Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia.

Slides:



Advertisements
Similar presentations
Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Advertisements

A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Some Thoughts on Cyber-Resiliency, Time, and Surveillance Peter Swire Huang Professor of Law and Ethics Georgia Institute of Technology NAS/NRC Forum on.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Texas City Municipal Police Association 2012 Satisfaction Survey.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
Law and Ethics Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
The President's NSA Review Group: The Technology Issues" Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Business Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Information Warfare Playgrounds to Battlegrounds.
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Larry Clinton Operations Officer Internet Security Alliance
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Information Warfare Playgrounds to Battlegrounds.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Prof. Peter Swire Georgia Tech Senior Counsel, Alston & Bird Sayers Security Conference/Curio Tech Summit Atlanta March 22, 2016 How Should Apple Balance.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Zero Day Attacks Jason Kephart. Purpose The purpose of this presentation is to describe Zero-Day attacks, stress the danger they pose for computer security.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Law Firm Data Security: What In-house Counsel Need to Know
International Security and Peace
Data Minimization Framework
The Cold War Begins ????
Forensics Week 11.
Define the Problem Constant surveillance of citizens in our country
U.S. Intelligence Oversight Reforms & the Cloud Act
Technology Convergence
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology

Overview of the Talk  Intro to Review Group  Theme 1: The declining half life of secrets  Due in large part to major IT trends  Theme 2: One Internet, multiple equities  Theme 3: The role of IT professionals

Creation of the Review Group  Snowden leaks of 215 and Prism in June, 2013  August – Review Group named  Report due in December  5 members

December 2013: The Situation Room

Our assigned task  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure

Our assigned task (2)  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure  Q: A simple optimization task, and write the algorithm?  Focus today: implications for IT

Our Report  Meetings, briefings, public comments  300+ pages in December  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records  Pres. Obama speech January  Adopt 70% in letter or spirit  Additional recommendations under study

Theme 1: Declining Half Life of Secrets  The IC assumption was that secrets lasted a long time, such as years  My descriptive claim – the half life of secrets is declining sharply  Multiple computing trends lead to this  Below, discuss implications for the IC if many secrets become known within a few years

The Insider, Big Data & the Internet  How much can an insider leak?  A lot. One thumb drive can ruin your whole day.  One CIO: “My goal is that leaks happen only by a printer”  How well can an insider disseminate secrets?  Old days: Ellsberg needed the NY Times  Today: Wikileaks, no gatekeeper to the Internet

Threat: The Sys Admin & Sociology  Contrast of USG & Silicon Valley view of Snowden on traitor v. whistleblower  USG: with all the briefings, I have not yet found an IC or other USG person who says WB  Silicon Valley:  In one company, over 90% say WB  “Thunderous applause” for Snowden at SXSW  Schneier: the civil disobedience of this generation  Sociological chasm between left coast and right coast  Solution: IC shouldn’t hire any techies? EFF membership as disqualification for security clearance?  Those aren’t good counter-measures

Crowd-sourcing & the Internet of Things  The mosaic theory historically used by the IC  Now, it turns against the IC  Bigger effort to publicly reveal IC activities  The Internet of Things – more sensors in private hands, networked  Crowd-sourcing – once some data is revealed, the world collaborates to put the pieces together  Hence, major trends in computing speed the revelation of IC secrets  The good old days:  Covert ops – few people knew  Signals -- for radio, often passively pick up signals

Private IT Systems as IC Targets  Section 215 & press reports of bulk collection in private telecomm/Internet systems  These systems do daily intrusion detection  They may have EFF-leaning employees,  Risk seems higher than before that someone outside of the IC will detect intrusions/year and report that

Descriptive Summary on Half Life of Secrets  Insider threats, with sociology risky for secrets  Big Data  Internet of Things  Crowdsourcing  Private systems can detect intrusions  Decline of gatekeepers  In short, if you were in the IC, would you bet on things staying secret for 25 or 50 years?

Policy Implications of Declining Half Life of Secrets  Previously, the IC often ignored the “front page test”  Jack Nicholson & “you can’t handle the truth” in A Few Good Men  But, how many front page stories this year?  When secrets become known:  At time of initial decision, higher expected impact of revelations – bigger negative effect if ignore the front page test  RG: effects on foreign affairs, economics, Internet governance, so USG must consider these multiple effects and not isolate IC decisions

Theme 2: One Internet, Multiple Equities  The same Internet for:  Intelligence, law enforcement  E-Commerce  Free speech & political dissent  All the fun stuff – cat videos  Military theaters of combat

One Internet -- Outline  Effects of earlier revelation of secrets  Effects are larger due to convergence of:  Domestic and civilian communications, with  Foreign, intelligence, and military communications  One major area of debate for IT:  Larger tensions between offense and defense in cybersecurity

Some Effects of Revealing Secrets Since June  U.S. intense debates post-Snowden about surveillance vs. privacy, civil liberties, and other values  Effects on allies – Merkel, Brazil  Cloud computing & other U.S. business interests  Marketers: “US cloud providers have to give all the customer data to the NSA, so buy our local services”  Internet governance  U.S. Internet Freedom agenda vs. surveillance  U.S. leadership in ICANN and standards groups under new challenge by ITU alternative

IC: Convergence of Communications  Cold War  Soviet systems separate from U.S. systems  Main threat from nation states  U.S. citizens rarely made “long-distance” or “international” calls  Today  One global Internet  Main threat from terrorists and others who swim in a sea of civilian communications  U.S. citizens have many communications that route outside of the U.S., where FISA rules are different  Mayer: “pervasive” information from U.S. browsing goes outside of U.S.

Offense & Defense in Cybersecurity in Era of Converging Communications  Strong intelligence and military reasons for offensive capabilities  Intelligence advantages if can access bulk data, globally, with lower risk of casualties than physical entry  Historical role of full-throttle offense for the military: crack Enigma and save the convoys  Military in the future - Cyber Command, analogous to the way the Air Force became key to offense  Where more critical infrastructure is online, then offense against it more valuable

Defense and Cybersecurity  Old days:  Military (and NSA) have long had “information assurance,” to protect own codes and communications  Where find a flaw, then use chain of command to fix it  Command and control, so “patch” is installed  Operational security, with goal that only the defenders learn of the patch  Today:  Over 90% of critical infrastructure privately held  If install a patch, then tip off outsiders: can’t defend the “good guys” and still attack the “bad guys”  Cybersecurity has daily attacks against civilians, so defense is more important

Review Group and Defense  With convergence, much bigger effects on civilian-side defense if IC & military lean toward offense  RG: Areas to strengthen defense:  Improve security of government systems  Address insider threat, etc.  Encryption  Zero days

Strong Crypto for Defense  RG Rec 29: support strong crypto standards and software; secure communications a priority on the insecure Internet; don’t push vendors to have back doors (defense)  No announcement yet on this recommendation

Zero Days & the Equities Process  A “zero day” exploit means previously unused vulnerability, where defenders have had zero days to respond  Press reports of USG stockpiling zero days, for intelligence & military use  RG Rec 30: Lean to defense. New WH equities process to ensure vulnerabilities are blocked for USG and private networks. Exception if inter-agency process finds a priority to retain the zero day as secret.  Software vendors and owners of corporate systems have strong interest in good defense  Recent administration announcement to do this

Addressing Multiple Risks  In addition to strengthening cyber-defense, there are multiple risks/equities in addition to national security:  Privacy & civil liberties  Allies  Business and the economy  Internet governance  RG Recs 16 & 17: Weigh the multiple risks  New process & WH staff to review sensitive intelligence collection in advance  Senior policymakers from the economic agencies (NEC, Commerce, USTR) should participate

Addressing Business & the Economy  Greater inclusion of economic policy-makers  RG Rec 9: Address the top IT industry request – transparency report  DOJ agreement with companies in January

Addressing Foreign Affairs/Allies  RG Rec 19: New process for surveillance of foreign leaders  Presidential Policy Directive 29:  Historically, for surveillance, countries have provided much stronger protections for their citizens than in other countries  PPD-29 a milestone, with “minimization” of data for non-US persons  Big new software project to build that  Details far from clear, but a notable shift

Summary on One Internet, Multiple Equities  In addition to national security, have crucial other equities:  Strengthen cyber-defense  Privacy & civil liberties  Allies  Business and the economy  Internet governance  IC decisions in the context of these other equities

Conclusion  There was no optimizing algorithm for the multiple tasks of the Review Group  There is no optimizing algorithm for your tasks as IT professionals, to conduct surveillance, prevent intrusion, govern the Internet, etc.  These are the great moral and policy issues of our time  We all need your participation and insights  Let’s get to work