Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.

Slides:



Advertisements
Similar presentations
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Advertisements

Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Gender Perspectives in Introduction to Competition Policy Gender Module #6 ITU Workshops on Sustainability in Telecommunication Through Gender & Social.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Freedom of Speech (Part 3)
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Cyber Security and the Global Business Environment Jeremy Schaar:)
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
The Internet industry’s privacy seal program Silicon Valley Web Guild.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Network Security of The United States of America By: Jeffery T. Pelletier.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Did you know? What is the difference between the Treaty of Lisbon and the Lisbon Strategy?
European data protection and privacy regulations Johny GASSER Orange Business Services – Consulting & Solutions Integration International Cyber Center.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &
Law and Ethics Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
The President's NSA Review Group: The Technology Issues" Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Business Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
Information Warfare Playgrounds to Battlegrounds.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
International Organizations
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
The Internet of Things and Consumer Protection
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Domestic and Foreign Policy. Opening Activity Essential Question What impact does domestic and foreign policy have on the citizens of the United States?
Prof. Peter Swire Georgia Tech Senior Counsel, Alston & Bird Sayers Security Conference/Curio Tech Summit Atlanta March 22, 2016 How Should Apple Balance.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
“Layers of the Cyberstack: Lessons for Cybersecurity”
Law Firm Data Security: What In-house Counsel Need to Know
Peter Swire Holder Chair of Law and Ethics
Surveillance around the world
Inclusion Europe: How we work with European Parliament and Commission Milan Šveřepa director, Inclusion Europe.
Privacy principles Individual written policies
North Carolina Law Review Symposium
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cybersecurity: the consumer perspective
Define the Problem Constant surveillance of citizens in our country
Commander in chief and Chief Diplomat
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
NPHS 1510 Federal and International
Presentation transcript:

Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of Technology Law Seminars International: 3/28/14

Overview of the Talk  Intro to Review Group  Four business issues:  Business & economics issues into the IC calculus  US-based global businesses affected by IC decisions  Lean toward defense in cyber-security  Support better Internet governance

Creation of the Review Group  Snowden leaks of 215 and Prism in June, 2013  August – Review Group  5 members

December 2013: The Situation Room

Our assigned task  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure

Our Report  Meetings, briefings, public comments  300+ pages in December  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records; proposal this week basically agrees  Pres. Obama speech January  Adopt 70% in letter or spirit  Additional recommendations under study  Organizational changes to NSA not adopted

Issue 1: Foreign Affairs/Economics  Major theme of the report is that we face multiple risks, not just national security risks  Effects on allies, foreign affairs  Risks to privacy & civil liberties  Risks to economic growth & business  Historically, intelligence community is heavily walled off, to maintain secrecy  Now, convergence of civilian and military/intelligence communications devices, software & networks  Q: How respond to the multiple risks?

Addressing Multiple Risks  RG Recs 16 & 17:  New process & WH staff to review sensitive intelligence collection in advance  Senior policymakers from the economic agencies (NEC, Commerce, USTR) should participate  Monitoring to ensure compliance with policy  RG Rec 19: New process for surveillance of foreign leaders  Relations with allies, with economic and other implications, if this surveillance becomes public

Issue 2: US-Based Cloud Companies in a Global Market  The issue: effects on US-based cloud industry  Understanding contrasting perspectives of IC and the IT industry  Intelligence community perspective:  Snowden a criminal; 0% say whistleblower  Substantial assistance to adversaries by ongoing revelations of sources & methods  E.g., reports on techniques for entering into “air- gapped” computer systems  IC Tradition of expecting secrecy over long time scale, so details of intelligence activities rarely disclosed and harms from disclosures rarely experienced

Tech Industry Perspective  Tech industry perspective:  Silicon Valley – 90% say whistleblower  Snowden has informed us about Internet realities  Tech industry libertarianism: “information wants to be free” and suspicion of government & secrecy  Anger at undermining encryption standards  More anger for stories that leased lines for Yahoo and Google servers were tapped  Microsoft GC: the US Government as an “advanced persistent threat”

What is at Stake for the IT Industry  Biggest focus on public cloud computing market  Double in size  Studies estimate US business losses from NSA revelations: tens of billions $/year  An opening for non-U.S. providers  Market has been dominated by US companies  Deutsche Telecomm and others: “Don’t put your data in the hands of the NSA and US providers”  US industry response: more transparency  Boost consumer confidence that the amount of government orders is modest

Moving to More Transparency  RG Rec 9: OK to reveal number of orders, number they have complied with, information produced, and number for each legal authority (215, 702, NSL, etc.), unless compelling national security showing  RG Rec 31: US should advocate to ensure transparency for requests by other governments  Put more focus on actions of other governments  DOJ agreement with companies in January

Issue 3: Offense v. Defense for Cyber- security  The issue of trading off offense & defense:  NSA/IC offensive missions  Foreign intelligence surveillance  Title 10 – military authorities  US Cyber Command  NSA/IC defensive missions  Information Assurance Directorate of NSA  Protect government systems  Counter-intelligence  We use precisely one communications infrastructure for both offense and defense

Conflict between Offense & Defense Has Increased (1) Before: separate communications system behind the Iron Curtain; nation-state actors Now: same Internet for civilians, terrorists & military (2) Before: military protected its communication security within the chain of command Now: critical infrastructure largely civilian; tips to defense get known to attackers (3) Before: episodic flares of military action Now: daily & hourly cyber-attacks, to businesses and others, right here at home

Strong Crypto for Defense  RG Rec 29: support strong crypto standards and software; secure communications a priority; don’t push vendors to have back doors (defense)  No announcement yet on this recommendation – it is a tech industry priority

Zero Days & the Equities Process  A “zero day” exploit means previously unused vulnerability, where defenders have had zero days to respond  Press reports of USG stockpiling zero days, for intelligence & military use  RG Rec 30: Lean to defense. New WH equities process to ensure vulnerabilities are blocked for USG and private networks. Exception if inter-agency process finds a priority to retain the zero day as secret.  Software vendors and owners of corporate systems have strong interest in good defense  No announcement yet on this recommendation

Issue 4: Internet Governance  The issue: Snowden becomes a huge talking point against the US approach to Internet governance. Potential harms to business, including US-based business.

International Telecommunications Union?  US & US industry position: Internet governance as bottom-up, tech-based, multi-stakeholder process. Outputs: innovation, growth, Internet freedom, democracy.  Russia & China: push for major ITU role. Governance by governments. Respect local norms (called “cyber- security” but meaning “censorship”). Oppose “chaos” of current approach.  Swing votes at the ITU: medium-sized economies pay more for Internet service than rich countries, lose inter- connection fees, don’t know how to have a voice in W3C & IETF.

How to Bolster Multi-stakeholder  US Internet Freedom agenda – secure communications by dissenters, democratic freedom, human rights.  Russia & China: Snowden shows US hypocrisy.  Response: legal checks & balances in US; First Amendment; emphatically not used for political repression  RG Rec 32: senior State Department official on these issues  RG Rec 33: support multi-stakeholder approach  Many RG recs: reinforce privacy & civil liberties & oversight in foreign surveillance  PPD-28: extend protections to non-US persons

Localization Proposals  Brazil, Vietnam, Indonesia proposals to require storage locally  EU proposals to restrict data transfers to US; using T- TIP & Safe Harbor as bargaining chips for less US surveillance  RG: emphasize economic & other harms from localization/”splinternet”  Strengthen relations with allies  RG Rec 31: build international norm against localization  RG Rec 34: streamline multi-lateral assistance treaties (MLATs), so no need to hold data there, can get it in US

The Lessons for Business  Business & economics issues into the IC calculus  US-based global businesses affected by IC decisions  Lean toward defense  Support better Internet governance

Conclusion  Are pessimists correct that nothing will change?  Section 215 program quite possibly will end  DOJ agreed to the transparency agreement  EU privacy regulation seemed dead, but Snowden- related sentiments resulted this month in EU Parliament in favor  We are in a period where change is possible  Businesses, and their advisors, should support changes that meet the multiple goals of our national and economic security