Ethics for the Information Age Chapter 5 – Privacy II William H. Bowers – whb108@psu.edu Topics US Legislation Authorizing Wiretapping Electronic Communications Privacy Act Communications Assistance for Law Enforcement Act USA PATRIOT ACT Responses to PATRIOT ACT Follow-On Legislation William H. Bowers – whb108@psu.edu Topics (cont) Data Mining Marketplace: Households IRS Audits Syndromic Surveillance System Total Information Awareness Who Owns Transaction Information? William H. Bowers – whb108@psu.edu Topics (cont) Identity Theft History and Role of SSAN Debate over a National ID Card Encryption Digital Cash William H. Bowers – whb108@psu.edu US Legislation Authorizing Wiretapping Title III Omnibus Crime Control and Safe Streets Act of 1968 Enacted during height of Vietnam war Concern over violent anti-war demonstrations Allows phone tap for up to 30 days with a court order William H. Bowers – whb108@psu.edu Electronic Communications Privacy Act http://www.usiia.org/legis/ecpa.html Enacted in 1986 Pen register – displays number for each outgoing call Trap and trace – displays phone number of each incoming call Requires court order William H. Bowers – whb108@psu.edu Electronic Communications Privacy Act Does not require probable cause Court approval is virtually automatic Allows roving wiretaps William H. Bowers – whb108@psu.edu Communications Assistance for Law Enforcement Act http://assembler.law.cornell.edu/uscode/htm l/uscode18/usc_sup_01_18_10_I_20_119.ht ml 1994 – also known as Digital Telephony Act Addresses digital phone networks Requires phone company equipment to allow tracing, listening to phone calls William H. Bowers – whb108@psu.edu Communications Assistance for Law Enforcement Act Provides for email interception Leaves details about type of information undefined FBI requested ability to intercept digits entered after connection was made – Credit card, bank numbers – ID numbers – PIN codes William H. Bowers – whb108@psu.edu Communications Assistance for Law Enforcement Act 1999 FCC issues guidelines (http://www.askcalea.net/docs/fcc992 30.pdf) http://www.askcalea.net Requires carriers to provide: – Content of subject initiated call William H. Bowers – whb108@psu.edu Communications Assistance for Law Enforcement Act Requires carriers to provide: – Content of subject initiated call – Party hold, drop or join on conference calls – Subject initiated dialing and signaling information – In-band and out of band signaling – Timing information William H. Bowers – whb108@psu.edu USA PATRIOT ACT Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 http://thomas.loc.gov/cgibin/query/D?c107:4:./temp/~c107fEmBJW:: Enacted in response to 11 September 2001 attacks Amended more than 15 existing laws William H. Bowers – whb108@psu.edu USA PATRIOT ACT Four principal categories – Greater communication monitoring authority for federal LEO and intelligence – Increased authority for Secretary of the Treasury to regulate banks to prevent money laundering William H. Bowers – whb108@psu.edu USA PATRIOT ACT Four principal categories – Making it more difficult for terrorists to enter the US – Defining new crimes and penalties for terrorist activity William H. Bowers – whb108@psu.edu Increased Monitoring Allows for using internet to track email addresses and URLs Does not require probable cause Requires warrant Extends jurisdiction of court approval Allows for national search warrants William H. Bowers – whb108@psu.edu Increased Monitoring Broadens roving surveillance Previously required law enforcement purpose and demonstration that the subject used the device to be monitored Now allowed for intelligence Does not require reporting back to the court William H. Bowers – whb108@psu.edu Increased Monitoring Allows for intercepting computer based communication without warrant if – Access to computer was illegal – Computer owner gives permission Allows search without warrant if there is “reasonable” belief that providing notice of warrant may have an “adverse affect” William H. Bowers – whb108@psu.edu Increased Monitoring Allows seizure of property if it “constitutes evidence of a criminal offense” even if not terror related Makes it easier for FBI to obtain warrant for medical, educational, library, religious organization records No need to show probable cause Only requires statement of support of ongoing investigation William H. Bowers – whb108@psu.edu Increased Monitoring Illegal for record provider to – Reveal existence of warrant – Tell anyone that they provided information Prohibits FBI from investigating citizens solely on basis of First Amendment activities William H. Bowers – whb108@psu.edu Responses to PATRIOT ACT Concern over unrestricted power Concerns over circumvention of First and Fourth Amendments FBI and NSA previously used illegal wiretaps to investigate unpopular political organizations May inhibit exercise of First Amendment rights William H. Bowers – whb108@psu.edu Responses to PATRIOT ACT LEO’s can monitor internet surfing without warrant Roving surveillance warrants do not require description of place to be searched Allows for limited search and seizure without warrants William H. Bowers – whb108@psu.edu Follow-On Legislation Domestic Security Enhancement Act of 2003 – http://www.publicintegrity.org/dtaweb/do wnloads/Story_01_020703_Doc_1.pdf – Allows expatriation of citizens convicted of giving material support to terrorist organization – Require names on suspected terrorist lists to be kept secret William H. Bowers – whb108@psu.edu Follow-On Legislation Domestic Security Enhancement Act of 2003 – Allow wide use of administrative subpoenas – Makes it easier for police to access credit records – Allows collection of DNA samples from suspected terrorists William H. Bowers – whb108@psu.edu Follow-On Legislation Domestic Security Enhancement Act of 2003 – Creation of national DNA database – Wiretaps and email interception allowed for 15 days without warrant William H. Bowers – whb108@psu.edu Data Mining Searching one or more databases for patterns or relationships Can combine facts from multiple transactions Secondary use of primary data – Primary use of Amazon customer information is process an order – Secondary use is to promote relationship William H. Bowers – whb108@psu.edu Data Mining Information about customers is becoming a product in itself Allows more narrow focusing of marketing efforts Suppose EZPass sells individual records without ID information Records can be purchased by credit card company William H. Bowers – whb108@psu.edu Data Mining Transactions can be matched between toll record and credit card charge based on time, date, location and amount Credit card company can now identify card holders who drive many miles Now that list can be sold to car dealers William H. Bowers – whb108@psu.edu Marketplace: Households Developed by Lotus Produced on CD Cost of $8 million Information on 120 million people Contained personal information such as household income Dropped after over 30,000 consumer complaints William H. Bowers – whb108@psu.edu IRS Audits Matches individual reported income with employer provided information Generates discriminant function (DIF) score based on number of irregularities on tax return William H. Bowers – whb108@psu.edu Syndromic Surveillance System New York City Analyzes more than 50,000 pieces of information per day – 911 calls, ER visits, prescription drug purchases Purpose is to identify onset of epidemics William H. Bowers – whb108@psu.edu Total Information Awareness Proposed by DARPA Information Awareness Office Would capture individual’s “information signature” – – – – – Financial Medical Communication Travel Video images William H. Bowers – whb108@psu.edu Criticism of the TIA Program ACM protested that it will generate more harm than benefits Huge privacy and security risks of maintaining such a database Database would become target of criminals and terrorists William H. Bowers – whb108@psu.edu Criticism of the TIA Program Access by tens of thousands of administrators, LEO, intelligence personnel poses great security risk Increased risk of identity theft Citizens could not challenge or correct secret databases May hurt US corporate competitiveness William H. Bowers – whb108@psu.edu Criticism of the TIA Program Potential for false positive ID May alter innocent individual behavior William H. Bowers – whb108@psu.edu Who Owns Transaction Information? Purchaser Seller Opt-In (preferred by privacy advocates) Opt-Out (preferred by direct marketing organizations) World Wide Web Consortium Platform for Privacy Preferences http://www.w3.org/P3P William H. Bowers – whb108@psu.edu Identity Theft Misuse of another person’s identifying information Largest problem in US is credit card theft Exacerbated by ease of opening new accounts About 86,000 US victims in 2001 William H. Bowers – whb108@psu.edu Identity Theft Individual loss limited to $50 if reported promptly Real cost is in time to clean up records Defined as crime in relatively few states ID theft usually leads to other criminal activities William H. Bowers – whb108@psu.edu Identity Theft Dumpster diving Shoulder surfing Skimmers Online phishing William H. Bowers – whb108@psu.edu History and Role of SSAN Social Security Act of 1935 Prohibited use of SSAN outside of the Social Security Administration Prohibited for use as national ID number 1943 FDR ordered use of SSAN in federal databases 1961 began use by IRS William H. Bowers – whb108@psu.edu History and Role of SSAN Collected by banks and credit card companies for interest payment reporting Approved for use by state agencies in 1976 Required to list children 1 year and older as dependent on tax return William H. Bowers – whb108@psu.edu Problems with SSANs Rarely checked by organizations No error detecting capabilities such as CRC William H. Bowers – whb108@psu.edu Debate over a National ID Card Proponents – More controllable than multiple state driver’s licenses, employee / student ID, etc – Make it more difficult for illegal entry to US – Makes it easier for police to positively identify people – Used by many other countries William H. Bowers – whb108@psu.edu Debate over a National ID Card Opponents – Does not guarantee accuracy – Biometric systems not infallible – No evidence it would reduce crime – Makes government tracking of individuals easier – Inaccurate national records harder to correct William H. Bowers – whb108@psu.edu Encryption Protects communications even if intercepted Symmetric encryption – Sender and user use the same key – Requires secure key transmission – Requires too many keys to be useful William H. Bowers – whb108@psu.edu Encryption Asymmetric encryption – Developed by Diffie and Hellman in 1976 – Public / Private Key – Security is directly related to key length – Keys are mathematically related – Not able to compute one from the other in a useful period of time William H. Bowers – whb108@psu.edu Encryption Pretty Good Privacy – 1991 – Senate Bill 266 required back door for government decryption of personal communications – Illegal to export encryption programs – PGP originally distributed as source code William H. Bowers – whb108@psu.edu Encryption Clipper Chip – 1992 AT&T wanted to market telephone encryption device – FBI and NSA suggested NSA’s technology instead – US government would maintain Clipper keys – March 1993 – Approved by President Clinton William H. Bowers – whb108@psu.edu Encryption Clipper Chip – Two federal agencies would maintain keys Law enforcement Intelligence – No penalty for improper key release – 80% of public disapproved – Administration changed course in February 1994 and suggested use rather than mandating it William H. Bowers – whb108@psu.edu Encryption Export Restrictions Forced software vendors to have two versions, internal and export Or just have one with weak encryption Reduced international competitiveness 1999, 2000 two federal appeals courts ruled ban was violation of free speech Export restrictions dropped William H. Bowers – whb108@psu.edu Digital Cash Relies on public/private keys Signed by bank’s public key on issuance Done without identifying purchaser Must prevent copying Can be used as easily as MAC cards without privacy concerns William H. Bowers – whb108@psu.edu Questions & Discussion William H. Bowers – whb108@psu.edu