Privacy V Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 26

Privacy, Encryption and

National Security

Privacy vs. Security

Those who would give up essential Liberty,


to purchase a little temporary Safety,
deserve neither Liberty nor Safety.
Benjamin Franklin, 1755

A Common View

Historical Context
World War II
Enigma and code breaking
Battle of Midway

Cold War
Spy vs. Spy
National Security Concerns
New technology, new courts.

Computers

9-11 + Rise of the Digital Age


Terrorist know to have used email, chat
rooms, and electronic money transfers
Email allows for anonymous,
asynchronous communications.
Simple encryption technology readily
available

Governments Respond
USA PATRIOT ACT and similar legislation
around the world
Great Firewall of China
Growing understanding of cybercrime

But civil liberties issues remain

Balancing Act

Renewals of Patriot Act


Bulk phone data collection
Periodic policy debates due to renewal
clauses in key surveillance laws
Security issues and the War on Terror
still dominate
Cooperation of
technology/communications companies

Game Changer

Snowden Backlash
Rise of civil libertarians
Greater resistance by tech companies
Challenges to subpoenas
Encryption
Market pressures from foreign customers

End of bulk collection in the US

Growing Cybercrime
Consumer data continues to be a target

Blue Cross/Blue Shield 10M


T-Mobile15 Million records
Vtech--- a toy maker 4.8M
Ashley Madison 37M

Government Data stores


OPM 22M
FBI
IRS $50M in fraudulent claims

Common Problems
Weak passwords
Lack of encryption of data at rest/in motion
UCLA Medical exposed 4.5 M health records
OPM/Ashley Madison data stored
unencrypted
Anthem 80M customers plus 19M rejected
applicants.

Consumers view

2013

Terrorism & Privacy

Terrorism & Privacy


Paris and San Bernardino
Not a new debate
Issues
Monitoring
Social Media exploitation by law enforcement
Encryption of communications vs. backdoors

Monitoring
Governments have access to large
amounts of information
Video monitoring
Communications monitoring

State sovereignty?

Social Media

Social Media Exploitation


ISIS and other terrorist groups have long
used social media for recruiting,
fundraising, and messaging
For intelligence and law enforcement it is
a source of information and targeting.
Some states actively monitor and control
US Government meet with Twitter,
Facebook, Google, etc.

Social Media and Big Data


From the Washington Post 1/11/16

The program scoured billions of data


points, including arrest reports, property
records, commercial databases, deep Web
searches and the mans social- media
postings. It calculated his threat level as
the highest of three color-coded scores: a
bright red warning.

Encryption and Backdoors

What is encryption
Basically encryption uses a mathematical
algorithm to change the data into a coded
format.
The algorithm uses a key to encode and
then decode the data or message
If you dont have the correct key, decoding
the message requires significant time

Encryption and backdoors

Encryption allows secure communications


What is a backdoor?
Why have one?
What are the risks?
China
Demanded backdoors in software for financial
and other software sold to Chinese
companies

Post Paris, calls in US, UK, etc.

Risks of backdoors
Consumer and customer confidence
Civil Liberties

Biggest risk
Backdoors can be found or inserted
Juniper Networks
RSA

Summary
Tension has long existed between privacy
concerns and national security concerns.
Digital technology opens new areas for
exploitation and debate
There are no easy answers

Questions?

You might also like