Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

Outbreak communication Preben Aavitsland. Your role National, regional or local public health office Responsible for outbreak response.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
International Employment – latest Digital Employment issues Melanie Lane and Karine Audouze.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
Topic 1: Introduction Law and the legal system ‘The Information Age’ (1.0) Web 2.0, Internet 2.0, Gov 2.0…
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1 Freedom of Expression Prepared By Joseph Leung.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
Jana Dixon Dawson Educational Cooperative
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
Keeping on top of the Cloud - Compliance from a Regulator’s Perspective Henry Chang, IT Advisor Office of the Privacy Commissioner for Personal Data, Hong.
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Google Street view: ‘Public place’ photography in the Internet age David Vaile, Executive Director Cyberspace Law and Policy Centre UNSW Law Faculty
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Computer Forensics Principles and Practices
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Big Data and Governance in the United Kingdom AAAS, February 13 th 2015 Dr Claire Craig Director, Government Office for Science, UK.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Drowning in Codes of Conduct: An analysis of codes of conduct applying to online activity in Australia Chris Connolly and David Vaile Cyberspace Law and.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
Legal issues in cloud computing Teemu Mäntylä
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
The Ethical Use of Data by Government Agencies By Sean Pugh.
Understanding Privacy An Overview of our Responsibilities.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law.
Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
James O'Keefe Boston Security Meetup Feb. 11, 2016
Surveillance around the world
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
RIGHT ON PRIVACY IN THE REPUBLIC OF SERBIA
Surveillance Topic Baxter July 26th, 2015
Is privacy research objective?
Consumer Protection Online
T.E.E.L Writing Structure
1984 – The Modern Context of Reception
Define the Problem Constant surveillance of citizens in our country
Holding surveillant power to account: Democratic problems & solutions
The Surveillance State
Electronic Surveillance, Post 9/11
Presentation transcript:

Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community UNSW Faculty of Law

Outline 1. What are the programs that Snowden revealed? 2. US Legal issues 3. UK issues 4. Australian issues 5. Google, Facebook and social media privacy? (move fast) 6. IT security undermined 7. Data Sovereignty and cloud 8. Whistleblowers and leakers 9. Big Data and predictive analytics 10. Panopticon and chilling effect

Intro Important to not pre-judge issues Evidence and facts are critical Spin is used to obfuscate both technical and legal issues There are justifications for some uses of this tech But people have fought for hundreds of years to avoid oppression by state/government Questions about proper levels of oversight, proper uses of technology, proper restraints, oversight Most important – identify the issues, and the strength of evidence Open-ness cannot be complete, but is the foundation of the system we are protecting – how far can secrecy help?

Programs Snowden revealed? Phone ‘metadata’ ] Fibre Security backdoors Cooperation with ISPs, ICHs Sharing with 5 eyes, Israel… Retention, targeting of encrypted

US legal issues? 4 th Amendment Constitution: warrant, suspiciion Legal basis: FISA, Patriot Act (Data Sovereignty report) Oversight by FISA court - anomalies “US person” – jurisdiction split with agencies Executive oversight? Legislative oversight?

UK issues Lack of 1 st Amendment US Constitution: ‘prior restraint’ on publication Legal basis: vaguer? GCHQ – outsourcing some tasks illegal for NSA? Extent of activities in the EU?

Australian issues Data Retention plan Legal basis: vaguer? ASD etc – outsourcing some tasks illegal for NSA? 5 eyes role Telecommunications Act s313? Lack of transparency

Google, Facebook and social media privacy? Active cooperation Similar instincts Encourage people not to care of consequences Hidden or suppressed roles Honeypots Contradictions: new DDoS protection? Masters of spin

‘Move Fast and Break Things’ ‘See what you can get away with’ ‘See if you get caught’/ Ask Forgiveness not Permission ‘We haven’t been caught [yet]’ Disposable Prototyping, not Compliance What works for software does not work for personal or critical information Your secrets are not revocable, disposable Not about compliance – assumes risk is neglible – assumes others carry the risk!

IT security undermined Back doors NIST standards TOR Uncertainty for IT security industry “security” agency undermines security? Security for whom?

Data Sovereignty and cloud Trust is critical SWIFT case Backlash Germany Mexico Brasil France Sweden Cloud industries undermined?

Whistleblowers and leakers Role as sysadmin Snowden Manning Greenwald Different views?

Big Data and predictive analytics Issues

Panopticon and chilling effect Issues

Questions and Discussion

Thanks David Vaile Cyberspace Law and Policy Community Faculty of Law, University of NSW