17
1 Privacy CS 340 PRIVACY SET 6: GOVERNMENT RECORDKEEPING, SURVEILLANCE, NSA AND EDWARD SNOWDEN NO BOOK PAGES FOR CS 340:001-004 Public records Disclosure in the day to day living. Records kept for legitimate governmental purposes. In the past, this information was buried in paper; cybertechnology makes accessing these records simple Varies by state but often includes: Marriage, birth, death, divorce, wills Arrest, convictions Census, property tax Some states, 911 calls become part of the public record Urban Meyer’s wife’s call after the SEC game http://www.youtube.com/watch?v=HfMFeQYDznY Compare & Contrast this with HIPAA, dr. & patient confidentiality, hospital policies

Privacyset6 SnowdenNSA WikiLeaks

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

1

PrivacyC S 3 4 0

P R I VA C Y S E T 6 : G O V E R N M E N T R E C O R D K E E P I N G , S U R V E I L L A N C E , N S A A N D E D WA R D S N O W D E N

N O B O O K PA G E S F O R C S 3 4 0 : 0 0 1 - 0 0 4

Public recordsDisclosure in the day to day living. Records kept for legitimate governmental purposes.◦ In the past, this information was buried in paper; cyber‐technology makes accessing these records simple

Varies by state but often includes:◦ Marriage, birth, death, divorce, wills

◦ Arrest, convictions

◦ Census, property tax

◦ Some states, 911 calls become part of the public record

◦ Urban Meyer’s wife’s call after the SEC game http://www.youtube.com/watch?v=HfMFeQYDznY

◦ Compare & Contrast this with HIPAA, dr. & patient confidentiality, hospital policies

2

1974 Privacy ActCodified 5 principles related to government handling of information:

1. Notice/Awareness

2. Choice/Consent

3. Access Participation

4. Integrity/Security

5. Enforcement/Redress

http://www.ftc.gov/reports/privacy3/fairinfo.shtm

Limitations of the Privacy ActFrom William Petrocelli Low Profile: How to avoid the Privacy Invaders:

1. Applies only to government databases not private ones

2. Applies only to records that use a personal identifier (name, number)

3. No agency is in charge of enforcement, individual agencies choose what is exempt

4. Inter‐agency sharing of info for “routine use”

3

Does the Privacy Act establish mandatory data handling practices for businesses?

A. Yes, it sets rules for all large databases.

B. No, the privacy act only applies to government databases.

Yes, it sets rules for all large dat...

No, the privacy act only applies t...

0%0%

The Patriot ActProvided:◦More monitoring authority for law enforcement and intelligence agencies 

◦ Surveillance of Internet use and email◦ Created nationwide system for search warrants and wire tapping◦ Allowed  for roving surveillance◦ Expanded search warrant exceptions

◦ Sec. of Treasury was given greater powers related to banks to prevent foreign money laundry

◦ Admission to US harder for citizens of certain countries.◦ Codified new crimes and punishments◦Watch video at http://www.cnn.com/2015/05/22/politics/patriot‐act‐debate‐explainer‐nsa/

4

Government Surveillance

Edward Snowden◦ Leaked details of the inter‐workings of NSA’s surveillance infrastructure.

Describe your opinion of Edward Snowden?

A. Very positive

B. Positive

C. Somewhat positive

D. Neutral

E. Somewhat negative

F. Negative

G. Strongly negative

Very positive

Positive

Somewhat positive

Neutral

Somewhat negative

Negative

Strongly negative

0% 0% 0%0%0%0%0%

5

Edward Snowdenhttp://www.theguardian.com/world/the‐nsa‐files

Wikipedia entry: http://en.wikipedia.org/wiki/Edward_Snowden

June 14, 2013 charges:◦ Theft of governmental property

◦ Espionage Act charges◦ Unauthorized communications of national defense information

◦ Willful communication of classified intelligence to unauthorized persons 

LeaksPRISM slides: ◦ http://en.wikipedia.org/wiki/PRISM_(surveillance_program)

Details of MAINWAY:◦ http://en.wikipedia.org/wiki/NSA_call_database

BOUNDLESS INFORMANT◦ http://en.wikipedia.org/wiki/Boundless_Informant

TEMPORA◦ http://en.wikipedia.org/wiki/Tempora

BULLRUN◦ http://en.wikipedia.org/wiki/Bullrun_(code_name)

STELLARWIND◦ Ten year program 2001‐2011,collecting metadata on 

Americans’ Internet

◦ IP addresses, email addresses, Bcc: addresses

◦ http://www.theatlanticwire.com/national/2013/06/nsa‐emails‐stellarwind/66658/

6

Interview with Snowdenhttp://www.theguardian.com/world/video/2013/jun/09/nsa‐whistleblower‐edward‐snowden‐interview‐video

&

http://www.theguardian.com/world/video/2013/jul/08/edward‐snowden‐video‐interview

June 6, 2013 in Hong Kong

NSAThe NSA is the National Security Agency

By law, NSA may not “spy on” Americans

Exception:◦ If the American is connected to the terror suspect by no more than two other people◦ What does this mean?

◦ Check out this article? Separating You and Me? 4.74 Degrees

◦ http://www.theatlanticwire.com/politics/2013/07/nsa‐admits‐it‐analyzes‐more‐peoples‐data‐previously‐revealed/67287/

7

Another Exception: phone call metadataPhone call meta data is not considered private information 

The Snowden disclosures detail the collection of phone call metadata on calls made by Americans 

◦ Phone numbers of participants, serial # of phone, time/duration, geo location

◦ Analogy to the outside of an envelope; not personal, no need to show probable cause

◦ http://www.theguardian.com/world/2013/jun/06/phone‐call‐metadata‐information‐authorities

Support for this practice comes from the Third Party doctrine

Smith v. Maryland, US S. Ct 19794th amendment: Reasonable, legitimate expectation of privacy Katz

“Since the pen register was installed on telephone company property at the telephone company's central offices, petitioner obviously cannot claim that his "property"' was invaded or that police intruded into a "constitutionally protected area.”

b/c users “convey” phone # to the phone company, no expectation of privacy in #s you dial.

“This Court consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties” : third party doctrine

8

“NSA Able to Foil Basic Safeguards of Privacy on Web”New York Times article, Sept. 5 2013:

http://www.nytimes.com/2013/09/06/us/nsa‐foils‐much‐internet‐encryption.html?hp&_r=2&pagewanted=all&

◦ If this link does not work for you use this link:◦ http://cs340.cs.ua.edu/wp‐content/uploads/2014/02/nsa‐foils‐much‐internet‐en.pdf

NY Times article: “NSA Able to Foil Basic Safeguards of Privacy on the Web”Claims NSA has been waging a “secret war” coded named BULLRUN on encryption:

1. Use of supercomputers to break codes

2. “collaboration” with tech companies to build “entry points” into their productsa) Created weaknesses, backdoors

b) Shared keys

3. Targeted computers to snare messages before encryption took place, or at destination after messages decrypted.

9

Internet Technology companiesClaimed tactics against Internet companies by NSA:

Voluntary cooperation

Stealing their encryption keys

Altering their software/hardware

Forcing their cooperation through court orders in the United States Foreign Intelligence Surveillance Court.

United States Foreign Intelligence Surveillance Court Interview about the court:◦ http://www.uscourts.gov/News/TheThirdBranch/02‐06‐01/An_Interview_with_Judge_Royce_C_Lamberth.aspx

See Wikipedia entry on http://en.wikipedia.org/wiki/United_States_Foreign_Intelligence_Surveillance_Court

◦ Snowden’s leak of the Verizon order

◦ Look at stats of approval, is it “rubber stamping?”

◦ See especially SECRET LAW section, policies on collecting data, extension of special needs exception to warrants

10

Examining the “special need” exceptionAmendment IV

g{x Ü|z{à Éy à{x ÑxÉÑÄx àÉ ux áxvâÜx |Ç à{x|Ü ÑxÜáÉÇá? {Éâáxá? ÑtÑxÜá? tÇw xyyxvàá? tzt|Çáà âÇÜxtáÉÇtuÄx áxtÜv{xá tÇw áx|éâÜxá? á{tÄÄ ÇÉà ux ä|ÉÄtàxw? tÇw ÇÉ ãtÜÜtÇàá á{tÄÄ |ááâx? uâà âÑÉÇ ÑÜÉutuÄx vtâáx? áâÑÑÉÜàxw uç Étà{ ÉÜ tyy|ÜÅtà|ÉÇ? tÇw ÑtÜà|vâÄtÜÄç wxávÜ|u|Çz à{x ÑÄtvx àÉ ux áxtÜv{xw? tÇw à{x ÑxÜáÉÇá ÉÜ à{|Çzá àÉ ux áx|éxwA

Special need case: City of Ontario v. Quon

Fallout of the leakCriticisms of his actions: http://www.nytimes.com/2013/09/30/us/qaeda‐plot‐leak‐has‐undermined‐us‐intelligence.html?pagewanted=all&_r=0

Changes & impact:

Requests for reform:◦ http://www.msnbc.com/msnbc/nsa‐sensenbrenner‐leahy‐reform

In January 2014, President Obama issued a policy change, allowing tech companies to disclose government requests for customer data.◦ http://www.theverge.com/2014/1/29/5357808/google‐microsoft‐and‐yahoo‐won‐their‐nsa‐transparency‐reports‐but‐what‐about‐web‐freedom

Lawsuits: http://www.usatoday.com/story/news/2015/08/28/nsa‐phone‐surveillance‐court/71303750/

11

Poll Data on support for Snowden2014 poll data:

45% of respondents say Snowden’s leaks have served the public interest◦ 43% of respondents say Snowden’s leaks have harmed it.

56% want criminal case against Snowden pursued◦ 32% are opposed to the charges

http://www.usatoday.com/story/tech/columnist/2014/01/28/nsa‐edward‐snowden‐pew‐poll‐secrecy‐encryption/4953215/

2015 poll data focused on Millennials:

http://mashable.com/2015/04/21/millennials‐edward‐snowden/#vz5u2St4Biq5

Other 2015 data: 64% negative opinion, 36% positive opinion (8% very positive opinion)

http://www.usnews.com/news/articles/2015/04/21/edward‐snowden‐unpopular‐at‐home‐a‐hero‐abroad‐poll‐finds

http://www.usatoday.com/story/cybertruth/2014/01/16/most‐americans‐oppose‐nsa‐surveillance/4516291/

12

2015 USA Freedom ActThis summer, Congress passes and President Obama signed the Freedom Act into law.◦ This ends some of the Patriot Act provisions, specifically it bans the bulk collection of phone meta data.

Now record collection must focus on a specific target and a specific target’s contacts with an “aim” of limiting collection, and destroying collected data.

The government has to “apply for records”

◦ One hop collection requires reasonable grounds, with an articulable suspicion

◦ Two hop collection requires a statement of a specific session (phone call)

Pen registers and tap and trace devices have to be applied for and a specific session has to be requested.

Expansion of targeted surveillance of non‐US citizens in US.

https://www.lawfareblog.com/so‐what‐does‐usa‐freedom‐act‐do‐anyway

Where is Snowden now?

Snowden lives in Moscow and works in “tech.”

He was nominated for a Nobel Prize last year but he did not win.

13

WikiLeaks

book pages 241‐243, 279

Is your current opinion of WikiLeaks positive or negative?

A. Positive

B. Mostly Positive

C. Negative

D. Mostly Negative

E. I don’t know enough yet to have an opinion Po

sitive

Mostly Positive

Negative

Mostly Negative

I don’t know enough yet to have ..

0% 0%0%0%0%

14

Is your current opinion of Julian Assangepositive or negative?

A. Positive

B. Mostly Positive

C. Negative

D. Mostly Negative

E. I don’t know enough yet to have an opinion. Po

sitive

Mostly Positive

Negative

Mostly Negative

I don’t know enough yet to have...

0% 0%0%0%0%

WikiLeaksOnline publisher/ repository of secret information, news leaks and classified material.

Launched in 2006

Founder Julian Assange

Donations◦ http://www.businessweek.com/articles/2013‐07‐11/wikileaks‐finds‐snowden‐cash‐bump‐elusive

Expenses◦ http://www.wired.com/threatlevel/2013/05/wikileaks‐donations‐down/

Brief mention in your book, p. 

15

Julian AssangeSelf‐described hacker/journalist

◦ http://www.youtube.com/watch?v=‐E5nrTRHSck&feature=player_embedded

Interview on Colbert Report◦ http://thecolbertreport.cc.com/videos/q1yz2t/julian‐assange

Assange’s Current Legal ProblemCurrently fighting extradition from UK to Sweden for prosecution of possible sex crimes◦ “holed up” at Ecuador’s Embassy in London since June 2012

◦ That is  1,234 days and counting…

◦ Interview April 7, 2015: http://www.craveonline.com/lifestyle/tech‐and‐gadgets‐news/843659‐julian‐assange‐nsa‐edward‐snowden‐fight‐government‐surveillance

◦ Some charges have expired but the statute of limitations on rape runs out August 2020

◦ In March 2015, Swedish officials have agreed to interview him at Ecuador’s London embassy. A meeting was set up in September, but it appears to have been blocked by UK authorities.

◦ Likely to remain at embassy because of WikiLeaks investigation.◦ http://www.reuters.com/article/2015/03/19/us‐usa‐assange‐investigation‐idUSKBN0MF2HQ20150319

In 2013, ran for a seat in the Australian senate. ◦ Lost as earned about 1% of the vote.

16

Bradley Manning: the ChargesAiding the enemy

Making information accessible to the enemy

Failure to obey a lawful order/regulation (computer system mods, improper storage

Violating the Espionage Act

Computer Fraud and Abuse Act

Embezzlement/Theft

Pretrial Incarceration & treatment

1,294 days

Harsh treatment◦ Was argued by his team that the charges should be dropped 

because of torture [nudity, isolation, harassment, sleep‐deprivation, conditions]

Trial, Verdict & SentencingManning requested judge trial (he wanted to NOT have a jury.) Why?

At trial, he plead guilty to some charges.◦ He was convicted under Espionage Act, disseminating classified field reports, State Dept cables, assessments of detainees at Guantanamo

◦ Acquitted of most serious charge: aiding the enemy

See table: http://www.washingtonpost.com/wp‐srv/special/national/manning‐verdict/?hpid=z1

17

“I was Bradley Manning”Daniel Ellsberg

http://www.theguardian.com/commentisfree/cifamerica/2011/mar/11/bradley‐manning‐wikileaks

http://www.huffingtonpost.com/2012/12/04/bradley‐manning‐daniel‐ellsberg‐pentagon‐papers_n_2240016.html

Do you agree with the verdict and sentencing?

A. No, Manning should not have been charged or prosecuted in the way he was

B. Yes, it all seems appropriate

C. Unsure

No, Manning should not have be..

Yes, it all seems appropriate

Unsure

0%0%0%