Keynote on Privacy and National Security: What Still Needs to Be Done Professor Peter Swire Ohio State University Consultant, Morrison & Foerster LLP IAPP.

Slides:



Advertisements
Similar presentations
Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Advertisements

The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
The Sunset of the Patriot Act Professor Peter P. Swire Moritz College of Law Ohio State University Winter College February 19, 2005.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Court Records and Data Privacy: Online or Over the Line? Professor Peter P. Swire Moritz College of Law The Ohio State University Judges Day 2005 October.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Sharing of Medical Records Pursuant to an Authorization Professor Peter P. Swire Moritz College of Law, Ohio St. Univ. Consultant, Morrison & Foerster,
Privacy in America: Your Role as Guardians of the Publics Data Professor Peter P. Swire Moritz College of Law The Ohio State University Ohio Digital Government.
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
Data Breach as a Critical Infrastructure & Computer Security Issue Peter P. Swire Professor, The Ohio State University Senior Fellow, Center for American.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Government Pattern Analysis: Securing Terrorists While Preserving Privacy? Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster.
Security and Privacy in Electronic Health Records Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Hospital Wireless Conference.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
Surviving Securely & Surviving Security -- Thoughts After 9/11 Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Inside the MATRIX: Fair Information Practices in a World of Data Mining Professor Peter Swire Ohio State University DePaul Symposium on Privacy and Identity.
Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
Engineers and Lawyers in Privacy Protection Peter Swire Professor, Moritz College of Law Visiting Professor, Georgia Institute of Technology IAPP Summit.
Compliance with Federal Trade Commission’s “Red Flag Rule”
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
USA Patriot Act I  Immediately post 9/11  Expanded search authority  Roving wiretaps  Monitor private internet and traffic  Acquisition of library.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Supreme Court American Government. The Court  The Supreme Court is the ultimate court of the land  There are 9 judges that make up the Supreme Court.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Peer Information Security Policies: A Sampling Summer 2015.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Information Sharing Challenges, Trends and Opportunities
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
INTERNAL CONTROLS What are they? Why should I care?
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
Bellwork Think about this…. Historical Event
HIS 301 ASSIST Extraordinary Success/his301assist.com
Protecting Your Credit
Disability Services Agencies Briefing On HIPAA
"Security and Privacy After September 11: The Healthcare Example”
Quick Review of Ch. 8 The Legislative Branch
U.S. Intelligence Oversight Reforms & the Cloud Act
“Court Records and Data Privacy: Online or Over the Line?”
HIPAA Privacy and Security Update - 5 Years After Implementation
APK Bellwork Think* Pair* Share
Presentation transcript:

Keynote on Privacy and National Security: What Still Needs to Be Done Professor Peter Swire Ohio State University Consultant, Morrison & Foerster LLP IAPP Forum on Privacy & National Security September 30, 2004

Overview Brief review of Administration actions on privacy and national security MATRIX as a case study Current issue: 9/11 Commission Recommendation of a Civil Liberties Board Theme: we need better institutions and procedures for accountability

I. Administration Actions Privacy controversies hit the Clinton Administration –Encryption (from Clipper chip to 1999 change) –Carnivore –Privacy & computer security (FIDNet) –Law enforcement & national security provisions in other laws, such as HIPAA –I was involved in each of these as Chief Counselor for Privacy, not as privacy advocate

Privacy controversies since 2001 USA-PATRIOT Act and other enhanced law enforcement & intelligence powers –FISA wiretaps now outnumber law enforcement Total Information Awareness CAPPS II Stricter ID (enhanced drivers licenses & passports) Data mining & information sharing as major themes for change No White House or government-wide officials on privacy and civil liberties

Positive Steps Since 2001 E-Gov Act of 2002 and privacy impact assessments –Sen. Lieberman took the lead; not vetoed DHS Chief Privacy Officer –Administration acquiesced but did not propose DOJ is appealing Councilman case on intercepts of s –Victory there will protect individuals and ease prosecutions for illegal interceptions

II. The Challenge Federal official, involved in funding information sharing systems, recently asked me: What can we do to address the concerns of privacy proponents so that they will stop complaining about MATRIX and other needed systems? This was a good-faith question from an honorable person. He was sobered by my answer.

MATRIX Multi-State Anti-Terrorism Information Exchange (MATRIX) –$12 million from DHS & DOJ –Project security and access in Florida First proposed after 9/11 At the peak,12 states had agreed to participate –Currently FL, CT, MI, OH, PA are in program –States that have left or decided not to join after actively considering it: AL, CA, CO, GA, LA, KY, OR, SC, TX, UT, WV –Privacy and cost cited as reasons not to do it

The Current MATRIX Information accessible includes criminal history records, drivers license data, vehicle registration records, and incarceration/corrections records, including digitized photographs, with significant amounts of public records data. This capability will save countless investigative hours and drastically improve the opportunity to successfully resolve investigations. The ultimate goal is to expand this capability to all states. Official site:

2 Early Objections System was created and pushed by admitted drug smuggler, Herb Asher of Seisent –This is not relevant to how we should view the current system –It made it harder to say Trust Us on MATRIX After 9/11, 120,000 names sent to law enforcement for high terrorism factor –This is data mining, without individualized suspicion, with no transparency or known checks against abuse –Today, MATRIX is not a data mining application.

Jan Seisent Documents HTF based on factors including: Age, gender & ethnicity What they did with their drivers licenses Pilots or associations to pilots Proximity to dirty addresses/phone numbers Investigational data SSN anomalies Credit histories

Seisent Documents The associative links, historical residential information, and other information, such as an individuals possible relatives and associates, are deeper and more comprehensive than other commercially available database systems presently on the market.

Answering the Federal Official Privacy experts (not necessarily advocates) will have a list of questions: –About current configuration of system and its compliance with fair information practices –About system as designed (it had original, broader functions) –How system could easily evolve over time (mission creep)

Florida, Other States More States Supply Data Public Records Private Records (?) MATRIX Police & Other State Subscribers Intel (?) Feds (?)

Florida, Other States More States Supply Data Public Records Private Records (?) MATRIX Police & Other State Subscribers Intel (?) Feds (?) The Inputs

Florida, Other States More States Supply Data Public Records Private Records (?) Questions on Inputs: Data Quality: 2003 FBI announcement that NCIC data could no longer be subject to accuracy requirements of the Privacy Act Are state criminal, prison, and similar records more accurate? If record are fixed in one place, is that correction spread to all the other databases?

Florida, Other States More States Supply Data Public Records Private Records (?) Questions on Inputs: Sensitive data: Sources of identity theft -- SSNs are listed in many public records; bank account records in bankruptcy public records Known privacy concerns of American people on medical, financial, childrens, & other sensitive records

Florida, Other States More States Supply Data Public Records Private Records (?) Questions on Inputs: Private sector data. Was there notice & consent for these uses? For medical, credit history, and other sensitive data? Are these secondary uses appropriate? Federal data under the Privacy Act, with public oversight. What similar checks and balances for how private data is gathered and used?

Questions on Outputs: For secret/confidential data, assume good security in data center. How many people have access to the outputs of MATRIX? 800,000 uniformed police, for traffic stops, etc. Non-uniformed? Firefighters? Others? Police & Other State Subscribers Intel (?) Feds (?)

Questions on Outputs: How to secure outputs to 1 million people? Assume few/no secrets for what the million can see about the system – Swire paper on security/obscurity Training Audit trails Anti-browsing laws & enforcement But, what can terrorist or organized crime group learn by bribing one out of the million? Police & Other State Subscribers Intel (?) Feds (?)

Questions on the Data Center/System: A principle: the more important the decisions made, the more important it is to have due process and fair information practices. E.g., denied for mortgage or job, so have FCRA. Decisions here might include: Arrest the person (my student Greg Smith) Deny ability to travel, enter secured spaces Deny job, on a background check Suspicion on a persons associates? Other uses over time?

Questions on the Data Center/System: Access and correction as key fair information practices. Currently no access by individual to data held in MATRIX. Instead, individual told to go to every data source and get access there. Problems include: Burdensome to go to numerous sources Data sources not all publicly listed. Even if correct mistake once, it often reappears

Questions on the Data Center/System: Transparency & Governance No privacy policy posted until recently No individual identified as CPO Perhaps have outside experts or advisory board? Most generally, how provide public oversight, accountability, assurance?

The Sobering List of Privacy Issues for the Federal Official Inputs: data quality Inputs: sensitive data Inputs: private-sector data Outputs: secrets when thousands or a million receive data Outputs: anti-browsing and good security at the edges Important decisions by government require due process Access and correction (when secrecy unlikely to work) Transparency and governance, to reduce mistakes and improve public acceptance

Is It Worth Answering Those Questions? If the privacy homework assignment seems too burdensome, then temptation is to minimize or ignore privacy issues But the privacy homework is good policy and good government Markle report and the need to do the privacy homework or else watch public opposition undermine the potential benefits of a system Transparent, good governance as the touchstone

III. Privacy Governance and National Security From MATRIX to the U.S. government 9/11 Commission recommended Civil Liberties Board in the executive branch –The Bush Executive Order –The Senate alternative as better governance

Bush Executive Order Aug Executive Order to create Presidents Board to Safeguard Civil Liberties It is good to address the issue. Why now? WH press office: Weve already moved on 36 of the 41 recommendations of the 9/11 Commission

Bush Executive Order Chaired by Deputy AG (enforcement officer) Vice-chair Under Sec. DHS for border (enforcement officer) No new powers to the committee to investigate or take action Is that a good structure for protecting privacy and civil liberties?

Justice Lewis Powell, in national security wiretapping case: "It is, or should be, an important working part of our machinery of government … to check the well-intentioned but mistakenly over- zealous executive officers who are a party of any system of law enforcement. So, dont have enforcement officers in charge of civil liberties protection.

Collins-Lieberman Bill A better alternative is being considered in the Senate Create a government-wide mechanism, in the Executive Office of the President Information sharing involves multiple agencies, so single-agency CPOs, acting alone, wont succeed Could be an individual; 9/11 Commission & the bill creates a Board

The Senate Bill Pre-clearance of policy proposals Regular reports to Congress and the public –If lack of action, that will be apparent Name the officers in the statute, to ensure they will testify before Congress Power to create advisory committees of experts on technology, law, etc. Subpoena/investigative powers, so that whistleblowers and others can prompt investigations

Conclusion National security and privacy intersection has been and will be an ongoing part of U.S. governance MATRIX analysis here shows real issues that should be considered in creating any system The official who questioned me was surprised and sobered by the number of significant and difficult privacy issues in MATRIX

Conclusion Despite positive efforts by Nuala Kelly and other federal officials, there has been too little government-wide policy leadership on privacy and civil liberties The Bush Executive Order creates a structure that is designed to be powerless There is still no leadership from the White House/EOP on these issues

Finally I believe it is good public policy to work through the sorts of issues shown here for MATRIX I believe it is wise political strategy to do so, to reduce the likelihood that good systems will be blocked Let us, as participants in this conference, work together on information systems, to help achieve both national security and civil liberties

Contact Information Professor Peter Swire Moritz College of Law of the Ohio State University Phone: (240) Web: