IS AS THOUGH HIGHWAYS WEREALSO FRAUGHT WITH PIRACY.

THAT'S THE TYPE OF THING WE'REDEALING WITH.

>> IT IS.

ONE OF THE THINGS I HOPE PEOPLETAKE AWAY FROM THE BOOK.

I REALLY WANT PEOPLE TO BEINFORMED AND ENGAGED AND SOME

PEOPLE WHO READ IT EARLY ON SAIDI'M ALSO ENRAGED BUT YOU REALLY

WANT PEOPLE TO TAKE AWAY FROM THIS ON JUST

BECAUSE YOU CAN COLLECT THEDATA, SHOULD YOU?

AND HOW LONG SHOULD YOU STORE ITFOR?

BECAUSE CHANCES ARE CRIMINALSWILL HACK THE DATA. IF YOU'RE

GOING TO KEEP IT, HOW ARE YOUGOING TO PROTECT IT, BECAUSE

IT'S NOT YOURS IT'S ABOUT YOUAND ME.

>> Jon: AND FIGURE OUT HOW TODO THAT.

WHAT IS A MORE DANGEROUS ENTITYTHE MORE CRIMINAL MISCHIEF

MAKERS, CORPORATE MARKETING, ORGOVERNMENT SNOOPING?

>> YOU KNOW, IT'S REALLY KIND OFTHE

CRIMINAL ELEMENT BECAUSE, YOUKNOW, CORPORATE THINKS THEY ARE

DOING IT TO HELP YOU, TO GIVEYOU A BETTER EXPERIENCE, A

BETTER PRODUCT.

THE GOVERNMENT THINKS THEY AREDOING IT TO HELP YOU TO GIVE YOU

BETTER SECURITY TO PROTECT YOU.

THE CYBER CRIMINALS WANT YOURDATA AND YOUR LIFE AND THEY WANT

TO TAKE OVER THAT INFORMATION.

THAT IS REALLY THE ELEMENT THATI THINK IF WE CAN ALL BAND

TOGETHER AND SAY, LET'S NOTCOLLECT AND STORE DATA

INDEFINITELY AND LET'S THINKDIFFERENTLY ABOUT WHAT WE

COLLECT AND HOW WE USE ITBECAUSE THE BAD GUYS ARE GOING

TO GET IT.

>> Jon: HOW ARE YOU GOING DOTHAT BECAUSE THE OTHER TWO

ENTITIES FEEL THAT THEY'RE DOINGIT FOR A GOOD REASON.

THAT'S THE ONLY REASON WE'REKEEPING IT FOREVER.

THEY ARE SAYING WE NEED TO DOTHIS TO PROTECT YOU AND THESE

GUYS ARE SAYING THAT PRESENTS USWITH OPPORTUNITY?

>> I THINK IT'S A NAIVERESPONSE.

>> Jon: THAT'S BECAUSE ITHOUGHT OF IT.

[LAUGHTER]THAT HAPPENS TO BE MY MO.

>> I THINK YOU ARE ASKING THERIGHT QUESTION WHICH IS WHAT TED

AND I WERE HOPING WOULD HAPPENWITH THIS BOOK, WHICH IS WAIT A

MINUTE, I KNOW YOU ARE DOING ITFOR GOOD INTENT BUT SINCE WE

KNOW ALL DATABASES CAN BEHACKED, THE PENTAGON HAS BEEN

HACKED, THE BIG NAMEINTELLIGENCE AGENCIES HAVE ALL

HAD ISSUES, EVERY PIECE OFTECHNOLOGY IS HACKABLE.

KNOWING THAT HOW DO YOU WANT TOPROTECT THAT DATA?

>> Jon: PERHAPS THEN IF ONLYTHEY WOULD HAVE THE CONVERSATION

ABOUT WHAT IS THE EFFICACY OFBIG DATA?

IF THE GOVERNMENT SAID HERE ISHOW IT WORKS THESE ALGORITHMS.

IF CORPORATIONS SAID DON'T YOULIKE ADS THAT ONLY GO TO YOU

WITH THINGS YOU ALSO ALREADYLIKE THEN MAYBE WE COULD HAVE

THE CONVERSATION.

RIGHT NOW IT SEEMS LIKE IT JUSTHAPPENS TO US.

>> IT DOES JUST HAPPEN TO US.

WE TALK ABOUT FOR EXAMPLE TARGETFIGURED OUT WITH BIG DATA THEY

KNOW YOU ARE PREGNANT BEFORE YOUKNOW OR BEFORE YOU ARE TELLING

PEOPLE.

NOT YOU PERSONALLY OBVIOUSLYBUT --

[LAUGHTER]>> Jon: WITH TARGET SURE

BECAUSE WHO WOULD EVER HACK INTOTHOSE GUYS THAT DATA IS -- THEY

KNOW HOW TO PROTECT STUFF.

>> THAT DATA IS SECURE.

>> Jon: ON THAT NOTE -- THISIS THE DISCUSSION OF THE ERA.

SO SMACK IN THE MIDDLE OF ITTHERE.

PRIVACY IN THE AGE OF BIG DATA.

IT'S ON THE BOOKSHELVES NOW.

THERESA PAYTON.

[CHEERS AND APPLAUSE)

Loading...