Dilemmas of Privacy and Surveillance

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Using Information at the University University Secretarys Office
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Internet surveillance in the UK Ian Brown. Signals intelligence Everybody’s at it: Echelon Frenchelon Multinationals “We steal secrets with espionage,
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
INTERNET and CODE OF CONDUCT
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection Act. Lesson Objectives To understand the data protection act.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
1 When hate speech tangles privacy... When hate speech tangles privacy...
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
P.R.I.M.E. Finance Panel of Recognized International Market Experts in Finance The role of experts in complex financial cases: DIFC Court case study (Al.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Freedom of expression: underlying principles and sources
Safeguarding Adults Care Act 2014.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Understanding Privacy An Overview of our Responsibilities.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
 The body of government officials who are employed in civil occupations that are neither political nor judicial.  In most countries the term refers.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
Understanding Privacy An Overview of our Responsibilities.
Understanding the Snooper‘s Charter
Bellwork Think about this…. Historical Event
The Data Protection Act 1998
Rights and responsibilities of providers and individuals
Why is fundraising so important?
Surveillance around the world
Advanced Income Tax Law
E-Safety Briefing
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Privacy principles Individual written policies
Data Protection Act and Other Laws
Rights and Responsibilities
Data Protection Act.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
The Data Protection Act 1998
Regulation of Investigatory Powers Act 2000
Health Insurance Portability and Accountability Act
Data Protection & Human Rights
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Reporting personal data breaches to the ICO
Red Flags Rule An Introduction County College of Morris
Article 10 – Freedom of expression
Define the Problem Constant surveillance of citizens in our country
How we use Your Health Records
Information management and communication
Cybercrime and Data Protection
Government Data Practices & Open Meeting Law Overview
Health Insurance Portability and Accountability Act
The Regulatory Role of the Charity Commission
Presentation transcript:

Dilemmas of Privacy and Surveillance Martyn Thomas CBE FREng Livery Company Professor of Information Technology

Cyberspace: The Fifth Dimension Many of us lead much of our lives in cyberspace. Privacy is important to many of us – and a human right Many organisations seek personal information, for reasons that range from the legitimate to the criminal. Crime will always exist where there is motive and opportunity: KPMG reported a rise of 1266% in cyber-enabled fraud between 2015 and 2016. Cyberspace has to be policed. Law enforcement necessitates some breaches of privacy This lecture explores the tensions that are the result

Personal Data and Privacy a human right “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks Article12 of the Universal Declaration of Human Rights

Privacy in the Physical World

Technology Erodes Physical Privacy

Crime Prevention and Detection must breach privacy Criminals have something to hide Law enforcement need to be able to detect things that criminals want to keep private

Metadata in the physical world and in cyberspace Which churches, clinics, charities, political meetings have you attended, when and who with? Whom have to written to or spoken to, how often and when? What are your regular journeys? Where and when might you be on foot and alone? Where did you spend the night? Who else was there? How often do you spend the nights together?

Metadata in Cyberspace What websites have you visited in the past year? In what order? Did you use your credit card? Who is in your address book? What network of contacts do you have, within three links? What are the patterns of contact? Where do you travel and who do you contact when you are there? If you are in corporate finance, what companies are you researching? Who are you contacting? How often and in what order? Are you using encrypted messaging more? Is MI6 breaking its normal working patterns – working late and ordering pizzas …? When metadata can reveal confidential information, should it have the same privacy protection as content does?

The RAEng Report Privacy Rights privacy as confidentiality privacy as anonymity privacy as freedom to be left alone privacy as freedom of expression privacy as control of personal data

The RAEng Report Privacy and conflicting values Accountability for personal or official actions the need for crime prevention and detection and for security efficiency, convenience and speed in access to goods or services access to services that depend on fulfilling specific criteria such as being above an age limit or having a disability the need to monitor health risks, such as outbreaks of infectious diseases public and legal standards of behaviour which might weigh against some personal choices

The RAEng Report Much has changed in 10 years … Cyberspace use has increased in volume and nature Surveillance, data retention and data analytics have increased greatly Benefits and harms are not equally distributed … Most people carry personal monitors and CCTV! Edward Snowden has revealed top secret details about the nature and degree of government surveillance

Government Surveillance: What did Edward Snowden reveal, and why? From TheTrueHOOHA to NSA sysadmin and whistleblower

What Did Snowden Reveal? Thousands of documents, many classified Top Secret and above Thousands of Gigabytes of the traffic on the internet were being collected from the Internet backbone fibre-optic cables every second, filtered, stored and searched Customer data, messages, pictures, video was being collected from the major Internet companies Internet encryption was being systematically weakened Many computers and mobile phones were being hacked And much more …

What Did Snowden Reveal? BLARNEY/FAIRVIEW/OAKSTAR/STORMBREW Massive upstream interception from internet cables PRISM: Downstream collection of data direct from the largest internet companies. BULLRUN: decryption of encrypted communications EGOTISTICAL GIRAFFE: penetration of Tor anonymity … and dozens of other programmes to increase the scale, ease and effectiveness of surveillance

https://snowdenarchive.cjfe.org

wp-srv/special/politics/prism-collection-documents/ http://www.washingtonpost.com/ wp-srv/special/politics/prism-collection-documents/

Privacy Enhancing Technology To protect content: encryption Used by almost everyone to reduce fraud, commercial spying, stalking and other antisocial surveillance To protect contacts, actions and anonymity: Tor Used by commercial, charity and government staff to keep their organisations confidential Used by political dissidents in oppressive regimes Supported by the US and other democratic Governments Both can also be used to conceal criminal activities

http://www.spiegel.de/media/media-35532.pdf

40 slide presentation, online at http://www.spiegel.de/media/media-35535.pdf

9 page guide http://www.spiegel.de/media/media-35530.pdf

http://www.spiegel.de/media/media-35532.pdf

Tor The Onion Router Supported by the US Government and others so that staff and companies could work overseas without revealing their affiliations and so that political dissidents could evade surveillance by oppressive regimes.

The NSA opinion of Tor

Why would anyone sacrifice a salary of roughly $200,000, a girlfriend with whom he shared a home in Hawaii, a stable career, and a family he loves? “I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building. … I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in. … … My sole motive is to inform the public as to that which is done in their name and that which is done against them.”

Conflicting Requirements There are many legitimate reasons to want or need private communications. We want secure systems but we do not want criminals to be able to hide their activities How much security is enough but not too much? Following the Snowden leaks: the USA introduced restrictions to limit NSA spying on US citizens The UK passed laws to make it clear that what had been happening was legal, and to extend surveillance powers

The UK Investigatory Powers Act sometimes called The Snoopers’ Charter? “world-leading legislation that provides unprecedented transparency and substantial privacy protection” Amber Rudd, Home Secretary “opens every detail of every citizen’s online life up to state eyes, drowning the authorities in data and putting innocent people’s personal information at massive risk. This new law is world-leading – but only as a beacon for despots everywhere” Bella Sankey, policy director of Liberty

The IPA 227 pages of legislation plus 64 schedules! Compels ISPs to record the website domains that users visit and keep these records for 12 months Agencies can hack into phones and other computers, and require companies to help them Public authorities can obtain this data

Who can access data under IPA? police, MI5, MI6, GCHQ, MoD, Department of Health, Home Office, Ministry of Justice, Department for Transport, National Crime Agency, HMRC, Department of Work and Pensions, Ambulance Trusts, Criminal Cases Review Commission, Competition and Markets Authority, Financial Conduct Authority, Fire Authorities, Food Standards Agency, Gambling Commission, Gangmasters and Labour Abuse Authority, Health and Safety Executive, Independent Police Complaints Commission, Information Commissioner, NHS Business Services Authority, Office of Communications, Serious Fraud Office … and the equivalent authorities in Scotland, Northern Ireland and Wales.

For what purposes? (1) (a) in the interests of national security, (b) for the purpose of preventing or detecting crime or of preventing disorder, (c) in the interests of the economic well-being of the United Kingdom so far as those interests are also relevant to the interests of national security, (d) in the interests of public safety, (e) for the purpose of protecting public health, (f) for the purpose of assessing or collecting any tax, duty, levy or other imposition, contribution or charge payable to a government department,

For what purposes? (2) (g) for the purpose of preventing death or injury or any damage to a person’s physical or mental health, or of mitigating any injury or damage to a person’s physical or mental health, (h) to assist investigations into alleged miscarriages of justice, (i) where a person (“P”) has died or is unable to identify themselves because of a physical or mental condition—(i) to assist in identifying P, or (ii) to obtain information about P’s next of kin or other persons connected with P or about the reason for P’s death or condition, or (j) for the purpose of exercising functions relating to— (i) the regulation of financial services and markets, or (ii )financial stability.

The CJEU has ruled that … mass retention of personal data is not permissible access to personal data must be authorised by an independent body only data belonging to people who are suspected of serious crimes can be accessed individuals must be notified if their data is accessed

Attitudes to privacy differ widely Many voice-activated devices Send their data to remote servers for analysis and other processing. They have to listen to everything

Spooks, Geeks and Privacy Activists the dilemmas have not been resolved The battles will continue. Privacy activists will use the courts to maintain the right to privacy, whilst most of us continue to give our personal data to anyone who offers a discount voucher Spooks against Geeks is an arms race. Each side tries to maintain supremacy. “Who should win?” is a political and social question. How much security is enough but not too much? It is important to reach a well informed consensus.

These dilemmas are not new Benjamin Franklin, 1755

How much security is enough but not too much?