1 Is there privacy in the cloud? The Snowden Effect KP Chow Dept of Computer Science University of Hong Kong July 2013.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
doi> Digital Object Identifier: overview
Using Information at the University University Secretarys Office
Northside I.S.D. Acceptable Use Policy
A presentation by Werardt Systemss P Ltd An Online Machine Monitoring System.
1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
How to keep your kids safe online
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Developing a Records & Information Retention & Disposition Program:
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Computer Networks IGCSE ICT Section 4.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Forensic Surveillance techniques Profiling techniques
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.
Database Applications Database Applications and Implications.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
(Edited) WORKPLACE PRIVACY.
C4- Social, Legal, and Ethical Issues in the Digital Firm
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
The Internet and New Technologies Chapter 2. “We had a choice to enter the country and follow the law. Or we had a choice to not enter the country.” —Eric.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Population Census carried out in Armenia in 2011 as an example of the Generic Statistical Business Process Model Anahit Safyan Member of the State Council.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Nuclearsafety.gc.ca Joint Congress on Medical Imaging and Radiation Sciences May 28, 2015 e-Doc CNSC Administrative Monetary Penalties Overview.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
How would you define a computer? Computers are... Electronic devices that receives (input), processes & stores data & produces a result (output).
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
DOE Data Management Plan Requirements
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
&. What is Utopia? Sir Thomas Moore’s Utopia (1516) Utopia is a world or society in which life is ideal or perfect in every way. It is the ultimate goal.
IC 3 BASICS, Internet and Computing Core Certification Computing Fundamentals Lesson 1 What Is a Computer?
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law.
Edward Snowden An Introduction.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Records Management Reality
Surveillance around the world
Clash of jurisdictions in the area of data protection
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Information Security and Travel-related Security
Define the Problem Constant surveillance of citizens in our country
Introduction to Networks
Holding surveillant power to account: Democratic problems & solutions
U.S. Intelligence Oversight Reforms & the Cloud Act
Presentation transcript:

1 Is there privacy in the cloud? The Snowden Effect KP Chow Dept of Computer Science University of Hong Kong July 2013

Something you should know Cloud computing has significant implications for the privacy of personal information A users privacy and confidentiality risks vary significantly with the terms of service and privacy policy established by the cloud provider Law could oblige a cloud provider to examine user records for evidence of criminal activities CISC2

Something you should know The legal status of some types of information may change when stored in the cloud The location of the information in the cloud may affect the privacy and confidentiality protections of the information Information in the cloud may have more than 1 legal location at the same time, with different legal consequence CISC3

Something I didnt know until June 2013, how about you? FISA and FISC The PRISM The MTI … CISC4 I dont want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded. by Snowden (The Guardian, June 2013) I learnt it from Snowden

Who is Snowden? American former CIA employee A former contractor for the NSA Leaked details of NSA mass surveillance programs to the press 2004: US Army Special Forces 2007: CIA computer technician, stationed with diplomatic cover in Geneva, Switzerland, responsible for maintaining computer network security 2009: left CIA and joined a private contractor inside an NSA facility on a US military base in Japan 2013 (< 3 months): consultant with Booz Allen Hamilton as a system administrator inside the NSA at the Kunia Regional SIGINT Operations Center in Hawaii

Disclosures Stories Disclosures Stories 5 June - a top secret order of Foreign Intelligence Surveillance Court (FISC) Ordered a business division to provide metadata for all telephone calls wholly within the United States, including local telephone calls and all calls between the United States and abroad. 6 June – PRISM (begin from 2007) A clandestine electronic surveillance program that allegedly allows the NSA to access , web searches, and other Internet traffic in real-time. 9 June – Boundless Informant A system "details and even maps by country the voluminous amount of information [the NSA] collects from computer and telephone networks." 15 June - Government Communications Headquarters (GCHQ) A British intelligence agency, worked jointly with the NSA to eavesdrop on a meeting of industrialized nations in London in June -- GCHQ has secretly gained access to the network of cables and has started to process vast streams (The MTI Project)

Major Programs/Events FISC (Foreign Intelligence Surveillance Court) PRISM Program and Boundless Informant China and Hong Kong Hacking GCHQ (Government Communication Headquarters) & British eavesdropping MTI (Master The Internet) CISC7

8 FISC

FISC Foreign Intelligence Surveillance Court (FISC) ordered a business division of Verizon Communications to provide on an ongoing daily basis metadata for all telephone calls wholly within the United States, including local telephone calls and all calls made between the United States and abroad NO CONTENT CISC9

10 What are the metadata? Caller and receiver Caller and receiver current location Length of call …

11 How the data was used? CISC Boundless Informant

The NSA's powerful tool for cataloguing global surveillance data – including figures on US collection CISC12 The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the '2007' date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself.

Boundless Informant Recording and analysing where its intelligence comes from Use advanced data mining techniques: details and maps by country the voluminous amount of information it collects from computer and telephone networks Focus on counting and categorizing the records of communications, known as metadata, rather than the content of an or instant message The agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30- day period ending in March

14 The Prism CISC Besides Verizon Communication, who else?

The PRISM Program The seal of Special Source Operations, the NSA term for alliances with trusted U.S. companies. The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables. This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports. NSA slides explain the PRISM data-collection program

Monitoring a target's communication NSA slides explain the PRISM data-collection program

Providers and data NSA slides explain the PRISM data-collection program Why the companies willing to participate?

Companies Participation Through a top-secret program authorized by federal judges working under the Foreign Intelligence Surveillance Act (FISA), the U.S. intelligence community can gain access to the servers of nine Internet companies for a wide range of digital data. (Washington Post 6 Jun 2013) CISC18

Participating providers NSA slides explain the PRISM data-collection program

The PRISM Data collected –Search history –Contents of s –File transfers –Live chats NOT METADATA anymore, it includes contents CISC20

Where is the law? Allows NSA to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders In the past, NSA needed individual authorization, and confirmation that all parties were outside USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA CISC21

What the PRISM found The number of obtained communications increased in 2012 by 248% for Skype 131% increase in requests for Facebook data 63% increase in requests for Google data Plan to add Dropbox as a PRISM provider CISC22

If you are using the cloud and you dont know where the data is, CISC23 It is very likely that NSA is watching you.

If you are using the cloud and the data is moving around the world, CISC24 According to FISA, it is likely that NSA is gaining access to the servers that store the data.

25 MTI Mastering the Internet CISC The web is for everyone and so is surveillance. (The Guardian, 21 Jun 2013)

MTI Under GCHQ (Government Communications Headquarters) Mastering the Internet, started in 2007 Capture and analyse a large quantity of international traffic consisting of – s, texts, phone calls, internet searches, chat, photographs, blogposts, videos and many uses of Google Collecting signals from up to 200 fiber-optic cables at the physical points of entry into the country, each with 10 gigabits per second, approx petabytes in a day CISC26

Internet Buffer Internet traffics into and out of UK are intercepted and collected, then filtered to get rid of uninteresting content The filtered traffics are then stored: 3 days for content and 30 days for metadata Some degree of co-operation from companies operating either the cables or the stations which they came into the country: referred to as the special source provider CISC27

Project Tempora Core programme in MTI The evolution of a secret programme to capture vast amounts of web and phone data CISC28

The Real Big Data MTI produces larger amounts of metadata collection than the NSA NSA analysts effectively exploit GCHQ metadata for intelligence production, target development/discovery purposes With Tempora's "buffering capability", and Britain's access to the cables that carry internet traffic in and out of the country, GCHQ has been able to collect and store a huge amount of information Every area of ops can get real benefit from this capability, especially for target discovery and target development CISC29

Where is the law? The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary. A clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad CISC30

TINT By March 2010, analysts from the NSA had been allowed some preliminary access to the project MTI Refer to as "joint GCHQ/NSA research initiative TINT: "uniquely allows retrospective analysis for attribution" – a storage system of sorts, which allowed analysts to capture traffic on the internet and then review it CISC31

If you are using the cloud and the data in located in Europe CISC32 It is likely that the data will travel through the fiber in UK, and got buffered by GCHQ.

Conclusion Data privacy protection: laws exist to protect data in a particular country Unfortunately, laws cannot protect data resided in another country where the intelligent agencies do not observed, or laws exist allow unlimited access of data that are potential dangerous in the oversea CISC33

34 Thank You