SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Our friends at the NSA
LIS 644
Why am I talking about this?
•Great real-world example bringing together
a lot of what we’ve already learned.
•Law and ethics as well as tech!

•Because it’s our patrons and potential
patrons being spied on.
•That puts it squarely in the category of “our problem.”

•The library world needs a strategy on this
kind of thing and doesn’t have one.
•That means you’re not exempt from worrying about it. Libraries tend to look to
newer practitioners to react to stuff like this.
How do we know what we
know about this?
•Massive classified-document leak from
contractor Edward Snowden.
•Pretty classic example of security failing from within! Records managers,
this is common and you need to be concerned about it!

•Why did he do it? Because he considered
the NSA’s actions unethical invasion of
privacy, and thought the rest of us needed
to know.
•Agree or not, it’s a very librarianly motivation.
•You need to ask yourself whether you’re that brave. It matters.
So what is the NSA
collecting?
•Domestic phone call records, landline
and cellular.
•This is the oft-mentioned “metadata.” Actual content of calls is not (as far
as we know!) collected.

•As much Internet traffic as they can get
their hands on.
•Including supposedly-private encrypted traffic.
•Not just “metadata” (that would be logs, I suppose), but the actual
content transferred/stored. Email, social media, video, uploaded files,
databases, name it.
How did they get it,
without anybody realizing?
•(via Ars Technica, http://arstechnica.com/tech-policy/2013/09/let-us-count-the-wayshow-the-feds-legally-technically-get-our-data/ Categories mine.)

•Social engineering
•A company volunteers to help (and gets paid for it)
•A company complies under legal duress
•Spies infiltrate a company
•Spies coerce upstream companies to weaken crypto in their products/install backdoors

•Actual technology breakage
•Spies copy the traffic directly off the fiber (sometimes without owner’s knowledge)
•Spies brute force the crypto
•Spies compromise a digital certificate
•Spies hack a target computer directly, stealing keys and/or data, sabotage.
Notes on the social
engineering factor
•The Patriot Act and its NSLs and gag
orders made a huge difference here.
•So librarians who protested the Patriot Act weren’t “hysterical!” I like to
think of us as early-warning signals...

•Not just companies compromising crypto
•Standards bodies, too. NSA has representatives on crypto-related
standards bodies, e.g. at NIST. This is worrisome!
On “metadata”
•You are your patterns of communication!
•Who you talk to, when, how often
•From where (your phone’s location is part of cellular metadata)

•The NSA’s database ties this directly to you.
•Even if it didn’t, you might well be identifiable!
•This is called “reidentification” and we will discuss it in more detail next week.

•Not just the NSA, not just cell phones!
•Check out license-plate databases sometime. Am I ever glad I don’t own a car.

•So if anybody says “it’s just metadata,” don’t
buy it. Metadata is a big deal.
Other things we know
•Judicial oversight of the NSA is... um. Not
rigorous, shall we say.
•The data have been abused by NSA
employees. In creepy and gross ways.
•The NSA has repeatedly lied, including to
Congress, about:
•what data it has collected
•who has access to the data it has collected
•what is being done with those data

•There’s probably lots more we don’t know!
Some principles of security
we can derive from this
•Retained data is vulnerable data.
•Can’t misuse data you ain’t got!

•The easiest (sometimes only) way to
break a security system is to break the
people who implement it.
•Security is a function of law and norms,
not just code.
•As usual, vulnerable populations get hurt
the most.
Meager signs of hope?
•Dark Email Alliance
•replacing totally-insecure SMTP email-sending protocol with something better
•headed by someone who shut down his secure-communications company
rather than let the government have his clients’ encrypted data. Downright
librarianly, that man.

•Very, very angry US allies
•Go Dilma Rousseff!

•IETF working on securing Internet
infrastructure standards
•Legislation (currently “USA Freedom Act”)
What can we do?
•Don’t miss the elephant for the circus.
•Lots of faff in the media about Snowden. It doesn’t matter what we think of
Snowden! What matters is the NSA!

•The usual citizen things: stay informed, contact
your legislators, vote.
•Educate. Discuss. Provide a venue for
education and discussion.
•Libraries: protect your employees! protect your
computers and networks! (as best you can)
•Library organizations: amicus briefs
•The ACLU has already sued.
Something to think about
•The Internet was designed and built by
engineers, physicists, military people.
•It therefore exhibits many of their values: e.g. technical elegance.

•What if librarians and archivists had built
it? How would it be different? Would it
be better?
•Can we build that Internet NOW?

Más contenido relacionado

Más de Dorothea Salo

Preservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesPreservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesDorothea Salo
 
Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Dorothea Salo
 
Research Data and Scholarly Communication
Research Data and Scholarly CommunicationResearch Data and Scholarly Communication
Research Data and Scholarly CommunicationDorothea Salo
 
Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Dorothea Salo
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing SerendipityDorothea Salo
 
RDF, RDA, and other TLAs
RDF, RDA, and other TLAsRDF, RDA, and other TLAs
RDF, RDA, and other TLAsDorothea Salo
 
I own copyright, so I pwn you!
I own copyright, so I pwn you!I own copyright, so I pwn you!
I own copyright, so I pwn you!Dorothea Salo
 
Librarians love data!
Librarians love data!Librarians love data!
Librarians love data!Dorothea Salo
 
Taming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsTaming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsDorothea Salo
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's WayDorothea Salo
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing SerendipityDorothea Salo
 
Lipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsLipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsDorothea Salo
 
Databases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDatabases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDorothea Salo
 

Más de Dorothea Salo (20)

Preservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesPreservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanities
 
Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?
 
Library Linked Data
Library Linked DataLibrary Linked Data
Library Linked Data
 
FRBR and RDA
FRBR and RDAFRBR and RDA
FRBR and RDA
 
Research Data and Scholarly Communication
Research Data and Scholarly CommunicationResearch Data and Scholarly Communication
Research Data and Scholarly Communication
 
Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing Serendipity
 
What We Organize
What We OrganizeWhat We Organize
What We Organize
 
Occupy Copyright!
Occupy Copyright!Occupy Copyright!
Occupy Copyright!
 
RDF, RDA, and other TLAs
RDF, RDA, and other TLAsRDF, RDA, and other TLAs
RDF, RDA, and other TLAs
 
I own copyright, so I pwn you!
I own copyright, so I pwn you!I own copyright, so I pwn you!
I own copyright, so I pwn you!
 
Librarians love data!
Librarians love data!Librarians love data!
Librarians love data!
 
Taming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsTaming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation Tools
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's Way
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing Serendipity
 
Open Content
Open ContentOpen Content
Open Content
 
Lipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsLipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library Systems
 
Databases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDatabases, Markup, and Regular Expressions
Databases, Markup, and Regular Expressions
 
Metadata
MetadataMetadata
Metadata
 
Escaping Datageddon
Escaping DatageddonEscaping Datageddon
Escaping Datageddon
 

Último

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Último (20)

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Our friends at the NSA

  • 1. Our friends at the NSA LIS 644
  • 2. Why am I talking about this? •Great real-world example bringing together a lot of what we’ve already learned. •Law and ethics as well as tech! •Because it’s our patrons and potential patrons being spied on. •That puts it squarely in the category of “our problem.” •The library world needs a strategy on this kind of thing and doesn’t have one. •That means you’re not exempt from worrying about it. Libraries tend to look to newer practitioners to react to stuff like this.
  • 3. How do we know what we know about this? •Massive classified-document leak from contractor Edward Snowden. •Pretty classic example of security failing from within! Records managers, this is common and you need to be concerned about it! •Why did he do it? Because he considered the NSA’s actions unethical invasion of privacy, and thought the rest of us needed to know. •Agree or not, it’s a very librarianly motivation. •You need to ask yourself whether you’re that brave. It matters.
  • 4. So what is the NSA collecting? •Domestic phone call records, landline and cellular. •This is the oft-mentioned “metadata.” Actual content of calls is not (as far as we know!) collected. •As much Internet traffic as they can get their hands on. •Including supposedly-private encrypted traffic. •Not just “metadata” (that would be logs, I suppose), but the actual content transferred/stored. Email, social media, video, uploaded files, databases, name it.
  • 5. How did they get it, without anybody realizing? •(via Ars Technica, http://arstechnica.com/tech-policy/2013/09/let-us-count-the-wayshow-the-feds-legally-technically-get-our-data/ Categories mine.) •Social engineering •A company volunteers to help (and gets paid for it) •A company complies under legal duress •Spies infiltrate a company •Spies coerce upstream companies to weaken crypto in their products/install backdoors •Actual technology breakage •Spies copy the traffic directly off the fiber (sometimes without owner’s knowledge) •Spies brute force the crypto •Spies compromise a digital certificate •Spies hack a target computer directly, stealing keys and/or data, sabotage.
  • 6. Notes on the social engineering factor •The Patriot Act and its NSLs and gag orders made a huge difference here. •So librarians who protested the Patriot Act weren’t “hysterical!” I like to think of us as early-warning signals... •Not just companies compromising crypto •Standards bodies, too. NSA has representatives on crypto-related standards bodies, e.g. at NIST. This is worrisome!
  • 7. On “metadata” •You are your patterns of communication! •Who you talk to, when, how often •From where (your phone’s location is part of cellular metadata) •The NSA’s database ties this directly to you. •Even if it didn’t, you might well be identifiable! •This is called “reidentification” and we will discuss it in more detail next week. •Not just the NSA, not just cell phones! •Check out license-plate databases sometime. Am I ever glad I don’t own a car. •So if anybody says “it’s just metadata,” don’t buy it. Metadata is a big deal.
  • 8. Other things we know •Judicial oversight of the NSA is... um. Not rigorous, shall we say. •The data have been abused by NSA employees. In creepy and gross ways. •The NSA has repeatedly lied, including to Congress, about: •what data it has collected •who has access to the data it has collected •what is being done with those data •There’s probably lots more we don’t know!
  • 9. Some principles of security we can derive from this •Retained data is vulnerable data. •Can’t misuse data you ain’t got! •The easiest (sometimes only) way to break a security system is to break the people who implement it. •Security is a function of law and norms, not just code. •As usual, vulnerable populations get hurt the most.
  • 10. Meager signs of hope? •Dark Email Alliance •replacing totally-insecure SMTP email-sending protocol with something better •headed by someone who shut down his secure-communications company rather than let the government have his clients’ encrypted data. Downright librarianly, that man. •Very, very angry US allies •Go Dilma Rousseff! •IETF working on securing Internet infrastructure standards •Legislation (currently “USA Freedom Act”)
  • 11. What can we do? •Don’t miss the elephant for the circus. •Lots of faff in the media about Snowden. It doesn’t matter what we think of Snowden! What matters is the NSA! •The usual citizen things: stay informed, contact your legislators, vote. •Educate. Discuss. Provide a venue for education and discussion. •Libraries: protect your employees! protect your computers and networks! (as best you can) •Library organizations: amicus briefs •The ACLU has already sued.
  • 12. Something to think about •The Internet was designed and built by engineers, physicists, military people. •It therefore exhibits many of their values: e.g. technical elegance. •What if librarians and archivists had built it? How would it be different? Would it be better? •Can we build that Internet NOW?