Defense Advanced Research Projects AgencyTagged Content List

Technologies for Privacy and Controlled Access to Sensitive Data

Relating to the selective release of information

Showing 9 results for Privacy RSS
03/11/2015
DARPA announced plans today to research and develop tools for online privacy, one of the most vexing problems facing the connected world as devices and data proliferate beyond a capacity to be managed responsibly. Named for former Supreme Court Justice Louis Brandeis, who while a student at Harvard law school co-developed the concept of a “right to privacy” in a seminal article under that title, the new program seeks to explore how users can understand, interact with and control data in their systems and in cyberspace through the expression of simple intentions that reflect purpose, acceptable risk and intended benefits such as "only share photos with approved family and friends.”
| Data | Privacy |
How can society responsibly reap the benefits of big data while protecting individual privacy?
| Data | Privacy |
04/28/2015

Because DARPA’s programs push the leading edge of technology, they are sometimes society’s first notable encounter with the societal dilemmas associated with new capabilities. DARPA pursues these technologies because of their promise, and the Agency is committed to exploring domains that could leave the Nation vulnerable if not pursued. But DARPA’s leadership and team members also understand that, in this pursuit, the Agency’s work will at times raise ethical, legal, security or policy questions that cannot and should not go unaddressed.

Cloud computing provides computing capabilities as a service rather than a product. Advantages to this include reduced costs and maintenance, and increased flexibility, availability and scalability. Cloud computing, however, also presents some potentially significant security issues. In particular, vulnerabilities could include compromise of data security and loss of key information. Any computer or web-friendly device connected to the Internet could gain unauthorized access to pools of computing power, applications, or files – compromising information security in cloud-computing environments.
The goal of the Safer Warfighter Communications (SAFER) program is to develop technology that will enable safe, resilient communications over the Internet, particularly in situations in which a third-party is attempting to discover the identity or location of the end users, or block the communication. The technology developed through the program will also provide the quality of service (QoS) required to support applications such as instant messaging, electronic mail, social networking, streaming video, voice over Internet protocol (VoIP), video conferencing and other media that promote effective communication.