The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.

Slides:



Advertisements
Similar presentations
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Advertisements

Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
W ashington A rea T rustworthy C omputing H our
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Best Practices Forum. Michael R. Levin Building an Ethical Supply Chain November 24, 2008 “ Consumers, investors, business partners, regulators,
Architecture Decision Group Group Organization & Processes April 7, 2015 | Tuesday.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Bringing Governments, Industry and Academia Closer Together to Assure Global Cyber Security Terry L. Janssen, PhD Science and Technology Advisor Network.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
1 An Overview of Computer Security computer security.
Using Digital Credentials On The World-Wide Web M. Winslett.
CEP Welcome September 1, Matthew J. Koehler September 1, 2005CEP Cognition and Technology Who’s Who?  Team up with someone you don’t.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Edward Snowden vs The U.S. Government By Nicholas Pace.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Do you know how to keep yourself safe?
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
Business Data Communications Standards and Laws. What are Standards? Documented agreements Technical specifications or other precise criteria to be used.
Law and Ethics Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
The President's NSA Review Group: The Technology Issues" Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Business Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology.
FERPA Questions and Answers Lenawee Data Camps June and August, 2009.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
Representing the People. Requirements and Benefits of Congress.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Prof. Blair MacIntyre Prof. Peter Swire CS4803 & 6725; MGT4803 & 8803 January 5, 2015 Information Security Strategies and Policy.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Social Media 101 An Overview of Social Media Basics.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Security Vulnerabilities in A Virtual Environment
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
JFK-102B13W#4 & JFK-103B1W#4 How to Become a Better Employee.
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Integrating Social Media into IS/IT Courses: A Success Story to Report.
Ch : 9 Interest Groups. ANSWER: C 1. What is the main purpose of a political action committee?  A: education interest groups  B: writing and passing.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Privacy and the Law.
Security.
Outline Introduction Characteristics of intrusion detection systems
Answer the questions to reveal the blocks and guess the picture.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Define the Problem Constant surveillance of citizens in our country
U.S. Intelligence Oversight Reforms & the Cloud Act
FIREWALL.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Naval Leadership and Ethics Center
IT and Society Week 2: Privacy.
Presentation transcript:

The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference June 10, 2014

Overview of the Talk  Finishing first year at Georgia Tech  GT Information Security Center (GTISC)  The Review Group  The declining half life of secrets  Due in large part to major IT trends  Descriptive  Normative  Request – I plan to publish this soon, so DNB beyond title and brief description

Creation of the Review Group  Snowden leaks of 215 and Prism in June, 2013  August – Review Group named  Report due in December  5 members

December 2013: The Situation Room

Our assigned task  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure

Our Report  Meetings, briefings, public comments  300+ pages in December  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records  Pres. Obama speech January  Adopt 70% in letter or spirit  Additional recommendations under study

Our Report  Meetings, briefings, public comments  300+ pages in December  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records  Pres. Obama speech January  Adopt 70% in letter or spirit  Additional recommendations under study

The Declining Half Life of Secrets  The IC assumption was that secrets lasted a long time, such as years  My descriptive claim – the half life of secrets is declining sharply  Multiple information-based trends lead to this

Data Quantity & Dissemination  How much can an insider leak?  A lot. One thumb drive can ruin your whole day.  One CIO: “My goal is that leaks happen only by a printer”  How well can an insider disseminate secrets?  Old days: Ellsberg needed the NY Times  Today: Wikileaks, no gatekeeper to the Internet

Mosaic Theory as Risk to the IC  The mosaic theory historically used by the IC  Now, it turns against the IC  Bigger effort to publicly reveal IC activities  More sensors in private hands, networked  Crowd-sourcing – once some data is revealed, the world collaborates to put the pieces together  E.g., Paglan & spy on the spy satellites

Threat to IC from IT Sociology  Contrast of USG & Silicon Valley view of Snowden on traitor v. whistleblower  USG: with all the briefings, I have not yet found an IC person who says WB  Silicon Valley: In one company, over 90% say WB  “Thunderous applause” for Snowden at SXSW  Schneier: the civil disobedience of this generation  Sociological chasm between left coast/right coast or Cambridge/Oxford  Solution: IC shouldn’t hire any techies? EFF membership as disqualification for security clearance?  Those aren’t good counter-measures

Sources & Methods of SigInt  Before:  Often-separate & “foreign” communications  Listening Posts  Monopoly PTTs work closely with government  Now:  Convergence of hardware, software, networks  IC efforts to intrude, but intrusion detection  Many comms thru new players with no former cops  Risk higher than before that someone outside of the IC will detect intrusions/year and report that

Policy Implications of Declining Half Life of Secrets  Previously, the IC often ignored the “front page test”  Jack Nicholson & “you can’t handle the truth” in A Few Good Men  But, how many front page stories this year?  Apply front page test ex ante:  At time of initial decision, higher expected value of revelations – bigger negative effect if ignore the front page test; Merkel is still in office  RG: effects on foreign affairs, economics, Internet governance, so USG must consider these multiple effects and not isolate IC decisions

Finally  12-step program needed for agencies used to secrets  From denial to acceptance  A painful process  Begins by accepting the need to change