2000 Conferences

6th CACR Information Security Workshop
1st Annual Privacy and Security Workshop


Conference Chair
Mike Gurski, Information & Privacy Commission, Ontario

Conference Chair Bio
Mike Gurski is the Senior Policy and Technology Advisor for the Information Privacy Commission of Ontario. Mike has published articles on e-mail encryption and P3P (Platform for Privacy Preferences), a privacy specification for the Web, as well as papers on Privacy Design Principles and Privacy Impact Assessments for Integrated Justice Technology Systems. This was done in partnership with the United States Justice Department's Office of Justice Programs. Mike also consults with the Ontario Government on their Enterprise Information Architecture, Public Key Infrastructure Initiatives and Smart Card Project. Mike is also a member of the Policy Outreach Group, the World Wide Consortium that is implementing P3P initiative.

Mike is a frequent speaker on privacy issues and most recently developed and gave privacy lectures to the Ivey Business School at Western.

Before joining the Information and Privacy Commission he held senior policy positions in Management Board Secretariat and community and Social Services wehre he developed government policy for Young Offenders and natives. Most recently Mike managed technology projects, including software design and data base development and management, for Ontario Works, teh government's Welfare program. Mike holds degrees in English and Architecture and enjoys cycling through France or exploring pre-Celtic megalithic Architecture in Ireland.

Opening Remarks

Welcome and Thank-you

I would like to thank the Center for Applied Cryptography, especially Alfred Menenzes, Frances Hannigan, and Sherry Shannon, from SVI Consulting for making this conference possible. I would also like to thank the Speakers, who have donated their time, energy and expertise to lead us in a series of involved discussions. I would like to thank the team, Mike Knowles, Karen Spector and Pasha Peroff who worked with me to organize this event as well as Ann Cavoukian, the Information and Privacy Commissioner, for her on-going support. Lastly, I would like to thank all the attendees, for your interest and your participation. After all, this day is about learning and the sharing of ideas, so thank you for taking the time out of your busy schedules to join us here today.

What this conference hopes to achieve

A few years ago now Doris Lessing, noted author and social critic gave a series of lectures here at the University of Toronto that was broadcast on the CBC Radio show Ideas. Lessing's Massey Lecture series entitled, The Prisons we Choose to Live Inside, explored our capacity to doublethink around difficult truths, the universality of gravity to pull most things down to the lowest common denominator and society's penchant for acceptance. Haunting tales of racism, totalitarianism and our desire to, at times, act as apologists for these inhumanities, or worse, choose to live within them, sprinkle her lecture series. Her predominantly dark work stands in stark contrast with the happy acolytes of the Internet and e-commerce boosters. This is a world holding to the truth that technology can and will solve the problem or at least create an IPO opportunity.

Yet the early warm glow of the Internet has been dowsed. The days when the magazine Internet World had articles on online museums and libraries have vanished. The Internet, once a government and academic tool, continues to shift to becoming a business apparatchik. The early rally cry that 'Information wants to be free,' is all but laughable today. FreeNets have all but disappeared. Getting online costs money, getting information costs money, getting goods or services costs personal information. The emerging model of the Internet, if current trends are pushed to an extreme, will see a preponderance of Intranet sites with restricted access that require some form of digital identification to enter and cost money and personal information to gain service. The rest of the net will remain a public medium littered with DoubleClick clones that suck every piece of personal information possible from a person's activities on the Internet in return for low value service. A few Internet oxbows will remain that echo the early Internet days but will be increasingly difficult to find through search engines. Why? Nullus Pretii.

It doesn't have to be that way. As Lessing suggests in her lectures, we can choose. That choice comes down to the code we write and the policies we adopt. It comes down to the choices we make. But it is not that simple. Individuals acting alone take on the tragic character of Sisyphus, repeatedly pushing the boulder up the hill and making no progress against much greater and often unseen forces. Those unseen forces are the critical mass of code development, which has been centralized into code building powerhouses like Microsoft. The hardware developers have consolidated as well into powerhouses like Intel, Cisco and Nortel. Then there are the content providers and carriers like AOL/Time/Warner and AT&T. Granted many of these organizations are placing privacy on their radar screen as an issue to be managed, but to believe that this critical mass of self -defined 'solution providers' has privacy at its heart would surely stretch one's imagination.

However, there is a light at the end of the tunnel. And holding that light are consumers, consumers skittish about doing business on-line, consumers voicing their privacy concerns in survey after survey. But consumers are not willing to pay to protect their privacy. Thus, the power of that light, in terms of privacy, remains a critical question.

Consumer privacy concerns have been likened to a lake a hundred miles wide and an inch deep. Witness Zero Knowledge's attempt to sell an Internet pseudonymiser. Forget that a number of countries banned access to Web surfers emanating from a Freedom server. According to recent media articles people are just not willing to spend $49.95 (a year) for the privilege of privacy. The cost is too high. Part of the problem is that pseudonymity is a personal add-on not a default method of doing business on the Internet. The default architecture of the Internet is not privacy protective. This gets back to the critical mass, the powerhouses that strongly influence the standards of cyberspace and create the code.

A second problem is that the 21st century business model is shifting from selling goods to giving the goods away and selling the service. In other words the light at the end of the tunnel might be shining the wrong way. Soon we will no longer buy anything, we will rent the experience (whether a driving experience, a vacation experience or a sitting experience) and return the goods when we are done. Turning privacy and personal information into a commodity might be a laudable tactic to get the private sector to address privacy issues but it might also be doomed in a service-centric world.

So that is the challenge. In Doris Lessing's words, 'how can we change the prison?' First, Lessing would say, we need to become aware of the prison, how our vocabulary shapes our reality. Think of a person talking about sharing data as opposed to limits of data use and disclosure. They are two totally different discussions. We need to be aware of the inherent structure of our technology and the privacy implications.

Next comes taking action. Each of us in our respective organizations has opportunities to reach out and educate our colleagues and senior executives, to form or join associations to address privacy issues, to present solutions that protect privacy whether in biometrics, wireless technology, or public key infrastructures. This conference is an example of what can be done as a first step. We must also develop and use privacy enhancing tools, whether privacy impact assessments or privacy design principles or technology products like Zero Knowledge's pseudonymiser.

Finally we must be strategic in our efforts. As Buckminster Fuller was fond of saying, if you try to change the course of a supertanker by pushing at the bow you will not see any change. If you push on the rudder your chances of changing the course of the supertanker are guaranteed, but the amount of energy needed is still prohibitive. To be the most effective we need to push on the trim tabs, those small fins on the end of the rudder, by moving them, the rudder in turn moves and the tanker makes its turn. To find the trim tabs of the technology environment we choose to live in, is our task and the task of this conference. It must be our goal to move the trim tabs in the right direction in order to protect privacy.

Enjoy the Conference.