citizenship the cyber summitweb.cecs.pdx.edu/~sheard/cybercamp/cybersummitslides01.pdf ·...
TRANSCRIPT
CITIZENSHIP &
THE CYBER SUMMIT Bob Liebman, Michael Lupro, David Wolf
Who is Edward Snowden?
What is he known for? Discuss with the person on your left for 2 minutes.
Edward Snowden
Hero?
Dissident? Patriot?
Traitor?
• The U.S. government’s emphasis on National Security since the end of World War II (since 1945)
• The arguments in the name of national security for the U.S. government’s cyber policies on encryption and metadata collection
• Context for the President’s 2015 Cyber Summit: the vulnerability of the Internet
• Format of the real Cyber Summit and how we’ll convene our version this week
Topics We’ll Cover Today
The National Security Argument: What’s the case for government involvement in Cyber Space?
Post-World War II U.S. becomes global superpower
Truman Doctrine: America’s new place in world requires large peacetime army and skilled intelligence
Post-War II Focus on National Security • Presidents are judged by how they provide for “the
common defense” as “Commander-in-Chief”
• Congress passes the National Security Act in 1947 • Creates National Security Council and CIA
• President Truman writes classified letter that outlines creation of National Security Agency (NSA) in 1952.
• “National security” requires the “communication intelligence” activities of the NSA
The National Security Agency—what does it do? • NSA a highly secretive intelligence organization of U.S. government.
• Gathers information on foreign adversaries • Performs code breaking and code making (cryptography) • Protects U.S. government against network warfare.
NSA Headquarters Ft. Meade, MD
Why did America emphasize National Security to this degree?
No more Pearl Harbors
Cold War Struggle for Global Influence
The End of the Cold War
Collapse of Berlin Wall In 1989 Break up of the Soviet Union in early 1990s The lone superpower left, America seems to Have “won.”
The Internet & Globalization Globalization: interaction/integration of people, companies, and governments of different nations, a process in part driven by information technology. U.S. Dept. of Defense sponsors initial computer research leading to first computer network (1960s)—THE ARPANET. The ARPANET grows into the Internet (1970s); electronic mail created in 1972. Ethernet technology enables the nascent Internet to spread (1980s). Formation of the World Wide Web and commercialization of the Internet (1990s)
9-11-2001 World Trade Center Attacked
The U.S. enters a War Period
Patriot Act passed in October 2001 • Widespread support:
• Senate votes 98-1; • House of Representatives votes 357-66.
• Designed to give U.S. officials “new legal tools” to detect and thwart future terrorist attacks
• Gov’t gained new surveillance authority in terrorism cases • The ability to conduct searches of property without the consent or
knowledge of owner or occupant
• Source: Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard U.
Gov’t’s powers to obtain “metadata” NSA collects bulk telephone records from telcomm companies if it shows data is relevant to a terrorist investigation
Metadata is “data about data,” data about specific phone numbers dialed and duration of each call
Prevention of Another 9-11 • Surveillance powers
enable gov’t to prevent attacks by terrorist cells, suicide bombers, cyber terrorists
• 54 terror “plots” disrupted by NSA programs(this claim has been disputed)
• No major terror attacks since on home soil
Gen. Keith Alexander, Former NSA Director
Encryption, the IPhone, & Terrorism
February 16, 2016: U.S. Justice Department requests that Apple help hack the contents of an iPhone 5c used by Syed Farook, one of the shooters Apple refuses and calls government's request unconstitutional.
Dec. 2, 2015: Two shooters kill fourteen people and injure twenty-two in a terrorist attack in San Bernadino, CA.
What is Encryption? • Encryption: the coding of messages in ways that only the
receiver, using a “key,” can decode.
Where does digital security end and national security begin? “Apple chose to protect a dead Isis terrorist’s privacy over the security of the American people”
---U.S. Senator Tom Cotton of Arkansas
“The US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.” ---Apple CEO Tim Cook
Should law enforcement be denied access to crime data?
FBI Director James Comey Encryption on mobile devices leaves law enforcement “dark” to emerging threat
Apple CEO Tim Cook Our responsibility is to protect the privacy of customers
Cyber Security: Challenges & Tools
The development of cyber technologies has created new national security challenges, but also new tools for dealing with those challenges. In your teams, discuss both some major cyber security concerns our government now faces as well as some of the tools and techniques the government can draw on in defending Cyber space. On the index card provided, write down at least one major cyber security challenge we face and then also one cyber tool our government can use.
Group Activity: 5-7 minute discussion.
Question: Why a Cyber Summit? What is the context?
Answer: Cyberspace is a lawless frontier.
White House Summit on Cybersecurity & Consumer Protection Stanford University February 13, 2015 President Barack Obama, January 13, 2015 The summit will bring together: • Industry • tech companies • law enforcement • consumer and privacy advocates • law professors • students
Obama on need for Cyber cooperation
Network Insecurity • Pres. Obama: A major cyber attack could happen.
• The U.S. electric grid is vulnerable. The Russians, Chinese, and Iranians may be in the grid already (Ted Koppel,
Lights Out, p. 53) • Google and its users are attacked “thousands of times
each day.” (The New Yorker magazine ) • Corporations, banks, gov’t agencies hacked repeatedly.
What is Lost ?
• Consumer data • Government secrets • Intellectual property • Hard cash
Network Insecurity: So Much at Stake
• “They thought they were building a classroom, and it turned into a bank.”
• – Historian Janet Abbate, author of Inventing the Internet
Major Hacks of US Organizations
US Government’s Office of Management & Budget (June 2015 by group of Chinese hackers) Hack obtained: • Personal Information of 4 million government employees • Emails/online accounts of people entrusted with the Nation’s secrets
North Korea’s Hack of Sony by “Guardians of the Peace” (G.O.P.) N. Korea sought cancellation of film ”The Interview”– about plot to assassinate North Korean leader Kim Jong-un Hackers planted Viper ( a type of malware) & destroyed servers They released to public: • personal information of employees and families • e-mails between employees • executive salaries • copies of unreleased Sony films & scripts
President of SONY urged employees not to read released emails. Feared they would turn against each other.
Sony Pictures Hack – Nov. 2014
Network Insecurity: Conflicts Between Government and the Private Sector • Tension between industry’s desire to operate within a free enterprise system and government’s responsibility to develop high standards of security …
• --Ted Koppel, author of Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath
SUMMIT GOAL: PARTNERSHIP OBAMA: US needs for government, private sector, and nonprofit privacy advocates to negotiate a policy that meets national security aims while preserving constitutional freedoms. THE 10 TERABYTE QUESTION: How should we balance national security & personal privacy in Cyberspace? You must address this question this week.
The President: A Shared Mission
Other issues at the Stanford Summit: • American gov’t’s massive surveillance of its own citizens:
NSA’s bulk collection of “metadata”
• Edward Snowden revelations of NSA abuses of power in 2013: privacy advocates cry out against government overreach
• Government presses companies for access to their encrypted networks through “back doors”
Who attended the actual Summit?
?
POTUS Apple CEO Tim Cook
Dir. of Homeland Security Jeh Johnson
Nuala O’Connor Center for Democracy & Technology
Bank of America CEO Brian Moynihan
Maria Contreras Sweet Dir. Of Small Business Adminisrration
Who Stayed Away?
• ?
NSA Director Admiral Michael Rogers
Cindy Cohen Exec. Dir. Electronic Frontier Foundation
Facebook CEO Mark Zuckerberg
More of the absent …
Sergei Brin, Google Founder
Jeff Bizos of Amazon NSA Whistleblower Edward Snowden
What happened? President Signs Executive Order
Not too much else happened … The big issues remain unresolved …
We’ll take our crack at them this week.
Role Play: reenact the Stanford Summit The reasons: • Get into heads of cyber stakeholders to grasp ethical
issues
• Practice negotiating differences and forging consensus in true to life setting
• Try on multiple ideas and potential solutions for complex
policy questions
PSU CYBERSECURITY SUMMIT: A Working Partnership?
President (POTUS)
National Security Chief
Global Tech CEO
Constitutional Rights Advocate
Telecom/Social Media CEO
Whistleblower Journalist
Negotiation Group
The Process for this week Monday – Summit preview/National Security issues Tuesday – Constitutional arguments to protect privacy Ø Dossiers distributed – Study your assigned role
Wednesday – Caucus & negotiate Ø role groups & negotiating groups Thursday – More caucusing and negotiating Friday – Submit video sharing your group’s policy solutions Saturday—Screen videos for judging
National Security vs. Preservation of Civil Liberties
• U.S. has extraordinary national security concerns in the 21st century and Cyber security is among its most important.
• Cyber Summit brings together stakeholders to negotiate policies that balance national security concerns & constitutional freedoms.
• Students to play roles of stakeholders in the Cyber Summit to represent their interests.
• Role Dossiers distributed after Bob Liebman’s Tuesday Presentation.