Categories
Apple Legal Issues

Apple, the FBI, and Libraries

I’m sure most people who might read this blog are at least familiar that there is currently a battle occurring between Apple and the FBI over access to information on a phone that had been used by the San Bernardino terrorist. The details of that case are fascinating and nuanced, and can be summarized very roughly as:

The FBI has obtained a court order that compels Apple to create a new version of iOS that is different from the existing version that lives on the phone in question in three ways: one, that the new version will bypass the time-delay between password attempts that is standard for iOS; two, that the new version will be able to enter password attempts in a programmatic fashion instead of through finger presses on the screen; and three, that the new version of iOS will disable the security setting that may be active that erases the phone unrecoverably if 10 password attempts are incorrect. The reason that the FBI needs this to access the information that is stored on the phone is that iOS uses encryption to secure the information on the phone when it is, in the parlance of computer security types, “at rest.” The FBI could make a bit-for-bit copy of the software that is on the phone, and examine it until the heat death of the universe, and not be able to decrypt the information into a readable form.

While the court order and the responses on both sides are not directly about encryption, the reason that this is a question at all is encryption…if the FBI could dump the contents and read them, there would be no need for them to access the phone at all. Indeed, the information from the phone that they do have, given to them by Apple, is from a 6-week-old iCloud backup of the device that isn’t encrypted (currently, iCloud backups are NOT encrypted, or rather, they are encrypted but with a key that Apple has).

Why is this relevant to libraries? I think it’s past time that we start paying very close attention to the details of our data in ways that we have, at best, hand-waved as a vendor responsibility in the past. There have been amazing strides lately in libraryland in regards to the security of our data connections via SSL (LetsEncrypt) as well as a resurgence in anonymization and privacy tools for our patrons (Tor and the like, thank you very much Library Freedom Project).

Data about our patrons and their interactions that isn’t encrypted at rest in either the local database or the vendor database hosted on their servers (and our electronic resource access, and our proxy logins, and, and, and…) is data that is subject to subpoena and could be accessed in ways that we would not want. It is the job of the librarian to protect the data about the information seeking process of their patrons. And while it’s been talked about before in library circles (Peter Murray’s 2011 article is a good example of past discussions) this court case brings into focus the lengths that some aspects of the law enforcement community will go to in order to have the power to collect data about individuals.

For a great article on the insanity associated with the government’s position on this, please take a moment and read James Allworth’s The US has gone F&*%ing Mad. Also take a look at the wonderful article by Barbara Fister from Inside Higher Ed, wherein she boils the case down and does some deft analysis of the situation (sidenote: I’m a massive fan of Barbara’s writing, if you do not regularly read her stuff, fix that).

It’s fairly clear, I think, that the FBI is using this case to seek to set a precedent that would allow for future access to information on iOS devices. The case was chosen specifically to have the right public relations spin for them, it’s a thing that is technically possible (unlike a request to “break the encryption” which may actually not be technically possible), and they have asked for a tool to be created that is easy generalizable to other iOS devices. I back Apple on this, and believe that strong security measures (including but not limited to strong encryption) make us safer.

And I would feel lots, lots better about the state of data in libraries if I knew we were using strong encryption that protects our data. I would love to see an architecture for a truly secure (from a data standpoint) ILS, because I’m pretty certain that none of the ones in use right now are even close. In the same way that I’m certain that Apple is working on producing a version of iOS that they cannot access at all….we need to architect and insist on the implementation of data storage that even we can’t get directly into. If patrons want us to keep their lending history (and we have some evidence that opting in to such a system is something that patrons do want), then let’s insist that our ILS treat that data like toxic waste: behind closed and locked vaults that neither we nor the vendor can access.

Categories
ALA presentation

Presentations from ALA Midwinter 2016

Back in January, I did a few presentations at the ALA Midwinter conference. Two of them were recorded and I’ve finally tracked down the recordings and got them ready to post here. I only have slides for one, but hopefully someone finds the recordings useful.


ALA Master Series
Jason Griffey & Measuring the Future


LITA Top Technology Trends – ALA Midwinter 2016


The two trends that I talk about are the Blockchain and it’s potential for decentralization of the web, and the confluence of AI/Machine Learning and autonomous agents as interface for data.

The video below is a great presentation about Blockchain and its potential, by one of my compatriots at the Berkman Center, Primavera De Filippi.

Categories
presentation

OLA SuperConference 2016

I was thrilled to spend the last few days at the Ontario Library Association SuperConference 2016, the largest library conference in Canada. I was invited to be the Spotlight Speaker for the Ontario Public Library Association, and gave a talk I ambitiously titled “Incubating Ourselves: Internal Iteration and the Quest for Better Libraries.”

The presentation itself was design as a series of stories, with an introduction dealing with innovation itself, and how libraries might consider what and how to approach innovation in their own operations and activities. The core of the talk was two stories about me, the first illustrating why libraries offering innovative technology to their patrons can help change their patron’s lives, and the second about how the same technology can also help to improve libraries themselves. I closed with a look at near-future tech that I think will impact society, as a suggestion about what libraries and librarians should be looking at as next-stage technology for themselves and their patrons. Throw in a bit about LibraryBox and Measure the Future, and that’s a lot to get into an hour, but I think it came together really well.

While the presentation doesn’t hold up remarkably well without the audio bits, if you’d like to take a look, here are the slides from the talk:

Two things stood out to me as a result of this talk. The first is that it was the first of my talks to have a Graphic Recorder/Graphic Facilitator assigned to it, and I’m over the moon with how amazingly cool the resulting poster turned out. If you aren’t familiar with the idea of Graphic Facilitation, here’s a video on the process:

So here’s my talk in graphic form, with details of different parts pulled out:

IMG_3382

IMG_3388

IMG_3383

IMG_3385

IMG_3386

IMG_3387

The other thing that I was really thankful for was that people seemed to appreciate the effort I make in trying to not only present good ideas, but to do so with some style:

Canadians really ARE the most polite and friendliest people around. 🙂

Thanks again for having me, OLA! It was fantastic, and I hope to be back someday keynoting for you.