SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Privacy vs. Security
By: Ilse Genovese, BreAnn Fields, Yonatan Brand, Kuang Htet, and Dana
Daniel
Privacy vs Security
What do the terms “privacy”
and “security” mean?
How do they relate and how
are they different?
Privacy vs Security
❏Privacy is part of the civil liberties reflected in the Bill
of Rights, the 1st, 3rd, 4th and 5th Amendments to the U.S. Constitution
❏Security = being free from harm and dangers
❏Safeguarding private information contributes to greater trust in whoever
holds that information (government, organizations, social media)
❏Keeping citizens secure, i.e., free from harm and dangers, is one of the
basic responsibilities of government
Privacy and security come to life in the case of Linux
The Case of Linux
exible and free
source: Created in the spirit of “naive
mentation”, just for fun [Just for Fun, 1992]
ed from 10,000 to 19 million lines of code
ssing the cognitive surplus of an unruly
who tailored the operating system to their
stes and purpose
The Case of Linux
❏ Elaborate, remarkably functioning system
❏ Works on almost any chip
❏ Stable and reliable managing the demands
of many programs
❏ Frequent free updates
❏ More popular than Microsoft’s Windows or
Apple’s iOX
The Case of Linux
But, world’s largest collaborative project,
Linus Torvald’s “hobby”, had a flaw--
the heart of the operating system, the kernel, has
become a popular target of botnets.
In September, a massive botnet attacked up to 20 targets a day,
worldwide | AshleyMadison.com in July
The Case of Linux
Efforts to “toughen” Linux with security
features (NSA’s SELinux for “sensitive work”)
Even with defenses around the kernel, though,
blackhats’ bugs can penetrate it
Torvald adamant : “There are no security bugs, just
“normal” bugs. Tracking them and making details
public encourages hackers.”
The Case of SELinux
❏ NSA’s SELinux = advanced security features
for “sensitive work”.
❏ But, building walls around Linux does not
solve the problem as Linux kernel easily
penetrable
❏ Brand Spengler (Grsecurity) circulated a “spoof
on NSA’s SELinux illusion”
The Case of SELinux
From SELinux to KALI LINUX
❏ Kees Cook: Linux “the ultimate attack
surface”; hackers can make it do
anything they want.” --- like DDoS attacks
❏ KALI LINUX = Great news for hackers
and Backtrack Linux fans!
Release date: 13th of March, 2013
Completely free, Open source
Vast wireless device support
GPG signed packages and repos
Multi-language
Completely customizable
.
One of the best available masterpieces
of the hacking community
The Case of KALI LINUX
The Cybersecurity Information Sharing Act
❏The fact of our times: private information is no longer secure
❏Congress wades in into the privacy vs. security debate with a new
cybersecurity bill, the CyberSecurity Information Sharing (CISA)
❏“A system that lets companies share evidence of hackers’
footsteps among themselves and with the U.S. government
without the risk of being sued for breaking privacy
protection or anti-trust laws” [Laura Hautala]
The Cybersecurity Information Sharing Act
“Critics, including more than 20 of the biggest
companies in the tech industry argue that the bill does
not do enough to protect the privacy of individuals and
could lead to mass government surveillance” [Laura
Hautala]
Senate Vote on The Cybersecurity bill
The Double-Edged Sword: Encryption
How do we know which app or chat
program is encrypted and which is
not?
Popular Encrypted Chat Programs
Cryptocat
Skype (Encrypted but cooperates with DHS)
Whatsapp (cooperates with DHS)
Telegram (mostly used by ISIS)
Blackberry messenger
AIM (Cooperates with DHS)
The Double-Edged Sword: Encryption
Fact: encryption helps terrorists as much as it
does law-abiding citizens, by keeping their
activities hidden from authorities
Terrorists have gone to school on encryption”
-- John Brennan, CIA Director
The Double-Edged Sword: Encryption
How encryption can be used for malicious purposes
Paris
❏ Playstation Messenger in Playstation 4 allegedly used by the
attackers to communicate with their base in Syria
❏ Voice communication in first-person shooters video games used to
communicate threat. Can throw law enforcement off of a valid threat
Australia
❏Playstation 4 used by a teen to download plans for a bomb via the
Playstation network
Encryption for Meaningful Purpose
❏ VPN connection can help individuals
❏ Encryption can prevent government
from following communication
among terrorists
❏ Snowden’s disclosures about NSA’s
metadata collection
❏ Prevent government from obtaining
personal data.
❏ USA Patriot Act II prohibits NSA from collecting telephone metadata from U.S
citizens (Section 2015)
Privacy, Security and Democracy
❏ Open source projects
Cognitive surplus used for the greater good
Promote productivity, ingenuity, innovation
Democratic in nature
Ethical intent
Can be misused
Fallacy that privacy and security can exist
independently of each other
Discussion/Questions
Q1: Should law enforcement be granted “extraordinary access”
to devices known to be used by terrorists?
Q2: Where should we draw the line between privacy vs security
when it comes to government tracking online activities
and messages?
Q3: Would you be willing to forego total encryption of your
information if that means that security agencies would be better
able to track terrorist chatter?
Q4: What do you think about the sunsetting of Section 215 in the
Freedom Act?

Weitere ähnliche Inhalte

Was ist angesagt?

The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAmy Lenzo
 

Was ist angesagt? (19)

"Hacking"
"Hacking""Hacking"
"Hacking"
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 

Andere mochten auch

Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBIBlake Uhing
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
The FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateThe FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateMike Chapple
 

Andere mochten auch (8)

Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBI
 
Security news 20160225
Security news 20160225Security news 20160225
Security news 20160225
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
The FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateThe FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the Debate
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 

Ähnlich wie Privacy vs Security

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Govarii827
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...Dana Gardner
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 

Ähnlich wie Privacy vs Security (20)

Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...
Corporate Data, Supply Chains Vulnerable to Cyber Crime Attacks from Outside ...
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 

Privacy vs Security

  • 1. Privacy vs. Security By: Ilse Genovese, BreAnn Fields, Yonatan Brand, Kuang Htet, and Dana Daniel
  • 2. Privacy vs Security What do the terms “privacy” and “security” mean? How do they relate and how are they different?
  • 3. Privacy vs Security ❏Privacy is part of the civil liberties reflected in the Bill of Rights, the 1st, 3rd, 4th and 5th Amendments to the U.S. Constitution ❏Security = being free from harm and dangers ❏Safeguarding private information contributes to greater trust in whoever holds that information (government, organizations, social media) ❏Keeping citizens secure, i.e., free from harm and dangers, is one of the basic responsibilities of government Privacy and security come to life in the case of Linux
  • 4. The Case of Linux exible and free source: Created in the spirit of “naive mentation”, just for fun [Just for Fun, 1992] ed from 10,000 to 19 million lines of code ssing the cognitive surplus of an unruly who tailored the operating system to their stes and purpose
  • 5. The Case of Linux ❏ Elaborate, remarkably functioning system ❏ Works on almost any chip ❏ Stable and reliable managing the demands of many programs ❏ Frequent free updates ❏ More popular than Microsoft’s Windows or Apple’s iOX
  • 6. The Case of Linux But, world’s largest collaborative project, Linus Torvald’s “hobby”, had a flaw-- the heart of the operating system, the kernel, has become a popular target of botnets. In September, a massive botnet attacked up to 20 targets a day, worldwide | AshleyMadison.com in July
  • 7. The Case of Linux Efforts to “toughen” Linux with security features (NSA’s SELinux for “sensitive work”) Even with defenses around the kernel, though, blackhats’ bugs can penetrate it Torvald adamant : “There are no security bugs, just “normal” bugs. Tracking them and making details public encourages hackers.”
  • 8. The Case of SELinux ❏ NSA’s SELinux = advanced security features for “sensitive work”. ❏ But, building walls around Linux does not solve the problem as Linux kernel easily penetrable ❏ Brand Spengler (Grsecurity) circulated a “spoof on NSA’s SELinux illusion”
  • 9. The Case of SELinux
  • 10. From SELinux to KALI LINUX ❏ Kees Cook: Linux “the ultimate attack surface”; hackers can make it do anything they want.” --- like DDoS attacks ❏ KALI LINUX = Great news for hackers and Backtrack Linux fans!
  • 11. Release date: 13th of March, 2013 Completely free, Open source Vast wireless device support GPG signed packages and repos Multi-language Completely customizable . One of the best available masterpieces of the hacking community The Case of KALI LINUX
  • 12. The Cybersecurity Information Sharing Act ❏The fact of our times: private information is no longer secure ❏Congress wades in into the privacy vs. security debate with a new cybersecurity bill, the CyberSecurity Information Sharing (CISA) ❏“A system that lets companies share evidence of hackers’ footsteps among themselves and with the U.S. government without the risk of being sued for breaking privacy protection or anti-trust laws” [Laura Hautala]
  • 13. The Cybersecurity Information Sharing Act “Critics, including more than 20 of the biggest companies in the tech industry argue that the bill does not do enough to protect the privacy of individuals and could lead to mass government surveillance” [Laura Hautala]
  • 14. Senate Vote on The Cybersecurity bill
  • 15. The Double-Edged Sword: Encryption How do we know which app or chat program is encrypted and which is not? Popular Encrypted Chat Programs Cryptocat Skype (Encrypted but cooperates with DHS) Whatsapp (cooperates with DHS) Telegram (mostly used by ISIS) Blackberry messenger AIM (Cooperates with DHS)
  • 16. The Double-Edged Sword: Encryption Fact: encryption helps terrorists as much as it does law-abiding citizens, by keeping their activities hidden from authorities Terrorists have gone to school on encryption” -- John Brennan, CIA Director
  • 17. The Double-Edged Sword: Encryption How encryption can be used for malicious purposes Paris ❏ Playstation Messenger in Playstation 4 allegedly used by the attackers to communicate with their base in Syria ❏ Voice communication in first-person shooters video games used to communicate threat. Can throw law enforcement off of a valid threat Australia ❏Playstation 4 used by a teen to download plans for a bomb via the Playstation network
  • 18. Encryption for Meaningful Purpose ❏ VPN connection can help individuals ❏ Encryption can prevent government from following communication among terrorists ❏ Snowden’s disclosures about NSA’s metadata collection ❏ Prevent government from obtaining personal data. ❏ USA Patriot Act II prohibits NSA from collecting telephone metadata from U.S citizens (Section 2015)
  • 19. Privacy, Security and Democracy ❏ Open source projects Cognitive surplus used for the greater good Promote productivity, ingenuity, innovation Democratic in nature Ethical intent Can be misused Fallacy that privacy and security can exist independently of each other
  • 20. Discussion/Questions Q1: Should law enforcement be granted “extraordinary access” to devices known to be used by terrorists? Q2: Where should we draw the line between privacy vs security when it comes to government tracking online activities and messages? Q3: Would you be willing to forego total encryption of your information if that means that security agencies would be better able to track terrorist chatter? Q4: What do you think about the sunsetting of Section 215 in the Freedom Act?

Hinweis der Redaktion

  1. Privacy is one of the most important issue affecting the use of technology and information sharing Linux the largest online collaborative project White hacks Too much security affects innovation The long tail User space: users as creators of content; should not be impeded