Download presentation
Presentation is loading. Please wait.
Published byNorah Edwards Modified over 9 years ago
1
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley
2
Overview Why cybersecurity matters Why cybersecurity is a hard problem, and why research is crucial How communications privacy law inhibits research A better balance between privacy and cybersecurity
3
Why Cybersecurity Matters Attacks target infrastructure –Internet is the “nervous system” –Transportation, energy, water, banking connected by Internet –Example: Massive cyber attack against Estonia, May 2007 Potential for devastation is growing –Pervasive networked devices (think home thermostats and building materials)
4
Why Cybersecurity Is Hard Attacks are cheap and easily disguised. Attacker ISP 1 ISP 2 ISP 3 Victim (e.g., military system or small country) A “distributed denial of service” attack It’s hard to distinguish innocuous from malicious traffic until it’s too late due to lack of coordination. Defense involves many open research questions.
5
Tension Between Privacy and Research Electronic Communications Privacy Act (ECPA) regulates acquisition, disclosure Scenario: UC Berkeley researcher seeks network logs (IP addresses only) from commercial ISPs. –ISP voluntary disclosures regulated by ECPA –Addressing info and contents (e.g., e-mail bodies) protected under ECPA –Stored record disclosure vs. “real-time” interceptions –Disclosures to a “governmental entity” (UC Berkeley) more restricted –Consent is unworkable –No research exceptions ECPA almost certainly bars disclosure
6
We need a cybersecurity research exception to the ECPA.
7
Properties of a Research Exception Tailored –For research only –Excludes law enforcement access Comprehensive –Applies to communications contents and real-time interception Protective –Prohibits further disclosures (voluntary or compelled) Controlled –Institutional review is integral
8
Would a Research Exception Work? Legislative action would give legitimacy to uses of data that are already analyzed, collected Exception would allow efficient data- sharing institutions to develop Exception’s institutional framework could extend to diverse data types (not just communications, e.g. passwords)
9
Conclusion Coordinated threats are potentially devastating. Urgent need for more coordinated defenses ECPA reform needed to make this happen
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.