Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Some Thoughts on Cyber-Resiliency, Time, and Surveillance Peter Swire Huang Professor of Law and Ethics Georgia Institute of Technology NAS/NRC Forum on.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 17 Controls and Security Measures
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Encryption Export Controls in the US Preliminary Research.
Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Law and Ethics Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
The President's NSA Review Group: The Technology Issues" Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Business Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter 9: The Executive Branch
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
Chapter 6 Section 1 page 160. Qualifications for President 1. native born citizen 2. at least 35 years old 3. have been a resident of the U.S. for at.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Foreign Policy A policy based on decision making, influenced by relations with the rest of the world.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
REPORT OF THE BJS/SEARCH NATIONAL TASK FORCE ON PRIVACY, TECHNOLOGY AND CRIMINAL JUSTICE INFORMATION May 31, 2000 Washington, DC Presented by Robert R.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
The Powers and Roles of the President Presidential Leadership.
1 THE PRESIDENCY CHAPTER 13 2 SECTION 1 Objective I. Identify the President’s many roles.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
According to the 25 th Amendment, how are vacancies in the office of the Vice President filled?
Prof. Peter Swire Georgia Tech Senior Counsel, Alston & Bird Sayers Security Conference/Curio Tech Summit Atlanta March 22, 2016 How Should Apple Balance.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
PRESIDENTIAL ROLES PRESIDENTIAL POWERS EXECUTIVE OFFICES PRESIDENTIAL SUCCESSION QUALIFICATIONS VICE PRESIDENTS DUTIES Created by Article II of the Constitution.
Roles & Powers of the Executive Branch. Demographics Male – 100% Male – 100% Caucasian – 100% until 2008 Caucasian – 100% until 2008 Protestant – 97%
US Executive Branch NCSCOS 2.02/2.03. Executive Branch Located in Article II Includes the President and the Vice President main job: enforce laws.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Bellwork Think about this…. Historical Event
Law Firm Data Security: What In-house Counsel Need to Know
North Carolina Law Review Symposium
Lesson 24: How Are National Laws Administered in the American Constitutional System?
A Brief History of the Crypto Wars
Define the Problem Constant surveillance of citizens in our country
“Congress lets the NSA run Amok”
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
APK Bellwork Think* Pair* Share
Presentation transcript:

Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston & Bird LLP Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology June 10, 2015

Overview of the Talk  USA Freedom Act passed last week  Link between President’s Review Group and USA Freedom  NSA reform has gone surprisingly far  That story at  Technology issues raised by the Review Group report  Tension between cyber offense and defense, for crypto and zero days  The role of IT professionals

This happened last week: coincidence? Last Triple Crown Winner: Affirmed (1978); American Pharaoh (2015) Last Foreign Intel Reform: FISA (1978); USA Freedom (2015)

Creation of the Review Group  Snowden leaks of 215 and Prism in June, 2013  August – Review Group named  Report due in December  5 members

December 2013: The Situation Room

Our assigned task  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure

Our Report  Meetings, briefings, public comments  300+ pages in December, 2013, republished Princeton University Press  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records  Pres. Obama speech January 2014  Adopt 70% in letter or spirit

USA Freedom Act & RG Recommendations  Section 215 order only with judicial approval and heightened standard (Rec 1)  End government storage of bulk telephone data and have records held in private sector, accessible only with a judicial order (Rec 5)  Similar limits on bulk collection: National Security Letters (Rec 2) and FISA pen/trap  General rule limiting bulk collection (Rec 4) – the new law as a message to agency lawyers to watch out  Greater transparency by government about foreign intelligence orders (Rec 9 & 10)  Congressional approval of public interest advocates to represent privacy and civil liberties interests before the FISC (Rec 28)

Administration Measures  In 2014, Administration already required judge before looking at a phone number under Section 215  Transparency, including FISC opinions, company transparency reports  Some limits on “incidental collection” under Prism (Section 702)  National Security Letters  Previously stayed secret 50 years (or longer)  New rule that secret no longer than 3 years, unless senior DOJ official finds essential

Administration Measures (2)  White House oversight of the intelligence community:  More on this later in the talk  Sensitive intelligence collection  Surveillance of foreign leaders  Zero-day equities process  Funding increases  In place for Privacy & Civil Liberties Oversight Board  Pending for Mutual Legal Assistance Treaty staffing and tech upgrades (current topic of my research)

Measures Affecting Non-US Persons  Presidential Policy Directive 28  History of spying – open season on foreign nationals outside your boundaries  New human rights-style declaration that will treat non US persons the same as US persons for foreign intelligence purposes, except where that won’t work  For Germany? Syria?  Minimization and dissemination rules apply. Privacy recognized as an integral part of intelligence process.  Hard to assess scope from the outside but a change in philosophy

Measures Affecting Non-US Persons (2)  US Privacy Act reform  History that applies to US persons (citizens and lawful permanent residents), but not to non-US persons  Dept. of Homeland Security treats the same  Administration support for this in statute, including judicial redress for non-US persons.  Good step, although limited scope of Privacy Act protections

Summary on NSA Reform  What we have seen:  Biggest pro-privacy legal reform in intelligence since enactment of FISA in 1978  The administration’s multiple reforms  USA Freedom sends a democratic message for agencies to be thoughtful about privacy  RG factual finding of strong compliance system in NSA  Tech companies have strengthened encryption & security for users in multiple ways  To me, an encouraging response compared to the debates immediately after 9/11

Part 2: One Internet, Multiple Equities  The same Internet for:  Intelligence, law enforcement  E-Commerce  Free speech & political dissent  All the fun stuff – cat videos  Military theaters of combat

One Internet -- Outline  Effects are larger due to convergence of:  Domestic and civilian communications, with  Foreign, intelligence, and military communications  One major area of debate for IT:  Larger tensions between offense and defense in cybersecurity

IC: Convergence of Communications  Cold War  Soviet systems separate from U.S. systems  Main threat from nation states  U.S. citizens rarely made “long-distance” or “international” calls  Today  One global Internet  Main threat from terrorists and others who swim in a sea of civilian communications  U.S. citizens have many communications that route outside of the U.S., where FISA rules are different  Mayer: “pervasive” information from U.S. browsing goes outside of U.S.

Offense & Defense in Cybersecurity in Era of Converging Communications  Offense was easier when there was a target “there” (in Warsaw Pact or military theater)  Convergence means we are often targeting the same hardware, software, and systems that the good guys use  Strong intelligence and military reasons for offensive capabilities  Intelligence advantages if can access bulk data, globally, with lower risk of casualties than physical entry  Historical role of full-throttle offense for the military: crack Enigma and save the convoys  Military in the future - Cyber Command, analogous to the way the Air Force became key to offense  Where more critical infrastructure is online, then offense against it more valuable

Defense and Cybersecurity  Old days:  Military (and NSA) have long had “information assurance,” to protect own codes and communications  Where find a flaw, then use chain of command to fix it  Command and control, so “patch” is installed  Operational security, with goal that only the defenders learn of the patch  Today:  Over 90% of critical infrastructure privately held  If install a patch, then tip off outsiders: can’t defend the “good guys” and still attack the “bad guys”  Cybersecurity has daily attacks against civilians, so defense is more important  No magic bullets to target only “them”; the offense also works against “us”

Review Group and Defense  With convergence, much bigger effects on civilian-side defense if IC & military lean toward offense  RG: Areas to strengthen defense:  Improve security of government systems  Address insider threat, etc.  Zero days  Encryption

Zero Days & the Equities Process  A “zero day” exploit means previously unused vulnerability, where defenders have had zero days to respond  Press reports of USG stockpiling zero days, for intelligence & military use  RG Rec 30: Lean to defense. New WH equities process to ensure vulnerabilities are blocked for USG and private networks. Exception if inter-agency process finds a priority to retain the zero day as secret.  Software vendors and owners of corporate systems have strong interest in good defense  WH adopted this this year

Strong Crypto for Defense  Crypto Wars of the 1990’s showed NSA & FBI interest in breaking encryption (offense)  1999 policy shift to permit export globally of strong encryption, necessary for Internet (defense)  Press reports of recent NSA actions to undermine encryption standards & defeat encryption (offense)  RG Rec 29: support strong crypto standards and software; secure communications a priority on the insecure Internet; don’t push vendors to have back doors (defense)  No announcement yet on this recommendation

Strong Crypto for Defense: The 90’s  Crypto Wars of the 1990’s showed NSA & FBI interest in breaking encryption (offense)  1999 policy shift to permit export globally of strong encryption, necessary for Internet, to protect civil liberties (defense)  Clipper Chip: proposal to build a back door (key escrow) into the hardware chips  Prohibit export of strong encryption because crypto was a “munition”  A lesson learned: key escrow doesn’t work because the method of entry used by the “good guys” is a vulnerability to exploit for the bad guys  Plus, other governments will insist on the keys – the least trusted country

Strong Crypto for Defense: Today  Press reports of NSA actions to undermine encryption standards & defeat encryption (offense)  RG Rec 29: support strong crypto standards and software; secure communications a priority on the insecure Internet; don’t push vendors to have back doors (defense)  FBI Director Comey: criticize Apple & Google when they decided not to have a “master key” for phones  He worries about “going dark” due to strong crypto  A & G: this is good defense, good protection for our customers

“Going Dark” vs. “Golden Age of Surveillance”  “Going Dark”: when have the phone, no way for FBI to open it  May be true, in small number of cases  Golden Age of Surveillance:  We all carry tracking devices  Meta-data of , text, phone, SNS shows the co- conspirators  LOTS of other databases that didn’t use to exist  If compare 1990 to 2015, the FBI has far greater capabilities today. Not “dark.”  My view: better to have effective defense against attackers with effective encryption

Internet Policy: Addressing Multiple Risks  In addition to strengthening cyber-defense, there are multiple risks/equities in addition to national security:  Privacy & civil liberties  Allies  Business and the economy  Internet governance  RG Recs 16 & 17: Weigh the multiple risks  New process & WH staff to review sensitive intelligence collection in advance  Senior policymakers from the economic agencies (NEC, Commerce, USTR) should participate

Summary on One Internet, Multiple Equities  In addition to national security, have crucial other equities:  Strengthen cyber-defense  Privacy & civil liberties  Allies  Business and the economy  Internet governance  IC decisions in the context of these other equities  Strong crypto for defense more important than broken crypto for surveillance access  Fix zero days for defense more important than having a shelf full of attacks

Part 3: The Role of IT Professionals  You are at the center of all of the equities of the “One Internet, Multiple Equities” clash of goals  ACM code of ethics – confidentiality & security  New Internet Society/IETF security efforts, with ethics for IT professionals  Lean toward defense for your own systems  Inform the policy makers of what can be done and should be done=

The 3 Themes  NSA reform has out-performed the skeptics  A democratic affirmation of privacy checks and balances on surveillance  One Internet, multiple equities  The IC cannot decide for all these equities  The role of IT professionals  You build these systems

Conclusion  There was no optimizing algorithm for the multiple tasks of the Review Group  There is no optimizing algorithm for your tasks as IT professionals, to conduct surveillance, prevent intrusion, govern the Internet, etc.  You are in the center of the great moral issues of our time  We all need your participation and insights  Let’s get to work