Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.

Slides:



Advertisements
Similar presentations
“Maintaining Trust in an Electronic World”
Advertisements

Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Privacy and National Security After September 11 Professor Peter P. Swire Ohio State University FLICC 2002 Forum Library of Congress March 19, 2002.
The Chief Privacy Officer for the U.S. Government Professor Peter P. Swire Ohio State University Visiting, George Washington University Privacy Officers.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Why E-Commerce is Like a Bottle of Tylenol Professor Peter P. Swire Ohio State Law School Conference on New Technologies and International Governance February.
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
The Sunset of the Patriot Act Professor Peter P. Swire Moritz College of Law Ohio State University Winter College February 19, 2005.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
"Embedding Privacy in Federal Information Systems" Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP MITRE Corp. Workshop.
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Privacy in America: Your Role as Guardians of the Publics Data Professor Peter P. Swire Moritz College of Law The Ohio State University Ohio Digital Government.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory Professor Peter P. Swire George Washington.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
HIPAA and the War on Terrorism Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP HIPAA Summit West June 7, 2003.
"Security and Privacy After September 11: Implications for Healthcare" Professor Peter P. Swire George Washington Law School Consultant, Morrison & Foerster.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
IT Security Policy Framework
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Why Security? A Commitment for [the Agency’s] Executives [CIO’s name] EC Presentation [date]
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Norman SecureSurf Protect your users when surfing the Internet.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Customer Websites and Web Applications Web Application Security.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Monitoring Employees on Networks: Unethical or Good Business?
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Society & Computers PowerPoint
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Bellwork Think about this…. Historical Event
2016 Cybersecurity Law If any one of these describes your company
Information Security based on International Standard ISO 27001
Chapter 3: IRS and FTC Data Security Rules
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
"Security and Privacy After September 11: The Healthcare Example”
The Surveillance State
Presentation transcript:

Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001

Overview of the Talk n My background n Critical infrastructure and your computer security n Wiretaps and surveillance today

I. My Background n First Internet law article in 1992 n Wrote on encryption, privacy, and international e-commerce issues n 1999 & Clinton Administration – Chief Counselor for Privacy n 2001 return to Ohio State Law – now visiting at George Washington – consultant with Morrison & Foerster

In the Administration n Privacy issues – Medical privacy proposed and final rule – Financial privacy law and rules – Internet privacy policy – Government databases and privacy n Website privacy policies n Cookies on website policy

In the Administration n Encryption policy shift 1999 – Strong encryption necessary for strong military, e-commerce, and civil society n Computer security – Government data for security and privacy – FIDNet – Other critical infrastructure issues

In the Administration n Wiretap and surveillance n Headed 15-agency White House working group on how to update these laws n Legislation proposed June, 2000 – S – Hearings and mark-up in House Judiciary

II. Computer Security & Critical Infrastructure n Security after Y2K n Openness in computer security n ISACs and critical infrastructure

A. Security after Y2K n In late 90s, was conventional wisdom that security would be the next big computer thing once Y2K was addressed n Security not a new issue since September 11 n Security is an even bigger issue now – Its important – Its hard

Why Security is Important n Information is valuable in an information society n Personal data is more valuable today – Customer info is important to customers and to your business model – Prevent identity theft – Safeguard that customer data

Why Security is Important n Potential losses to your business if insecure – Interruption of business - DDOS – Loss of data and expensive IT assets – Reputation and confidence loss n Credible threats of loss – Terrorists – Other malicious actors

Why Security is Hard n PC enormous growth since 1980s n Internet enormous growth since early 1990s n Applications have outstripped security – The rush to get products to market – Legacy systems and inconsistent platforms – The opportunities and risks of networks – User autonomy rather than IT dictators – Security has not been the driver

Some lessons on security n Security is an issue whose time was coming n Clearly a bigger issue today n What lessons for you?

B. Lesson 1: Openness in Security n Subject of my current research: – Openness and hiddenness in computer security n Historic link between hiddenness and security n Openness and inter-operability n Openness and updating your security

Security and hiddenness n Would a military base reveal the location of its defenses and booby traps? n No. n Thats the historic link between security and hiddenness.

Computer security and openness n Computers and inter-operability – Will you trust software or hardware into your system if you cant test it? Cant know whats in it? – Will you trust partners in your extranet or grid unless you know how they handle data?

Computer security and openness n Computers and updating your security n New patches daily n New systems also needed often n How get these to all your users and systems that need them? Other companys users? n Moral: with this broad dissemination, the determined bad guy will learn the weakness and patch, too

C. ISACs and Critical Infrastructure n Computer security requires much more openness than traditional security n Must share information to inter-operate and to update patches and other security approaches n How do this information sharing?

ISACs n Information Sharing and Analysis Centers – Banking – Telecommunications – Electric Power – IT n Industry groupings to share information about attacks and responses

ISACs n The security pro at your competitor has much the same job as the security pro in your company n Networked systems and critical infrastructure n Cooperation dominates competition here – Not price setting, low antitrust risk n Regulators should encourage this sharing

Summary on computer security n Security bigger issue now n Openness much greater in computer security n Use ISACs and other sharing systems so the defenders learn what the attackers already know

III. Wiretaps and Surveillance n Last year, Clinton proposal to update both for privacy and surveillance n House Judiciary then farther toward privacy n Now, Ashcroft proposal all in the direction of surveillance n Compromise in House yesterday with smaller move toward surveillance than Ashcroft

FISA Changes n Foreign Intelligence Surveillance Act n Special court, wiretap never revealed n Roving wiretap – One order, multiple phones n More FISA orders and more sharing with law enforcement n Likely bigger requests for you to have employees with clearance

Trap and Trace n Transactional or to/from information n Need some updating of language n Nationwide order – Challenge, if needed, far from you n Emergency orders – Any computer attack – Anything affecting a national security interest – Go to a judge after the trap is in place

Trap and Trace (continued) n For phones, is to/from information n Ashcroft asks for dialing, routing, addressing, or signaling n Issue: get urls and other content? n Variation: DRAS that identifies the destination of a communication

Hacker trespasser n Issue: the government cant look over your shoulder when you monitor your system n Proposal: – (1) you authorize the government – (2) legitimate part of an investigation – (3) no communications other than those to or from the trespasser – (4) for trespasser who accesses a protected computer without authorization

Voice mail n Current law, stored voice mail to government only under the strict Title III rules for phone wiretaps n Proposal to treat like stored – Get with a subpoena

Administrative subpoenas n Current law: disclose name, address, local and long distance telephone toll billing records, telephone number, and length of service n Proposal: add means and source of payment (including any credit card or bank account number)

Concluding Remarks n For computer security, how to do more and more effective sharing of information n For surveillance, last year had consensus that need greater judicial oversight for trap and trace n Consider that still, not just law enforcement certifying that the standard has been met

Conclusions n To address the current emergency, Administration calling for rapid passage of all their proposals, with essentially no hearings n One choice: take time to examine closely n Other choice: sunset after 2 years, so we can re-examine with greater calm

Concluding Thoughts n For you in telecommunications – Security will be a bigger issue – Compliance with new laws will take your attention – Corporate decisions about how to assist law enforcement and national security while also safeguarding your customers records n Big challenges, and its an important job where we will see great progress

Contact Information n Professor Peter P. Swire n phone: (301) n n web:

Comments: the Emergency