Coronavirus Tracing Apps Conflict With Privacy

Smartphone apps designed to trace people at risk of Covid-19 infection have attracting criticism in Europe and the US for their potential as surveillance and spying tools to be used by governments.  

Scientists and researchers from more than 25 countries have published an open letter urging governments not to abuse such technology to spy on their people and warning of risks in an approach championed by Germany.

More than a hundreds of the British researchers and scientists have expressed concern over privacy and security resulting from 'mission creep' as the UK's government plans for using smartphones to trace and combat coronavirus slowly get going.

Much of our pre-coronavirus lives may be reclaimable with some modifications around how we work, socialise and travel, however in one crucial way the post-pandemic landscape will be very different as an individual’s autonomy and data privacy may be lost as mobile telephones are used for surveillance.

This will have important consequences for the relationship not just between citizens and governments, but also between consumers and businesses.

The risk of the coming end of privacy is attributable to the success of virus tracing apps in South Korea and Taiwan which have both been effective in flattening the Covid-19 curve by digitally tracking infected persons. No government was using dispersed databases as extensively to fight the spread of the disease as South Korea. Before an explosive outbreak in its worker dormitories, Singapore earned praise for TraceTogether, which claims to be the first Bluetooth contact-tracing app covering an entire nation. The 1.4 million users represent roughly a fourth of the island’s population.

Governments want access to phones, with or without informed consent and turning the clock back will be difficult, if not impossible. Where boundaries between private and public are thin to begin with, a pandemic can make them disappear. 

There have been assurances from various governments, including those in France, India and Singapore, that tracing  Apps will go away once the outbreak is contained, but no legal guarantees.  

  • The Singaporean app records physical proximity in an anonymised form on smartphones. Minimal data is stored on servers. The national TraceTogether’s App building blocks are in the public domain although he source code of  is yet to be disclosed.
  • As India reopens after a 43-day lockdown, it’s mandatory, first for public-sector employees and now for private-sector workers and company bosses are liable to ensure their workers download the app, though nobody is accountable for misuse of data.  The Indian government recently denied a French security researcher’s claim that the privacy of ninety million Indians is at stake. 

An analysis of China’s Alipay Health Code software, which uses various data sources of data to categorise a person’s health status with a colour code, found that some information is shared with the police.

One consequence of Covid-19 will be to erode privacy in the name of public health. European data protection laws will try to ensure that the emergency collection and processing of personal information is legally accountable and for a limited purpose but the British parliament’s human rights committee says it isn’t convinced that the National Health Service’s tracing App protects privacy.

Where they exist, robust institutions could will offer resistance to surveillance but  in many places the individual’s autonomy has already become a virus casualty. Poorer countries where consumers have only recently started going online will see states insist on devices that come with pre-loaded tracking apps. 

Whether sensitive data will be kept safely on devices or stored on a central server in a way that might allow a bad actor to reconstruct a person’s social activity, keeping a record of where they have been and when and who they meet. will become an urgent question as efforts to control the Coronavirus extend around the world.  

Bloomberg:      ZDNet:     SCMP:       LA Times:   

You Might Also Read: 

Incompatible: Privacy & The Internet of Things:

Coronavirus Track & Trace Apps On A Deadline:

 

« Hacked Vehicle Owner Database For Sale
Vehicle Cyber Crime Attacks Double »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.