Title: Balancing Security and Privacy in Times of Cyberterror
1Balancing Security and Privacyin Times of
Cyberterror
- EDUCAUSE Mid-Atlantic Regional Conference
- January 18, 2007
- Steve Worona
- EDUCAUSE
- sworona_at_educause.edu
2The Internet ObeysOnly One Law
3The Internet ObeysOnly One Law
- The Law of
- Unintended Consequences
4or
5Be careful what you ask for
6you might just get it
7Example 1 A Story from the Dawn of (Internet)
Time
- It all started in 1995 with a simple question
- Whats the best resource for filtering out adult
material for K-12 students? - Net Nanny
- Cybersitter
- Surfwatch
- Cyber Patrol
- Etc.
8Example 2A Poll on Campaign Finance
9Example 2A Poll on Campaign Finance
- Proposition 1Who are our political candidates
taking money from? This should be public
information.(Agree/Disagree?)
10Example 2A Poll on Campaign Finance
- Proposition 1Who are our political candidates
taking money from? This should be public
information.(Agree/Disagree?) - Proposition 2What political candidates are you
giving money to? This should be public
information.(Agree/Disagree?)
11www.fec.gov
12Example 3Do you want Privacyor Privacy?
13Example 3Do you want Privacyor Privacy?
- Sorry, you cant have both.
14You cant have Privacywithout Security
15You cant have Privacywithout Security
- Privacy Ensuring that your personal information
doesnt fall into the wrong hands
16You cant have Privacywithout Security
- Privacy Ensuring that your personal information
doesnt fall into the wrong hands - VA Data Files on Millions of Veterans Stolen
- Bank of America Loses A Million Customer
Records - UCLA Warns 800,000 of Computer Break-In
17You cant have Privacywithout Security
- Privacy Ensuring that your personal information
doesnt fall into the wrong hands - VA Data Files on Millions of Veterans Stolen
- Bank of America Loses A Million Customer
Records - UCLA Warns 800,000 of Computer Break-In
- HIPAA, FERPA, etc.
- State and federal data-spill notification mandates
18You cant have Privacywithout Security
- Privacy Ensuring that your personal information
doesnt fall into the wrong hands - VA Data Files on Millions of Veterans Stolen
- Bank of America Loses A Million Customer
Records - UCLA Warns 800,000 of Computer Break-In
- HIPAA, FERPA, etc.
- State and federal data-spill notification
mandates - Security Limiting everyones activity to only
the things they have a right to see and do - Who is trying to access data (Authentication)
- Whether they have the right (Authorization)
19So Whenever Anyone Does Anything Online,We Want
to Know
20So Whenever Anyone Does Anything Online,We Want
to Know
21So Whenever Anyone Does Anything Online,We Want
to Know
- Who they are
- What theyre doing
22So Whenever Anyone Does Anything Online,We Want
to Know
- Who they are
- What theyre doing
- Why theyre doing it
23Authentication Mechanisms
- Accounts and passwords
- ATM cards and PINs
- Smart cards
- Challenge/response systems
- Digital certificates
- Key-fob tokens
- Biometrics
- Etc
24When to Authenticate
- Each time a data element is accessed
- Each time a screen is presented
- Each time a transaction is initiated
- Once every minute/15 minutes/hour/day
- Single Sign-On
25To Whom to Authenticate
- The program youre talking to
- The server youre talking to
- The network
26The Trend
- Single sign-on
- With possible refresh for sensitive transactions
- Network sign-on
- Stronger authentication
- Guest authentication
- Wireless authentication
- Identity intermediaries
- Shibboleth
27Another Definition of Privacy
- Privacy The ability to go about your daily life
without leaving a trail the ability to read,
speak, attend meetings, etc. anonymously
28The Importance of Anonymity
- Anonymous pamphlets, leaflets, brochures and
even books have played an important role in the
progress of mankind. Persecuted groups and sects
from time to time throughout history have been
able to criticize oppressive practices and laws
either anonymously or not at all. Hugo Black,
Talley v. California, 1960
29Privacy1 vs Privacy2
- Privacy1 Ensuring that your personal information
doesnt fall into the wrong hands.
(Confidentiality) - Privacy2 The ability to go about your daily life
without leaving a trail the ability to read
(speak, attend meetings, etc.) anonymously.
(Anonymity)
30The Dilemma
31The Dilemma
- We want to go through cyber-life without leaving
a trail
32The Dilemma
- We want to go through cyber-life without leaving
a trail - But we want everyone who comes in contact with
our data (and with us) to be identified and
monitored
33The Dilemma
- We want to go through cyber-life without leaving
a trail - But we want everyone who comes in contact with
our data (and with us) to be identified and
monitored - Spam
- Phishing
- Threats
- Poison-pen postings
- Baseless accusations
- Etc
34The Dilemma
- We want to go through cyber-life without leaving
a trail - But we want everyone who comes in contact with
our data (and with us) to be identified and
monitored
Not Much Different Than
- We want everyone to know who the candidates are
getting money from - But we dont want anyone to know who we are
giving money to
35Privacy Can Be TrickyConsider Chat Rooms
- In general you have no legal expectation of
privacy in a chat room because you dont know
who else is listening - Youre essentially speaking in public
- You have no reason to believe a police officer
(on- or off-duty) isnt present - US vs Charbonneau
36Privacy Can Be TrickyConsider Chat Rooms
- In general you have no legal expectation of
privacy in a chat room because you dont know
who else is listening - Youre essentially speaking in public
- You have no reason to believe a police officer
(on- or off-duty) isnt present - US vs Charbonneau
- What are the limitations on government
surveillance of chat rooms?
37Privacy Can Be TrickyConsider Chat Rooms
- In general you have no legal expectation of
privacy in a chat room because you dont know
who else is listening - Youre essentially speaking in public
- You have no reason to believe a police officer
(on- or off-duty) isnt present - US vs Charbonneau
- What are the limitations on government
surveillance of chat rooms? - Child molestors
38Privacy Can Be TrickyConsider Chat Rooms
- In general you have no legal expectation of
privacy in a chat room because you dont know
who else is listening - Youre essentially speaking in public
- You have no reason to believe a police officer
(on- or off-duty) isnt present - US vs Charbonneau
- What are the limitations on government
surveillance of chat rooms? - Child molestors
- Dissident political groups
39The Dilemma
- We want to go through cyber-life without leaving
a trail - But we want everyone who comes in contact with
our data (and with us) to be identified and
monitored
Not Much Different Than
- We want everyone to know who the candidates are
getting money from - But we dont want anyone to know who we are
giving money to
40Identified and Monitored
- Government Plans Massive Data Sweep
- Feds Get Wide Wiretap Authority
- NSA Has Massive Database of Americans Phone
Calls - Finance-Monitoring Program Amounts to Spying
- Police Chief Wants Surveillance Cameras in
Houston Apartments - Future Fuzzy for Government Use of Public
Surveillance Cameras
41Why Now?
42Why Now?
43Why Now?
- Because we can
- Technology now makes it possible to collect,
maintain, and process everything you do - Moores Law is not being repealed
- Brain 1TB 500 retail
- Gordon Bell MyLifeBits (10TB)
- Library of Congress 100TB
- WORM drives
- The Internet Archive
- Ray Kurzweil The Singularity Is Near
44Why Now?
- Because we can
- And so our only limitations are those we choose
to impose on ourselves
45Why Now?
- Because we can
- Because we (think we) must
46Why Now?
- Because we can
- Because we (think we) must
- Why?
47Why Now?
- Because we can
- Because we (think we) must
- Because it makes law enforcement easier
48Law Enforcement and Data
- Specific, focused, temporary
- Tap, probe, monitor, investigate whats needed to
deal with a particular crime or threat
49The Fourth Amendment
- The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be seized.
50Law Enforcement and Data
- Specific, focused, temporary
- Tap, probe, monitor, investigate whats needed to
deal with a particular crime or threat - Just in case
- Capture all possible information so that,
whenever something goes wrong, we can just play
back the tape
51Some simple examples
- Toll-gate license-plate photos
- No longer needed if the bell doesnt ring
- But very helpful if you want to get a list of
possible suspects for yesterdays crime - Metro cards
- Paying for your trip
- Who was where when?
- ATM cameras
- If no robbery occurred, no need to retain
- But might have caught a glimpse of a kidnapper
52Déjà Vu?
- Homeland Security Monitored Students
- surveillance by the Pentagon database of
military protests and demonstrations at
institutions of higher education - Although there does not appear to be any direct
terrorist nexus to the event, a large gathering,
especially on a college campus, may gain momentum
and create public safety concerns. I do not see
an issue of civil liberties being violated,
rather proactive precautionary measures being
taken by DHS and DoD. William H. Parrish,
Assoc. Prof. of Homeland Security, VCU
53Airport Security Tomorrow
- Airport security chiefs and efficiency geeks will
be able to keep close tabs on airport passengers
by tagging them with a high powered radio chip
developed at the University of Central London.
The technology is to be trialled in Debrecen
Airport in Hungary after being in development for
two-and-a-half years by University College London
as part of an EU-funded consortium called Optag. - Dr Paul Brennan, of UCLs antennas and radar
group, said his team had developed a radio
frequency identification tag far in advance of
any that had been used to now to label
supermarket produce. - People will be told to wear radio tags round
their necks when they get to the airport. The tag
would notify a computer system of their identity
and whereabouts. The system would then track
their activities in the airport using a network
of high definition cameras. - The Register (UK), Oct. 12, 2006
54Network Authentication Today
- For every bit originating on our campus networks,
we have the capability to know who put it there,
when, and from where.
55Network Authentication Today
- For every bit originating on our campus networks,
we have the capability to know who put it there,
when, and from where. - Will we do it?
56Network Authentication Today
- For every bit originating on our campus networks,
we have the capability to know who put it there,
when, and from where. - Will we do it?
- Why?
57Network Authentication Today
- For every bit originating on our campus networks,
we have the capability to know who put it there,
when, and from where. - Will we do it?
- Why?
- Who should be involved in the decision?
58The Dilemma in Other Words
- They that can give up essential liberty to
obtain a little temporary safety deserve neither
liberty nor safety. Benjamin Franklin (1755)
59The Dilemma in Other Words
- They that can give up essential liberty to
obtain a little temporary safety deserve neither
liberty nor safety. Benjamin Franklin (1755) -
- While the Constitution protects against
invasions of individual rights, it is not a
suicide pact. Arthur Goldberg (1963)
60The Constitution Is Nota Suicide Pact
61The Constitution Is Nota Suicide Pact
62Or
- Give me Liberty or give me Death!
- Patrick Henry
- (Delegate, Virginia, 1775)
63Or
- Give me Liberty or give me Death!
- Patrick Henry
- (Delegate, Virginia, 1775)
- You have no civil liberties if youre dead!
- Patrick Roberts
- (Senator, Kansas, 2006)
64The Eternal Value of Privacy(Bruce Schneier)
- The most common retort against privacy advocates
is this line If you arent doing anything
wrong, what do you have to hide? - Some clever answers If Im not doing anything
wrong, then you have no cause to watch me.
Because the government gets to define whats
wrong, and they keep changing the definition.
Because you might do something wrong with my
information. - My problem with quips like these as right as
they are is that they accept the premise that
privacy is about hiding a wrong. Its not.
Privacy is an inherent human right, and a
requirement for maintaining the human condition
with dignity and respect. - Cardinal Richelieu understood the value of
surveillance when he famously said, If one would
give me six lines written by the hand of the most
honest man, I would find something in them to
have him hanged. Watch someone long enough, and
youll find something to arrest or just
blackmail with. - Privacy protects us from abuses by those in
power, even if were doing nothing wrong at the
time of surveillance. - We do nothing wrong when we make love or go to
the bathroom. We are not deliberately hiding
anything when we seek out private places for
reflection or conversation. We keep private
journals, sing in the privacy of the shower, and
write letters to secret lovers and then burn
them. Privacy is a basic human need.
65The Privacy/Security Rorschach
66The Privacy/Security Rorschach
- Law enforcement is not supposed to be easy.
Where it is easy, its called a police state.
Jeff Schiller, in Wired (1999)
67End