SlideShare a Scribd company logo
1 of 74
Great Decisions 2015
Privacy in the Information Age
Jordan Peacock
"The saddest aspect
of life right now is
that science gathers
knowledge faster
than society gathers
wisdom."
—Isaac Asimov
Threat Landscape
Key Points:
Our attack surface has increased tremendously.
Our capacities to defend ourselves have not kept pace.
Opting out is less and less of an option.
Risk of becoming collateral damage exceeds risk of direct targeting.
Autoimmune
in an age of
endemic disease
Big Data
Facebook indexes > 1 trillion posts
Evolution of Attackers
Internet-Wide Vulnerabilities
Negligence and bad norms
Several former Home Depot employees said they were
not surprised the company had been hacked. They said
that over the years, when they sought new software and
training, managers came back with the same response:
“We sell hammers.”
—New York Times
On February 4, Anthem revealed that it had
been the target of a massive cyberattack by
hackers who broke into its servers and stole the
personal information of as many as 80 million
current and former members and employees.
Anthem CEO Joseph Swedish said the attack
compromised names, dates of birth, member
IDs, Social Security numbers, addresses, phone
numbers, email addresses and employment
information. But he said he found no evidence
that any credit card or medical records had been
exposed.
—CNET
“The relationship with Superfish is not financially
significant; our goal was to enhance the experience for
users.”
—Lenovo
Negligence and bad norms
Social Security numbers stored by the OPM were not
encrypted due to the networks being “too old.”
—Director Katherine Archuleta admitted in testimony
If you paid $19 to delete [your Ashley Madison account,]
[...] your GPS coordinates would not be removed, nor
would your city, state, country, weight, height, date of
birth, whether you smoke and/or like a drink, your
gender, your ethnicity, what turns you on, and other bits
and pieces. And if you didn't pay the 19 bucks,
everything was eventually leaked online by the website's
hackers.
—The Register
Some Samsung smart TVs are sending users’ voice
searches and data over the internet unencrypted,
allowing hackers and snoopers to listen in on their
activity.
—The Guardian
Security Theater
Asset secured
against threat
Feeling secure The ideal
Security Theater
Security Questions:
“What is your mother’s maiden
name?”
__________________
“What city were you born in?”
__________________
The Department of Homeland Security
that revealed that agents with the
Transportation Security Administration
failed 67 out of 70 tests that were carried
out by special investigators.
First-Order Consequences
Target (40m credit/debit cards, 70m phone numbers, addresses, emails)
Sony (internal network, basically everything)
Home Depot (56m credit cards, 53m emails)
Global Payments (1.5m credit cards)
Anthem (80m names, DOB, SSN, other info)
Office of Personnel Management (25.7m names, SSN, security
clearance and background check data, etc; 1.1m fingerprints)
"I hope the Chinese aren't
collating the Ashley Madison
data with their handy federal list
of every American with a
security clearance."
—Bruce Sterling
“U.S. intelligence officials have
seen evidence that China's
Ministry of State Security has
combined medical data snatched
in January from health insurance
giant Anthem, passenger
records stripped from United
Airlines servers in May and the
OPM security clearance files.”
—Los Angeles Times
September 7, 2015
AOL User No. 4417749
AOL search terms:
numb fingers
dog that urinates on
everything
landscapers in Lilburn, Ga
60 single men
New York Times: In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and
saved [German politican Malte Spitz’s] longitude and latitude coordinates more than 35,000 times. It traced him from a
train on the way to Erlangen at the start through to that last night, when he was home in Berlin.
Evolution of Attackers
Map of hacked devices using embedded Linux
with default passwords
Computer Viruses
Antivirus companies now report that they are struggling to classify and
combat an average of 82,000 new malicious software variants
attacking computers every day.
—Brian Krebs
Technology cuts both ways
Western do-gooders may
have missed how [the
internet]… entrenches
dictators, threatens
dissidents, and makes it
harder – not easier –to
promote democracy.
—Evgeny Morozov
China
Specialized military network
warfare forces: network
cyberattacks and defense
Civilian teams which have been
given the go-ahead by the
Chinese military to carry out
"network warfare operations."
Umbrella for "external entities"
which "can be organized and
mobilized for network warfare
operations," but act outside of
government departments.
The Chinese have penetrated
every major corporation of any
consequence in the United States
and taken information... We've
never, ever not found Chinese
malware.
—Mike McConnell, Director
of National Intelligence under
President George W. Bush
Costs to Security
Falling behind the rapid development of Internet technology and
applications, our current management of the Internet is
seriously flawed and cannot function properly. [...] How to
strengthen oversight within a legal framework and guide public
opinion and how to ensure the orderly dissemination of online
information, while at the same time safeguarding national
security and social stability, have become pressing problems for
us.
- Xi Jinping, Explanatory Notes to the “Decision of the CPC
Central Committee on Some Major Issues”
Russia
The 2015 Worldwide Threat
Assessment of the U.S. Intelligence
Community singles out Russia as the
single most capable cyber actor:
"We foresee an ongoing series of
low-to-moderate level cyber attacks
from a variety of sources over time,
which will impose cumulative costs
on U.S. economic competitiveness
and national security.”
U.S.A.
Section 215 of the PATRIOT Act
Status: Expired, with the passing of the USA Freedom Act on June 2nd.
What it was supposed to do: Help the FBI cast a wider net when conducting domestic
terrorism investigations, through record searches, intelligence searches, secret searches and
‘trap & trace’ searches.
How it was misused: Bulk phone record collection on millions of Americans not under
investigation.
“The administration claims authority to sift through details of our private lives because the
Patriot Act says that it can. I disagree. I authored the Patriot Act, and this is an abuse of that
law.”
- Rep. Jim Sensenbrenner
Status: Expired May 31 2015. Partially restored until 2019 on June 2 as part of the US
Freedom Act.
Section 702 of the FISA Amendments Act
Status: Active
What it was supposed to do: Help the NSA track information that originated outside the
U.S. but incidentally flowed through U.S. communications systems.
How it was misused: By ‘incidental’ the NSA understood this to mean any amount of
information on any channel it could access.
In principle, the NSA is accountable to and must receive approval from the FISA Court.
In practice, this is a rubber stamp: out of 34,000+ warrant requests, only 11 have ever been
rejected.
Executive Order 12333
Status: 1981 Executive Order under Reagan, Currently Active
What it was supposed to do: Gives the NSA broad authorities to conduct surveillance
outside the United States and collect data on Americans.
How it was misused: No protections for U.S. citizens whose information is held outside of
the United States.
At least in 2007, the president believed he could modify or ignore [Executive Order 12333] at
will and in secret. As a result, we know very little about how Executive Order 12333 is being
interpreted inside the NSA.
- Bruce Schneier
Pop Quiz
What do emails, buddy lists, drive back ups, social networking posts,
web browsing history, your medical data, your bank records, your face
print, your voice print, your driving patterns and your DNA have in
common?
Pop Quiz
What do emails, buddy lists, drive back ups, social networking posts,
web browsing history, your medical data, your bank records, your face
print, your voice print, your driving patterns and your DNA have in
common?
The U.S. Department of Justice (DOJ) doesn’t think any of these things
are private. Because the data is technically accessible to service
providers or visible in public, it should be freely accessible to
investigators and spies.
“Collect”
Under Department of Defense regulations, information is considered to
be “collected” only after it has been “received for use by an employee of
a DoD intelligence component,” and “data acquired by electronic
means is ‘collected’ only when it has been processed into intelligible
form.”
In other words, the NSA can intercept and store communications in its
database, then have an algorithm search them for key words and
analyze the metadata without ever considering the communications
“collected.”
—Electronic Frontier Foundation
Loss of Credibility, Influence
October 2013, Wired:
All of the major internet organisations have pledged,
at a summit in Uruguay, to free themselves of
the influence of the US government.
The directors of ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the
World Wide Web Consortium, the Internet Society and all five of the regional Internet address
registries have vowed to break their associations with the US government.
In a statement, the group called for "accelerating the globalization of ICANN and IANA functions,
towards an environment in which all stakeholders, including all governments, participate on an
equal footing".
That's a distinct change from the current situation, where the US department of commerce has
oversight of ICANN.
Costs to U.S. Businesses
Studies by the Information Technology and Innovation Foundation and Forrester
Research estimate NSA surveillance will cost the U.S. tech industry between $22
billion and $180 billion over the new three years, a loss of up to 25% of total
industry revenue.
Costs to U.S. Businesses
The government response was, ‘Oh
don’t worry, we’re not spying on any
Americans.’
Oh, wonderful: that’s really helpful to
companies trying to serve people
around the world, and that’s really
going to inspire confidence in
American internet companies.”
-Mark Zuckerberg, CEO of
Facebook
Yahoo and PRISM
The U.S. government threatened to fine
Yahoo $250,000 each day the Internet
giant did not share data about its users
– a fine that would have doubled for
each week of noncompliance,
according to newly unsealed court
documents.
"In 2007 Yahoo filed a lawsuit
against the new Patriot Act, parts
of PRISM and FISA, we were the
key plaintiff. A lot of people have
wondered about that case and
who it was. It was us ... we lost.
The thing is, we lost and if you
don't comply it's treason."
—Marissa Mayer
Apple and the FBI
Apple said iMessage and
FaceTime conversations were
protected by end-to-end
encryption so no-one but the
sender and receiver could see
or read them.
"Apple cannot decrypt that
data. Similarly, we do not store
data related to customers'
location, Map searches or Siri
requests in any identifiable
form."
Schneier’s proposal
Break NSA up into three parts:
- Domestic work moves under
the aegis (and oversight) of
the FBI
- Cyberwarfare moves under
US CYBERCOM
- NSA retains foreign
surveillance
Positive Achievements
- US Code of Fair Information Practices 1973
- US Consumer Privacy Bill of Rights 2012
- OECD Privacy Framework 1980
Cyber Threat
Sharing Act
Protecting Cyber
Networks Act
Cybersecurity
Information Sharing Act
National Cybersecurity
Advancement Act
Companies may give data directly to FBI X X
Legal protections for companies that violate
your rights
X X
Broad exemptions for state & federal
government
X X
Permission to share information across
agencies unrelated to cybersecurity
X
“Cybersecurity” purposes defined to include
minor drug offenses and crimes for purpose of
information sharing
X
Opaque sharing with international partners X X X
Restricts civilian control of domestic
cybersecurity
X
Status Vote deferred Passed in House Referred to the
Committee on
Homeland Security
and Governmental
Affairs.
Passed in House
Implications for international law
Government documents clarify that the basis for permitting an investigation isn’t
terrorism, but the person’s status as a non-US person:
“For traditional FISAs you must have probable cause that the target is a ‘foreign
power’ or agent of a ‘foreign power.’ For section 702, however, there must a
reasonable belief that the target is a NON-USPER located outside the United
States”. US law doesn’t grant the same rights to non-US persons, at least for
those overseas. This is in contrast to, for example, the European Court of Human
Rights, which recognizes the right of liberty and security for each person
regardless of citizenship.
—Susan Landau
Implications for international law
- Article 12 of the Universal Declaration of Human Rights states that " No one shall be subjected to
arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his
honour and reputation. Everyone has the right to the protection of the law against such interference
or attacks."
- The 2012 draft European Data Protection Regulation Article 17 details the "right to be forgotten and
to erasure".
Under Article 17 individuals to whom the data appertains are granted the right to "obtain from the
controller the erasure of personal data relating to them and the abstention from further
dissemination of such data, especially in relation to personal data which are made available by the
data subject while he or she was a child or where the data is no longer necessary for the purpose it
was collected for, the subject withdraws consent, the storage period has expired, the data subject
objects to the processing of personal data or the processing of data does not comply with other
regulation".
Implications for international law
Government documents clarify that the basis for permitting an investigation isn’t
terrorism, but the person’s status as a non-US person:
“For traditional FISAs you must have probable cause that the target is a ‘foreign
power’ or agent of a ‘foreign power.’ For section 702, however, there must a
reasonable belief that the target is a NON-USPER located outside the United
States”. US law doesn’t grant the same rights to non-US persons, at least for
those overseas. This is in contrast to, for example, the European Court of Human
Rights, which recognizes the right of liberty and security for each person
regardless of citizenship.
—Susan Landau
Resources for international agreement
For the U.S.:
Consumer Data Privacy in a Networked World
For businesses:
OECD Privacy Principles
For the international community:
13 International Principles on the Application of Human Rights to
Communication Surveillance
Next Steps
Low-Hanging Fruit
- Enforce existing laws
- Incentivize proactive defense and disclosure after breaches
- International coordination on reciprocal protection for citizens
Questions to pose to institutions and organizations:
- Why are you retaining this information?
- Is the present value worth the future risk?
- What is the risk of not keeping it?
- Could an unfriendly government steal or force you to surrender
it?
At the end of the day, the law
doesn't defend us; we defend the
law. And when it becomes
contrary to our morals, we have
both the right and the
responsibility to rebalance it
toward just ends.
— Edward Snowden
Privacy as Agency
Positioning privacy and public-ness
in opposition is a false dichotomy.
People want privacy and they want
to be able to participate in public.
Protecting privacy is about making
certain that people have the agency
they need to make informed
decisions about how they engage in
public.
—danah boyd
Implications for users/customers
Questions for companies and organizations:
Why are you retaining this information?
Is the present value worth the future risk?
What is the risk of not keeping it?
Could an unfriendly (domestic or foreign) government force you to give
it, or steal it?
things a consumer can do
to protect themselves?’
I hate to be a gloomy Gus,
but the message I give
journalists and others is
there’s basically nothing
you can do.
It’s like saying, what can
you do about climate
change by yourself … when
the problem is structural
architecture and the flow
around your data.”
—Lee Tien
Electronic Frontier
Foundation
Individual Defense Strategies
A Layered Defense
Examples:
- Firewall
- Antivirus
- Passphrase
- Two-Factor Authentication
Surveillance & Sousveillance
Surveillance is when the masters watch over the masses.
Sousveillance is where everybody has the capability to
watch over each other, peer-to-peer style – and not even
the rulers are exempt from the universal collective eye.
It’s generally meant to imply that citizens have and exercise
the power to look-back at the powers-that-be, or to “watch
the watchmen.”
—David Brin and Ben Goertzel
Evaluating Strategies for Information Security
Mossad
Magic
???
Not-Mossad
https
Strong password
Applied security
patches
Threat:
Best Practices
- HTTPS
- Passphrases
- Two-Factor Authentication
- Antivirus
- Device encryption
- Install security updates
Antivirus
Password Managers
Identity Theft/Fraud Resources
identitytheft.gov
ftc.gov/idtheft
Additional resources
For further questions or a copy of
this presentation, email:
Jordan Peacock
CEO, Becoming Machinic
jordan@becomingmachinic.com

More Related Content

What's hot

Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationBrunswick Group
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
As japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideAs japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideUltraUploader
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 

What's hot (19)

Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
As japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideAs japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a ride
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Prism
PrismPrism
Prism
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 

Viewers also liked

Hanging Separately: Why China and Africa are unable to meet as equals
Hanging Separately: Why China and Africa are unable to meet as equalsHanging Separately: Why China and Africa are unable to meet as equals
Hanging Separately: Why China and Africa are unable to meet as equalsJordan Peacock
 
INICIO DEL PARACAIDISMO
INICIO DEL PARACAIDISMOINICIO DEL PARACAIDISMO
INICIO DEL PARACAIDISMOdavinshii
 
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its Report
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its ReportBulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its Report
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its ReportScitax Advisory Partners LP
 
#ACPA14 Pecha Kucha
#ACPA14 Pecha Kucha#ACPA14 Pecha Kucha
#ACPA14 Pecha KuchaNiki Rudolph
 
Los 12 timos de navidad en internet
Los 12 timos de navidad en internetLos 12 timos de navidad en internet
Los 12 timos de navidad en internetkentaui mohamed
 
An Overview of Deuteronomy
An Overview of DeuteronomyAn Overview of Deuteronomy
An Overview of DeuteronomyDavid Witthoff
 
At the foot of the cross
At the foot of the crossAt the foot of the cross
At the foot of the crossLondon Church
 
Sustainable Recycling NCC
Sustainable Recycling NCCSustainable Recycling NCC
Sustainable Recycling NCCKyle Frith
 
Introduction to nanobiotechnology
Introduction to nanobiotechnologyIntroduction to nanobiotechnology
Introduction to nanobiotechnologyQweku Black
 
Psychoanalytic social theory
Psychoanalytic social theoryPsychoanalytic social theory
Psychoanalytic social theoryVi-Ann Javil
 
Automatic high speed bottle washing machine project mechanical engineering ...
Automatic high speed bottle washing machine project   mechanical engineering ...Automatic high speed bottle washing machine project   mechanical engineering ...
Automatic high speed bottle washing machine project mechanical engineering ...vasanth ravi
 
Deportes extremos " paracaidismo"
Deportes extremos " paracaidismo"Deportes extremos " paracaidismo"
Deportes extremos " paracaidismo"YENNYGIL
 

Viewers also liked (14)

Hanging Separately: Why China and Africa are unable to meet as equals
Hanging Separately: Why China and Africa are unable to meet as equalsHanging Separately: Why China and Africa are unable to meet as equals
Hanging Separately: Why China and Africa are unable to meet as equals
 
INICIO DEL PARACAIDISMO
INICIO DEL PARACAIDISMOINICIO DEL PARACAIDISMO
INICIO DEL PARACAIDISMO
 
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its Report
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its ReportBulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its Report
Bulletin #48 - Canadian Government’s "R&D Review Expert Panel" Makes Its Report
 
#ACPA14 Pecha Kucha
#ACPA14 Pecha Kucha#ACPA14 Pecha Kucha
#ACPA14 Pecha Kucha
 
Los 12 timos de navidad en internet
Los 12 timos de navidad en internetLos 12 timos de navidad en internet
Los 12 timos de navidad en internet
 
Syntek brochure
Syntek brochureSyntek brochure
Syntek brochure
 
An Overview of Deuteronomy
An Overview of DeuteronomyAn Overview of Deuteronomy
An Overview of Deuteronomy
 
At the foot of the cross
At the foot of the crossAt the foot of the cross
At the foot of the cross
 
Sustainable Recycling NCC
Sustainable Recycling NCCSustainable Recycling NCC
Sustainable Recycling NCC
 
4 lekcia
4 lekcia4 lekcia
4 lekcia
 
Introduction to nanobiotechnology
Introduction to nanobiotechnologyIntroduction to nanobiotechnology
Introduction to nanobiotechnology
 
Psychoanalytic social theory
Psychoanalytic social theoryPsychoanalytic social theory
Psychoanalytic social theory
 
Automatic high speed bottle washing machine project mechanical engineering ...
Automatic high speed bottle washing machine project   mechanical engineering ...Automatic high speed bottle washing machine project   mechanical engineering ...
Automatic high speed bottle washing machine project mechanical engineering ...
 
Deportes extremos " paracaidismo"
Deportes extremos " paracaidismo"Deportes extremos " paracaidismo"
Deportes extremos " paracaidismo"
 

Similar to Privacy in the Information Age [Q3 2015 version]

The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 

Similar to Privacy in the Information Age [Q3 2015 version] (13)

The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 

Recently uploaded

VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfauroraaudrey4826
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 

Recently uploaded (16)

VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdf
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 

Privacy in the Information Age [Q3 2015 version]

  • 1. Great Decisions 2015 Privacy in the Information Age Jordan Peacock
  • 2. "The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom." —Isaac Asimov
  • 3. Threat Landscape Key Points: Our attack surface has increased tremendously. Our capacities to defend ourselves have not kept pace. Opting out is less and less of an option. Risk of becoming collateral damage exceeds risk of direct targeting.
  • 4. Autoimmune in an age of endemic disease
  • 5. Big Data Facebook indexes > 1 trillion posts
  • 7.
  • 9. Negligence and bad norms Several former Home Depot employees said they were not surprised the company had been hacked. They said that over the years, when they sought new software and training, managers came back with the same response: “We sell hammers.” —New York Times On February 4, Anthem revealed that it had been the target of a massive cyberattack by hackers who broke into its servers and stole the personal information of as many as 80 million current and former members and employees. Anthem CEO Joseph Swedish said the attack compromised names, dates of birth, member IDs, Social Security numbers, addresses, phone numbers, email addresses and employment information. But he said he found no evidence that any credit card or medical records had been exposed. —CNET “The relationship with Superfish is not financially significant; our goal was to enhance the experience for users.” —Lenovo
  • 10. Negligence and bad norms Social Security numbers stored by the OPM were not encrypted due to the networks being “too old.” —Director Katherine Archuleta admitted in testimony If you paid $19 to delete [your Ashley Madison account,] [...] your GPS coordinates would not be removed, nor would your city, state, country, weight, height, date of birth, whether you smoke and/or like a drink, your gender, your ethnicity, what turns you on, and other bits and pieces. And if you didn't pay the 19 bucks, everything was eventually leaked online by the website's hackers. —The Register Some Samsung smart TVs are sending users’ voice searches and data over the internet unencrypted, allowing hackers and snoopers to listen in on their activity. —The Guardian
  • 11. Security Theater Asset secured against threat Feeling secure The ideal
  • 12. Security Theater Security Questions: “What is your mother’s maiden name?” __________________ “What city were you born in?” __________________ The Department of Homeland Security that revealed that agents with the Transportation Security Administration failed 67 out of 70 tests that were carried out by special investigators.
  • 13. First-Order Consequences Target (40m credit/debit cards, 70m phone numbers, addresses, emails) Sony (internal network, basically everything) Home Depot (56m credit cards, 53m emails) Global Payments (1.5m credit cards) Anthem (80m names, DOB, SSN, other info) Office of Personnel Management (25.7m names, SSN, security clearance and background check data, etc; 1.1m fingerprints)
  • 14. "I hope the Chinese aren't collating the Ashley Madison data with their handy federal list of every American with a security clearance." —Bruce Sterling
  • 15. “U.S. intelligence officials have seen evidence that China's Ministry of State Security has combined medical data snatched in January from health insurance giant Anthem, passenger records stripped from United Airlines servers in May and the OPM security clearance files.” —Los Angeles Times September 7, 2015
  • 16.
  • 17.
  • 18. AOL User No. 4417749 AOL search terms: numb fingers dog that urinates on everything landscapers in Lilburn, Ga 60 single men
  • 19.
  • 20. New York Times: In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved [German politican Malte Spitz’s] longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.
  • 22.
  • 23.
  • 24. Map of hacked devices using embedded Linux with default passwords
  • 25.
  • 26.
  • 27.
  • 28. Computer Viruses Antivirus companies now report that they are struggling to classify and combat an average of 82,000 new malicious software variants attacking computers every day. —Brian Krebs
  • 29.
  • 30.
  • 31. Technology cuts both ways Western do-gooders may have missed how [the internet]… entrenches dictators, threatens dissidents, and makes it harder – not easier –to promote democracy. —Evgeny Morozov
  • 32. China Specialized military network warfare forces: network cyberattacks and defense Civilian teams which have been given the go-ahead by the Chinese military to carry out "network warfare operations." Umbrella for "external entities" which "can be organized and mobilized for network warfare operations," but act outside of government departments.
  • 33. The Chinese have penetrated every major corporation of any consequence in the United States and taken information... We've never, ever not found Chinese malware. —Mike McConnell, Director of National Intelligence under President George W. Bush
  • 34. Costs to Security Falling behind the rapid development of Internet technology and applications, our current management of the Internet is seriously flawed and cannot function properly. [...] How to strengthen oversight within a legal framework and guide public opinion and how to ensure the orderly dissemination of online information, while at the same time safeguarding national security and social stability, have become pressing problems for us. - Xi Jinping, Explanatory Notes to the “Decision of the CPC Central Committee on Some Major Issues”
  • 35. Russia The 2015 Worldwide Threat Assessment of the U.S. Intelligence Community singles out Russia as the single most capable cyber actor: "We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on U.S. economic competitiveness and national security.”
  • 37.
  • 38. Section 215 of the PATRIOT Act Status: Expired, with the passing of the USA Freedom Act on June 2nd. What it was supposed to do: Help the FBI cast a wider net when conducting domestic terrorism investigations, through record searches, intelligence searches, secret searches and ‘trap & trace’ searches. How it was misused: Bulk phone record collection on millions of Americans not under investigation. “The administration claims authority to sift through details of our private lives because the Patriot Act says that it can. I disagree. I authored the Patriot Act, and this is an abuse of that law.” - Rep. Jim Sensenbrenner Status: Expired May 31 2015. Partially restored until 2019 on June 2 as part of the US Freedom Act.
  • 39. Section 702 of the FISA Amendments Act Status: Active What it was supposed to do: Help the NSA track information that originated outside the U.S. but incidentally flowed through U.S. communications systems. How it was misused: By ‘incidental’ the NSA understood this to mean any amount of information on any channel it could access. In principle, the NSA is accountable to and must receive approval from the FISA Court. In practice, this is a rubber stamp: out of 34,000+ warrant requests, only 11 have ever been rejected.
  • 40. Executive Order 12333 Status: 1981 Executive Order under Reagan, Currently Active What it was supposed to do: Gives the NSA broad authorities to conduct surveillance outside the United States and collect data on Americans. How it was misused: No protections for U.S. citizens whose information is held outside of the United States. At least in 2007, the president believed he could modify or ignore [Executive Order 12333] at will and in secret. As a result, we know very little about how Executive Order 12333 is being interpreted inside the NSA. - Bruce Schneier
  • 41. Pop Quiz What do emails, buddy lists, drive back ups, social networking posts, web browsing history, your medical data, your bank records, your face print, your voice print, your driving patterns and your DNA have in common?
  • 42. Pop Quiz What do emails, buddy lists, drive back ups, social networking posts, web browsing history, your medical data, your bank records, your face print, your voice print, your driving patterns and your DNA have in common? The U.S. Department of Justice (DOJ) doesn’t think any of these things are private. Because the data is technically accessible to service providers or visible in public, it should be freely accessible to investigators and spies.
  • 43. “Collect” Under Department of Defense regulations, information is considered to be “collected” only after it has been “received for use by an employee of a DoD intelligence component,” and “data acquired by electronic means is ‘collected’ only when it has been processed into intelligible form.” In other words, the NSA can intercept and store communications in its database, then have an algorithm search them for key words and analyze the metadata without ever considering the communications “collected.” —Electronic Frontier Foundation
  • 44. Loss of Credibility, Influence October 2013, Wired: All of the major internet organisations have pledged, at a summit in Uruguay, to free themselves of the influence of the US government. The directors of ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society and all five of the regional Internet address registries have vowed to break their associations with the US government. In a statement, the group called for "accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing". That's a distinct change from the current situation, where the US department of commerce has oversight of ICANN.
  • 45. Costs to U.S. Businesses Studies by the Information Technology and Innovation Foundation and Forrester Research estimate NSA surveillance will cost the U.S. tech industry between $22 billion and $180 billion over the new three years, a loss of up to 25% of total industry revenue.
  • 46. Costs to U.S. Businesses The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies trying to serve people around the world, and that’s really going to inspire confidence in American internet companies.” -Mark Zuckerberg, CEO of Facebook
  • 47. Yahoo and PRISM The U.S. government threatened to fine Yahoo $250,000 each day the Internet giant did not share data about its users – a fine that would have doubled for each week of noncompliance, according to newly unsealed court documents. "In 2007 Yahoo filed a lawsuit against the new Patriot Act, parts of PRISM and FISA, we were the key plaintiff. A lot of people have wondered about that case and who it was. It was us ... we lost. The thing is, we lost and if you don't comply it's treason." —Marissa Mayer
  • 48. Apple and the FBI Apple said iMessage and FaceTime conversations were protected by end-to-end encryption so no-one but the sender and receiver could see or read them. "Apple cannot decrypt that data. Similarly, we do not store data related to customers' location, Map searches or Siri requests in any identifiable form."
  • 49.
  • 50.
  • 51. Schneier’s proposal Break NSA up into three parts: - Domestic work moves under the aegis (and oversight) of the FBI - Cyberwarfare moves under US CYBERCOM - NSA retains foreign surveillance
  • 52.
  • 53.
  • 54. Positive Achievements - US Code of Fair Information Practices 1973 - US Consumer Privacy Bill of Rights 2012 - OECD Privacy Framework 1980
  • 55. Cyber Threat Sharing Act Protecting Cyber Networks Act Cybersecurity Information Sharing Act National Cybersecurity Advancement Act Companies may give data directly to FBI X X Legal protections for companies that violate your rights X X Broad exemptions for state & federal government X X Permission to share information across agencies unrelated to cybersecurity X “Cybersecurity” purposes defined to include minor drug offenses and crimes for purpose of information sharing X Opaque sharing with international partners X X X Restricts civilian control of domestic cybersecurity X Status Vote deferred Passed in House Referred to the Committee on Homeland Security and Governmental Affairs. Passed in House
  • 56. Implications for international law Government documents clarify that the basis for permitting an investigation isn’t terrorism, but the person’s status as a non-US person: “For traditional FISAs you must have probable cause that the target is a ‘foreign power’ or agent of a ‘foreign power.’ For section 702, however, there must a reasonable belief that the target is a NON-USPER located outside the United States”. US law doesn’t grant the same rights to non-US persons, at least for those overseas. This is in contrast to, for example, the European Court of Human Rights, which recognizes the right of liberty and security for each person regardless of citizenship. —Susan Landau
  • 57. Implications for international law - Article 12 of the Universal Declaration of Human Rights states that " No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks." - The 2012 draft European Data Protection Regulation Article 17 details the "right to be forgotten and to erasure". Under Article 17 individuals to whom the data appertains are granted the right to "obtain from the controller the erasure of personal data relating to them and the abstention from further dissemination of such data, especially in relation to personal data which are made available by the data subject while he or she was a child or where the data is no longer necessary for the purpose it was collected for, the subject withdraws consent, the storage period has expired, the data subject objects to the processing of personal data or the processing of data does not comply with other regulation".
  • 58. Implications for international law Government documents clarify that the basis for permitting an investigation isn’t terrorism, but the person’s status as a non-US person: “For traditional FISAs you must have probable cause that the target is a ‘foreign power’ or agent of a ‘foreign power.’ For section 702, however, there must a reasonable belief that the target is a NON-USPER located outside the United States”. US law doesn’t grant the same rights to non-US persons, at least for those overseas. This is in contrast to, for example, the European Court of Human Rights, which recognizes the right of liberty and security for each person regardless of citizenship. —Susan Landau
  • 59. Resources for international agreement For the U.S.: Consumer Data Privacy in a Networked World For businesses: OECD Privacy Principles For the international community: 13 International Principles on the Application of Human Rights to Communication Surveillance
  • 60. Next Steps Low-Hanging Fruit - Enforce existing laws - Incentivize proactive defense and disclosure after breaches - International coordination on reciprocal protection for citizens Questions to pose to institutions and organizations: - Why are you retaining this information? - Is the present value worth the future risk? - What is the risk of not keeping it? - Could an unfriendly government steal or force you to surrender it?
  • 61. At the end of the day, the law doesn't defend us; we defend the law. And when it becomes contrary to our morals, we have both the right and the responsibility to rebalance it toward just ends. — Edward Snowden
  • 62. Privacy as Agency Positioning privacy and public-ness in opposition is a false dichotomy. People want privacy and they want to be able to participate in public. Protecting privacy is about making certain that people have the agency they need to make informed decisions about how they engage in public. —danah boyd
  • 63. Implications for users/customers Questions for companies and organizations: Why are you retaining this information? Is the present value worth the future risk? What is the risk of not keeping it? Could an unfriendly (domestic or foreign) government force you to give it, or steal it?
  • 64. things a consumer can do to protect themselves?’ I hate to be a gloomy Gus, but the message I give journalists and others is there’s basically nothing you can do. It’s like saying, what can you do about climate change by yourself … when the problem is structural architecture and the flow around your data.” —Lee Tien Electronic Frontier Foundation
  • 65. Individual Defense Strategies A Layered Defense Examples: - Firewall - Antivirus - Passphrase - Two-Factor Authentication
  • 66. Surveillance & Sousveillance Surveillance is when the masters watch over the masses. Sousveillance is where everybody has the capability to watch over each other, peer-to-peer style – and not even the rulers are exempt from the universal collective eye. It’s generally meant to imply that citizens have and exercise the power to look-back at the powers-that-be, or to “watch the watchmen.” —David Brin and Ben Goertzel
  • 67. Evaluating Strategies for Information Security Mossad Magic ??? Not-Mossad https Strong password Applied security patches Threat:
  • 68. Best Practices - HTTPS - Passphrases - Two-Factor Authentication - Antivirus - Device encryption - Install security updates
  • 69.
  • 70.
  • 74. Additional resources For further questions or a copy of this presentation, email: Jordan Peacock CEO, Becoming Machinic jordan@becomingmachinic.com

Editor's Notes

  1. <Introduce myself> What is privacy? <solicit answer from audience A huge amount of the noise in the debate around privacy in the information age has to do with confused definitions about what privacy, in fact, is. Fundamentally, privacy centers on information exposure. The challenge for policymakers is that each person will make different decisions regarding what information they choose to expose, to whom, and on what basis. To draw the lines anywhere at all will inevitably cause some of their constituents to recoil in shock, and others to yawn. It is not without reason that we say information technology. Computer networks have not so much helped us discover new things about the world, but have rather allowed us to better transmit, aggregate, peruse and grasp what was already there. This doesn’t mean that there has been no innovation, but that the innovations have centered around quantitative changes that have in turned produced qualitative changes.
  2. In this sense, then, the rise of big data has resulted in a world of repeated intensive changes to what is generally available, and moreover, the persistence of this data exposes us to a future in which more can be gleaned from data that seemed innocuous when it was collected, but which turned out to be anything but. One example is CCTV which, as invasive as it seemed, wasn’t in principle different from having a government officer watching public place with an exceptional memory. Now, with the rise of facial recognition technology, it is within the realm of possibilities that this data will be mined to uncover the people with whom a future person of interest has interacted over the years.
  3. http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  4. Cory Doctorow comments specifically on the IRS hack at Boing Boing: Like many services, the IRS had a lost password recovery system that relied on answers to standard questions, which the identity thieves were easily able to extract from public sources like credit-reporting bureaux. But the IRS's vulnerability to this kind of breach is much, much worse than any of those other services, for two reasons. First, the IRS's files contain more compromising personal information than virtually any other entity. Second, because the IRS won't let you protect yourself from this sort of attack by using false answers to those questions: it's a criminal offense to lie to the IRS about your sensitive information, and its security questions rely on the answers in your tax-return, as opposed to answers you've supplied for the purposes of authentication. When I'm prompted with "secret questions," like "What is your father's middle name," I use apg to generate a random string like "#TTU3@\COy,waA@F!X2dE+(1cI+BqrLbOi8,)w]fuqHJFC(E6Z062FAoB^qy^`w" and use that as the answer. The IRS system denies this self-help measure to people with the nous to use it. http://boingboing.net/2015/05/27/irs-leaks-100k-taxpayers-dat.html
  5. Family members of people who live in China and like Falun Gong. You can imagine how much worse the McCarthy era or some of the Jewish pogroms would have been with this information at one’s fingertips. Developing a robust time-series of trillions of such data points is revolutionizing our knowledge of ourselves, and our world.
  6. Malte Spitz, a German politician, sued Deutsche Telekom to uncover the information in this graph, a history of his movement throughout Munich over a six-month period based on the GPS signals retained by the phone company.
  7. Operation Antisec: summer of hacks, Sabu, etc.
  8. Source: McReynolds, ZDNet http://www.zdnet.com/article/china-reveals-existence-of-cyber-warfare-hacking-teams/
  9. Russia certainly has been more active than any other country in terms of combining cyber-attacks, or cyber-operations, with physical operations. The Russia-Georgia war of 2008 was a perfect example of a combined kinetic and cyber operation. Jeffrey Carr
  10. Russia certainly has been more active than any other country in terms of combining cyber-attacks, or cyber-operations, with physical operations. The Russia-Georgia war of 2008 was a perfect example of a combined kinetic and cyber operation. Jeffrey Carr
  11. Jennifer Granick
  12. Some have recoiled. When mobile phones with cameras first came out in Japan, there was a rush of incidents involving peeping Toms attempting to capture compromising photos of women. That’s an ongoing issue; just in 2009, Rep. Peter King proposed a law to make phones produce an audible sound when taking a photograph in his Camera Phone Predator Alert Act (which failed to pass). This is a case of trying to shut the fence after the horse has bolted; or, as this picture references, an illusory power such as King Cnut’s when ordering the tide not to come in. This does not mean nothing can be done, either personally or collectively via legislation. But a simple perusal of laws from a mere ten, twenty or thirty years ago shows how poorly they have aged. <Exhibit A: ???> <Exhibit B: ???> <Exhibit C: ???> If we’re going to make meaningful collective decisions about privacy, we should avoid the politician’s syllogism (“something must be done. this is something. we must do this”), and instead ask ourselves what precisely we’re trying to accomplish.
  13. With that, I’d like to play a game of Taboo. After this slide, I will try to avoid using the word privacy except when quoting someone else. Instead, I will have to say precisely what I mean by privacy; as we’ll find, it varies by context. But perhaps the most robust definition of privacy is the statement “privacy is an expression of agency.” After all, there is very little about ourselves that we’re unwilling to reveal to anyone, under any circumstances. But what we reveal to our spouse, our employer, our neighbors, our government, or the companies whose services we utilize have almost nothing in common… except for the fact that we generally chose what to reveal, and to what degree, in each case. And, to the extent that it was *not* our choice, it felt like a violation of our autonomy. <read quote> Conceiving privacy as an expression of agency creates a commonality between issues as simple as who gets to view your medical records or as complex as how the things you ‘Like’ on Facebook get used.
  14. James Mickens: Basically, you're either dealing with Mossad or not-Mossad. If your adversary is not-Mossad, then you'll probably be fine if you pick a good password and don't respond to emails from ChEaPestPAiNPi11s@virus-basket.biz.ru. If your adversary is the Mossad, YOU'RE GONNA DIE AND THERE'S NOTHING THAT YOU CAN DO ABOUT IT. The Mossad is not intimidated by the fact that you employ https://.
  15. Some have recoiled. When mobile phones with cameras first came out in Japan, there was a rush of incidents involving peeping Toms attempting to capture compromising photos of women. That’s an ongoing issue; just in 2009, Rep. Peter King proposed a law to make phones produce an audible sound when taking a photograph in his Camera Phone Predator Alert Act (which failed to pass). This is a case of trying to shut the fence after the horse has bolted; or, as this picture references, an illusory power such as King Cnut’s when ordering the tide not to come in. This does not mean nothing can be done, either personally or collectively via legislation. But a simple perusal of laws from a mere ten, twenty or thirty years ago shows how poorly they have aged. <Exhibit A: ???> <Exhibit B: ???> <Exhibit C: ???> If we’re going to make meaningful collective decisions about privacy, we should avoid the politician’s syllogism (“something must be done. this is something. we must do this”), and instead ask ourselves what precisely we’re trying to accomplish.
  16. Some have recoiled. When mobile phones with cameras first came out in Japan, there was a rush of incidents involving peeping Toms attempting to capture compromising photos of women. That’s an ongoing issue; just in 2009, Rep. Peter King proposed a law to make phones produce an audible sound when taking a photograph in his Camera Phone Predator Alert Act (which failed to pass). This is a case of trying to shut the fence after the horse has bolted; or, as this picture references, an illusory power such as King Cnut’s when ordering the tide not to come in. This does not mean nothing can be done, either personally or collectively via legislation. But a simple perusal of laws from a mere ten, twenty or thirty years ago shows how poorly they have aged. <Exhibit A: ???> <Exhibit B: ???> <Exhibit C: ???> If we’re going to make meaningful collective decisions about privacy, we should avoid the politician’s syllogism (“something must be done. this is something. we must do this”), and instead ask ourselves what precisely we’re trying to accomplish.