Defense Advanced Research Projects AgencyTagged Content List

Technologies for Privacy and Controlled Access to Sensitive Data

Relating to the selective release of information

Showing 8 results for Privacy RSS
03/11/2015
DARPA announced plans today to research and develop tools for online privacy, one of the most vexing problems facing the connected world as devices and data proliferate beyond a capacity to be managed responsibly. Named for former Supreme Court Justice Louis Brandeis, who while a student at Harvard law school co-developed the concept of a “right to privacy” in a seminal article under that title, the new program seeks to explore how users can understand, interact with and control data in their systems and in cyberspace through the expression of simple intentions that reflect purpose, acceptable risk and intended benefits such as "only share photos with approved family and friends.”
| Data | Privacy |
01/16/2019
Whether a piece of information is private, proprietary, or sensitive to national security, systems owners and users have little guarantees about where their information resides or of its movements between systems. When a user enters information on a phone, for example, it is difficult to provably track that the data remains on the phone or whether it is uploaded to a server beyond the device. The national defense and security communities are similarly left with few options when it comes to ensuring that sensitive information is appropriately isolated, particularly when it’s loaded to an internet-connected system.
How can society responsibly reap the benefits of big data while protecting individual privacy?
| Data | Privacy |
04/28/2015

Because DARPA’s programs push the leading edge of technology, they are sometimes society’s first notable encounter with the societal dilemmas associated with new capabilities. DARPA pursues these technologies because of their promise, and the Agency is committed to exploring domains that could leave the Nation vulnerable if not pursued. But DARPA’s leadership and team members also understand that, in this pursuit, the Agency’s work will at times raise ethical, legal, security or policy questions that cannot and should not go unaddressed.

Cloud computing provides computing capabilities as a service rather than a product. Advantages to this include reduced costs and maintenance, and increased flexibility, availability and scalability. Cloud computing, however, also presents some potentially significant security issues. In particular, vulnerabilities could include compromise of data security and loss of key information. Any computer or web-friendly device connected to the Internet could gain unauthorized access to pools of computing power, applications, or files – compromising information security in cloud-computing environments.