Top Banner
West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN FilePage 1 West Coast Publishing Internet of Things Privacy MAIN File Public Forum Nov 2016 Edited by Jim Hanson Research Assistance by Kathryn Starkey Thanks for using our Policy, LD, Public Forum, and Extemp Materials. We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com
76

WEST COAST DEBATE - BC Forensic Web viewincluding via print, email, dropbox, google drive, the web, etc

Feb 03, 2018

Download

Documents

buihanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 1

West Coast Publishing

Internet of Things PrivacyMAIN File

Public Forum Nov 2016

Edited by Jim HansonResearch Assistance by Kathryn Starkey

Thanks for using our Policy, LD, Public Forum, and Extemp Materials.

Please don’t share this material with anyone outside of your school

including via print, email, dropbox, google drive, the web, etc.We’re a small non-profit; please help us continue to provide our products.

Contact us at [email protected]

www.wcdebate.com

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 2: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 2

WEST COAST DEBATE

Public Forum Nov 2016

Internet of Things Privacy Main FileFinding Arguments in this File

Use the table of contents on the next pages to find the evidence you need or the navigation bar on the left. We have tried to make the table of contents as easy to use as possible.

Using the arguments in this FileWe encourage you to be familiar with the evidence you use. Highlight (underline) the key lines you will use in the evidence. Cut evidence from our files, incorporate your and others’ research and make new files. File the evidence so that you can easily retrieve it when you need it in debate rounds. Practice reading the evidence out-loud; Practice applying the arguments to your opponents’ positions; Practice defending your evidence in rebuttal speeches.

Use West Coast Evidence as a BeginningWe hope you enjoy our evidence files and find them useful. In saying this, we want to make a strong statement that we make when we coach and that we believe is vitally important to your success: DO NOT USE THIS EVIDENCE AS A SUBSTITUTE FOR YOUR OWN RESEARCH. Instead, let it serve as a beginning. Let it inform you of important arguments, of how to tag and organize your arguments, and to offer citations for further research. Don’t stagnate in these files--build upon them by doing your own research for updates, new strategies, and arguments that specifically apply to your opponents. In doing so, you’ll use our evidence to become a better debater.

Copying West Coast EvidenceOur policy gives you the freedom to use our evidence for educational purposes without violating our hard work.

You may print and copy this evidence for those on your team. You may not electronically share nor distribute this evidence with anyone other than those on your team

unless you very substantially change each page of material that you share.For unusual situations, you can e-mail us at [email protected] and seek our consent.

Ordering West Coast Materials1. Visit the West Coast Web Page at www.wcdebate.com2. E-mail us at [email protected] 3. Fax us at 877-781-5058Copyright 2016. West Coast Publishing. All Rights Reserved.

Visit our web page!www.wcdebate.com

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 3: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 3

WEST COAST DEBATE...........................................................................2

October 2016 Public Forum Topic: Resolved: On balance, the benefits of the Internet of Things outweigh the harms of decreased personal privacy..................................................5

Topic Essay.........................................................................................6

Definitions.............................................................................................................................................. 9

“On Balance”.....................................................................................10Benefits.............................................................................................11“Internet of Things”...........................................................................12Outweigh...........................................................................................14Harm.................................................................................................15Decreased.........................................................................................16“Personal Privacy”.............................................................................17

PRO Case............................................................................................................................................... 19

Contention 1: IoT Creates Advancements in the Healthcare Industry, Which Helps Society Long-term....................................................................20Contention 2: IoT has a multitude of economic benefits that are worth risking personal privacy in the short-term...........................................22Rebuttal to IoT Causes Hacking and Internet Crime..............................24Rebuttal to IoT causes Discrimination and Harassment........................25Rebuttal to IoT causes Data Overload..................................................26Rebuttal to IoT causes Privacy Invasions.............................................27Rebuttal to IoT creates Computer Takeover.........................................28Rebuttal to IoT Harms Consumer Confidence.......................................29Rebuttal to IoT Harms Economic Growth..............................................30Rebuttal to IoT is Terrible for Healthcare.............................................31Rebuttal to IoT Cannot Help Infrastructure..........................................33

CON Case............................................................................................................................................... 34

Contention 1: Security concerns with the Internet of Things can Invade Personal Privacy, Leading to Discrimination........................................35Contention 2: Lack of Security in the Internet of Things Allows Hackers to Cause Further Issues..........................................................................37Rebuttal to IoT Helps Hacking and Internet Crime................................39

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 4: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 4

Rebuttal to IoT Does Not Lead to Harassment & Discrimination............40Rebuttal to IoT Sufficiently Handles Data............................................41Rebuttal to IoT Prevents Privacy Invasions..........................................42Rebuttal to IoT Prevents Computer Takeover.......................................43Rebuttal to IoT Helps Consumer Confidence........................................44Rebuttal to IoT Fosters Economic Growth............................................45Rebuttal to IoT Fosters Healthcare Innovation.....................................46Rebuttal to IoT Is Key to Infrastructure Development...........................47

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 5: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 5

October 2016 Public Forum Topic: Resolved: On balance, the benefits of the Internet of Things outweigh the harms of decreased personal privacy.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 6: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 6

Topic Essay

On the Pro side of the debate, there are many arguments that can be made to demonstrate the benefits of the Internet of Things (IoT). It’s a very versatile and multifaceted industry, which allows the Pro some flexibility in the types of arguments it makes throughout the debate. One important argument to focus upon is the notion that most of the benefits of the IoT will benefit privacy concerns in the long term. At the heart of the IoT debate is security. As the IoT develops, new security protocols are created, which can help alleviate privacy concerns in the future while allowing consumers to take part in all of the benefits of the IoT. For consumers, the IoT has a lot of value in the healthcare industry. It has the propensity to track patients, monitor their conditions, and even prevent ailments in the future through preventative healthcare measures. On a larger scale, IoT can foster consumer confidence through its benefits in industry and transportation. It can help consumers in their product selection, as well as make goods cheaper long term. IoT can monitor traffic flows, create smart grids, and make the shipping of goods more efficient, ultimately saving consumers money. Even broader, IoT can help foster new STEM (science, technology, engineering, math) advancements, which is a major concern for many governments in the world. The tech race is real, and by advancing industries like the IoT, countries can get a leg up in the race. It is also a trillion-dollar industry, as much of the evidence in the file below articulates, which can give inroads to discussions of the economy. As the economy grows, it becomes even easier to enact methods to protect privacy, as more money can be spent on security.

The Con on this topic will have several lines of argumentation that all culminate in a discussion of privacy concerns. The implication of many of these arguments can also go further than just discussing privacy, which will be useful for the Con when weighing arguments at the end of the debate. At the core of the debate, though, is privacy. The notion of personal privacy is an important concept, particularly in Western culture. The Supreme Court in the United States has, for decades, promoted doctrine that protected the privacy of citizens through various precedents. Individuals also find the need to protect their privacy as much as possible. Maslow’s Hierarchy of Needs demonstrates that safety is the second most important need, and many equate that need with a sense of personal privacy. When people know their information is secure, they can move up to the next level in the Hierarchy. The Con must win that privacy is a right worth protecting. One of the implications of privacy intrusions is discrimination. Much of the evidence below discusses what can happen when an individual’s personal information is stolen; corporations, or even worse, stalkers and dangerous individuals, can discriminate against that person. The risk of discrimination and harassment is not worth further developing the IoT. Hackers are a growing concern in today’s society. From small scale hacking that obtains someone’s email address to hacking that can harm national infrastructure, all of it is on the radar of most governments today. Much of the evidence in the file below discusses how IoT is very susceptible to hacking. Many of the sensors that are placed in devices like coffee pots, watches, etc. will be placed and never updated. Consumers won’t take the time to update the security, not only due to the inconvenience, but also due to the costly price of updating security on their products. This leaves most objects in the IoT susceptible to hacking. Personal data is vulnerable.

The Pro rebuttals are focused on defending all of the potential benefits of the Internet of Things against the possible intrusions of privacy. One concept to focus on, in particular is the notion that privacy is becoming We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 7: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 7

more and more obsolete. Individuals continue to waive more of their right to privacy through the ways in which they interact with the internet. Social media, different consumer sites, and the like all collect information and share it with other entities, yet people still allow it to happen. The Pro can use this notion to demonstrate that privacy is not nearly as important today as it was in the past. By diminishing the importance of privacy, it allows the Pro to focus on the many ways in which the Internet of Things can enhance society. There are several arguments and rebuttals to Con arguments in this file, many of which are not part of the two contentions in the Pro sample case. The Pro can even demonstrate how the Internet of Things can better protect privacy in the future. If the IoT can try new systems for collecting and storing minute, unimportant data, then these new security measures can be implemented in other sectors. The Con will try to break apart the benefits of the IoT, especially in the healthcare debate, but if IoT can work to improve the healthcare industry now, society can see better privacy in healthcare, as well as better overall health, in the future. One of the important debates happening in the U.S. right now is the debate between security and privacy. By saying that security and data collection is the first step to privacy, it demonstrates why the Pro is more important than the Con in relation to the topic this month. The Con will make arguments that attack the structure of IoT and expound upon possible implications. But technology is always changing and adapting; the IoT will be able to fix most of its concerns as it develops.

Con rebuttals must focus on privacy as the first step to achieving many of the benefits of the Internet of Things. Much of the data collected in the IoT concerns consumers. In a world where they do not feel that their personal data is protected, they will be less likely to engage in many of the benefits of the IoT. In the healthcare industry, for example, many people already have a difficult time discussing their ailments with their doctors. Communication studies has an entire facet of the discipline dedicated to healthcare communication. Oftentimes, patients feel like their information is not safe. As more medical records are moved onto the cloud, many patients worry that their information will be leaked. Patients will be unwilling to participate in the IoT in relation to their healthcare if there is any chance that their personal privacy will be violated. Yes, HIPPA exists, but much of the evidence below discusses that hacking of the IoT is inevitable. On the hacking debate in particular, any risk of hacking can derail the Pro’s arguments. Hackers can corrupt infrastructure, destroy transportation lines and smart grids, and even stifle economic growth. If a hacker could break into the DNC server, the IoT with its lackadaisical security updates is not safe. This means there is more of a propensity of the negative implications of IoT to become a reality.

In terms of weighing arguments, there are several trains of thought that will prove useful, especially in this debate. First, discussing the probability, timeframe, and magnitude of the arguments can help create vivid, important comparisons between arguments. How likely a benefit of the IoT is, or when that benefit will be reaped, or how important that argument is in relation to privacy help the judge discern which arguments are those upon which they will vote. The pro can also point out that privacy is unweighable. It is a nebulous concept that lacks a concrete interpretation and impact, which is useful for the Pro to demonstrate why issues like the economic value of the Internet of Things (which is in the trillions of dollars) is a larger issue with a tangible impact on society. It is easier for the Pro to weigh all of the benefits of the IoT against privacy, which isn’t easily calculable. By focusing on this idea that privacy cannot be quantified, it can derail the Con’s rebuttals, as that team will be focusing on privacy as the first step and the most important concern when framing all other arguments. The Con on the other hand must frame privacy as the first step to many of the issues in the debate. Since the Pro will be very focused on security, the Con should do the

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 8: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 8

same, claiming that privacy is the root of security concerns for the future. This allows the Con to frame other arguments around a concern for privacy.

There are several says to win arguments in this debate. First, discuss dropped arguments throughout the debate. Extending dropped arguments can show not only that you’ve out-debated your opponent, but unanswered arguments seem stronger. Second, focus on voting issues. Decide the two or three main issues you must win to get the ballot. Third, remember to centralize your final focus on the notion that privacy either is or is not the most important argument in the round, depending if you are Pro or Con. Remember, the IoT is a vast, intricate debate that covers multiple topics. Keep the debate on the main issue – privacy. Is it worth invading some privacy for the benefits of the IoT? That’s the question your final focus should answer.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 9: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 9

Definitions

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 10: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 10

“On Balance” With all things considered.

Merriam-Webster, 2016, Balance, http://www.merriam-webster.com/dictionary/on%20balance (accessed 10/2/16)

with all things considered <the meeting went well on balance>

Being in equilibrium.

Dictionary.com, 2016, Balance, http://www.dictionary.com/browse/on--balance?s=t (accessed 10/2/16)

1. a state of equilibrium or equipoise; equal distribution of weight, amount, etc. 2. something used to produce equilibrium; counterpoise. 3. mental steadiness or emotional stability; habit of calm behavior, judgment, etc. 4. a state of bodily equilibrium: He lost his balance and fell down the stairs. 5. an instrument for determining weight, typically by the equilibrium of a bar with a fulcrum at the center, from each end of which is suspended a scale or pan, one holding an object of known weight, and the other holding the object to be weighed. 6. the remainder or rest: He carried what he could and left the balance for his brother to bring.7.the power or ability to decide an outcome by throwing one's strength, influence, support, or the like, to one side or the other.

A situation when things are equally divided and opposing forces are given the same power or consideration.

Cambridge Dictionary, 2016, Balance, http://dictionary.cambridge.org/us/dictionary/english/on-balance (accessed 10/2/16)

after considering the power or influence of both sides of a question: the condition of someone or something in which its weight is equally divided so that it can stay in one position or be under control while moving: Balance in a work of art means that all the parts of it work together and no part is emphasized too much.; a situation in which two opposing forces have or are given the same power:

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 11: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 11

BenefitsA good result or effect.

Merriam-Webster, 2016, Benefits, http://www.merriam-webster.com/dictionary/benefits (accessed 10/2/16)

: a good or helpful result or effect: money that is paid by a company (such as an insurance company) or by a government when someone dies, becomes sick, stops working, etc. : something extra (such as vacation time or health insurance) that is given by an employer to workers in addition to their regular pay

Something good or advantageous.

Dictionary.com, 2016, Benefits, http://www.dictionary.com/browse/benefits?s=t (accessed 10/2/16)

1. something that is advantageous or good; an advantage: He explained the benefits of public ownership of the postal system. 2. a payment or gift, as one made to help someone or given by an employer, an insurance company, or a public agency: The company offers its employees a pension plan, free health insurance, and other benefits. 3. a theatrical performance or other public entertainment to raise money for a charitable organization or cause. 4. Archaic. an act of kindness; good deed; benefaction.

A helpful or good effect.

Cambridge Dictionary, 2016, Benefits, http://dictionary.cambridge.org/us/dictionary/english/benefit?q=benefits (accessed 10/2/16)

a helpful or good effect: [ C ] It was a giveaway to the rich, he said, and not something that’s a benefit to most Americans. [ U ] She wanted her money to be used for the benefit of (= to help) poor children. social studies A benefit is also a helpful service given to employees in addition to their pay or to someone else who needs help: [ C ] health/medical benefits [ C ] I’m collecting unemployment benefits. A benefit is also a party or other event that has the purpose of raising money.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 12: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 12

“Internet of Things”

IoT is a useful tool to both understand its environment and communicate the information swiftly and efficiently.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

These networks churn out huge volumes of data that flow to computers for analysis. When objects can both sense the environment and communicate, they become tools for understanding complexity and responding to it swiftly. What’s revolutionary in all this is that these physical information systems are now beginning to be deployed, and some of them even work largely without human intervention.

The Internet of things is the networking of physical objects through embedded sensors and the like to collect and transmit information over wifi.

Johannes Deichmann is a consultant in McKinsey’s Stuttgart office, Matthias Roggendorf is a senior expert in the Berlin office, and Dominik Wee is a principal in the Munich office, November 2015, "Preparing IT systems and organizations for the Internet of Things," McKinsey & Company, http://www.mckinsey.com/industries/high-tech/our-insights/preparing-it-systems-and-organizations-for-the-internet-of-things (accessed 10/3/16)

The Internet of Things refers to the networking of physical objects through the use of embedded sensors, actuators, and other devices that can collect or transmit information about the objects. Examples in the consumer market include smart watches, fitness bands, and home-security systems. Examples in the B2B market include sensor-embedded production equipment and shipping and storage containers. Such devices are networked through computer systems and generate an enormous amount of data—information that some leading-edge companies are mining for insights and opportunities that can help set them apart from competitors.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 13: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 13

In the Internet of Things, sensors are imbedded into physical objects and are linked through wired and wireless networks.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

But the predictable pathways of information are changing: the physical world itself is becoming a type of information system. In what’s called the Internet of Things, sensors and actuators embedded in physical objects—from roadways to pacemakers—are linked through wired and wireless networks, often using the same Internet Protocol (IP) that connects the Internet.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 14: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 14

OutweighTo outweigh is to be greater than in weight, value or importance.

Merriam-Webster, 2016, Outweigh, http://www.merriam-webster.com/dictionary/outweigh (accessed 10/2/16)

: to be greater than (someone or something) in weight, value, or importance: to exceed in weight, value, or importance <the advantages outweigh the disadvantages>

To outweigh is to exceed in value, importance or influence.

Dictionary.com, 2016, Outweigh, http://www.dictionary.com/browse/outweigh?s=t (accessed 10/2/16)

1.to exceed in value, importance, influence, etc.: The advantages of the plan outweighed its defects. 2. to exceed in weight: The champion will probably outweigh his opponent. 3. to be too heavy or burdensome for: Collapse may follow if the load outweighs its supports.; 1 to prevail over; overcome: his desire outweighed his discretion 2. to be more important or significant than 3. to be heavier than

To outweigh is to be more important than another.

Cambridge Dictionary, 2016, Outweigh, http://dictionary.cambridge.org/us/dictionary/english/outweigh (accessed 10/2/16)

to be likely to be more important than or have an effect on something else: The benefits of increased immigration outweigh the costs.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 15: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 15

HarmPhysical or mental damage or injury.

Merriam-Webster, 2016, Harm, http://www.merriam-webster.com/dictionary/harms (accessed 10/2/16)

: physical or mental damage or injury : something that causes someone or something to be hurt, broken, made less valuable or successful, etc. : physical or mental damage : : to cause hurt, injury, or damage to (someone or something) : to cause harm to (someone or something)

Harm is to damage, injure, or hurt.

Black’s Law Dictionary, 2016, Harm, http://thelawdictionary.org/harm/ (accessed 10/2/16)

This means to damage, injure or hurt. Also related: bodily harm, great bodily harm,indemnis, false, nuisance, consequential damage, self-insured, malicious falsehood, hurt.

Hurt: In such phrases as "to be hurt or annoyance of another," or "hurt, molested,or restrained in his person or estate," this word is not restricted to physical injuries, butincludes also mental pain, as well as discomfort or annoyance. See Rowland v. Miller(Super. N. Y.) 15 N. Y. Supp. 702; Pronk v. Brooklyn Heights R. Co., 68 App. Div. 390,74 N. Y. Supp. 375; Thurston v. Whitney, 2 Cush. (Mass.) 110.

Harm is physical injury or mental damage; a moral injury or evil wrong doing.

Dictionary.com, 2016, Harm, http://www.dictionary.com/browse/harms?s=t (accessed 10/2/16)

Noun 1. physical injury or mental damage; hurt: to do him bodily harm. 2. moral injury; evil; wrong. verb (used with object) 3. to do or cause harm to; injure; damage; hurt: to harm one's reputation.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 16: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 16

DecreasedTo become or to make smaller in size, amount, number, etc.

Merriam-Webster, 2016, Decreased, SITE (accessed 10/2/16)

to become smaller in size, amount, number, etc.: to make (something) smaller in size, amount, number, etc.

To diminish, make less, the amount by which a thing is lessened.

Dictionary.com, 2016, Decreased, http://www.merriam-webster.com/dictionary/decreased (accessed 10/2/16)

1. to diminish or lessen in extent, quantity, strength, power, etc.: During the ten-day march across the desert their supply of water decreased rapidly. verb (used with object), decreased, decreasing. 2. to make less; cause to diminish: to decrease one's work load. Noun 3. the act or process of decreasing; condition of being decreased; gradual reduction: a decrease in sales; a decrease in intensity. 4. the amount by which a thing is lessened: The decrease in sales was almost 20 percent.

Having become less.

Cambridge Dictionary, 2016, Decreased, http://dictionary.cambridge.org/us/dictionary/english/decreased (accessed 10/2/16)

having become less: decreased costs/sales/spending

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 17: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 17

“Personal Privacy”The Privacy Act of 1974 stops Federal intrusion of privacy with three important guaranteed rights.

U.S. Department of State, 2016, “The Privacy Act,” U.S. Department of State, https://foia.state.gov/Learn/PrivacyAct.aspx (accessed 10/3/16)

The Privacy Act of 1974 provides safeguards against invasion of personal privacy through the misuse of records by Federal Agencies. The Privacy Act was passed in 1974 to establish controls over what personal information is collected, maintained, used and disseminated by agencies in the executive branch of the Federal government. The Privacy Act only applies to records that are located in a “system of records.” As defined in the Privacy Act, a system of records is “a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.” For a complete list of the Department’s records collections systems, go to the Privacy Impact Assessments (PIA) and the Systems of Records Notices (SORN) pages. The Privacy Act guarantees three primary rights: The right to see records about oneself, subject to Privacy Act exemptions; The right to request the amendment of records that are not accurate, relevant, timely or complete; and The right of individuals to be protected against unwarranted invasion of their privacy resulting from the collection, maintenance, use, and disclosure of personal information.

The Freedom of Information Act demonstrates individuals have access to preventing an unwarranted invasion of personal privacy.

The Freee Dictionary, 2016, Personal Privacy, http://legal-dictionary.thefreedictionary.com/privacy (accessed 10/2/16)

Similarly, the Freedom of Information Act (5 U.S.C.A. § 552 [1996]) contains limitations on the disclosure of agency information when such disclosure would constitute a "clearly unwarranted invasion of personal privacy." In most other instances, the Freedom of Information Act guarantees the right of Americans to request a copy of any reasonably identifiable record kept by a federal agency. However, the U.S. government may refuse to disclose certain sensitive information that relates to national security, foreign policy, or other classified areas. Persons who have requested information and been denied may challenge the decision in court. The Freedom of Information Act serves the twin purposes of protecting private and classified documents from disclosure while requiring the uninhibited exchange of all other information that is consistent with an open society and a democratic government.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 18: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 18

The Court has defined personal privacy to not include business related entities.

Gibson & Dunn Law firm, March 9, 2011, “U.S. Supreme Court Finds the Definition of "Personal Privacy" in One Statute to Exclude the Privacy of Corporations,” Gibson, Dunn & Crutcher's Information Technology and Data Privacy Practice Group, http://www.gibsondunn.com/publications/pages/SupremeCourtFinds-DefinitionofPersonalPrivacyInOneStatuteToExcludePrivacyofCorporations.aspx (accessed 10/2/16)

The Court instead examined the ordinary meaning, context, and statutory construction of the term "personal privacy" to define its scope. Id. at 5-9. Critically, the Court noted that in common parlance, "we often use the word 'personal' to mean precisely the opposite of business-related: We speak of personal expenses and business expenses, personal life and work life, personal opinion and a company's view." Id. at 5-6. The opinion then analyzed several other dictionary definitions supporting the same conclusion. Id. at 6. The Court acknowledged AT&T's argument that the term "personal jurisdiction" in case law often refers to jurisdiction over corporations, but distinguished that usage as mere shorthand to differentiate between "jurisdiction in personam, as opposed to in rem, not the jurisdiction 'of a person.'" Id. at 7.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 19: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 19

PRO Case

The Internet of Things provides a multitude of societal benefits, particularly in todays’ digital age. It is because of this that we stand for the topic resolved: on balance, the benefits of the Internet of Things outweigh the harms of decreased personal privacy.

The Internet of things is the networking of physical objects through embedded sensors and the like to collect and transmit information over wifi.

Johannes Deichmann is a consultant in McKinsey’s Stuttgart office, Matthias Roggendorf is a senior expert in the Berlin office, and Dominik Wee is a principal in the Munich office, November 2015, "Preparing IT systems and organizations for the Internet of Things," McKinsey & Company, http://www.mckinsey.com/industries/high-tech/our-insights/preparing-it-systems-and-organizations-for-the-internet-of-things (accessed 10/3/16)

The Internet of Things refers to the networking of physical objects through the use of embedded sensors, actuators, and other devices that can collect or transmit information about the objects. Examples in the consumer market include smart watches, fitness bands, and home-security systems. Examples in the B2B market include sensor-embedded production equipment and shipping and storage containers. Such devices are networked through computer systems and generate an enormous amount of data—information that some leading-edge companies are mining for insights and opportunities that can help set them apart from competitors.

The Freedom of Information Act demonstrates individuals have access to preventing an unwarranted invasion of personal privacy.

The Freee Dictionary, 2016, Personal Privacy, http://legal-dictionary.thefreedictionary.com/privacy (accessed 10/2/16)

Similarly, the Freedom of Information Act (5 U.S.C.A. § 552 [1996]) contains limitations on the disclosure of agency information when such disclosure would constitute a "clearly unwarranted invasion of personal privacy." In most other instances, the Freedom of Information Act guarantees the right of Americans to request a copy of any reasonably identifiable record kept by a federal agency. However, the U.S. government may refuse to disclose certain sensitive information that relates to national security, foreign policy, or other classified areas. Persons who have requested information and been denied may challenge the decision in court. The Freedom of Information Act serves the twin purposes of protecting private and classified documents from disclosure while requiring the uninhibited exchange of all other information that is consistent with an open society and a democratic government.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 20: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 20

Contention 1: IoT Creates Advancements in the Healthcare Industry, Which Helps Society Long-term. IoT can have vast advancements in the healthcare industry, monitoring individuals with congestive heart failure and other illnesses.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

In health care, sensors and data links offer possibilities for monitoring a patient’s behavior and symptoms in real time and at relatively low cost, allowing physicians to better diagnose disease and prescribe tailored treatment regimens. Patients with chronic illnesses, for example, have been outfitted with sensors in a small number of health care trials currently under way, so that their conditions can be monitored continuously as they go about their daily activities. One such trial has enrolled patients with congestive heart failure. These patients are typically monitored only during periodic physician office visits for weight, blood pressure, and heart rate and rhythm. Sensors placed on the patient can now monitor many of these signs remotely and continuously, giving practitioners early warning of conditions that would otherwise lead to unplanned hospitalizations and expensive emergency care. Better management of congestive heart failure alone could reduce hospitalization and treatment costs by a billion dollars annually in the United States.

The ability for IoT to identify and authenticate helps reduce incidents to patients while they're in a hospital.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 9

Identification and authentication It includes patient identification to reduce incidents harmful to patients (such as wrong drug/dose/time/procedure), comprehensive and current electronic medical record maintenance (both in the in- and out-patient settings), and infant identification in hospitals to prevent mismatching. In relation to staff, identification and authentication is most frequently used to grant access and to improve employee morale by addressing patient safety issues. In relation to assets, identification and authentication is predominantly used to meet the requirements of security procedures, to avoid thefts or losses of important instruments and products.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 21: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 21

IoT can provide a comprehensive picture of a patient's health to better provide care in healthcare settings and for preventative healthcare in the future.

Daniele Miorandi, CREATE-NET, via Alla Cascata, Sabrina Sicari, Università degli Studi dell’ Insubria, Francesco De Pellegrini, CREATE-NET, via Alla Cascata, and Imrich Chlamtac, CREATE-NET, via Alla Cascata, February 2012, Internet of things: Vision, applications and research challenges, p. 1510

The interconnection of such heterogeneous sensors could provide a comprehensive picture of health parameters, thereby triggering an intervention by the medical staff upon detection of conditions that may lead to health deterioration, thus realizing preventive care. Another relevant application sector relates to personalized health-care and well-being solutions. The use of wearable sensors, together with suitable applications running on personal computing devices enables people to track their daily activities (steps walked, calories burned, exercises performed, etc.), providing suggestions for enhancing their lifestyle and prevent the onset of health problems.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 22: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 22

Contention 2: IoT has a multitude of economic benefits that are worth risking personal privacy in the short-term. Studies show that IoT has the ability to impact the economy with a net worth of 11.1 trillion per year by 2025.

James Manyika, Director of the McKinsey Global Institute, Jonathan Woetzel, Director of the McKinsey Global Institute, and Richard Dobbs, Director of the McKinsey Global Institute, 2016, "Unlocking the Potential of the Internet of Things," McKinsey & Company, http://www.mckinsey.com/business-functions/business-technology/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world (accessed 10/1/16)

To get a broader view of the IoT’s potential benefits and challenges across the global economy , we analyzed more than 150 use cases, ranging from people whose devices monitor health and wellness to manufacturers that utilize sensors to optimize the maintenance of equipment and protect the safety of workers. Our bottom-up analysis for the applications we size estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. At the top end, that level of value—including the consumer surplus—would be equivalent to about 11 percent of the world economy (exhibit).

The IoT can help the shipping industry, working to reduce logistical costs and improving inventory management.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

In the business-to-business marketplace, one well-known application of the Internet of Things involves using sensors to track RFID (radio-frequency identification) tags placed on products moving through supply chains, thus improving inventory management while reducing working capital and logistics costs. The range of possible uses for tracking is expanding.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 23: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 23

IoT can help the shipping and transportation industry, which is key to provide vital nutrition across the nation.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 8Perishable goods such as fruits, fresh-cut produce, meat, and dairy products are vital parts of our nutrition. From the production to the consumption sites thousands of kilometers or even more are covered and during the transportation the conservation status (temperature, humidity, shock) need to be monitored to avoid uncertainty in quality levels for distribution decisions. Pervasive computing and sensor technologies offer great potential for improving the efficiency of the food supply chain.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 24: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 24

Rebuttal to IoT Causes Hacking and Internet Crime

Hacking to some extent is inevitable. The IoT can help create new means of security to lessen hacking in the future. IoT is also fostering new legal standards that will prevent hacking and other issues in the future.

IoT is setting standards to prevent hacking and establishing legal standards for protection of data.

Tim Mullaney, Guest Contributor to MIT Technology Review, January 25, 2016, "Can We Insure the Internet of Things Against Cyber Risk?" MIT Technology Review, https://www.technologyreview.com/s/545736/can-we-insure-the-internet-of-things-against-cyber-risk/ (accessed 10/5/16) A number of groups have begun setting standards for protecting cybersecurity in Internet-of-things devices, and the hope is that they will standardize insurance practice and begin establishing the legal standards for handling data, helping to determine who’s responsible for what losses when things go wrong, says George Washington University Law School lecturer Paul Rosenzweig.

New regulations for the IoT are effective and in accordance with international law to prevent hacking and other crimes.

Kirsten Thompson and Brandon Mattalo, November 24th, 2015, “The Internet of Things: Guidance, Regulation, and the Canadian Approach,” Cyberlex, http://www.canadiancybersecuritylaw.com/2015/11/the-internet-of-things-guidance-regulation-and-the-canadian-approach/ (accessed 10/5/16)

The Internet of Things can help make society more effective, safer and greener so it is important that these future regulations strike a proper balance between supporting helpful innovation and protecting consumers. It is also important that these future regulations be in accordance with international approaches, since asymmetric regulations can lead to increased regulatory compliance costs to enter the Canadian market and they can also increase the barriers of Canadian companies to enter the global markets.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 25: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 25

Rebuttal to IoT causes Discrimination and Harassment

The IoT does not foster any more harassment than exists now. IF anything, it decreases the possibility of harassment as new laws will be passed to protect individuals and their privacy.

The IoT can ensure that loopholes in antidiscrimination law cannot be withstood, ensuring the protection of vulnerable populations under those already established laws.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 125

As analysis reveals more and more correlations between Internet of Things data, however, this exception or loophole in antidiscrimination law may collapse under its own weight. A decision at least facially based on conduct—such as not to hire a particular employee because of her lack of exercise discipline—may systematically bias an employer against a certain group if that group does not or cannot engage in that conduct as much as others. Moreover, seemingly voluntary “conduct” may shade into an immutable trait depending on our understanding of genetic predisposition. Nicotine addiction and obesity, for example, may be less voluntary than biologically determined. The level of detail provided by Internet of Things data will allow such fine-grained differentiation that it may easily begin to resemble illegal forms of discrimination.

As long as businesses are proactive, there are ways to prevent the leakage of data.

Kirsten Thompson and Brandon Mattalo, November 24th, 2015, “The Internet of Things: Guidance, Regulation, and the Canadian Approach,” Cyberlex, http://www.canadiancybersecuritylaw.com/2015/11/the-internet-of-things-guidance-regulation-and-the-canadian-approach/ (accessed 10/5/16)

Security and Safety: The report recognized that security in the context of the Internet of Things is becoming more important. Namely, the report outlined the various ways that security breaches can lead to real-life safety concerns. [5] The report suggests that companies should prioritize the building of security into devices, should train employees adequately, should ensure that contractors can maintain security, and should monitor devices and report to the consumer when security breaches are detected.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 26: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 26

Rebuttal to IoT causes Data Overload

The Internet of Things is connecting more and more devices to the web. Despite the large and growing mass of data that it is encompassing, there are new means to handle the data efficiently and effectively.

GE proves: IoT can handle mass amounts of data.

Joel Shore, Tech Target Writer, 2015, "How IIoT and Consumer IoT Handle Data Differently," Tech Target, http://searchcloudapplications.techtarget.com/feature/How-IIoT-and-consumer-IoT-handle-data-differently (accessed 10/5/16) The challenge, said Christian Renaud, research director for IoT at 451 Research, is creating cloud applications that are robust enough to handle the torrent of data without slowing down. "You're dealing with zillions of miniscule packets containing telemetry and diagnostic data," he said. "You can't have an application start skipping packets because it can't handle the pace." General Electric (GE) has put that torrent to good use, developing Predix, an IIoT analytics and big data platform that examines sensor telemetry from industrial machinery to minimize downtime. As the world's largest maker of jet engines for commercial airliners, GE's aviation division used Predix to analyze 340 terabytes of data from 3.4 million flights to improve asset performance and minimize disruptions

IoT is fostering new algorithms that can both store data and interpret it.

Karen Rose, Senior Director, Strategy and Analysis, Internet Society, Scott Eldridge, Principal, Cam & Sprocket LLC , and Lyman Chapin, Principal, Interisle Consulting Group, October 2015, “THE INTERNET OF THINGS: AN OVERVIEW Understanding the Issues and Challenges of a More Connected World,” Internet Society, https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151221-en.pdf (accessed 10/5/16)

New algorithms and rapid increases in computing power, data storage, and cloud services enable the aggregation, correlation, and analysis of vast quantities of data; these large and dynamic datasets provide new opportunities for extracting information and knowledge. Cloud computing, which leverages remote, networked computing resources to process, manage, and store data, allows small and distributed devices to interact with powerful back-end analytic and control capabilities.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 27: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 27

Rebuttal to IoT causes Privacy Invasions IoT is a growing industry, and with it comes growing security protections. As the technology advances, the security systems surrounding IoT will do so as well. Additionally, privacy is becoming more obsolete as individuals put more and more of their lives on the web.

Privacy concerns about IoT will dissipate as individuals learn how great the IoT is for their daily lives.

Bill Wasik, senior editor at Wired, May 14, 2013, "In the Programmable World, All Our Objects Will Act as One," Wired News, https://www.wired.com/2013/05/internet-of-things-2/ (accessed 10/2/16)

Certainly the gradual acceptance of smart toll tags for cars (e.g., E-ZPass) shows that such qualms can be overcome, so long as there’s a demonstrated benefit and a fair assurance of security. In that regard, personalized billboards are arguably a step in the wrong direction, but wireless payments will make users happy; so too will the coffee shop that knows your order and lets you skip the line, or the rental-car seat that adjusts to your preferences before you sit in it. Just as with social networking, the privacy concerns of a sensor- connected world will be fast outweighed by the strange pleasures of residing in it.

Precautions can be taken to ensure the IoT does not infringe upon privacy.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 16Accordingly, privacy should be protected by ensuring that individuals can control which of their personal data is being collected, who is collecting such data, and when this is happening. Furthermore, the personal data collected should be used only in the aim of supporting authorized services by authorized service providers; and, finally, the above data should be stored only until it is strictly needed.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 28: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 28

Rebuttal to IoT creates Computer Takeover

Science fiction is not our reality; IoT can create smart devices, but there is no risk that computers will take over the world in any capacity. Smart houses, grids, etc. are the future and are safe to embrace.

Science fiction has made the IoT a concern as our "things" could get too smart, but that will never happen.

Bill Wasik, senior editor at Wired, May 14, 2013, "In the Programmable World, All Our Objects Will Act as One," Wired News, https://www.wired.com/2013/05/internet-of-things-2/ (accessed 10/2/16)

The idea of animating the inanimate, of compelling the physical world to do our bidding, has been a staple of science fiction for half a century or more. Often we’ve imagined the resulting objects to be perverse in their lack of intelligence, like those remorselessly multiplying brooms conjured up by Mickey Mouse in Fantasia. At other times we’ve feared the perversity that results when our things get too smart, like HAL refusing to open those damn pod-bay doors. In reality, though, just as in our programmable computers, the “intelligence” in our programmable world will never be more or less than the intelligence we can instill into its far-flung moving parts. It’s vanishingly unlikely that we’ll ever have a car like KITT or a house like Tony Stark’s Jarvis, chatting us up in urbane British accents about our built-in weapons systems. But someday soon we’ll have a house that can warn us about a flood or keep an eye on our kids or turn off that stove when we forget—acts of genuine intelligence that will enrich our lives far more than any missile launcher ever could.

The IoT can allow machines to self-diagnose ad self-correct, communicating to become instruments that will save money and produce better outcomes.

Jeff Immelt, chairman and CEO of GE, November 28, 2012, "The Future of the Internet is Intelligent Machines," GIGAOM, https://gigaom.com/2012/11/28/the-future-of-the-internet-is-intelligent-machines/ (accessed 10/5/16) The Industrial Internet leverages the power of the cloud to connect machines embedded with sensors and sophisticated software to other machines (and to us) so we can extract data, make sense of it and find meaning where it did not exist before. Machines – from jet engines to gas turbines to CT scanners – will have the analytical intelligence to self-diagnose and self-correct. They will be able to deliver the right information to the right people, all in real time. When machines can sense conditions and communicate, they become instruments of understanding. They create knowledge from which we can act quickly, saving money and producing better outcomes.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 29: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 29

Rebuttal to IoT Harms Consumer Confidence

IoT has the propensity to affect many of the industries consumers care about the most. This helps to boost consumer confidence, which is important for economic growth. Industries like airlines and automobiles especially bolster consumer confidence.

The IoT can benefit the airline industry, providing necessary intell to ensure proactive maintenance of airplanes.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

In the aviation industry, sensor technologies are spurring new business models. Manufacturers of jet engines retain ownership of their products while charging airlines for the amount of thrust used. Airplane manufacturers are building airframes with networked sensors that send continuous data on product wear and tear to their computers, allowing for proactive maintenance and reducing unplanned downtime.

Businesses can use IoT to help make pricing better for consumers, such as in car insurance.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

When products are embedded with sensors, companies can track the movements of these products and even monitor interactions with them. Business models can be fine-tuned to take advantage of this behavioral data. Some insurance companies, for example, are offering to install location sensors in customers’ cars. That allows these companies to base the price of policies on how a car is driven as well as where it travels. Pricing can be customized to the actual risks of operating a vehicle rather than based on proxies such as a driver’s age, gender, or place of residence.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 30: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 30

Rebuttal to IoT Harms Economic Growth

The Internet of Things is what has been called a new industrial revolution. It is a trillion-dollar industry that only has the capability of growing as more and more devices become connected to the IoT.

The IoT is like the new Industrial Revolution with significant impacts for the United States economy.

Plamen Nedeltchev, Ph.D., Distinguished IT Engineer at Cisco, September 29, 2015, "The Internet of Everything is Our New Economy," CISCO, http://www.cisco.com/c/en/us/solutions/collateral/enterprise/cisco-on-cisco/Cisco_IT_Trends_IoE_Is_the_New_Economy.html (accessed 10/5/16)A study conducted by General Electric concluded that the Internet of Things (IoT) over the next 20 years could add as much as $15 trillion to the global gross domestic product (GDP), roughly “the size of today’s U.S. economy.” Of the $19 trillion in profits and cost savings projected over the next decade, Cisco®estimates that $14.4 trillion will be new private-sector profits, and $4.6 trillion will come from public-sector cost savings and new revenues. In its study, General Electric positions the IoE trend “much like the industrial revolution of the 18th and 19th centuries, when mechanized manufacturing made mass-produced goods possible, and rural residents flooded into cities.” The study adds, “We are at the cusp of another wave of innovation that promises to change the way we do business and interact with the world of industrial machines.”

Iot is great for consumers in terms of banking and economic growth as banks will use IoT to benefit its customers’ experience.

Adrian Bridgwater, Contributor to Forbes, January 21, 2015, "Will Internet Of Things Robots Take Over Earth By 2020?" Forbes, http://www.forbes.com/sites/adrianbridgwater/2015/01/21/will-internet-of-things-robots-take-over-earth-by-2020/2/#51ea42b11aa3 (accessed 10/5/16) The German software maker also points to the less obvious area of financial services and banking saying that IoT is just beginning to emerge in the financial services sector as retail banks are still grappling with the cost/benefit ratio of implementing IoT technology. “However, as banks seek new ways to engage customers and increase their line of business opportunities, they will begin to use IoT-enabled incentives to grow their customer base and make banking easier and more rewarding. Three emerging trends in this space include mobile banking, spending tracking and wearables,” stated SAP’s Lynch.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 31: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 31

Rebuttal to IoT is Terrible for Healthcare

IoT has amazing applications for the healthcare industry. It can not only monitor patients while they’re in the hospital, they can help to monitor patients in ways that promote and foster preventative care, reducing health concerns in the future.

Because IoT can track and authenticate, it has wide applications to the healthcare industry.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 9

Many are the benefits provided by the IoT technologies to the healthcare domain and the resulting applications can be grouped mostly into: tracking of objects and people (staff and patients); identification and authentication of people; automatic data collection and sensing.

IoT can help with tracking patients, which can help make hospitals more efficient.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 9

Tracking is the function aimed at the identification of a person or object in motion. This includes both real-time position tracking, such as the case of patient-flow monitoring to improve workflow in hospitals, and tracking of motion through choke points, such as access to designated areas. In relation to assets, tracking is most frequently applied to continuous inventory location tracking (for example for maintenance, availability when needed and monitoring of use), and materials tracking to prevent left-ins during surgery, such as specimen and blood products.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 32: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 32

IoT can help in the diagnosis phase for patients.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 9

Sensing Sensor devices enable function centered on patients, and in particular on diagnosing patient conditions, providing real-time information on patient health indicators. Application domains include different telemedicine solutions, monitoring patient compliance with medication regiment prescriptions, and alerting for patient well-being. In this capacity, sensors can be applied both in in-patient and out-patient care. Heterogeneous wireless access-based remote patient monitoring systems can be deployed to reach the patient everywhere, with multiple wireless technologies integrated to support continuous bio-signal monitoring in presence of patient mobility.

IoT benefits the healthcare sector by monitoring patients.

Daniele Miorandi, CREATE-NET, via Alla Cascata, Sabrina Sicari, Università degli Studi dell’ Insubria, Francesco De Pellegrini, CREATE-NET, via Alla Cascata, and Imrich Chlamtac, CREATE-NET, via Alla Cascata, February 2012, Internet of things: Vision, applications and research challenges, p. 1510

IoT technologies can find a number of applications in the health-care sector. On the one hand, they can be used to enhance current assisted living solutions. Patients will carry medical sensors to monitor parameters such as body temperature, blood pressure, breathing activity. Other sensors, either wearable (e.g., accelerometers, gyroscopes) or fixed (proximity) will be used to gather data used to monitor patient activities in their living environments. Information will be locally aggregated and transmitted to remote medical centers, which will be able to perform advanced remote monitoring and will be capable of rapid response actions when needed.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 33: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 33

Rebuttal to IoT Cannot Help Infrastructure

IoT has the propensity to ameliorate many current traffic issues, like congestion, lack of a smart grid, and can help speed up the transportation of goods, making those goods cheaper in the long term.

IoT can help with traffic situations, as sensors can be deployed in infrastructure.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

Data from large numbers of sensors, deployed in infrastructure (such as roads and buildings) or to report on environmental conditions (including soil moisture, ocean currents, or weather), can give decision makers a heightened awareness of real-time events, particularly when the sensors are used with advanced display or visualization technologies.

IoT sensors can give logistics managers current data to increase productivity and reduce congestion costs.

Michael Chui is a senior fellow with the McKinsey Global Institute, Markus Löffler is a principal in McKinsey’s Stuttgart office, and Roger Roberts is a principal in the Silicon Valley office, March 2010, "The Internet of Things," McKinsey Quarterly, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things (accessed 10/1/16)

Some advanced security systems already use elements of these technologies, but more far-reaching applications are in the works as sensors become smaller and more powerful, and software systems more adept at analyzing and displaying captured information. Logistics managers for airlines and trucking lines already are tapping some early capabilities to get up-to-the-second knowledge of weather conditions, traffic patterns, and vehicle locations. In this way, these managers are increasing their ability to make constant routing adjustments that reduce congestion costs and increase a network’s effective capacity.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 34: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 34

CON Case

It is because privacy is a true concern for all people, as well as the government, that we stand against the current resolution: resolved: on balance, the benefits of the Internet of Things outweigh the harms of personal privacy.

Definitions:

The Internet of things is the networking of physical objects through embedded sensors and the like to collect and transmit information over wifi.

Johannes Deichmann is a consultant in McKinsey’s Stuttgart office, Matthias Roggendorf is a senior expert in the Berlin office, and Dominik Wee is a principal in the Munich office, November 2015, "Preparing IT systems and organizations for the Internet of Things," McKinsey & Company, http://www.mckinsey.com/industries/high-tech/our-insights/preparing-it-systems-and-organizations-for-the-internet-of-things (accessed 10/3/16)

The Internet of Things refers to the networking of physical objects through the use of embedded sensors, actuators, and other devices that can collect or transmit information about the objects. Examples in the consumer market include smart watches, fitness bands, and home-security systems. Examples in the B2B market include sensor-embedded production equipment and shipping and storage containers. Such devices are networked through computer systems and generate an enormous amount of data—information that some leading-edge companies are mining for insights and opportunities that can help set them apart from competitors.

The Freedom of Information Act demonstrates individuals have access to preventing an unwarranted invasion of personal privacy.

The Freee Dictionary, 2016, Personal Privacy, http://legal-dictionary.thefreedictionary.com/privacy (accessed 10/2/16)

Similarly, the Freedom of Information Act (5 U.S.C.A. § 552 [1996]) contains limitations on the disclosure of agency information when such disclosure would constitute a "clearly unwarranted invasion of personal privacy." In most other instances, the Freedom of Information Act guarantees the right of Americans to request a copy of any reasonably identifiable record kept by a federal agency. However, the U.S. government may refuse to disclose certain sensitive information that relates to national security, foreign policy, or other classified areas. Persons who have requested information and been denied may challenge the decision in court. The Freedom of Information Act serves the twin purposes of protecting private and classified documents from disclosure while requiring the uninhibited exchange of all other information that is consistent with an open society and a democratic government.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 35: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 35

Contention 1: Security concerns with the Internet of Things can Invade Personal Privacy, Leading to Discrimination.

The collection of data in IoT makes it impossible for us to personally control the disclosure of our personal information.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 16The concept of privacy is deeply rooted into our civilizations, is recognized in all legislations of civilized countries and, as we already said, concerns about its protection have proven to be a significant barrier against the diffusion of the technologies involved in the IoT . People concerns about privacy are indeed well justified. In fact, the ways in which data collection, mining, and provisioning will be accomplished in the IoT are completely different from those that we now know and there will be an amazing number of occasions for personal data to be collected. Therefore, for human individuals it will be impossible to personally control the disclosure of their personal information.

The low cost of information storage makes IoT and its collection of personal information makes privacy concerns for all IoT users and even those that do not use IoT.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 16Furthermore, the cost of information storage continues to decrease and is now approaching 109 euro per byte. Accordingly, once information is generated, will most probably be retained indefinitely, which involves denial of digital forgetting in people perspective It follows that the IoT really represents an environment in which privacy of individuals is seriously menaced in several ways. Furthermore, while in the traditional Internet problems of privacy arise mostly for Internet users (individuals playing an active role), in the IoT scenarios privacy problems arise even for people not using any IoT service.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 36: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 36

Privacy law is unprepared for the Internet of Things.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 131

Privacy Law Is Unprepared.—The inherent sparsity of Internet of Things data means that protecting privacy through anonymization is particularly unlikely to succeed. The legal implications are dramatic. Ohm has catalogued the huge number of privacy laws that rely on anonymization. Many distinguish “personally identifiable information”

(PII)—usually defined as name, address, social-security number, or telephone number—from other data that is presumed not to reveal identity. The threat of re-identification of sparse sensor-based datasets makes questionable this distinction between PII and other data.

The Internet of Things allows companies to sort customers, which can lead to unwanted discrimination and harassment, and privacy law is unprepared to solve it.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 117

The first Internet of Things problem is the Achilles’ heel of widespread sensor deployment: Internet of Things data will allow us to sort consumers more precisely than ever before, but such sorting can easily turn from relatively benign differentiation into new and invidious types of unwanted discrimination. This subpart explores both the technical and legal problems of discrimination on the Internet of Things. The technical problem is simple: coupled with Big Data or machine learning analysis, massive amounts of sensor data from Internet of Things devices can give rise to unexpected inferences about individual consumers. Employers, insurers, lenders, and others may then make economically important decisions based on those inferences, without consumers or regulators having much understanding of that process. This could lead to new forms of illegal discrimination against those in protected classes such as race, age, or gender. More likely, it may create troublesome but hidden forms of economic discrimination based on Internet of Things data. Currently, both traditional discrimination law and information privacy law, such as the FCRA, are unprepared for such new forms of discriminatory decision making.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 37: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 37

Contention 2: Lack of Security in the Internet of Things Allows Hackers to Cause Further Issues.

IoT is susceptible to hackers who will overwhelm systems and privacy issues

Jamie Condliffe, Associate Editor of Commentary and News for MIT Technology Review, September 30, 2016, "The Internet of Things Goes Rogue," MIT Technology Review, https://www.technologyreview.com/s/602519/the-internet-of-things-goes-rogue/ (accessed 10/1/16)

According to the Wall Street Journal, as many as one million security cameras, digital video recorders, and other connected devices have been employed by hackers to carry out a series of such attacks. When corralled together, these pieces of hardware can be used as a so-called botnet, collectively sending data and Web page requests to servers with such ferocity that they’re overwhelmed and ultimately crash.

IoT has large security risks as consumer products have not yet been so widely connected to the internet.

Jon Bruner, editor-at-large of O’Reilly Media; Renee DiResta, vice president of business development at Haven; Cory Doctorow, author, Mark Hatch, cofounder and chief executive officer of TechShop; Joi Ito, director of the MIT Media Lab; Dan Kaufman is the deputy director of Google’s Advanced Technology and Projects group, Mike Olson is the cofounder and chief strategy officer of Cloudera; and Tim O’Reilly, chief executive officer of O’Reilly Media. Michael Chui is a partner at the McKinsey Global Institute and is based in McKinsey’s San Francisco office, August 2015, "The Internet of Things: 5 Critical Questions," McKinsey Global Institute Interview, http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things-five-critical-questions (accessed 10/1/16)

There is an enormous security risk in IoT. IoT can scale up the attack surface for any kind of a cyberattack. The risk is going to be a distributed attack on a lot of things. We haven’t seen consumer products connected to the Internet in very wide scale yet, but there’s certainly a risk that once everyone has a connected door lock or a connected car, that that will present a bad security situation.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 38: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 38

Hackers can use IoT devices to control our personal devices.

Jamie Condliffe, Associate Editor of Commentary and News for MIT Technology Review, September 30, 2016, "The Internet of Things Goes Rogue," MIT Technology Review, https://www.technologyreview.com/s/602519/the-internet-of-things-goes-rogue/ (accessed 10/1/16)

It’s a powerful new way of putting an old idea into practice. Attackers have long installed malware on PCs to have them act as bots that they control, and more recently home routers and printers have been used to the same ends. But as Internet-connected devices proliferate in our homes and offices, the potential number of devices to draw upon is increasing dramatically.

Security concerning the IoT is lacking due to high costs, leading to more hackers in the future.

Kashmir Hill, Forbes Staff Writer, May 27, 2014, "The Half Baked Security of Our 'Internet of Things,'" Forbes, http://www.forbes.com/sites/kashmirhill/2014/05/27/article-may-scare-you-away-from-internet-of-things/#20e9283923dd (accessed 10/2/16)

Harutyunyan says software will always have bugs and that perfect security is impossible, but that some vendors are trying harder than others. “It boils down to money,” says Harutyunyan. “The reason why [Internet of Things] vendors are not doing security better is that it’s cheaper not to do it. It’s expensive to build security in. The shopper in Best Buy will buy the camera for $40 not the one that’s $100. She doesn’t know or care about the security. There will be more and more hacks, not just of cameras but of lots of things. Eventually it will make people care, and it will be more expensive to be insecure than secure.”

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 39: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 39

Rebuttal to IoT Helps Hacking and Internet Crime

The Internet of Things cannot prevent hacking and internet crime. Many attacks cannot be solved, and without proper security measures the vulnerability of the IoT is a very large concern.

Some attacks cannot be solved, making privacy a very real concern.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, October, 2010, The Internet of Things: A Survey, p. 15Finally, none of the existing solutions can help in solving the proxy attack problem, also known as the man-in- the-middle attack. Consider the case in which a node is utilized to identify something or someone and, accordingly, provides access to a certain service or a certain area (consider an electronic passport for example, or some keys based on RFID). The attack depicted in Fig. 5 could be successfully performed.

The Internet of Things is prone to security vulnerabilities, allowing hackers to act without consequence.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 132-133

Internet of Things devices suffer from a third problem: they are prone to security vulnerabilities for reasons that may not be simple to remedy. More importantly, data security laws—particularly state data-breach notification statutes—are unprepared for and don’t apply to such security problems. To return to our example, if Fitbit’s servers were hacked today, the company would have no legal obligation to inform the public and no legal consequence would likely attach

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 40: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 40

Rebuttal to IoT Does Not Lead to Harassment & Discrimination

When the data of millions of people is not only readily available but is searchable and also sellable, discrimination becomes inevitable. The internet of things can foster discrimination and racism, particularly when privacy and anti-discrimination laws cannot keep up with how quickly the IoT is developing and changing.

The IoT pulls information that can lead to racial and other forms of illegal discrimination.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 123-124

If the Internet of Things creates many new data sources from which unexpected inferences can be drawn, and if those inferences are used by economic actors to make decisions, one can immediately see the possibility of seemingly innocuous data being used as a surrogate for racial or other forms of illegal discrimination. One might not know a credit applicant’s race, but one might be able to guess that race based on where and how a person drives, where and how that person lives, or a variety of other habits, behaviors, and characteristics revealed by analysis of data from a myriad of Internet of Things devices. Similarly, it would not be surprising if various sensor devices—a Fitbit, heart-rate tracker, or driving sensor, for example—could easily discern a user’s age, gender, or disabilities. If sensor fusion leads to a world in which “everything reveals everything,” then many different types of devices may reveal sensitive personal characteristics. As a result, the Internet of Things may make possible new forms of obnoxious discrimination.

The IoT has the propensity to lead to discrimination against people with disabilities due to the ADA and the GINA being unable to keep up with the IoT.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 124-125

Title I of the Americans with Disabilities Act (ADA) forbids discrimination against those with disabilities, and the Genetic Information Nondiscrimination Act (GINA) bars discrimination based on genetic inheritance. These traditional antidiscrimination laws leave room, however, for new forms of discrimination based on Internet of Things data. For example, nothing prevents discrimination based on a potential employee’s health status, so long as the employee does not suffer from what the ADA would consider a disability. Similarly, antidiscrimination law does not prevent economic sorting based on our personalities, habits, and character traits. Employers are free not to hire those with personality traits they don’t like; insurers are free to avoid insuring—or charge more to—those with risk preferences they find too expensive to insure; lenders are free to differentiate between borrowers with traits that suggest trustworthiness versus questionable character.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 41: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 41

Rebuttal to IoT Sufficiently Handles Data

There are terabytes of data that has to be managed and stored properly. It is impossible for the IoT to do this in an efficient manner that is ensuring the protection of that data.

IoT cannot sufficiently handle the large amount of data it gathers.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 134

These examples illustrate the larger technical problem: Internet of Things devices may be inherently vulnerable for several reasons. First, these products are often manufactured by traditional consumer-goods makers rather than computer hardware or software firms. The engineers involved may therefore be relatively inexperienced with data-security issues, and the firms involved may place insufficient priority on security concerns.

IoT does not protect data properly, leading to hacks.

Graham Cudley, Independent Security Analyst, April 27, 2016, “Ransomware and The Internet of Things,” WeLiveSecurity, http://www.welivesecurity.com/2016/04/27/ransomware-internet-things/ (accessed 10/5/16) We know from past experience that many cybercriminals have no qualms about putting lives in danger, and that many IoT devices suffer from weak security compared to regular computers, suffer from hard-coded passwords, may have no simple updating infrastructure, and can be riddled with a wide variety of vulnerabilities. We have even seen devices such as CCTV cameras and routers, that you wouldn’t naturally consider the typical botnet recruits, being exploited to launch DDoS attacks.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 42: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 42

Rebuttal to IoT Prevents Privacy Invasions

The major issue concerning the Internet of Things is privacy. Despite how individuals like to share their personal information in different spheres, the lack of security and disregard for privacy concerns makes the IoT a dangerous industry that can lead to discrimination.

Privacy concerns about IoT are a big concern.

Bill Wasik, senior editor at Wired, May 14, 2013, "In the Programmable World, All Our Objects Will Act as One," Wired News, https://www.wired.com/2013/05/internet-of-things-2/ (accessed 10/2/16)

A bigger concern, perhaps, is simple privacy. Just because we’ve finally warmed up to oversharing in the virtual world doesn’t mean we’ll be comfortable doing the same in the physical world, as all our interactions with objects capture more and more data about where we are and what we’re doing.

Surveillance and lack of privacy leads to discrimination.

Andrew Keen, author of the Internet is Not the Answer, March 16, 2015, "Is the Internet Hurting More Than Helping?" WBUR - Boston's NPR Station, http://www.wbur.org/hereandnow/2015/03/16/internet-economics-keen (accessed 10/5/16)Its cultural ramifications are equally chilling. Rather than creating transparency and openness, the Internet is creating a panopticon of information-gathering and surveillance services in which we, the users of big data networks like Facebook, have been packaged as their all-too-transparent product. Rather than creating more democracy, it is empowering the rule of the mob. Rather than encouraging tolerance, it has unleashed such a distasteful war on women that many no longer feel welcome on the network. Rather than fostering a renaissance, it has created a selfie-centered culture of voyeurism and narcissism. Rather than establishing more diversity, it is massively enriching a tiny group of young white men in black limousines. Rather than making us happy, it’s compounding our rage.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 43: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 43

Rebuttal to IoT Prevents Computer Takeover

The Internet of Things helps make possible what science fiction movies theorize about: machines becoming too smart. IoT can lead to objects becoming smarter than humans, which could become problematic in the future.

IoT can lead to objects becoming smarter than humans.

Luigi Atzori, University of Cagliari, Italy, Antonio Iera, University ‘‘Mediterranea” of Reggio Calabria, Italy, and Giacomo Morabito, University of Catania, Italy, January 2014, From “Smart Objects” to “Social Objects”: The Next Evolutionary Step of the Internet of Things, p. 98 Nonetheless, smart objects are only the first step of an evolutionary process that is affecting modern communication devices and has been triggered by the advent of IoT in the telecommunication scenario. We are currently observing a generational leap from objects with a certain degree of smartness to objects with an actual social consciousness.

The IoT should not be trusted, as we will lose desire on our own will and lose our intuition.

Janna Anderson, Pew Research Center Contributor, and Lee Raine, Director of Internet, Science, and Technology for the Pew Research Center, May 14, 2014, "The Internet of Things will Thrive by 2025," Pew Research Center, http://www.pewinternet.org/2014/05/14/internet-of-things/ (accessed 10/5/16) A related strain of argument ties to fears that algorithms cannot necessarily be trusted to make the appropriate decisions. For instance, Aaron Balick, a PhD, psychotherapist , and author of The Psychodynamics of Social Networking, predicted, “Positive things may be tempered by a growing reliance on outsourcing to technologies that make decisions not based on human concerns, but instead on algorithms (however influenced by our own past choices). We may begin to lose sight of our own desires or our own wills, like many of these drivers who we hear about who, because their GPS told them to, end up in the most unlikely places in the face of all sorts of real-world, contrary evidence. What will happen to our own senses of intuition, let alone our capacity to venture into the unknown, learn new things, and our ability to be still and quiet without being in constant relationship to one device or another.”

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 44: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 44

Rebuttal to IoT Helps Consumer Confidence

There are many issues that can affect or manipulate consumer confidence. Different consumer products like refrigerators, baby monitors, and even guns all relate to consumer confidence. When the IoT negatively impacts these products, it’s likely consumer confidence will diminish.

Consumer products like fridges and baby monitors are not safe.

Andy Greenberg, Senior Writer for WIRED, and Kim Zetter, writer for WIRED, December 28, 2015, "How the Internet of Things Got Hacked," WIRED News, https://www.wired.com/2015/12/2015-the-year-the-internet-of-things-got-hacked/ (accessed 10/5/16)When Mattel added Wi-Fi connectivity to its Hello Barbie to enable what it described as real-time artificially intelligent conversations, it left its connection to the Hello Barbie smartphone app open to spoofing and interception of all the audio the doll records. A Samsung “smart fridge,” designed to synch over Wi-Fi with the user’s Google Calendar, failed to validate SSL certificates, leaving users’ Gmail credentials open to theft. Even baby monitors, despite the creepy risk of hackers spying on kids, remain worryingly insecure: A study from the security firm Rapid7 found that all nine of the monitors it tested were relatively easy to hack.

Gun control is an important issue for consumers, and guns are susceptible to hacking if they are connected to the IoT.

Andy Greenberg, senior writer for WIRED, July 29, 2015, "Hackers Can Disable a Sniper Rifle - Or Change Its Target," WIRED News, https://www.wired.com/2015/07/hackers-can-disable-sniper-rifleor-change-target/ (accessed 10/5/16) At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 45: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 45

Rebuttal to IoT Fosters Economic Growth

The Internet of Things, though with the potential of providing a profit for the economy, has negative implications. The IoT claims to be efficient, but it comes at the cost of eliminating jobs while also opening up avenues for further cybercrime. Cybercrime is not only expensive to fight but also expensive to remedy once damage has been done.

The IoT is detrimental for the economy through the destroying of jobs and social friction that results.

Alain Louchez, Managing Director of the Center for the Development and Application of Internet of Things Technologies (CDAIT) at the Georgia Institute of Technology, and Dr. Shoumen Datta, Co-Founder and Executive Director of the MIT Forum for Supply Chain Innovation at MIT, May 3, 2014, “Beyond Technology: Overcoming the Economic and Social Frictions of the Internet of Things,” Postscapes, http://www.postscapes.com/iot-voices/insights/beyond-technology-overcoming-the-economic-and-social-frictions-of-the-internet-of-things/ (accessed 10/5/16)

While still in its infancy, it invites countless and legitimate debates about the “invasion of data snatchers”, the dislocation of business models, the disappearing jobs due to technological innovation increasingly relying on automation, the lack of related skills and expertise, and more broadly its social impact. IoT is indeed bound to generate economic and social friction, including the clash of status quo with not- as-usual business; the collision between creative and out-of-focus imagination; and the asphyxiation from old world ideas versus geographically-agnostic unbridled innovation.

IoT can lead to more cybercrime.

BBC News, September 29, 2106, "Army of Webcams Used in Net Attacks," http://www.bbc.com/news/technology-37504719 (accessed 10/1/16)

According to a recent report on IoT malware from security firm Symantec, cybercriminals are increasingly looking for vulnerable smart devices - such as TVs, home security systems and webcams "Cybercriminals are interested in cheap bandwidth to enable bigger attacks. They obtain this by hijacking our devices and stitching together a large web of consumer devices that are easy to infect because they lack sophisticated security," said Nick Shaw from Symantec's Norton division.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 46: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 46

Rebuttal to IoT Fosters Healthcare Innovation

IoT claims to benefit the healthcare industry, but it causes more problems than it ameliorates. Not only can personal privacy information get leaked, but hackers can disrupt healthcare systems like insulin pumps and pacemakers, which can lead to death.

IoT causes privacy concerns in the healthcare industry.

Daniele Miorandi, CREATE-NET, via Alla Cascata, Sabrina Sicari, Università degli Studi dell’ Insubria, Francesco De Pellegrini, CREATE-NET, via Alla Cascata, and Imrich Chlamtac, CREATE-NET, via Alla Cascata, February 2012, Internet of things: Vision, applications and research challenges, p. 1507

Health-care applications represent the most outstanding application field, whereby the lack of appropriate mechanisms for ensuring privacy of personal and/or sensitive information has harnessed the adoption of IoT technologies. In addition, in the IoT vision, a prominent role will be played by wireless communication technologies. The ubiquitous adoption of the wireless medium for exchanging data may pose new issue in term of privacy violation. In fact, wireless channel increases the risk of violation due to the remote access capabilities, which potentially expose the system to eavesdropping and masking attacks. Hence privacy represents a real open issue that may limit the development of the IoT.

IoT can harm privacy in the healthcare industry due to the possibility of hacking, insulin pumps prove.

Scott R. Peppet, Professor of Law, University of Colorado School of Law, 2014, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, p. 133-134

More dire, insulin pumps have been shown to be vulnerable to hacking. Jay Radcliffe, a security researcher with diabetes, has demonstrated that these medical devices can be remotely accessed and controlled by a hacker nearby the device’s user. Similarly, many insulin pumps communicate wirelessly to a small monitor that patients use to check insulin levels. Radcliffe has shown that these monitors are also easily accessed, leading to the possibility that a malicious hacker could cause a monitor to display inaccurate information, causing a diabetic patient to mis-administer insulin doses. Other medical devices have also proven insecure.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com

Page 47: WEST COAST DEBATE - BC Forensic   Web viewincluding via print, email, dropbox, google drive, the web, etc

West Coast Publishing Nov 2016 Public Forum Internet of Things Privacy MAIN File Page 47

Rebuttal to IoT Is Key to Infrastructure Development

Despite any advances that IoT can foster for infrastructure development, it is too easy for hackers to wreak havoc by destroying smart grids and hacking into driverless cars.

Smart cars on a smart grid are a terrible idea, as hackers can easily disrupt the infrastructure, causing damage and harm.

Andy Greenberg, Senior Writer for WIRED, and Kim Zetter, writer for WIRED, December 28, 2015, "How the Internet of Things Got Hacked," WIRED News, https://www.wired.com/2015/12/2015-the-year-the-internet-of-things-got-hacked/ (accessed 10/5/16)Security researchers Charlie Miller and Chris Valasek forever altered the automobile industry’s notion of “vehicle safety” in July when they demonstrated for WIRED that they could remotely hack a 2014 Jeep Cherokee to disable its transmission and brakes. Their work led Fiat Chrysler to issue an unprecedented recall for 1.4 million vehicles, mailing out USB drives with a patch for the vulnerable infotainment systems and blocking the attack on the Sprint network that connected its cars and trucks. That Jeep attack turned out to be only the first in a series of car hacks that rattled the auto industry through the summer . At the DefCon hacker conference in August, Marc Rogers, principal security researcher for CloudFlare, and Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, revealed a suite of vulnerabilities they found in the Tesla Model S that would have allowed someone to connect their laptop to the car’s network cable behind the driver’s-side dashboard, start the $100,000 vehicle with a software command, and drive off with it—or they could plant a remote-access Trojan on the car’s internal network to later remotely cut the engine while someone was driving.

Culturally, consumers do not want our infrastructure to be a smart grid with driverless cars.

Adrian Bridgwater, Contributor to Forbes, January 21, 2015, "Will Internet Of Things Robots Take Over Earth By 2020?" Forbes, http://www.forbes.com/sites/adrianbridgwater/2015/01/21/will-internet-of-things-robots-take-over-earth-by-2020/2/#51ea42b11aa3 (accessed 10/5/16) This cultural factor is important i.e. many say that we could have driverless cars in widespread use by the end of the end of the decade if we wanted to. But would we as humans be happy with this with our existing road infrastructures by 2020? Probably not, no – we don’t want to drive on highways filled with robots, not in this next decade we don’t.

We’re a small non-profit. Please don’t share this file with those who have not paid including via dropbox, google drive, the web, printed copies, email, etc. Visit us at www.wcdebate.com