Dunstan et al v. comScore, Inc.

Filing 176

DECLARATION of Robyn Bowland regarding memorandum in opposition to motion 175 (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Exhibit D, # 5 Exhibit E, # 6 Exhibit F, # 7 Exhibit G, # 8 Exhibit H, # 9 Exhibit I, # 10 Errata J, # 11 Exhibit K, # 12 Exhibit L, # 13 Exhibit M, # 14 Exhibit N, # 15 Exhibit O, # 16 Exhibit P, # 17 Exhibit Q, # 18 Exhibit R, # 19 Exhibit S, # 20 Exhibit T, # 21 Exhibit U, # 22 Exhibit V, # 23 Exhibit W)(Bowland, Robyn)

Download PDF
EXHIBIT G Page 1 IN THE UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION MIKE HARRIS and JEFF DUNSTAN, individually and on behalf of a class of similarly situated individuals, ) ) ) ) ) Plaintiffs, ) ) -vs) ) COMSCORE, INC., a Delaware ) corporation, ) ) ) Defendant. ) __________________________________) No. 1:11-cv-5807 Judge Holderman Magistrate Judge Kim The deposition of ROBERTO TAMASSIA, Ph.D., called by the Plaintiffs for examination, pursuant to notice and pursuant to the Federal Rules of Civil Procedure for the United States District Courts pertaining to the taking of depositions, taken before Emily R. Pellegrino, Certified Shorthand Reporter and Notary Public within and for the County of Cook and State of Illinois, at 350 North LaSalle Street, 13th Floor, Chicago, Illinois, commencing at the hour of 9:29 a.m. on the 14th day of December, A.D., 2012. (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1 Page 2 1 2 3 4 5 A P P E A R A N C E S: EDELSON MCGUIRE, LLC, By MR. CHANDLER GIVENS and MR. BEN THOMASSEN 350 North LaSalle Street, 13th Floor (312) 589-6370 (312) 589-6378 (Facsimile) cgivens@edelson.com bthomassen@edelson.com 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 6 On behalf of the Plaintiffs; 7 8 9 10 11 QUINN, EMANUEL, URQUHART & SULLIVAN, LLP, By MR. STEPHEN A. SWEDLOW and MS. ROBYN M. BOWLAND 500 West Madison Street, Suite 2450 Chicago, Illinois 60661 (312) 705-7400 (312) 705-7401 (Facsimile) stephenswedlow@quinnemanuel.com robynbowland@quinnemanuel.com 12 and 13 14 15 16 STACK & O'CONNOR, Chtd., By MR. PAUL F. STACK 140 South Dearborn Street, Suite 411 Chicago, Illinois 60603 (312) 782-0690 (312) 782-0936 (Facsimile) pstack@stacklaw.com 17 and 18 19 20 21 22 23 Page 4 MR. THOMAS S. CUSHING, III 11950 Democracy Drive, Suite 600 Reston, Virginia, 20190 (703) 438-2392 (703) 438-2350 (Facsimile) tcushing@comscore.com On behalf of the Defendant. ALSO PRESENT: Mr. Amir Missaghi 24 (Witness duly sworn.) ROBERTO TAMASSIA, Ph.D., called as a witness herein, having been first duly sworn, was examined and testified as follows: EXAMINATION BY MR. GIVENS: Q. Good morning, Roberto. A. Hi. Q. My name is Chandler Givens, this is my colleague Ben Thomassen, and one of our law clerks Amir Missaghi who's sitting in today. A. Okay. Q. I read in your expert report that you haven't testified at deposition or trial in the past four yours. Have you ever sat for a deposition before? A. I have never sat for a deposition. Q. Okay. So I'm going to layout some ground rules just to help you understand what's going on here. A. Sure. Q. Everything you say is on the record today, so I need you to give verbal answers. So if you nod your head or shrug your shoulders or point a finger Page 3 INDEX 1 2 WITNESS EXAMINATION 3 ROBERTO TAMASSIA, Ph.D. 4 5 6 7 8 By Mr. Givens 4 EXHIBITS 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 TAMASSIA DEPOSITION EXHIBIT No. 1 No. 2 No. 3 No. 4 No. 5 MARKED FOR ID 4 76 79 81 83 Page 5 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 at me, she's not going to be able to pick this up. A. Okay. Q. So that's one. The second thing is if you don't understand one of the questions that I'm asking you, just ask for a clarification, that's fine. But if you don't, then I'm going to assume you understand the question. Your counsel Stephen might object, but you are required to answer unless he instructs you otherwise. Are you on any medications, substances, or do you have any health issues that might prevent you from understanding the questions that I'm going to ask you today and responding? A. No. (Whereupon, Tamassia Deposition Exhibit No. 1 was marked for identification, ERP.) BY MR. GIVENS: Q. Let's begin here. I'm handing you what has been marked as Tamassia Exhibit 1 which is your expert report. You'll be familiar with it. A. Yes. Q. Do you recognize this document? A. Yes. Right. 2 (Pages 2 to 5) * * * * (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1 Page 42 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 MR. SWEDLOW: Objection, vague. You can answer. THE WITNESS: I would like to speak about the computer user that is identified in the ULA. Installation process requires the users to be an administrator of the ULA. Administrator with computer has knowledge about installation of programs and installation of program settings. I believe that a user who's an administrator of a computer should be able to understand exactly what is the meaning of, so what is the operation of the software. BY MR. GIVENS: Q. So a general user then? A. A general user who is an administrator. Q. What do you mean by administrator? A. Administrator is a user who has certain privilege rights with respect to installing programs, reviewing programs, and viewing and modifying settings on a computer. Q. Give me an example of an administrator. A. I'm not sure I understand the question when you say example of administrator. I am an example of an administrator, for example. I don't know if that is your question. Page 44 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 software was installed? MR. SWEDLOW: Can you read that question back because I wasn't paying attention? (Whereupon, the record was read as requested.) MR. SWEDLOW: I'll object as vague. There is no "no." Do you want to rephrase that question? MR. GIVENS: I don't want to rephrase the question. MR. SWEDLOW: It doesn't make any sense then. THE WITNESS: Can I ask clarification of the meaning by what happens? What do you mean by what happens? BY MR. GIVENS: Q. In your report you write, if a user selects "no" when presented with a dialog box requesting acceptance of the disclosures and ULA, the comScore installation process does not run. During the demonstration, did Yvonne Bigbee click no? A. Now I can answer your question? Okay. I asked to see both what happens when the user agrees and accepts and when the user disagrees and does not accept, and I saw in the administration that when the Page 43 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Q. Can any consumer be an administrator on their computer? A. Are you asking whether any person or -- what do you mean by consumer here? Q. Any person, yes. A. Okay. So not every person on this planet will have the basic understanding of how a computer works to be an administrator. So there is some basic computer skills that are needed in order to be an administrator. Do you want me to elaborate more on this? Q. I'd love for you to elaborate a little bit. A. Well, what I can say is that computer literacy is growing worldwide, especially in the United States, and so a good fraction of the population is likely to have skills of computer administrator. Q. Is every user who installs comScore software an administrator? A. Yes. The software is set up so that if the user logged into the machine is not an administrator, then the installation will not proceed. Q. What happened during the demonstration when Yvonne clicked no when she was showing you how the Page 45 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 user does not accept does not agree, the comScore portion of the software is not installed but the user will still be able to install the other software that was bundled together with the comScore software which was the original software that the user attempted to download. Q. During the demonstration, was there only one type of bundled software used? A. Yes. In the demonstration, there was only one type of bundled software. Q. Let's move to the operation section of your report. A. Yes. Q. The basis for this whole section is the demonstration that was given to you at Reston, Virginia; is that correct? A. Yes. Q. Can you explain a few ways that a panelist will be able to determine that comScore software is running on their computer? A. Are you referring with the word "panelist" to a user who has installed the comScore software? Q. Yes. A. There are various reasons, multiple reasons 12 (Pages 42 to 45) (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1 Page 46 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 that will make such -- panelist as copious user to be fully aware that the software is fine. So first of all, this panelist has explicitly accepted the installation such that manner is occurring. Second, the panelist should notice that the tray area of the task bar in the Windows operating system contains an icon associated with the comScore software. This provides an explicit and continuous and persistent indication that the software is running. In addition, whenever the user -- this panelist, this user will look at the list of programs installed, that the software will appear. And then even more, if you look at what is called the task manager, which is a display of the so-called processes, programs running, the comScore software is there. And if one will inspect some settings of the machine or the so called registry, one will see registry keys associated with the software. The primary visual indication is in the system, is in the tray. Q. In the second sentence of the last full paragraph on page four "Uninstallation" you write, based upon my observations of the demonstration and the documentation I reviewed, comScore software can Page 48 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 additionally through the start menu. Q. What methods do you use to verify that all components of the comScore software have been removed from the machine? A. I asked to show me the locations within the file system and within the registry where traces of the installation would have been present if it were not complete. And through the inspection, so I asked Yvonne who showed me the registry to show me certain folders on the computer, and there were no files that indicated that the program still existed. In addition, I asked about various details of the operation of the software. And based on what I was told, it is my opinion that no files associated with the tracking were left in the file system. There was a portion of my report where I mentioned that the filtering and trackings performed in internal memory, so there is kind of no log files, no log files that will be part of the file system. Q. But you never personally checked the computer; you relied upon Yvonne Bigbee's demonstration? A. The screen of the computer was projected in front of me and Yvonne did exactly what I asked her Page 47 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 be uninstalled in manner consistent with other Windows based software, and you go on to write, through the add/remove function provided as a part of the Windows operating system. Can you explain your basis for writing in a manner consistent with other Windows based software? A. The Windows operating system includes specifications for developers of applications on how uninstallation should be performed. All applications for the Windows operating system are expected to provide an uninstallation program. And this uninstallation program is the one that will be launched when the user goes to this app within the settings of the computer, called in operation Windows add/remove programs and enter other things. So it is the standard expected way. All applications are expected to provide this functionality. Q. In your experience, have you seen consumer software that adds an item to a user start menu that is an icon to uninstall software; are you familiar with that? A. I am perfectly familiar with what you're saying and, yes, I have seen some software applications that provide the uninstall functionality Page 49 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 to do. So I considered this equivalent to myself having inspected the files. Unless, of course, some trick was set up to show me something else. Q. What tool did you use to use the registry? A. I asked Yvonne to show me the registry and she used a standard tool called reg edit. MR. SWEDLOW: A what? THE WITNESS: Reg edit, R-e-g, e-d-i-t. BY MR. GIVENS: Q. Backing up for just a second on the same page the third full paragraph from the bottom last sentence you write, moreover, every user who provides his or her e-mail address during installation of comScore software, it sends an e-mail that includes the ULA. What's your basis for that sentence? A. The question I asked and the answer I obtained. Q. Okay. Let's move to the obfuscation section. Can you explain to me what regular expressions are? A. Regular expression is a standard mechanism for describing in a succinct way a collection of text strings. Text string is a sequence of characters. Regular expression can by informally viewed as text 13 (Pages 46 to 49) (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1 Page 50 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 pattern. For example, a regular expression will describe succinctly the form of a Social Security number, of a phone number, of a ZIP code, of a two-digit abbreviation of a state. That's it. Q. When you write that the software uses a computational technique called regular expressions to check for the presence of text patterns associated with sensitive data, who determines what those text patterns are? MR. SWEDLOW: In the report? Objection, vague. THE WITNESS: Yeah, I actually do not understand your question about who determines. BY MR. GIVENS: Q. Let me ask generally. If you're using regular expressions to detect the presence of text pattern, who is that determines the text pattern; is it the programmer? A. The process for creating the regular expression should be based on domain knowledge about how the text patterns look like and then the programmer will now implement this domain knowledge in the specific program language for the regular expressions. So someone, for example, who knows Page 52 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 once they are discovered, the software either removes completely the data or transforms it so that the new output data cannot be used to reconstruct the original data. Q. When you say removes completely, what do you mean? A. Removes completely means that the output of the transformation is the empty data set. Q. Is the empty data set then sent to comScore's servers? A. There is no such concept of submitting an empty set. The data is suppressed, is not uploaded. Q. Once that type of sensitive information is detected, a credit card number, a Social Security number, a bank number, would it be technically feasible to simply excise that information or not collect it at all? MR. SWEDLOW: I'll object as vague and compound, but you can answer. THE WITNESS: Your question, it is hypothetical about -- so can you rephrase it again? Can you say it to me again so I can understand? BY MR. GIVENS: Q. My understanding of the way the comScore Page 51 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 about the form of the Social Security numbers will determine how the pattern looks like. And then the programmer will have to create what is the actual programming specification of the regular expression. Q. So at comScore, who is the person who determines that? A. I did not ask who is the person. I assumed that they have domain experts who have this knowledge and I know that it is the software developers under the leadership of the CDO and the director of technology and video technology who implement in this programming language of regular expressions what is this domain knowledge. Q. When you write in your report that sensitive data is transformed through the obfuscation process, what do you mean by transformed? A. What I mean is that there is a matter that takes as input data and could use as output some other data; that is the transformation process. Q. So is the comScore software actively seeking Social Security numbers, credit card numbers? A. Yes. The software tries to identify the presence of various types of sensitive data including Social Security numbers and credit card numbers. And Page 53 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 software works is that it uses regular expressions to detect some certain information like a credit card or Social Security number? A. Yes. Q. Then it collects that information and transforms it; those are your words? A. Yes. Q. Would it be technically feasible to rather than collect it and transform it, to detect it, and not collect it at all? A. Of course it is technically feasible to do nothing about the information that is collected, but comScore is in the business of actually acquiring some type of information. Q. Why do you think comScore transforms credit card numbers and collects that information? A. You're asking two questions. Can you ask them separately? Q. Why do you think that comScore actively seeks credit card numbers to collect? A. Yes. My understanding of the comScore business is that they're the one to provide aggregate statistical data to their customers about, for example, the use of certain credit cards for 14 (Pages 50 to 53) (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1 Page 54 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 transactions. So that's one of the reasons that they will track credit card usage across the economy, across the users of the software. Q. Once the comScore software is installed on the user's machine, is it constantly listening for web traffic? A. My understanding is that yes, this is the case. Q. When the comScore software detects information to be collected, how much time elapses between collection and transmission to comScore servers? A. I did not run timing experiments, so I cannot answer this question. Q. When you write in your expert report -MR. SWEDLOW: Are we on page five? BY MR. GIVENS: Q. Page five second full paragraph, once it is identified sensitive data is transformed by an obfuscation process, it aims to remove detailed information while preserving more general information of statistical significance. What do you mean by general information of statistical significance? A. General information means that this Page 56 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 difficult to have absolute certainty of the success of a certain program. In particular, it is unfeasible to try the program on all possible inputs. However, my reading of the software, the description I was given of the techniques and methods indicates that the obfuscation process is based on technically sound principals and was implemented with the appropriate tools. Q. Look with me now at the last sentence of the second full paragraph -A. Uh-huh. Q. -- where you write, in addition, the technique of cryptographic hashing is used to map other sensitive data items to numeric values called digests that have the following properties: (1) with very high probability, the digests are uniquely associated with the items; (2) it is computationally infeasible to reconstruct the items form the digest. What do you mean when you write it is computationally infeasible to reconstruct the items from the digest? A. The meaning is that reversing the transformation is practically impossible to do given current computer technology. Page 55 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 information about class of objects, a class of items. For example, the class of days of birth that have the same year or the class of credit card numbers that start with the same seven digits. This is not information about a specific credit card of the user. It is a class of credit cards that include the credit card of the user. That's the meaning of general information. The meaning of statistical significance means that it is relevant to the type of statistical summaries that are provided by the comScore to their customers; for example, demographic information as related to certain types of internet shopping habits or user job certain brands of credit cards for certain types of internet transactions. Q. When you write since the data's transformed by an obfuscation process that aims to remove detailed information, why did you write aims to remove rather than remove? Let me rephrase that. Are you aware of any instances where the software doesn't remove the detailed information? A. The reason why I wrote the sentence with the term aims is because it is the clear intent of the code. And as in any programming endeavors, it is Page 57 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Q. Would it be computationally feasible to reconstruct the items from the digest if you were aware of what the values associated with the digest were? A. The question you are asking seems to be of the type if you already know what the value is, can you reconstruct the value from the digest. There is no point in reconstructing something that you already know. Q. Are you familiar with the concept of rainbow tables? A. Yes. Q. So here you write, it's computationally infeasible to reconstruct the items from the digest. But comScore not only has the digest; they also have the associated value, i.e., this is a Social Security number; is that correct? A. ComScore detects -- attempts to detect the presence of Social Security numbers through regular expressions, then Social Security numbers are suppressed, so the transformation actually produces no output value; it produces the empty data set. For Social Security numbers, they do not use the technique of cryptographic hashing. 15 (Pages 54 to 57) (312) 345-1414 a639eee0-d065-4e4e-9e24-2314607108c1

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?