From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.

Slides:



Advertisements
Similar presentations
Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
Advertisements

Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Privacy and Cybersecurity Law in India and the U.S. Professor Peter Swire Ohio State University National Law University, Dwarka March 31, 2011.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
Chapter 17 Controls and Security Measures
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
VoIP Voice over Internet Protocol or “It is not Voice over IP; it is Everything over IP…” Bob Pepper, FCC.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Conflicting Privacy Regimes: (1) Encryption and (2) Access to Cloud Records Peter Swire Ohio State University Future of Privacy Forum IAPP Global Summit.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
Cyber crime & Security Prepared by : Rughani Zarana.
Reasons to Support Strong Encryption for a Globally Secure Internet Professor Peter Swire Ohio State University U.S. Technology Training Institute Washington,
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Implications of VoIP TC 310 May 28, Questions from Reviews Duty to Interconnect Reciprocal compensation Line of business v statutory line of business.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Prof. Peter Swire Georgia Tech Senior Counsel, Alston & Bird Sayers Security Conference/Curio Tech Summit Atlanta March 22, 2016 How Should Apple Balance.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Surveillance around the world
“Privacy and Cybersecurity Law in India and the U.S.”
Wiretapping Christopher Simpson.
PowerPoint® Slides to Accompany
Decrypting Data Compliance in China
PowerPoint® Slides to Accompany
Attribution & the globalization of criminal evidence
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
How to build a good reputation online
Wiretapping and Encryption
PowerPoint® Slides to Accompany
U.S. Intelligence Oversight Reforms & the Cloud Act
By: Matthew Harris and brendan salvas
Presentation transcript:

From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State University TPRC 2012 September 22, 2012

Current Research: Crypto & De-Identification Encryption and Globalization India, China, and first full legal/policy analysis since the crypto wars Going Dark vs. a Golden Age of Surveillance From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud (todays paper) Next: De-ID project with Future of Privacy Forum Law and policy of masking technologies The articles available online

Setting the Context … 1990s FBI and NSA worry that encryption would block lawful surveillance 1999 White House shift to permit strong encryption Why Johnny Cant Encrypt Whitten & Tygar, 1999 Low encryption adoption Tech literature had not shifted from that view

Encryption Adoption Now Widespread VPNs Skype & other VoIP Blackberry Gmail now, other webmail soon SSL pervasive (credit card numbers) Dropbox & many more Facebook enables HTTPS, may shift default Result: interception order at ISP or local telco often wont work What are the agencies to do?

Ways to Get Communications 1. Break the encryption 2. Get comms in the clear (CALEA) 3. Get comms before or after encrypted (backdoors) 4. Get stored communications, such as in the cloud #4 is becoming FAR more important, for global communications Also, temptation to do more #2 and #3

Overview Local switch Phone call Telecom Company Alice Bob

Overview Local switch Phone call Telecom Company Alice Bob

Bob ISP Alice ISP %!#&*YJ# Hi Bob! Many Nodes between ISPs Alice Bob %!#&*YJ#

Problems with Weak Encryption Nodes between A and B can see and copy whatever passes through Many potential malicious nodes Strong encryption as feasible and correct answer When encryption adoption rises...

Encrypt Encrypted message – Hi Bob! Alice Bob's public key Bob's private key – Alice's local ISP Decrypt Hi Bob! – Bob's local ISP – Backbone provider Bob

Ways to Grab Communications 1. Break the encryption: 1. Keys are with the individuals 2. Crypto today is very hard to break 2. Get comms in the clear 1. CALEA requires that for phone 2. FBI proposal to extend to Internet 3. Get comms with hardware or software before or after encrypted (backdoors) 4. Get stored communications, such as in the cloud

Dont Extend CALEA to Internet Bad cybersecurity to have unencrypted IP go through Internet nodes How deep to regulate IP products & services WoW just a game? Make all Internet hardware & software be built wiretap ready? That would be large new regulation of the Internet Could mobilize SOPA/PIPA coalition

Ways to Grab Communications 1. Break the encryption 2. Get comms in the clear 3. Get comms before or after encrypted (backdoors) 4. Get stored communications, such as in the cloud

Governments Install Software? Police install virus on your computer This opens a back door, so police gain access to your computer Good idea for the police to be hackers? Good for cybersecurity?

Governments Install Hardware? Reports of telecom equipment that surveil communications through them Can phone home Good to design these vulnerabilities into the Net? Chinese Telecoms May Be Spying on Large Numbers of Foreign Customers [The Atlantic, 2/16/2012]

Ways to Grab Communications 1. Break the encryption (but cant) 2. Grab comms in the clear (but CALEA a bad idea) 3. Grab comms before or after encrypted (but backdoors a bad idea) Therefore: 4. New emphasis on stored communications, such as in the cloud

Conclusions Technology Gmail & Skype can encrypt, even if Johnny cant Change our assumptions about adoption Law Important emerging debates on data retention mandates & lawful access rules Split between have & have not jurisdictions Industry Cloud providers at the center of future debates on government access