48
CITIZENSHIP & THE CYBER SUMMIT Bob Liebman, Michael Lupro, David Wolf

CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

CITIZENSHIP &

THE CYBER SUMMIT Bob Liebman, Michael Lupro, David Wolf

Page 2: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Who is Edward Snowden?

What is he known for? Discuss with the person on your left for 2 minutes.

Page 3: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Edward Snowden

Hero?

Dissident? Patriot?

Traitor?

Page 4: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

•  The U.S. government’s emphasis on National Security since the end of World War II (since 1945)

•  The arguments in the name of national security for the U.S. government’s cyber policies on encryption and metadata collection

• Context for the President’s 2015 Cyber Summit: the vulnerability of the Internet

•  Format of the real Cyber Summit and how we’ll convene our version this week

Topics We’ll Cover Today

Page 5: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The National Security Argument: What’s the case for government involvement in Cyber Space?

Page 6: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Post-World War II U.S. becomes global superpower

Page 7: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Truman Doctrine: America’s new place in world requires large peacetime army and skilled intelligence

Page 8: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Post-War II Focus on National Security • Presidents are judged by how they provide for “the

common defense” as “Commander-in-Chief”

• Congress passes the National Security Act in 1947 •  Creates National Security Council and CIA

• President Truman writes classified letter that outlines creation of National Security Agency (NSA) in 1952.

•  “National security” requires the “communication intelligence” activities of the NSA

Page 9: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The National Security Agency—what does it do? • NSA a highly secretive intelligence organization of U.S. government.

• Gathers information on foreign adversaries • Performs code breaking and code making (cryptography) • Protects U.S. government against network warfare.

NSA Headquarters Ft. Meade, MD

Page 10: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Why did America emphasize National Security to this degree?

Page 11: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

No more Pearl Harbors

Page 12: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Cold War Struggle for Global Influence

Page 13: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The End of the Cold War

Collapse of Berlin Wall In 1989 Break up of the Soviet Union in early 1990s The lone superpower left, America seems to Have “won.”

Page 14: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The Internet & Globalization Globalization: interaction/integration of people, companies, and governments of different nations, a process in part driven by information technology. U.S. Dept. of Defense sponsors initial computer research leading to first computer network (1960s)—THE ARPANET. The ARPANET grows into the Internet (1970s); electronic mail created in 1972. Ethernet technology enables the nascent Internet to spread (1980s). Formation of the World Wide Web and commercialization of the Internet (1990s)

Page 15: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

9-11-2001 World Trade Center Attacked

Page 16: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The U.S. enters a War Period

Page 17: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Patriot Act passed in October 2001 • Widespread support:

•  Senate votes 98-1; •  House of Representatives votes 357-66.

• Designed to give U.S. officials “new legal tools” to detect and thwart future terrorist attacks

• Gov’t gained new surveillance authority in terrorism cases •  The ability to conduct searches of property without the consent or

knowledge of owner or occupant

•  Source: Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard U.

Page 18: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Gov’t’s powers to obtain “metadata” NSA collects bulk telephone records from telcomm companies if it shows data is relevant to a terrorist investigation

Metadata is “data about data,” data about specific phone numbers dialed and duration of each call

Page 19: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Prevention of Another 9-11 • Surveillance powers

enable gov’t to prevent attacks by terrorist cells, suicide bombers, cyber terrorists

• 54 terror “plots” disrupted by NSA programs(this claim has been disputed)

• No major terror attacks since on home soil

Gen. Keith Alexander, Former NSA Director

Page 20: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Encryption, the IPhone, & Terrorism

February 16, 2016: U.S. Justice Department requests that Apple help hack the contents of an iPhone 5c used by Syed Farook, one of the shooters Apple refuses and calls government's request unconstitutional.

Dec. 2, 2015: Two shooters kill fourteen people and injure twenty-two in a terrorist attack in San Bernadino, CA.

Page 21: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

What is Encryption? • Encryption: the coding of messages in ways that only the

receiver, using a “key,” can decode.

Page 22: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Where does digital security end and national security begin? “Apple chose to protect a dead Isis terrorist’s privacy over the security of the American people”

---U.S. Senator Tom Cotton of Arkansas

“The US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.” ---Apple CEO Tim Cook

Page 23: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Should law enforcement be denied access to crime data?

FBI Director James Comey Encryption on mobile devices leaves law enforcement “dark” to emerging threat

Apple CEO Tim Cook Our responsibility is to protect the privacy of customers

Page 24: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Cyber Security: Challenges & Tools

The development of cyber technologies has created new national security challenges, but also new tools for dealing with those challenges. In your teams, discuss both some major cyber security concerns our government now faces as well as some of the tools and techniques the government can draw on in defending Cyber space. On the index card provided, write down at least one major cyber security challenge we face and then also one cyber tool our government can use.

Group Activity: 5-7 minute discussion.

Page 25: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Question: Why a Cyber Summit? What is the context?

Answer: Cyberspace is a lawless frontier.

Page 26: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

White House Summit on Cybersecurity & Consumer Protection Stanford University February 13, 2015 President Barack Obama, January 13, 2015 The summit will bring together: •  Industry •  tech companies •  law enforcement •  consumer and privacy advocates •  law professors •  students

Page 27: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Obama on need for Cyber cooperation

Page 28: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Network Insecurity • Pres. Obama: A major cyber attack could happen.

•  The U.S. electric grid is vulnerable. The Russians, Chinese, and Iranians may be in the grid already (Ted Koppel,

Lights Out, p. 53) • Google and its users are attacked “thousands of times

each day.” (The New Yorker magazine ) •  Corporations, banks, gov’t agencies hacked repeatedly.

Page 29: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

What is Lost ?

• Consumer data • Government secrets •  Intellectual property •  Hard cash

Page 30: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Network Insecurity: So Much at Stake

• “They thought they were building a classroom, and it turned into a bank.”

•  – Historian Janet Abbate, author of Inventing the Internet

Page 31: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Major Hacks of US Organizations

US Government’s Office of Management & Budget (June 2015 by group of Chinese hackers) Hack obtained: •  Personal Information of 4 million government employees •  Emails/online accounts of people entrusted with the Nation’s secrets

Page 32: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

North Korea’s Hack of Sony by “Guardians of the Peace” (G.O.P.) N. Korea sought cancellation of film ”The Interview”– about plot to assassinate North Korean leader Kim Jong-un Hackers planted Viper ( a type of malware) & destroyed servers They released to public: •  personal information of employees and families •  e-mails between employees •  executive salaries •  copies of unreleased Sony films & scripts

President of SONY urged employees not to read released emails. Feared they would turn against each other.

Page 33: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Sony Pictures Hack – Nov. 2014

Page 34: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Network Insecurity: Conflicts Between Government and the Private Sector •  Tension between industry’s desire to operate within a free enterprise system and government’s responsibility to develop high standards of security …

•  --Ted Koppel, author of Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

Page 35: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

SUMMIT GOAL: PARTNERSHIP OBAMA: US needs for government, private sector, and nonprofit privacy advocates to negotiate a policy that meets national security aims while preserving constitutional freedoms. THE 10 TERABYTE QUESTION: How should we balance national security & personal privacy in Cyberspace? You must address this question this week.

Page 36: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The President: A Shared Mission

Page 37: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Other issues at the Stanford Summit: • American gov’t’s massive surveillance of its own citizens:

NSA’s bulk collection of “metadata”

• Edward Snowden revelations of NSA abuses of power in 2013: privacy advocates cry out against government overreach

• Government presses companies for access to their encrypted networks through “back doors”

Page 38: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Who attended the actual Summit?

?

Page 39: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

POTUS Apple CEO Tim Cook

Dir. of Homeland Security Jeh Johnson

Nuala O’Connor Center for Democracy & Technology

Bank of America CEO Brian Moynihan

Maria Contreras Sweet Dir. Of Small Business Adminisrration

Page 40: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Who Stayed Away?

•  ?

Page 41: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

NSA Director Admiral Michael Rogers

Cindy Cohen Exec. Dir. Electronic Frontier Foundation

Facebook CEO Mark Zuckerberg

Page 42: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

More of the absent …

Sergei Brin, Google Founder

Jeff Bizos of Amazon NSA Whistleblower Edward Snowden

Page 43: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

What happened? President Signs Executive Order

Page 44: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Not too much else happened … The big issues remain unresolved …

We’ll take our crack at them this week.

Page 45: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

Role Play: reenact the Stanford Summit The reasons: • Get into heads of cyber stakeholders to grasp ethical

issues

• Practice negotiating differences and forging consensus in true to life setting

•  Try on multiple ideas and potential solutions for complex

policy questions

Page 46: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

PSU CYBERSECURITY SUMMIT: A Working Partnership?

President (POTUS)

National Security Chief

Global Tech CEO

Constitutional Rights Advocate

Telecom/Social Media CEO

Whistleblower Journalist

Negotiation Group

Page 47: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

The Process for this week Monday – Summit preview/National Security issues Tuesday – Constitutional arguments to protect privacy Ø Dossiers distributed – Study your assigned role

Wednesday – Caucus & negotiate Ø role groups & negotiating groups Thursday – More caucusing and negotiating Friday – Submit video sharing your group’s policy solutions Saturday—Screen videos for judging

Page 48: CITIZENSHIP THE CYBER SUMMITweb.cecs.pdx.edu/~sheard/cybercamp/CyberSummitSlides01.pdf · 2016-07-11 · •The U.S. government’s emphasis on National Security since the end of

National Security vs. Preservation of Civil Liberties

•  U.S. has extraordinary national security concerns in the 21st century and Cyber security is among its most important.

•  Cyber Summit brings together stakeholders to negotiate policies that balance national security concerns & constitutional freedoms.

•  Students to play roles of stakeholders in the Cyber Summit to represent their interests.

•  Role Dossiers distributed after Bob Liebman’s Tuesday Presentation.