48
CSCI 215 Social & Ethical Issues In Computing Class 6 – Government Spying Transparency in Government

CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

CSCI 215 Social & Ethical Issues In Computing

Class 6 – Government Spying

Transparency in Government

Page 2: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Notes

• Computer Museum Reschedule – Next Tuesday (NOT Thursday)

• Homework 2 is still posted, due Thursday

• Office hours change: 1-2pm

Page 3: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Review• Why can’t doctors leave voicemail with your health results?

• A. HIPAA B. FERPA C. The CS department D. COPPA

• Which Amendment protects your privacy against the government reading letters sent to your mailbox (without a warrant)?• A. First B. Eightieth C. Fourth D. Zeroth

Page 4: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Thomas Andrew Drake

• Senior Executive of NSA for 7 years

• 2008 Attempted to alert his superiors and Congress to what he saw as illegal activities, waste and mismanagement at the NSA

• Reported documents to a reporter using encrypted channels

• Charged with numerous counts, including Espionage Laws violations. Faced up to 35 years in prison

• 2011 settled and sentenced to 1 year probation and 240 hours community service

Page 5: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

NSA – National Security Agency• Formed in 1952 on President Harry Truman’s order following

codebreaking in WWII

• “… we gather information that America's adversaries wish to keep secret. Through Information Assurance, we protect America's vital national security information and systems from theft or damage by others.

• Through carrying out its missions, NSA […] helps save lives, defend vital networks, and advance our Nation's goals and alliances, while strictly protecting privacy rights guaranteed by the U.S. Constitution and laws”

• https://www.nsa.gov/about/faqs/about_nsa.shtml

Page 6: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some Issues NSA directors have lied to Congress on a number of issues. By NSA’s own admissions

• Originally defended these actions by stating this data has helped to stop 54 terrorist attacks

• Later admitted to only 13 attacks on or in the US

• Then revealed only 1 of these attacks was discovered through mass surveillance (as opposed to confidential informants, existing law enforcements, etc)

• And this was not an attack or plot, it discovered a taxi driver and 3 accomplices raised $8000 to a Somalin terrorist group (who has never been involved with an attack on US)

Page 7: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Page 8: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Page 9: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Page 10: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Surveillance Back Doors

• http://www.ted.com/talks/christopher_soghoian_a_brief_history_of_phone_wiretapping_and_how_to_avoid_it#t-269418

• http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching

Page 11: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Page 12: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Page 13: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

• TURBINE: a brain for malware

• NSA implanted Computer Network Exploitation (CNE): surveillance malware installed on computers and networking devices

• Over 50,000 computers, expected to reach over 85,000 by 2013

• TURBINE designed to allow automated implants (over millions)• A brain, that operated with little or no human interaction

• Uses man-in-the middle or man-on-the-side attaches (More on this later)

• Pretends to be a Facebook server, and is able to extract files from hard drive

Page 14: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

Phone Meta Data

• Cannot keep the content of phone calls, but can keep meta data

• For Example:• Phone numbers of both caller and recipient

• Number of any calling cards used

• Time and Duration of calls

Page 15: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Metadata

In regards to the phone metadata

• May 2015: Declared collecting phone metadata illegal

• August 2015: U.S. appeals court overturned lower’s court ruling

Page 16: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

http://www.forbes.com/sites/erikkain/2013/12/30/the-nsa-reportedly-has-total-access-to-your-iphone/#174f91c1604e

Page 17: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Some of the info leaked by Snowden

• “GUMFISH” tool for taking over cameras on machines

• “CAPTIVATEDAUDIENCE” tool for recording conversations on targeted microphones

Page 18: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

What allows NSA to do this?

• Section 215 of Patriot Act (and its successor USA Freedom Act )

• FISA (Foreign Intelligence Surveillance Act)• Allows data collection about and from foreigners, or US Citizens suspected of

espionage

• Why does NSA continue to get away with this?

Page 19: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

But To be Fair NSA defends collecting information about US Citizens because it is not intentionally targeting them – it’s just part of the mass surveillance.

• Any Analysist can abuse these tools (though take comfort because “this doesn’t happen a lot”)

Page 20: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

But To be Fair LOVEINT: spy on love interests, spouses, ex-spouses, first dates

• Love Intelligence

• In 2003, an NSA employee was internally investigated after a woman with whom he had a sexual relationship reported him to the government because she suspected he was monitoring her calls.

• An investigation revealed that over a period of five years, the employee had unlawfully monitored nine phone numbers associated with female foreign nationals.

Page 21: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

But To be Fair LOVEINT: spy on love interests, spouses, ex-spouses, first dates

• Love Intelligence

• In 2004, a wife was found to have followed a foreign number she found on her husband’s phone because she thought he was cheating

• In each of these three cases there was no prosecution or disciplinary action taken because the NSA staff involved in the abuses resigned.

• One LOVEINT case was referred to the Justice Department in 2011—but it declined to prosecute

• Worst Punishment was a reduction in pay for two months, restricted access to intelligence

Page 22: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

But To be Fair 2 former NSA reported that they listened to solders overseas:

• "Hey, check this out," one said he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy.'"

Page 23: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

In the News – February 2016

Obama Administration is expected to make changes that allow other agencies such as the FBI and local law enforcement to have direct access to data collected by NSA.

Page 24: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Discussion Point

• Is there a difference between the data Social Media collects about you and the data Government collects about you?

• Is there a difference between the Snowden Leaks and WikiLeaks? What about Thomas Drake’s leaks?

Page 25: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Break!

Page 26: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Warm up Discussion

Should intelligence agencies be allowed to download your social media profile picture for use in NGI?

Page 27: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Freedom of Information Act (FOIA):

• Requires all federal agencies to provide information upon request, unless it falls under one of the following exceptions:

• http://www.foia.gov/

Page 28: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Exemption 1: Information that is classified to protect national security.

Exemption 2: Information related solely to the internal personnel rules and practices of an agency.

Exemption 3: Information that is prohibited from disclosure by another federal law.

Exemption 4: Trade secrets or commercial or financial information that is confidential or privileged.

Page 29: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Exemption 5: Privileged communications within or between agencies, including:

1.Deliberative Process Privilege

2.Attorney-Work Product Privilege

3.Attorney-Client Privilege

Page 30: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Exemption 6: Information that, if disclosed, would invade another individual's personal privacy.

Page 31: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Exemption 7: Information compiled for law enforcement purposes that:• Reasons A-F) interfere with a fair trial / sensitive law

enforcement procedures

Page 32: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Our Access to Government Records

Exemption 8: Information that concerns the supervision of financial institutions.

Exemption 9: Geological information on wells.

Page 33: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Question

• How many of you have computers or laptops?

• How many of you have tablets?

• How many of you have smart phones?

• How many of you have smart Televisions?

• How many of you have a smartwatch or fitness tracker?

• How many of you have an electronic medical device?

Page 34: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

All of these can be hacked

• http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked

Page 35: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hack, Hacker, and Hacking

Page 36: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hack, Hacker, and Hacking

• Why do people hack?

Page 37: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: Government

• NSA can turn on your microphone, even when you turn your phone off:• http://paleofuture.gizmodo.com/the-nsa-can-still-bug-your-phone-when-its-

powered-off-1585427282

• http://money.cnn.com/2014/06/06/technology/security/nsa-turn-on-phone/

Page 38: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: Government

• FBI cannot confirm or deny using Amazon’s echo’s microphone via FOIA request denial• http://paleofuture.gizmodo.com/the-fbi-can-neither-confirm-nor-deny-

wiretapping-your-a-1776092971?utm_campaign=socialflow_gizmodo_facebook&utm_source=gizmodo_facebook&utm_medium=socialflow

Page 39: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: Bad Guys

Spying with webcams:

• Miss Teen USA blackmailed (http://www.teenvogue.com/story/cassidy-wolf-hacking )

• Canadian Woman watching Netflix while cuddling with her boyfriend (http://globalnews.ca/news/2156291/toronto-womans-webcam-hacked-while-watching-netflix/ )

Page 40: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: Bad Guys

Spying with Baby Monitors:

• Washington couple 3-year old son reported (for months) the voice from the telephone telling him to stay in bed. Mother investigated during nap time, heard "Oh, watch this one, she's coming in again” while the camera followed her around the room

• London Ontario Creepy music starts playing, and then “you are being watched” announced as parents enter the room

Page 41: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: In between(?) guys

Schools Spying:

• Philadelphia Schools pay out $610,000• 2,300 school issued macs, complete with RAT• Took thousands of images of students at home, in bed,

and even partially dressed• Accused student of popping pills, when actually taking

candy

Page 42: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers: Everybody

Page 43: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers

• 2013 Khalil Shreateh (An “unemployed security researcher”) discovered a bug on Facebook that would allow him to post to any user’s wall

• First response said that they were unable to see the link he gave them to prove his abilities (probably because they weren’t friends with the victim)

• Second response, said it wasn’t a bug

Page 44: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers

• Proved his point by posting directly to Mark Zuckerberg’s wall:

• "First, sorry for breaking your privacy and post(ing) to your wall, I (have) no other choice to make after all the reports I sent to (the) Facebook team.“

• Because of the way he forced the issue, he was

not given reward money

Page 45: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Hackers

• Proved his point by posting directly to Mark Zuckerberg’s wall:

• "First, sorry for breaking your privacy and post(ing) to your wall, I (have) no other choice to make after all the reports I sent to (the) Facebook team.“

• Because of the way he forced the issue, he was

not given reward money

Page 46: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Question

• What color hat hacker is Khalil?

Page 47: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Discussion

• Some hackers see themselves as electronic Robin Hoods—taking information from those who would hoard it, and spreading it to all. In addition, hacking groups are egalitarian: anyone can join, regardless of gender, age, race, or class (as long as the person has access to a computer), and the amorphous hacking (dis)organizations don't have a clear hierarchy.

• Does hacking then make Internet use more fair, by allowing to any user access to information that would otherwise be available only to some? Or is hacking an unjust takeover of information from those who don't have the know-how or resources to protect it?

Page 48: CSCI 215 Social & Ethical Issues In Computingmdale/courses/CSCI215/slides/Class6... · 2016-05-31 · CSCI 215 Social & Ethical Issues In Computing Class 6 –Government Spying Transparency

Thank you

• Did you learn something?

• Coming up: Hactivist (and Slacktivist)

• You are free to go, or you can stay and watch a John Oliver video about the FBI v Apple issue .