SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Saying no to the government Christopher Soghoian Indiana University Presented at LSI Cloud Computing Seminar
About me and my work PhD Candidate at Indiana University Privacy activist Some of my previous work includes: TSA / No Fly List activism TACO Behavioral Advertising add-on for Firefox Open letter to Google Re: SSL for Gmail These opinions are my own.
A problem for Internet companies Consumers care about their privacy, and are particularly concerned about government access. The government routinely compels Internet and telecom companies to disclose their customers’ data. When the firms do disclose (as required by law), they are criticized, blamed and shamed by privacy activists.
Saying “no” to the Feds is great PR Qwest and the NSA (2001). Gonzales v. Google (2006). Kramerbooks and Kenneth Starr (1998). Tattered Cover v. City of Thornton (Colo. 2002). In re Application of U.S. (D. Col. 2010)
Saying yes to the feds brings bad press Jetblue sharing passenger data with DoD (2004). AT&T and Verizon providing “sneak peeks” to the FBI (DOJ OIG report, 2010). Yahoo and Chinese dissidents (2003). What about the legal costs?
Companies can be compelled to violate their end user’s privacy In re the U.S. for an Order Auth. the Roving Interception of Oral Commc’n, 349 F.3d 1132, 1134 (9th Cir. 2003).
How can you protect your customer’s data from government access, yet still comply with the law?
Companies have significant freedom Technical Policies: Minimal data retention Transport encryption Storage encryption Don’t ever handle user’s encryption keys. Legal policies: No voluntary disclosure of data in emergencies. Charge the government. Theofel standard, no matter where the request comes from. Publish stats on government requests.
Data Retention If you don’t log it, you can’t be compelled to disclose it. Examples include Indymedia.us (2009). The Tor anonymous browsing network. Sprint Nextel (static IPs retained for 2 years) vs. T-Mobile & Cricket (no logging of IP info).
Swedish ISPs An anti-piracy law enacted April 1, 2009, forcing ISPs to disclose identities of accused P2P infringers.
Transport Encryption Not all cloud computing providers provide the same degree of security. You wouldn’t use a bank that doesn’t offer SSL – why do you trust a cloud based provider that doesn’t offer SSL (and enable it by default).
Storage Encryption Several services now offer cloud based storage of user data, with an encryption key only known to the user. If the government compels disclosure of data, they have nothing useful to deliver. Do NOT handle the user’s encryption keys, even for a second or two.
Pro-privacy ECPA positions Yes, ECPA strictly regulates when the government can compel the disclosure of customer information. However, companies can adopt extremely strong pro-privacy positions, and still comply with ECPA.
Voluntary Disclosure and ECPA 18 USC 2702 regulates the voluntary disclosure of data to the government in emergencies. There is no emergency obligation to disclose. Rule 41 (d)(3)(A) states: “A magistrate judge may issue a warrant based on information communicated by telephone or other reliable electronic means.” Companies can and should adopt a policy of “no valid legal process, no data.”
Charge the government 18 USC 2706: permits you to charge the government reasonable costs for compliance with requests. The problem with free: No reason not to ask. Charging just $1 changes the equation.
Don’t keep the money “Selling” your users’ data to the government looks really bad. Solution: Charge the government, and then donate the money to charity.
Theofelv. Farey-Jones DOJ’s position: Once an email has been opened, it can be obtained with a subpoena. Ninth circuit disagrees. Some ISPs have argued that since their HQ is in 9th circuit, Theofel applies no matter where the request comes from. Others have simply argued that Theofel is the correct interpretation of the law. DOJ isn’t happy – Good. Make them fight it out in court.
Publish Stats!
Further reading (my work) An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government, Forthcoming. Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era,Journal on Telecommunications and High Technology Law, Vol. 8, No. 2, 2010. More info and other work available at: http://www.dubfire.net Email me: csoghoian@gmail.com

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyberlaw
CyberlawCyberlaw
CyberlawLamont Lum
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
Legislation
LegislationLegislation
Legislationmegabyte
 
Should European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot ActShould European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot Actfrjennings
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Anthony Rapa
 
Criminal Antitrust Update ~ January 2013
Criminal Antitrust Update ~ January 2013Criminal Antitrust Update ~ January 2013
Criminal Antitrust Update ~ January 2013Patton Boggs LLP
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020rhedges
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...morsemh
 
Human Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookHuman Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookSean Gugerty
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber HarassmentBennet Kelley
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media ExpoInternet Law Center
 
Intellectual Property In California
Intellectual Property In CaliforniaIntellectual Property In California
Intellectual Property In CaliforniaEEVaranini
 
Cloud primer
Cloud primerCloud primer
Cloud primerZeno Idzerda
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 

Was ist angesagt? (20)

Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Legislation
LegislationLegislation
Legislation
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Should European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot ActShould European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot Act
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Criminal Antitrust Update ~ January 2013
Criminal Antitrust Update ~ January 2013Criminal Antitrust Update ~ January 2013
Criminal Antitrust Update ~ January 2013
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020
 
Wills and estates law in the digital age
Wills and estates law in the digital ageWills and estates law in the digital age
Wills and estates law in the digital age
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...
Drinker Biddle ABA Antitrust Section Corporate Counseling September October U...
 
Human Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookHuman Trafficking Court Case Against Facebook
Human Trafficking Court Case Against Facebook
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Intellectual Property In California
Intellectual Property In CaliforniaIntellectual Property In California
Intellectual Property In California
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
FilmingThePolice
FilmingThePoliceFilmingThePolice
FilmingThePolice
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 

Andere mochten auch

Andere mochten auch (6)

Hoja de vida nt actual
Hoja de vida nt actualHoja de vida nt actual
Hoja de vida nt actual
 
Karen
KarenKaren
Karen
 
Vm component
Vm componentVm component
Vm component
 
Syllabus Gerencia Ambiental
Syllabus Gerencia AmbientalSyllabus Gerencia Ambiental
Syllabus Gerencia Ambiental
 
Rrpp partes ibero 2016 1 57 sep 23
 Rrpp partes ibero 2016 1 57 sep 23 Rrpp partes ibero 2016 1 57 sep 23
Rrpp partes ibero 2016 1 57 sep 23
 
Syllabus planeacion estrategica
Syllabus planeacion estrategicaSyllabus planeacion estrategica
Syllabus planeacion estrategica
 

Ähnlich wie Saying no to the government

Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the LawChristina Gagnier
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Training Presentation on Shareholder crimes
Training Presentation on Shareholder crimesTraining Presentation on Shareholder crimes
Training Presentation on Shareholder crimesDissertation Help Service
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Matthew MacNabb
 
Pisa-Relli ITAR Civil Enforcement (November 2011)
Pisa-Relli ITAR Civil Enforcement (November 2011)Pisa-Relli ITAR Civil Enforcement (November 2011)
Pisa-Relli ITAR Civil Enforcement (November 2011)John Pisa-Relli
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshellMatthew Butler
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresJason Fernandes
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber AttackBrian Miller, Solicitor
 

Ähnlich wie Saying no to the government (20)

Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Ppt3 copy
Ppt3  copyPpt3  copy
Ppt3 copy
 
Chapter2
Chapter2Chapter2
Chapter2
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Training Presentation on Shareholder crimes
Training Presentation on Shareholder crimesTraining Presentation on Shareholder crimes
Training Presentation on Shareholder crimes
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
 
Pisa-Relli ITAR Civil Enforcement (November 2011)
Pisa-Relli ITAR Civil Enforcement (November 2011)Pisa-Relli ITAR Civil Enforcement (November 2011)
Pisa-Relli ITAR Civil Enforcement (November 2011)
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 

KĂŒrzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

KĂŒrzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Saying no to the government

  • 1. Saying no to the government Christopher Soghoian Indiana University Presented at LSI Cloud Computing Seminar
  • 2. About me and my work PhD Candidate at Indiana University Privacy activist Some of my previous work includes: TSA / No Fly List activism TACO Behavioral Advertising add-on for Firefox Open letter to Google Re: SSL for Gmail These opinions are my own.
  • 3. A problem for Internet companies Consumers care about their privacy, and are particularly concerned about government access. The government routinely compels Internet and telecom companies to disclose their customers’ data. When the firms do disclose (as required by law), they are criticized, blamed and shamed by privacy activists.
  • 4. Saying “no” to the Feds is great PR Qwest and the NSA (2001). Gonzales v. Google (2006). Kramerbooks and Kenneth Starr (1998). Tattered Cover v. City of Thornton (Colo. 2002). In re Application of U.S. (D. Col. 2010)
  • 5. Saying yes to the feds brings bad press Jetblue sharing passenger data with DoD (2004). AT&T and Verizon providing “sneak peeks” to the FBI (DOJ OIG report, 2010). Yahoo and Chinese dissidents (2003). What about the legal costs?
  • 6.
  • 7. Companies can be compelled to violate their end user’s privacy In re the U.S. for an Order Auth. the Roving Interception of Oral Commc’n, 349 F.3d 1132, 1134 (9th Cir. 2003).
  • 8. How can you protect your customer’s data from government access, yet still comply with the law?
  • 9. Companies have significant freedom Technical Policies: Minimal data retention Transport encryption Storage encryption Don’t ever handle user’s encryption keys. Legal policies: No voluntary disclosure of data in emergencies. Charge the government. Theofel standard, no matter where the request comes from. Publish stats on government requests.
  • 10. Data Retention If you don’t log it, you can’t be compelled to disclose it. Examples include Indymedia.us (2009). The Tor anonymous browsing network. Sprint Nextel (static IPs retained for 2 years) vs. T-Mobile & Cricket (no logging of IP info).
  • 11. Swedish ISPs An anti-piracy law enacted April 1, 2009, forcing ISPs to disclose identities of accused P2P infringers.
  • 12. Transport Encryption Not all cloud computing providers provide the same degree of security. You wouldn’t use a bank that doesn’t offer SSL – why do you trust a cloud based provider that doesn’t offer SSL (and enable it by default).
  • 13.
  • 14. Storage Encryption Several services now offer cloud based storage of user data, with an encryption key only known to the user. If the government compels disclosure of data, they have nothing useful to deliver. Do NOT handle the user’s encryption keys, even for a second or two.
  • 15. Pro-privacy ECPA positions Yes, ECPA strictly regulates when the government can compel the disclosure of customer information. However, companies can adopt extremely strong pro-privacy positions, and still comply with ECPA.
  • 16. Voluntary Disclosure and ECPA 18 USC 2702 regulates the voluntary disclosure of data to the government in emergencies. There is no emergency obligation to disclose. Rule 41 (d)(3)(A) states: “A magistrate judge may issue a warrant based on information communicated by telephone or other reliable electronic means.” Companies can and should adopt a policy of “no valid legal process, no data.”
  • 17. Charge the government 18 USC 2706: permits you to charge the government reasonable costs for compliance with requests. The problem with free: No reason not to ask. Charging just $1 changes the equation.
  • 18. Don’t keep the money “Selling” your users’ data to the government looks really bad. Solution: Charge the government, and then donate the money to charity.
  • 19. Theofelv. Farey-Jones DOJ’s position: Once an email has been opened, it can be obtained with a subpoena. Ninth circuit disagrees. Some ISPs have argued that since their HQ is in 9th circuit, Theofel applies no matter where the request comes from. Others have simply argued that Theofel is the correct interpretation of the law. DOJ isn’t happy – Good. Make them fight it out in court.
  • 21. Further reading (my work) An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government, Forthcoming. Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era,Journal on Telecommunications and High Technology Law, Vol. 8, No. 2, 2010. More info and other work available at: http://www.dubfire.net Email me: csoghoian@gmail.com