Sunday 30 October 2011

Viktor Mayer-Schönberger presents "Delete: The Virtue of Forgetting in the Digital Age"

A book talk with professor Viktor Mayer-Schönberger who examines the technology that is facilitating the end of forgetting in his book, "Delete: The Virtue of Forgetting in the Digital Age". Mayer-Schönberger argues that in our quest for perfect digital memories where we can store everything from recipes and family photographs to work emails and personal information, weve put ourselves in danger of losing a very human quality—the ability and privilege of forgetting.

To see the video here.


Thursday 27 October 2011

"Custodial sentences should be introduced for breaches of the Data Protection Act"

The Justice Committe - a committee of the House of the Commons - has published a report arguing in favour of custodial sentences for breaches of the Data Protection Act 1998, with considerable input from Christopher Graham, the current Information Commissioner:


"Using deception to obtain personal information – sometimes known as blagging – or selling it on without permission are serious offences that can cause great harm.

Fines are used to punish breaches of data protection laws, but they provide little deterrent when the financial gain exceeds the penalty.

Magistrates and Judges need to be able to hand out custodial sentences when serious misuses of personal information come to light. Parliament has provided that power, but Ministers have not yet brought it into force - they must do so."


The report is available here.

Wednesday 26 October 2011

ECJ decision in Martinez case

The ECJ has ruled in the joined Martinez and eDate cases (joined cases C‑509/09 and C‑161/10) - you can find the judgment here.

I've yet to read the decision, but it looks to be an interesting one. The court's press release (here), which provides a useful overview for those not wishing to read the full decision, describes the outcome as:

"Victims of infringements of personality rights by means of the internet may bring actions before the courts of the Member State in which they reside in respect of all of the damage caused. However, the operator of an internet website covered by the e-commerce directive cannot be made subject, in that State, to stricter requirements than those provided for by the law of the Member State in which it is established."


Fortunately - in my opinion - the UK does not (yet?) recognise a "personality right."

Monday 24 October 2011

Facebook audit set to begin amidst claims of unlawful personal data storage

A group calling itself Europe v Facebook is claming that Facebook-Irland's processing and storage of personal data violates EU data protection laws. Also they claim that Facebook-Irland is building 'shadow profiles' of individuals not registered in Facebook (ex.being invited to join Facebook).

I doubt that Data Protection Commissioner in Ireland will find evidence against Facebook-Irland !
see full text.

Privacy blunders by UK biz soar, websites least trusted



Interesting article on a survey findings from the UK Information Commissioner, that more violation of data protection was reported in 2011, in both private and public sectors.

The ICO report mentioned below:

Privacy blunders by UK biz soar, websites least trusted
Surprise! Public confidence in data protection declines

Data security breaches within the private sector are rapidly increasing, the UK's Information Commissioner warned today.
Information Commissioner Christopher Graham said that the number of such violations reported to the ICO was up 58 per cent so far in 2011/12, compared with the same period last year.
The watchdog revealed those findings following a survey of 2,500 UK-based individuals and 800 businesses.
A disconnect between the private sector's greater understanding of its data protection responsibilities and a drop in public confidence of the handling of such information was unsurprisingly uncovered in the survey.
“I’m encouraged that the private sector is waking up to its data protection responsibilities, with unprompted awareness of the [Data Protection] Act’s principles higher than ever," said Graham.
"However, the sector does not seem to be putting its knowledge to good use. The fact is that security breaches in the private sector are on the rise, and public confidence in good information handling is declining."
He reminded businesses that a fine of up to £500,000 could be slapped on companies that fail to comply with the Data Protection Act.
Graham also pointed out that a brand's reputation could be damaged "when data is not handled properly".
The ICO, in its report, pinpointed web-based outfits where public concern about personal data was at its highest. It said "almost three-quarters of individuals believe that online companies are not keeping their details secure". ®

Friday 21 October 2011

Every movement of Syrians online is monitored

In the context of repression in the Middle East and North Africa, surveillance technology has played a key role in providing authoritarian regimes with the tools necessary to track citizens online. Among these companies, BlueCoat has proved to be the most efficient in helping the Syrian regime control every movement of Syrians on the Internet

Check the whole article here

Aside from the political side of the story, any comments?

Wednesday 19 October 2011

German states defend use of 'Federal Trojan'

Five German states have admitted using a controversial backdoor Trojan to spy on criminal suspects.

...

Samples of the so-called R2D2 (AKA "0zapftis") Trojan came into the possession of the Chaos Computer Club (CCC), which published an analysis of the code last weekend.
....
Local government officials said the Trojan was used within the law, contrary to CCC's claims. Bavarian Interior Minister Joachim Herrmann said local authorities had acted within the law but nonetheless offered to review the use of the technology. Full text here

Tuesday 18 October 2011

"Cloud computing and data protection"

Watch out for this new technology of Cloud computing:

Cloud computing is more than simply a technical challenge. By putting our personal data on remote servers, we risk losing control over that data. Because the right to the protection of personal data is a fundamental right in the EU, this demands several actions. Fundamentally, the Commission believes that we need further research to enhance the security features of these technologies. And indeed we are funding such research at European level – which looks at "privacy-by-design" and "privacy-enhancing technologies".

more on this on here.

Nokia Near Field Communications and privacy study project

Last night, the LSE and Nokia released the Nokia Near Field Communications and privacy study project - you can download the final report here.

Amongst the conclusions reached, the research team opines that:
The current approach to choosing between “opt in” and “opt out” is inadequate for NFC applications. Although consent is an important part of the perception of having control of one’s privacy, users cannot adequately asses how effective and at what point the individual knows when there is a default opt in or opt out...

The key danger is that the discussion of privacy in this domain will degenerate into debates over ‘regulation’ vs. ‘innovation’, as we have seen in so many other technology policy debates. For NFC to thrive, privacy must be considered in the design of the technology, the platforms, and the services.

"Markey to Amazon: Don’t Hold a Kindle Fire Sale on Privacy "

US congressman Ed Markey has written an interesting letter to Amazon, about its Silk browser (and, more importantly, its back end servers), focussing on the privacy implications of its design - his letter is available here.

Of course, using server-side technology to speed up browsing is nothing new - Opera, for example, does it, as does RIM in its BlackBerry system, and there are likely more BlackBerry users than there are / will be of the Kindle Fire, but, given Amazon's clout, it could be an interesting debate, especially given the pressure on network operators / ISPs around use of customer browsing data.

Update: I had forgotten something on which I was asked to advise a few years back - Vodafone's UK operating company implemented a network-based rendering engine / proxy for Novarra for re-rendering webpages - a self-titled rant about the issue here. Many similar, and probably wider, issues.

Monday 17 October 2011

Defense Department Sued Over Security Breach

Hi,

this may be of your interest. An interesting case of data breach (of sentitive...real sensitive!) data leaked from an US organization.

Regards,
Salva


http://www.computerworld.com/s/article/9220874/Defense_Dept._hit_with_4.9B_lawsuit_over_data_breach
*********

The lawsuit seeks $4.9 billion, or $1,000 for each of the 4.9 million people affected.

Computerworld - The U.S. Department of Defense has been hit with a $4.9 billion lawsuit over a recently disclosed data breach involving TRICARE, a healthcare system for active and retired military personnel and their families.

The lawsuit, filed in federal court in Washington D.C. this week by four people whose data was allegedly compromised, seeks $1000 in damages for each of the 4.9 million individuals affected by the breach.

The suit charges TRICARE, the Department and Defense Secretary Leon Panetta with failing to adequately protect private data and of "intentional, willful and reckless disregard" for patient privacy rights.

TRICARE did not respond immediately to a request for comment.

In the complaint, the four plaintiffs faulted TRICARE for failing to properly encrypt the private data in its possession and for taking too long to notify victims of the breach.

The four plaintiffs are Virginia Gaffney, a Hampton, Va.-based individual who described herself in court papers as the spouse of a decorated war veteran; her two children; and Adrienne Taylor, a Glendale, Az. Based Air Force veteran.

TRICARE in September disclosed that sensitive data including Social Security Numbers, names, addresses, phone numbers and personal health data belonging to about 4.9 million active and retired U.S. military personnel may have been compromised after unencrypted backup tapes containing the data went missing.

The information on the tapes was from an electronic healthcare application used to capture patient data. The backup tapes were stolen from the car of an employee at Science Applications International Corp. (SAIC), a TRICARE contractor. The breach affects all those who received care at the military's San Antonio area military treatment facilities between 1992 and Sept. 7. 2011.

Lawsuits such as this one have become increasingly common in the immediate aftermath of a major data breach.

Earlier this month, for instance, Stanford Hospital and Clinics was hit with a $20 million proposed class action lawsuit for a data breach involving a third-party contractor. And major breaches such as the ones at Heartland Payment Systems, TJX and Hannaford Bros. have all prompted their share of consumer lawsuits charging the companies with negligence, breach of contract and other charges.

In many cases, courts however have tended to dismiss lawsuits in data breach cases. Several courts have held that consumers cannot claim compensatory or punitive damages in data breach cases unless they can demonstrate that they have suffered actual monetary damage as the result of a breach.

The notion that someone might become the victim of ID theft in future because of a data breach cannot be used as a basis for claims, courts have held.

One exception was in the Heartland case, where the company agreed to pay $4 million to settle claims stemming from several class-action lawsuits.

"Assessing the Privacy Impact of Deep Packet Inspection"

With so many debates at the moment about the sancitity of browsing data, and in particular with reference to ongoing discussions about net neutrality, the issue of deep packet inspection keeps cropping up. Alissa Cooper, of the Centre for Democracy and Technology and the Oxford Internet Institute, has just published a paper on the subject, which "assess[es] how the privacy impact of DPI varies depending on the context and attempt[s] to outline a practical definition of DPI" - it might be of interest.


A pre-print version of the paper is available from Alissa's website, here.

Sunday 16 October 2011

Perhaps jumping ahead

Many of you may already have seen this report from the Guardian newspaper.  It concerns a case where a third party obtained access to a GMail account and, inter alia, sent emails to everyone on the account owner's contact list claiming that she had been robbed in Madrid and pleading for them to lend her money.

The tale is perhaps more relevant to the computer crime part of the module. I know though that I have received a good number of emails of this kind. Being perhaps rather cynical, I've always taken the view that there are mechanisms for a genuine victim to get help without emailing hat are often casual acquaintances.

I think the story (and many others like it) does illustrate how we are struggling to fit our lives into the new patterns of behaviour associated with the Internet. We know that it is not wise to walk through a strange city carrying large amounts of money or wearing expensive watches or items of jewellery. Its more difficult on the Internet and perhaps also we are more dependent on intermediaries such as Google. Maybe we all need to have back up email accounts? And back ups of back ups?

Friday 14 October 2011

Undermining the respect for Privacy – a hidden agenda?

I thought that other students particularly US nationals may find this of interest. Whilst I was researching privacy I came upon the New-born Screening for Genetic and Metabolic Disorders Act (I think that is the correct title or something very similar). What I found interesting is that the Act, intended to be used to establish genetic abnormalities in new-borns, may have a more sinister application. Although US legislation is not my forte it appears prima facie that this Act gives unprecedented access to the DNA profiles of all US New-borns (born after 2007/8). Furthermore, it appears that parents/guardians do not have to give consent for the clinicians to take samples.


What surprises me is the apparent lack of protest against such a database. If a government body is to administer the database, what is to stop other agencies in the future such as the FBI using the database for criminal investigation? If all new-borns have their DNA profiles taken then eventually the US will have an absolute DNA database excluding only those who are born without medical supervision.

In Europe the ECtHR case – S and Marper v United Kingdom [2008] ECHR 1581 was a clear indication of the illegality of collecting such databases. For example, in Scotland if you commit a non-serious crime your DNA profile taken at the police station will be destroyed within a set period. Although, in England and Wales the Home Office is much more unsure on how it should proceed.


Should information which is derived from a biological source be of greater importance for protection? And if so should the state face specific legal obligations for its safe and secure eradication? Most of the Home Office literatures are guidelines.

Wednesday 12 October 2011

Freedoms Bill may infringe on individuals' privacy rights, Parliamentary committee says

Ian talks in his podcast how the UK is not fully complying with the European Convention on Human Rights directives in relation to privacy rights.  Here is a related article on which areas requires reforms:

Parts of a proposed civil rights law threaten the UK's compliance with human rights obligations and infringe on individuals' rights, Parliament's Human Rights Joint Committee has said.11 Oct 2011
http://www.out-law.com/en/articles/2011/october/freedoms-bill-may-infringe-on-individuals-privacy-rights-parliamentary-committee-says/

Monday 10 October 2011

Privacy protections in Act apply to all electronic communications stored in the US, court rules

Hi All,

I would like to share with you this topic, related to US law privacy (source Out-law.com);

A law which gives US citizens certain rights to privacy over their electronic communications also gives protection to non-US citizens if their data is stored on US servers, a US court has ruled. (06 Oct 2011)

you can find the full text on:
http://www.out-law.com/en/articles/2011/october/privacy-protections-in-act-apply-to-all-electronic-communications-stored-in-the-us-court-rules/


I would argue that this law may apply to US and non-US citizens as long as the data is stored in the US domain.

any other views?

Ban

A little bit gory

But for anyone interested in the trails we leave behind on the Internet this story from the BBC Website   makes fairly compelling reading.

Comments?

Sunday 9 October 2011

Starting work in earnest

Dear All,

The time has come to talk about subjects in more detail. The first part of this posting is generic to all the modules and if you are connected to other blogs you will see it repeated there. The second part will be specific to Legal Aspects of Information Security.

Let me start by talking a little about what we expect of you and the way in which the course is structured.  Each module lasts for 12 weeks and is divided into 4 themes. At the end of the theme we ask you to submit a reflective report on your experiences of and thoughts on the topics covered. Specific dates will come out later in the week.

There might appear to be a daunting amount of material in each theme. If it is of comfort, you are not expected to read it all at this stage. When we move to the middle of the semester you will be given topics for the end of semester essays. At the risk of giving away state secrets, there will be 4 topics. With 4 topics and 4 themes you might draw an obvious and correct conclusion. If you choose to write an essay on a particular topic, you will be expected to do a good deal of research and the materials will be of great value to you then.

I suggest that you listen first to a podcast. For information secuirity there are about 15 in total, slightly more than one per week  k of the semester. You might then look at the chapters in my book and the course notes (often the same). I'll try either in the podcasts or in postings here to indicate key items of reading. I would like you to start (if you are not already used to) reading cases and statutes. Don't worry, especially if you do not have formal legal qualifications if you don't understand everything. It does take time and for now you will be fine with secondary sources, such as my book, which will summarise materials for you.

Very importantly, if you feel you don't understand something, ask. The teachers are here to help you. By all means email me privately although I will tend to post replies - without identifying people - to this blog. Almost invariably, if one student has an issue, others will have the same difficulty. I really would encourage you to post queries to this forum. There is no shame in admitting to doubt. I near constantly send off (and receive) emails from colleagues along the lines 'I've been looking at this case and am not sure if I understand what it is about. This is what I think, but it may be nonsense'. Two or more minds are always better than one.

I'm often asked how much time you need to spend on the course and that is always a very difficult question to answer. There are so many variables in terms of experience and language skills and also, quite important, your own expectations. What I would say is that you need to spend a lot of time on your end of module essay (which will count for 60% of the final mark). The bulk of that work will have to be carried out in December and January. If you can book some holiday for that period, it might be helpful.

You were admitted to the course because we believe that you can pass. We believe that you can pass without giving up every other aspect of your life. Indeed you will probably damage your studies if you try to devote every spare waking moment to them. Do your honest best, take some time off,  and I think it will be good enough.



Turning to Information Security, we have a fairly gentle introduction although many of the issues are quite complicated. How do we strike a balance between rights of privacy and the right to receive an impart (publish)  information. We have had something of a watershed moment in the UK with the ongoing controversy about phone hacking carried out by newspapers. One example included the hacking of a voice mailbox from a phone belonging to a missing teenager who was subsequently found murdered. Although I think the evidence is a bit limited, it appears that the hackers had erased messages giving a false impression that the unfortunate woman might still have been alive and possibly hindered the police investigation.


What you might think about, is what privacy means to you. I tend to think that the term anonymity is perhaps more appropriate. We live large parts of our lives in public spaces -  and there is an issue whether the Internet is public space -  and we can have limited expectations of absolute privacy. We may not wanted to be identified as individuals, however.


Lots of issues then. For your reading I do commend the reports on the Surveillance Society and Wnat price privacy?


Please do post your thoughts and comments.


Best


Ian

Youtube lectures of surviellance and public places.

I usually play a video while eating my lunch. That increases my appetite to some level. While I was browsing youtube looking for a good catch, I found few lectures for Lewis R. Katz and other professors from Case Western Reserve University, titled as Surveillance and privacy in an age of national insecurity, given in 4 panels.
As a comparative study, that added much to my knowledge in such field and it worked very well for my appetite today.
Thought of sharing this with my distant classmates & everyone.

http://bit.ly/qBf96s

from such link, it would be easy to follow the other 3 panels

Thank you all


Welcome

A warm welcome to this blog.

Regards

Steve Saxby

Friday 7 October 2011

The Legal Aspects of Information Security Blog

Welcome to this new site.

All students on the module can post their own comments and also respond to postings made by other members.

Please try to do both.

Best

ian