CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf ·...

Preview:

Citation preview

CITIZENSHIP &

THE CYBER SUMMIT Bob Liebman, Michael Lupro, David Wolf

Who is Edward Snowden?

What is he known for? Discuss with the person on your left for 2 minutes.

Edward Snowden

Hero?

Dissident? Patriot?

Traitor?

•  The U.S. government’s emphasis on National Security since the end of World War II (since 1945)

•  The arguments in the name of national security for the U.S. government’s cyber policies on encryption and metadata collection

• Context for the President’s 2015 Cyber Summit: the vulnerability of the Internet

•  Format of the real Cyber Summit and how we’ll convene our version this week

Topics We’ll Cover Today

The National Security Argument: What’s the case for government involvement in Cyber Space?

Post-World War II U.S. becomes global superpower

Truman Doctrine: America’s new place in world requires large peacetime army and skilled intelligence

Post-War II Focus on National Security • Presidents are judged by how they provide for “the

common defense” as “Commander-in-Chief”

• Congress passes the National Security Act in 1947 •  Creates National Security Council and CIA

• President Truman writes classified letter that outlines creation of National Security Agency (NSA) in 1952.

•  “National security” requires the “communication intelligence” activities of the NSA

The National Security Agency—what does it do? • NSA a highly secretive intelligence organization of U.S. government.

• Gathers information on foreign adversaries • Performs code breaking and code making (cryptography) • Protects U.S. government against network warfare.

NSA Headquarters Ft. Meade, MD

Why did America emphasize National Security to this degree?

No more Pearl Harbors

Cold War Struggle for Global Influence

The End of the Cold War

Collapse of Berlin Wall In 1989 Break up of the Soviet Union in early 1990s The lone superpower left, America seems to Have “won.”

The Internet & Globalization Globalization: interaction/integration of people, companies, and governments of different nations, a process in part driven by information technology. U.S. Dept. of Defense sponsors initial computer research leading to first computer network (1960s)—THE ARPANET. The ARPANET grows into the Internet (1970s); electronic mail created in 1972. Ethernet technology enables the nascent Internet to spread (1980s). Formation of the World Wide Web and commercialization of the Internet (1990s)

9-11-2001 World Trade Center Attacked

The U.S. enters a War Period

Patriot Act passed in October 2001 • Widespread support:

•  Senate votes 98-1; •  House of Representatives votes 357-66.

• Designed to give U.S. officials “new legal tools” to detect and thwart future terrorist attacks

• Gov’t gained new surveillance authority in terrorism cases •  The ability to conduct searches of property without the consent or

knowledge of owner or occupant

•  Source: Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard U.

Gov’t’s powers to obtain “metadata” NSA collects bulk telephone records from telcomm companies if it shows data is relevant to a terrorist investigation

Metadata is “data about data,” data about specific phone numbers dialed and duration of each call

Prevention of Another 9-11 • Surveillance powers

enable gov’t to prevent attacks by terrorist cells, suicide bombers, cyber terrorists

• 54 terror “plots” disrupted by NSA programs(this claim has been disputed)

• No major terror attacks since on home soil

Gen. Keith Alexander, Former NSA Director

Encryption, the IPhone, & Terrorism

February 16, 2016: U.S. Justice Department requests that Apple help hack the contents of an iPhone 5c used by Syed Farook, one of the shooters Apple refuses and calls government's request unconstitutional.

Dec. 2, 2015: Two shooters kill fourteen people and injure twenty-two in a terrorist attack in San Bernadino, CA.

What is Encryption? • Encryption: the coding of messages in ways that only the

receiver, using a “key,” can decode.

Where does digital security end and national security begin? “Apple chose to protect a dead Isis terrorist’s privacy over the security of the American people”

---U.S. Senator Tom Cotton of Arkansas

“The US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.” ---Apple CEO Tim Cook

Should law enforcement be denied access to crime data?

FBI Director James Comey Encryption on mobile devices leaves law enforcement “dark” to emerging threat

Apple CEO Tim Cook Our responsibility is to protect the privacy of customers

Cyber Security: Challenges & Tools

The development of cyber technologies has created new national security challenges, but also new tools for dealing with those challenges. In your teams, discuss both some major cyber security concerns our government now faces as well as some of the tools and techniques the government can draw on in defending Cyber space. On the index card provided, write down at least one major cyber security challenge we face and then also one cyber tool our government can use.

Group Activity: 5-7 minute discussion.

Question: Why a Cyber Summit? What is the context?

Answer: Cyberspace is a lawless frontier.

White House Summit on Cybersecurity & Consumer Protection Stanford University February 13, 2015 President Barack Obama, January 13, 2015 The summit will bring together: •  Industry •  tech companies •  law enforcement •  consumer and privacy advocates •  law professors •  students

Obama on need for Cyber cooperation

Network Insecurity • Pres. Obama: A major cyber attack could happen.

•  The U.S. electric grid is vulnerable. The Russians, Chinese, and Iranians may be in the grid already (Ted Koppel,

Lights Out, p. 53) • Google and its users are attacked “thousands of times

each day.” (The New Yorker magazine ) •  Corporations, banks, gov’t agencies hacked repeatedly.

What is Lost ?

• Consumer data • Government secrets •  Intellectual property •  Hard cash

Network Insecurity: So Much at Stake

• “They thought they were building a classroom, and it turned into a bank.”

•  – Historian Janet Abbate, author of Inventing the Internet

Major Hacks of US Organizations

US Government’s Office of Management & Budget (June 2015 by group of Chinese hackers) Hack obtained: •  Personal Information of 4 million government employees •  Emails/online accounts of people entrusted with the Nation’s secrets

North Korea’s Hack of Sony by “Guardians of the Peace” (G.O.P.) N. Korea sought cancellation of film ”The Interview”– about plot to assassinate North Korean leader Kim Jong-un Hackers planted Viper ( a type of malware) & destroyed servers They released to public: •  personal information of employees and families •  e-mails between employees •  executive salaries •  copies of unreleased Sony films & scripts

President of SONY urged employees not to read released emails. Feared they would turn against each other.

Sony Pictures Hack – Nov. 2014

Network Insecurity: Conflicts Between Government and the Private Sector •  Tension between industry’s desire to operate within a free enterprise system and government’s responsibility to develop high standards of security …

•  --Ted Koppel, author of Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

SUMMIT GOAL: PARTNERSHIP OBAMA: US needs for government, private sector, and nonprofit privacy advocates to negotiate a policy that meets national security aims while preserving constitutional freedoms. THE 10 TERABYTE QUESTION: How should we balance national security & personal privacy in Cyberspace? You must address this question this week.

The President: A Shared Mission

Other issues at the Stanford Summit: • American gov’t’s massive surveillance of its own citizens:

NSA’s bulk collection of “metadata”

• Edward Snowden revelations of NSA abuses of power in 2013: privacy advocates cry out against government overreach

• Government presses companies for access to their encrypted networks through “back doors”

Who attended the actual Summit?

?

POTUS Apple CEO Tim Cook

Dir. of Homeland Security Jeh Johnson

Nuala O’Connor Center for Democracy & Technology

Bank of America CEO Brian Moynihan

Maria Contreras Sweet Dir. Of Small Business Adminisrration

Who Stayed Away?

•  ?

NSA Director Admiral Michael Rogers

Cindy Cohen Exec. Dir. Electronic Frontier Foundation

Facebook CEO Mark Zuckerberg

More of the absent …

Sergei Brin, Google Founder

Jeff Bizos of Amazon NSA Whistleblower Edward Snowden

What happened? President Signs Executive Order

Not too much else happened … The big issues remain unresolved …

We’ll take our crack at them this week.

Role Play: reenact the Stanford Summit The reasons: • Get into heads of cyber stakeholders to grasp ethical

issues

• Practice negotiating differences and forging consensus in true to life setting

•  Try on multiple ideas and potential solutions for complex

policy questions

PSU CYBERSECURITY SUMMIT: A Working Partnership?

President (POTUS)

National Security Chief

Global Tech CEO

Constitutional Rights Advocate

Telecom/Social Media CEO

Whistleblower Journalist

Negotiation Group

The Process for this week Monday – Summit preview/National Security issues Tuesday – Constitutional arguments to protect privacy Ø Dossiers distributed – Study your assigned role

Wednesday – Caucus & negotiate Ø role groups & negotiating groups Thursday – More caucusing and negotiating Friday – Submit video sharing your group’s policy solutions Saturday—Screen videos for judging

National Security vs. Preservation of Civil Liberties

•  U.S. has extraordinary national security concerns in the 21st century and Cyber security is among its most important.

•  Cyber Summit brings together stakeholders to negotiate policies that balance national security concerns & constitutional freedoms.

•  Students to play roles of stakeholders in the Cyber Summit to represent their interests.

•  Role Dossiers distributed after Bob Liebman’s Tuesday Presentation.

Recommended