Aleksander Wiatrowski Doctorand, University of Lapland Less Privacy, More Security?

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
 Fundamental Rights for Pakistanis are aimed at overturning the inequities of past social practices.  Guarantee that all citizens can and will lead.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
CASE OF NIEMIETZ v. GERMANY (Application no /88) JUDGMENT STRASBOURG 16 December 1992.
1 When hate speech tangles privacy... When hate speech tangles privacy...
C4- Social, Legal, and Ethical Issues in the Digital Firm
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
Personal data protection in criminal procedure International collaboration and principle of proportionality LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
Data protection and European citizens’ initiatives
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
The USA PATRIOT Act “Those that can give up liberty to obtain a little temporary safety deserve neither liberty nor safety” – Benjamin Franklin.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Access to Court Decisions The right to anonymity in the sphere of personal data protection. Best practices.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Week 12. Lecture 2. Health Law & the EU Cross-border healthcare: patients’ rights.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
František Nonnemann Skopje, 9th October 2012 JHA DP aspects related to provision of information about public figures in CZ.
Gail Davidson. Approved unanimously by the UN General Assembly on December 10,  Article 19 Everyone has the right to freedom of opinion and expression;
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Privacy in the Digital Age: the UN General Assembly Resolution
Surveillance around the world
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
Dr. Željko Karas Police College, Zagreb (Croatia)
Legal and Ethical Issues
Is privacy research objective?
Data Protection & Human Rights
The Future of Big Data, Equality and Privacy
Employee Privacy and Privacy of Employee Information
Define the Problem Constant surveillance of citizens in our country
Cybercrime and Data Protection
U.S. Intelligence Oversight Reforms & the Cloud Act
The Surveillance State
Electronic Surveillance, Post 9/11
Presentation transcript:

Aleksander Wiatrowski Doctorand, University of Lapland Less Privacy, More Security?

1.PRISM and Tempora 2.Privacy 3.Xkeyscore 4.’Useful’ companies 5.Results and possible consequences 6.Conclusion Less Privacy, More Security? – PRISM

Prism (US) and Tempora (British) are both clandestine mass electronic surveillance data mining programs, Both classified and secret untill revealed by E. Snowden, Both are part of government sponsored mass surveillance programs, British spy agency collects and stores vast quantities of global messages, Facebook posts, internet histories and calls, and shares them with NSA according to E. Snowden, US NSA stores massive information with examples including , video and voice chat, videos, photos, voice-over-IP chats (such as Skype), file transfers, and social networking details, British Government Communications Headquarters (GCHQ) had probes attached to more than 200 internet links, each probe carried 10 gigabits of data a second, Both have centralized mass databanks, Data in PRISM is maintained for Archived system audit logs and backup data is stored for a minimum of two (2) years. PRISM and Tempora Less Privacy, More Security? – PRISM

Privacy is at the very soul of being human. Legal rights to privacy appeared 2000 years ago in Jewish laws. Privacy is the right to autonomy, and it includes the right to be let alone. It includes the right to control information about ourselves, including the right to limit access to that information. Most important, the right to privacy means the right to enjoy solitude, intimacy, and anonymity. Privacy as a Fundamental Human Right Less Privacy, More Security? – PRISM

Privacy is the right to control who knows what about you, and under what conditions. The right to share different things with your family, your friends and your colleagues. The right to know that your personal s, medical records and bank details are safe and secure. Privacy is essential to human dignity and autonomy in all societies. The right to privacy is a qualified fundamental human right - meaning that if someone wants to take it away from you, they need to have a damn good reason for doing so. Privacy Less Privacy, More Security? – PRISM

 Out of choice,  Matter of convenience,  Lack of legislation or lack of respect for existing rules. Loosing Privacy Less Privacy, More Security? – PRISM

 National level: constitutions and national privacy laws.  International level: Treaties of Rome and Strasbourg by European Council and the Treaty on Civil Rights and Political Rights by United nations.  Universal Declaration of Human Rights from 1948, Article 12: Legal framework for Privacy Protection Less Privacy, More Security? – PRISM No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

OECD and European Commision 8 priciples formulated in 1980: use limitation principle 1)The use limitation principle: the smallest possible amount of personal data should be gathered and used for the purpose given, principle of purpose specification 2)The principle of purpose specification: only personal data for strictly specified purposes should be collected and processed, 3)Quality 3)Quality: the personal data must be correct, complete and up to date. Furthermore they have to be well protected by means of security, principle of transparency or opennes 4)The principle of transparency or opennes: the people involved have the right to know what personal data are collected, to what purpose, who has access to these data, what will happen to these data when they are passed on to others, and to whom they are passed on. Legal framework for Privacy Protection (2) Less Privacy, More Security? – PRISM

US: no general privacy law (nothing in Constitution), as well as no legislation following OECD & EC principles. On the other hand, huge number of privacy-related acts.EU: The Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data (Data Protection Directive, 1995) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) US and EU legislation "Dominance" in abuses of dominant companies

American Civil Liberties Union: The ACLU is nation's guardian of liberty, working daily in courts, legislatures and communities to defend and preserve the individual rights and liberties that the Constitution and laws of the United States guarantee everyone in this country. Right to privacy - freedom from unwarranted government intrusion into personal and private affairs. ACLU Less Privacy, More Security? – PRISM

In the wake of 9/11, mass surveillance has become one of the U.S. government’s principal strategies for protecting national security. Over the past decade, the government has asserted sweeping power to conduct dragnet collection and analysis of innocent Americans’ telephone calls and s, web browsing records, financial records, credit reports, and library records. The government has also asserted expansive authority to monitor Americans’ peaceful political and religious activities. ACLU Less Privacy, More Security? – PRISM

“They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.” “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.” Less Privacy, More Security? – PRISM Benjamin Franklin, shortly before February 17, 1775 as part of his notes for a proposition at the Pennsylvania Assembly Better known paraphrased: “ Any society that would give up a little liberty to gain a little security will deserve neither and lose both.”

“You can’t have 100-percent security and also have 100-percent privacy and zero inconvenience. We’re going to have to make some choices as a society.” Less Privacy, More Security? – PRISM Part of US President’s Barack Obama statement to reporters on the Affordable Care Act at Fairmont Hotel in San Jose, California, on June 7, 2013.

“But we don't have 100% security, so can we have our privacy back?” Less Privacy, More Security? – PRISM Anonymous user ,

Less Privacy, More Security? – PRISM

“When it comes to telephone calls, nobody is listening to your telephone calls. That’s not what this program is about. (…) What the intelligence community is doing is looking at phone numbers, and durations of calls; they are not looking at people’s names and they’re not looking at content. (…) If the intelligence committee actually wants to listen to a phone call they have to go back to a federal judge, just like they would in a criminal investigation.” Less Privacy, More Security? – PRISM

Revealed on July Formerly secret computer system used by the United States National Security Agency for searching and analyzing Internet data about foreign nationals across the world. The program is run jointly with other agencies including Australia's Defence Signals Directorate, and New Zealand's Government Communications Security Bureau. There is a claim that even low-level analysts are allowed to search the private s and phone calls. Xkeyscore Less Privacy, More Security? – PRISM

The Guardian's Glenn Greenwald revealed that is is possible to “listen to whatever s they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst.” abcnews.go.com The NSA sums up the program best: XKeyscore is its "widest reaching" system for developing intelligence from the Internet. The program gives analysts the ability to search through the entire database of your information without any prior authorization — no warrant, no court clearance, no signature on a dotted line. An analyst must simply complete a simple onscreen form, and seconds later, your online history is no longer private. The agency claims that XKeyscore covers "nearly everything a typical user does on the Internet.„ cnn.com Xkeyscore (2) Less Privacy, More Security? – PRISM

Dominant IT Companies’ Role Less Privacy, More Security? – PRISM

Dominant IT Companies involvement Less Privacy, More Security? – PRISM

Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.” Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.” Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data,” Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.” Google, Apple and Facebook Outright Deny They’re Helping the NSA Mine Data Less Privacy, More Security? – PRISM

 Burying down both security and privacy,  Giving green light to Dominant IT Companies,  Opening new dangerous paths,  Diminishing the significance of data protection legislation,  Bigger Dominant IT Companies’ role (?),  Loosing trust. Results and possible consequences Less Privacy, More Security? – PRISM

ECHELON Schengen Information System INDECT Golden Shield Project Public Information Network Security Monitoring Bureau Frenchelon NATGRID Centralized Monitoring System (CMS) DRDO NETRA SORM Titan traffic database Onyx Interception Modernisation Programme Tempora UK National DNA Database (NDNAD) Impact Nominal Index Nationwide Suspicious Activity Reporting Initiative PRISM X-Keyscore Fairview DCSNet Main Core NSA call database Intelligence Community (IC) Financial Crimes Enforcement Network Terrorist Finance Tracking Program Tailored Access Operations Boundless Informant Special Collection Service (SCS) Stellar Wind Stuxnet GhostNet ”The Soviet Union, East Germany, and other totalitarian states rarely respected the rights of individuals, and this included the right to privacy. Those societies were permeated by informants, telephones were assumed to be tapped and hotel rooms to be bugged: life was defined by police surveillance. Democratic societies are supposed to function differently.” W. Diffie, S. Landau, PRIVACY ON THE LINE, MIT 2007, p. 143.

Less Privacy, More Security? – PRISM