Prof. I. Brown

advertisement
Politics and privacy engineering
Dr Ian Brown
Oxford Internet Institute
University of Oxford
Revenue & Customs lose 25m records
 Two discs containing
names, addresses, DoB,
NI no. and bank details
of 25m people lost in
the post
 Chairman of HMRC
immediately resigned
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Prime Minister’s Questions 21/11/07
QuickTime™ and a
H.264 decompressor
are needed to see this picture.
Impact on public opinion
45%
40%
35%
Approve govt record
30%
Vote for tomorrow
25%
20%
15%
Jul07
Aug- Sep- Oct- Nov- Dec- Jan- Feb- Mar07
07
07
07
07
08
08
08
Data: YouGov tracker poll for Daily Telegraph, 28/3/2008
Simple audit protocol
NAO: “I do not need address, bank or parent
details in the download – are these
removable to keep the file smaller?”
HMRC: “I must stress we must make use of
[existing] data we hold and not overburden
the business by asking them to run
additional data scans/filters that may incur a
cost to the department.”
£5,000 of code
SELECT Recipient_ID, Date,
Amount
FROM Child_Benefit_Payments
gpg -er NAO benefitdata.csv
Privacy-enhanced audit
1. For each recipient, send to auditor
(Recipient_ID, hash(shared_random,
recipient data))
2. Auditor requests sample of x records
3. Only those records are sent, and can be
checked against bit commitments
Individuals affected by UK data
breaches since July 2006
100000000
10000000
1000000
100000
10000
1000
100
10
1
r
il
il
s
il st
il st C
s a l ty
s
s
s
y
e
A
A
A ty
st st al
ty
ie VL unc ru Tru Tru pit VL tom pit cie ice olic tom unc unc nce ion unc Tru SB av VL cie tom
c
v
s
s D s os o
e
D o eT S
H al N D So us
u H
So
S Ser n P Cus Co y co Sp en Co HS
C ar H are Ho
C
C
g
l
g
oy
ng nd
d Mill ding ial olita nd nty ge nd nd P City y N
in
i
in y C le N y C Hal
R
n
d
d
u
d
c p
a a
l
r
in
r
il
il
a
a o
e
ui e a
un ma Va ma lls
e g's Bu nan tro ue
C Har rks rk stle kn
B
Bu
F
u
i
i
e
i
n
c
o ca a
a
n Ki ax F Me en ire
e enu
h Pr and Pr ss
e
ds
d
s
W
M
h
i
f
H
i
v
v
i
n
w
t
u
e
t
w ev
e
e ers
al pto
or Ne nd
ot fton diff por R
n
f
Le
R
R
R
t
c
H
o
i
t
a
i
s
S Se ar ck
M
M
y
at HM
Sk
ep
t
C to
H
H rce
i
N
D
C
o
S
W
Basic security needed
 Encrypted stored and in-transit data
 Access control
 Need-to-know
Measuring system security requirements
1.
2.
3.
4.
Scale and complexity
Number of users
Sensitivity of data
Connections to other systems, particularly
untrusted
5. Connectivity to the Internet
6. Attractiveness as target
Source: B. R. Gladman and I. Brown (2007) Security, Safety and the
National Identity Register. In S. G. Davies & I. Hosein (eds), The Identity
Project: an assessment of the UK Identity Cards Bill and its implications,
London School of Economics pp.187-200.
Software quality is key
Prof. Martyn Thomas: “almost every IT supplier in
the world today is incompetent… the typical rate
of delivered faults after full user acceptance testing
from the main suppliers in the industry over many
years has been steady at around 20 faults per
thousand lines of code. We know how to deliver
software with a fault rate that is down around 0.1
faults per thousand lines of code and the industry
does not adopt these techniques.” Evidence to Home
Affairs Select Committee, 24/2/2004
Insider fraud
Information required
Price paid to
‘blagger’
Occupant search/Electoral roll check
(obtaining or checking an address)
Telephone reverse trace
Telephone conversion (mobile)
Friends and Family
Vehicle check at DVLA
Criminal records check
Area search (locating a named person
across a wide area)
Company/Director search
Ex-directory search
Mobile telephone account enquiries
Licence check
not known
Price
charged to
customer
£17.50
£40
not known
£60 – £80
£70
not known
not known
£75
£75
not known
£150 – £200
£500
£60
not known
£40
not known
not known
£40
£65 – £75
£750
£250
Source: “What price privacy?”, Information Commissioner, May 2006
Key privacy engineering steps
1. Understand your problem
2. Design system to minimise collection,
storage and access to personally
identifiable information
3. Engineer security system to enforce
privacy policies
4. Enforce controls and audit remaining
accesses
Source: S. Marsh, I. Brown and F. Khaki (2008)
Privacy Engineering. Cybersecurity KTN white paper
NHS Connecting for Health
 £20bn programme
 Patient Summary
Care Records stored
on centralised
database (“Spine”)
with pointers to
Detailed Care
Records in regional
databases
 Emergency
treatment and
research
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Efficacy of NPfIT
 Emergency clinicians treatment styles
 Public opposition to unconsented research paper last year blog?
Confidentiality problems
 “Sealed envelope” limits access to especially
sensitive records… but can be opened by the NHS
and police and doesn’t actually exist yet!
 Pretexting found in N. Yorkshire HA to be
occurring 30 times per week (Anderson 1996)
 Leeds Teaching Hospitals NHS Trust found
70,000 cases of "inappropriate access" to systems
in 1 month
 South Warwickshire General Hospitals NHS Trust
allows A&E clinicians to share smartcards due to
60-90s login times
General Practitioners’ worries
 50% of GPs will refuse to upload medical
records to central "Spine" without patients'
permission
 80% think Spine puts patient confidentiality
at risk
 79% think new system will be less secure
Source: Medix poll of 1,026 representative GPs, Nov. 2006
ContactPoint & eCAF
QuickTime™ and a
TIFF (Uncomp resse d) de com press or
are nee ded to s ee this picture.
Cornwall County Council
 Database storing details of
11m UK children’s contact
with social services, police,
health and education
 330,000 users
 50% children will have
detailed seven-page
assessment
Purposes of ContactPoint
 “[P]rotecting children from abuse or neglect,
preventing impairment of their health and
development, and ensuring that they are growing
up in circumstances consistent with the provision
of safe and effective care which is undertaken so
as to enable children to have optimum life
chances and enter adulthood successfully.”
 Victoria Climbie case
 Crime prevention
Source: R. Anderson, I. Brown, R. Clayton, T. Dowty, D. Korff and E. Munro (2006)
Children’s Databases - Safety and Privacy. Information Commissioner’s Office
Efficacy of ContactPoint



“The practitioners in contact with Victoria knew of each other’s involvement
and shared considerable amounts of information. The crucial errors arose
from individuals either not paying attention to the information, or giving it a
benign interpretation so that the risk to Victoria from abuse was not seen.” Anderson et al.
Wood for trees Dr Liz Davies
Resources and evidence base for interventions
Source: R. Anderson, I. Brown, R. Clayton, T. Dowty, D. Korff and E. Munro (2006)
Children’s Databases - Safety and Privacy. Information Commissioner’s Office
Efficacy of ContactPoint
 “[A]ny notion that better screening can enable policy makers to
identify young children destined to join the 5 per cent of offenders
responsible for 50-60 per cent of crime is fanciful. Even if there were
no ethical objections to putting ‘potential delinquent’ labels round the
necks of young children, there would continue to be statistical
barriers.” -Prof. David Farrington
 “The practitioners in contact with Victoria knew of each other’s
involvement and shared considerable amounts of information. The
crucial errors arose from individuals either not paying attention to the
information, or giving it a benign interpretation so that the risk to
Victoria from abuse was not seen.” -Anderson et al.
 Impact upon family autonomy
Source: R. Anderson, I. Brown, R. Clayton, T. Dowty, D. Korff and E. Munro (2006)
Children’s Databases - Safety and Privacy. Information Commissioner’s Office
UK National Identity Scheme
S. G. Davies & I. Hosein (eds), The Identity Project: an assessment of the UK
Identity Cards Bill and its implications, London School of Economics p.25
Purposes of NIS





Anti-terrorism
Social security fraud
Identity fraud (£1.7bn pa)
Illegal immigration
Sense of community
Efficacy of NIS
QuickTime™ and a
TIFF (Uncompress ed) dec ompres sor
are needed to s ee this pic ture.
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Quic kTime™ and a
TIFF (Unc ompres sed) dec ompres sor
are needed to see this pic ture.
 “If you ask me whether ID cards or any other
measure would have stopped [the London
bombings], I can't identify any measure which
would have just stopped it like that.” -Charles
Clarke MP, former Home Secretary
 “Benefit fraud that relies on false identity was,
at most, 1 or 2 per cent of the total.” -Peter
Lilley MP, former Social Security Secretary
 “The Home Office's definition of ID fraud
doesn't match our definition. We class it as a
more serious crime that involves a great deal
more hassle than just having your card stolen
and having to phone up the bank to cancel it” APACS
Efficacy of Identity Scheme
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
 "If stop and search is anything to go
by, for Black people our ID card is
really the colour of our skin.” Karen
Chouhan, 1990 Trust
 “Terrorists rarely conceal their
identity, only their intention - as was
apparent in the case of those involved
in the 9/11 tragedy, and in Madrid and
in Constantinople.” -Peter Lilley MP
IT and the smaller state
QuickT ime ™an d a
TIFF ( Uncomp res sed) deco mpre ssor
ar e need ed to see this pictur e.
QuickTime™ and a
TIFF (Uncompress ed) dec ompres sor
are needed to s ee this pic ture.
 "Never again could there be projects like
Labour's hubristic NHS supercomputer… The
basic reason for these problems is Labour's
addiction to the mainframe model - large,
centralised systems for the management of
information.” -David Cameron MP
 “As chancellor, Brown relentlessly pursued his
forlorn vision of a ‘joined-up identity
management regime’ across public services. As
prime minister, he continues this vain search,
like an obsessed alchemist, for a giant database
that his closest advisers ominously refer to as a
‘single source of truth’.” -David Davis MP
Conclusion
 Privacy engineering is key to making
privacy meaningful in information societies
 “Collect then protect” is a fundamentally
broken model
 Understanding problem domain is critical
 Privacy has become a key element in UK
politics - central to debate over effective
checks on state power
Download