{"id":62,"date":"2005-09-06T00:10:30","date_gmt":"2005-09-06T00:10:30","guid":{"rendered":"\/?p=62"},"modified":"2006-01-07T22:13:10","modified_gmt":"2006-01-08T06:13:10","slug":"just-a-few-scanning-machines","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=62","title":{"rendered":"Just a few scanning machines&#8230;"},"content":{"rendered":"<p>Since I seem to be on the subject of <a href=\"https:\/\/www.identityblog.com\/2004\/11\/16.html\" class=\"broken_link\">Bluetooth<\/a> again, I want to tell you about an experience I had recently that put a gnarly visceral edge on my opposition to technologies that serve as <strong><a href=\"\/?p=352\">tracking beacons<\/a><\/strong> for us as private individuals.<\/p>\n<p>I was having lunch in San Diego with <a href=\"http:\/\/cis-berkman.editme.com\/\">Paul Trevithick<\/a>, <a href=\"http:\/\/www.idcorner.org\/\" class=\"broken_link\">Stefan Brands<\/a> and <a href=\"http:\/\/cyberlaw.stanford.edu\/blogs\/rundle\/\" class=\"broken_link\">Mary Rundle<\/a>.  Everyone knows Paul for his work with Social Physics and the Berkman identity wiki;  Stefan is a tremendously innovative privacy cryptographer; and Mary is pushing the envelope on cyber law with Berkman and Stanford.<\/p>\n<p>Suddenly Mary recalled the closing plenary at the <a href=\"https:\/\/www.identityblog.com\/2005\/04\/18.html\" class=\"broken_link\">Computers, Freedom and Privacy<\/a> &#8220;<a href=\"http:\/\/blogs.pcworld.com\/mt-comments.cgi?entry_id=608\" class=\"broken_link\">Panopticon Conference<\/a>&#8221; in Seattle.<\/p>\n<p>She referred off-handedly to &#8220;the presentation where they flashed a slide tracking your whereabouts throughout the conference using your bluetooth phone.&#8221;<\/p>\n<p>Essentially I was flabbergasted.  I had missed the final plenary, and had no idea this had happened.  <\/p>\n<table cellSpacing=0 cellPadding=2 border=1>\n<tbody>\n<tr bgColor=#a6a6a6>\n<th><font face=Geneva,Arial,Sans-Serif size=1>MAC<\/font><\/th>\n<th><font face=Geneva,Arial,Sans-Serif size=1>Name<\/font><\/th>\n<th><font face=Geneva,Arial,Sans-Serif size=1>Room<\/font><\/th>\n<th><font face=Geneva,Arial,Sans-Serif size=1>Time<\/font><\/th>\n<th><font face=Geneva,Arial,Sans-Serif size=1>Talk<\/font><\/th>\n<\/tr>\n<tr>\n<td rowSpan=12><font face=Geneva,Arial,Sans-Serif size=1>Kim Cameron Mobile<br \/><\/font><a href=\"http:\/\/127.0.0.1:5335\/43.svg\" class=\"broken_link\"><font face=Geneva,Arial,Sans-Serif size=1>00:09:2D:02:9A:68<\/font><\/a><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand I (G1)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 09:32<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>09:32<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>????<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand Crescent (gc)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 09:35<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>09:35<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Adware and Privacy: Finding a Common Ground <\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand I (G1)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 09:37<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>09:37<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>????<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand Crescent (gc)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 09:41<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>09:42<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Adware and Privacy: Finding a Common Ground <\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand I (G1)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 09:46<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>09:47<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>????<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand III (g3)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 10:18<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>10:30<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Intelligent Video Surveillance<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Baker (ol)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 10:33<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>10:42<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Reforming E-mail and Digital Telephonic Privacy <\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand III (g3)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 10:47<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>10:48<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Intelligent Video Surveillance<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand Crescent (gc)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 11:25<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>11:26<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Adware and Privacy: Finding a Common Ground <\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand III (g3)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 11:46<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>12:22<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Intelligent Video Surveillance<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>5th Avenue (5a)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 12:33<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>12:55<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>????<\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Grand III (g3)<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>Wed 13:08<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=1>14:34<\/font><\/td>\n<td><font face=Geneva,Arial,Sans-Serif size=2><\/font><font size=1>Plenary: Government CPOs: Are they worth fighting for?<\/font> <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Of course, to some extent I&#39;m a public figure when it comes to identity matters, and tracking my participation at a privacy conference is, I suspect, fair game.  Or at any rate, it&#39;s good theatre, and drives home the message of the Fourth Law, which makes the point that private individuals must not be subjected &#8211; without their knowledge or against their will &#8211; to technologies that create tracking beacons.<\/p>\n<p><img height=296 alt=\"A picture named kim_cameron.JPG\" hspace=15 src=\"https:\/\/www.identityblog.com\/images\/2005\/09\/05\/kim_cameron.JPG\" width=408 align=right vspace=5 border=0\/>Later Mary introduced me to Paul Holman from <a href=\"http:\/\/shmoo.com\/\" class=\"broken_link\">The Shmoo Group<\/a>.   He was the person who had put  this presentation together, and given our mutual friends I don&#39;t doubt his motives.  In fact, I look forward to meeting him in person.<\/p>\n<p>He told me:<\/p>\n<p><font size=2><\/p>\n<p>&#8220;I take it you missed our quick presentation, but essentially, we just put bluetooth scanning machines in a few of the conference rooms and had them log the devices they saw. This was a pretty unsophisticated exercise, showing only devices in discoverable mode. To get them all would be a lot more work. You could do the same kind of thing just monitoring for cell phones or wifi devices or whatever. We were trying to illustrate a crude version of what will be possible with RFIDs.&#8221;<\/p>\n<p>The Bluetooth tracking was tied in to the conference session titles, and by clicking on a link you could see the information represented graphically &#8211; including my escape to a conference center window so I could take a phone call.<\/p>\n<p>Anyway, I think I have had a foretaste of how people will feel when networks of billboards and posters start tracking their locations and behaviors.  They won&#39;t like it one bit.  They&#39;ll push back.<\/p>\n<p><\/font><\/p>\n<p align=right><font color=#00008b size=2>[tags: <a href=\"http:\/\/technorati.com\/tags\/bluetooth\" rel=\"tag\" class=\"broken_link\">Bluetooth<\/a>, <a href=\"http:\/\/technorati.com\/tags\/bluecasting\" rel=\"tag\" class=\"broken_link\">Bluecasting<\/a>, <a href=\"http:\/\/technorati.com\/tags\/digitalidentity\" rel=\"tag\" class=\"broken_link\">Digital Identity<\/a>, <a href=\"http:\/\/technorati.com\/tags\/fourthlawofidentity\" rel=\"tag\" class=\"broken_link\">Fourth Law Of Identity<\/a><\/font><font color=#00008b size=2>]<a href=\"http:\/\/technorati.com\/tags\/kimcameron\" rel=\"tag\" class=\"broken_link\"><\/a><\/font><\/p>\n<p align=right><font color=#00008b size=2><\/font><font color=#00008b size=2><\/font><font color=#00008b size=2><\/font> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since I seem to be on the subject of Bluetooth again, I want to tell you about an experience I had recently that put a gnarly visceral edge on my opposition to technologies that serve as tracking beacons for us as private individuals. I was having lunch in San Diego with Paul Trevithick, Stefan Brands &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=62\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Just a few scanning machines&#8230;<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/62"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=62"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/62\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}