Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002
Overview of the Talk n Overview of electronic surveillance, before and after September 11 n Security vs. privacy n Security and privacy
Wiretaps and Surveillance n History of wiretaps n 2000 Administration proposal n 2001 USA Patriot Act
Wiretap History n 1920s Olmstead – Wiretaps permitted by police without warrant where tap applied outside your home n 1960s Katz – Reasonable expectation of privacy, even in a phone booth n 1968 Title III – Strict rules for content, more than probable cause, as a last resort, reporting requirements
History (cont.) n 1984 ECPA – Some protections for – Some protections for to/from information; pen registers (who you call); trap and trace (who calls you)
2000 Administration Proposal n How to update wiretap and surveillance for the Internet age n 15-agency White House working group n Legislation proposed June, 2000 – S – Hearings and mark-up in House Judiciary, further toward privacy than our proposal
2000 Administration Proposal n Update telephone era language n Upgrade and web protections to same as telephone calls n Identify new obstacles to law enforcement from the new technology n Sense of responsibility -- assure privacy, give law enforcement tools it needs
2001 USA Patriot Act n Introduced less than a week after September 11 n Key provisions often have a point, but maybe went too far n 4 year sunset for many surveillance provisions and what to do next
Emergency orders n Before, imminent threat of serious harm to get wiretap before a court order n Now, for any ongoing computer attack, or else ability to trace back may be lost n For anything affecting a national security interest n Are these too broad?
Roving taps n Old days, order for each phone n What if suspect buys a dozen disposable cell phones? Uses someone elses computer? n But, how far can the order rove? Anyone in the public library? n Problem -- less of a suppression remedy for and web use
Nationwide trap and trace n Old days, serve order on ATT and it was effective nationwide n Today, may travel through a half- dozen providers, have needed that many court orders n New law -- one order effective nationwide n Query -- order from a judge in Idaho, served late at night, how do you challenge that?
Computer trespasser exception n Previous law: – ISP can monitor its own system – ISP can give evidence of yesterdays attack – ISP cannot invite law enforcement in to catch the burglars n Problem for: – DOD and many hack attacks – Small system owners who need help
Computer trespasser proposal n Law enforcement can surf behind if: – Targets person who accesses a computer without authorization – System owner consents – Lawful investigation – Law enforcement reasonably believes that the information will be relevant – Interception does not acquire communications other than those transmitted to or from the trespasser
Computer trespasser n Issues of concern: – Never a hearing in Congress on it – No time limit on each use – No reporting requirement – FBI can ask the ISP to invite it in, and then camp at ISP permanently – Limited suppression remedy if go outside permitted scope
II. Security & Privacy After 9/11 n Less tolerance for hackers and other unauthorized use n Cyber-security and the need to protect critical infrastructures such as payments system, electricity grid, & telephone system n Greater tolerance for surveillance, which many people believe is justified by greater risks
Security vs. Privacy n Security sometimes means greater surveillance, information gathering, & information sharing n USA Patriot increases surveillance powers n Computer trespasser exception n Moral suasion to report possible terrorists
Security and Privacy n Good data handling practices become more important -- good security protects information against unauthorized use n Audit trails, accounting become more obviously desirable -- helps fight sloppy privacy practices n Part of system upgrade for security will be system upgrade for other requirements, such as privacy
In Conclusion n USA Patriot has 4 year sunset of many of the surveillance provisions n Imagine an architecture that meets legitimate security needs and also respects privacy n Need accountability to ensure the new powers are used wisely n Our homework -- how to do that wisely
Contact Information n Professor Peter P. Swire n phone: (301) n n web: