Background Guide. Security Intelligence Summit. Director: Jenilee Trew Assistant Director: Anthony Tsou. Georgia Tech

Size: px
Start display at page:

Download "Background Guide. Security Intelligence Summit. Director: Jenilee Trew Assistant Director: Anthony Tsou. Georgia Tech"

Transcription

1 Background Guide Security Intelligence Summit Director: Jenilee Trew Assistant Director: Anthony Tsou Georgia Tech Model United Nations Conference 2014

2 Table of Contents Table of Contents... 2 Letter from the Dias... 3 Committee Directive... 4 Committee Positions... 5 Committee Overview... 6 Topic One: Civil Liberties and Technology in Security Intelligence... 8 Historical Background... 8 Timeline Timeline Narrative Current Situation Bibliography... 15

3 Letter from the Dias Dear Delegates, Welcome to Atlanta for the Seventeenth Georgia Tech Model United Nations Conference! My name is Jenilee Trew and I will be your Director for the Security Intelligence Summit Crisis Committee. I am a fourth year International Affairs and Business Administration double major from Douglasville, Georgia. I am also a member of the Georgia Tech National Model United Nations Team and have directed at GTMUN previously. I m thrilled to have you all here for what will be a very interesting committee! The Assistant Director for this committee is Anthony Tsou. He is a third-year, Computer Science major from Lawrenceville, Georgia. Anthony has participated in Model United Nations during high school and served as the Assistant Director of General Assembly Plenary in last year's GTMUN. He just studied abroad in South Korea over the summer, and he is looking forward to your participation in the coming conference! As the topic is still in motion and continues to be an on-going issue in American Politics, we have taken several liberties to focus on the main issue at hand. The purpose of this committee is to examine the broader questions regarding the connections between security, technology and civil liberties, as the issue is on-going and constantly debated in the real world. As such, there will be several changes such as recent bills that could change since the writing of this guide to the conference. If you have any questions about the conference, committee, guide or where to begin your research please reach out to either of us at jenilee@gatech.edu or aytsou147@gmail.com. We look forward to working with you in October! Sincerely, Jenilee Trew, Director Anthony Tsou, Assistant Director

4 COMMITTEE OVERVIEW GTMUN XVII 4 Committee Directive This crisis guide should be used as a starting point for research and understanding of the topic. This guide will provide you with the framework of the issue and will briefly discuss the possible directions and current challenges of the topic at hand. It is up to each of you to research your position and understand the most important topics in this issue as they relate to the role you will fill. While it is important to research all possible of areas of debate, it is more important to prepare for those subjects most important to your position. The directors do not expect any of you all to be experts on every topic, but we do expect you to have the knowledge to be able to critically think of these issues through the perspective of your delegate. Understanding the debates and points of contention between yourself and other delegates, and being prepared to contribute to those debates should be your main focus. Your position papers should address this, discussing the most important areas of debate for you and how you plan to deal with them. As such, this guide will serve to highlight the most important issues and debates of the topic through a variety of perspectives to give the best overview of what you can expect to be addressed throughout the crisis. Use this guide as a starting point for research, utilizing the footnotes and subjects mentioned in your search for information.

5 COMMITTEE OVERVIEW GTMUN XVII 5 Committee Positions The following is a list of participating delegates, for you reference. You should know who each person is and what will be their likely main concern in debating. Admiral Michael Rogers, Director, National Security Agency David Medine, Chairman, Privacy and Civil Liberties Oversight Board DeEtte Gray, President - Intelligence & Security, BAE Systems Inc. Dianne Feinstein (D), Chairman, US Senate Select Committee on Intelligence Jim Dempsey, VP for Public Policy, Center for Democracy & Technology Jim Sensenbrenner (R), Congressman John Buckman, Chairman of the Board, Electronic Frontier Foundation Meredith Baker, President, CTIA The Wireless Association Mike Rogers (R), Chairman, US House Intelligence Committee Philip S. Goldberg, Assistant Secretary of State for Intelligence and Research Richard Hoch, Director of Intelligence, Central Intelligence Agency Richard Ledgett, Deputy Director, National Security Agency Susan Herman, President, American Civil Liberties Union Susan Molinari, VP of Public Policy & Government Affairs, Google Zoe Lofgren (D), Congresswoman

6 COMMITTEE OVERVIEW GTMUN XVII 6 Committee Overview The Security Intelligence Summit will explore the United States intelligence community as it relates to civil liberties and technology. After developments within the National Security Agency the past year, there have been several inquiries into the methods and constitutionality of intelligence gathering, as seen in the collection of metadata from industry. This committee will be a fictitious summit comprised of civil rights leaders, intelligence community members, politicians, and corporations. This committee will examine the delicate balancing act between securing the United States interests, protecting its citizen s liberties, and the everchanging technological field. Delegates will work together to debate and examine the future of these issues and come to important agreements on what kind of future security intelligence should take. This summit is called to review the effectiveness of current policies and propose a plan of action regarding which direction security intelligence should proceed in the future. This exploratory body will refer proposals of change to the Director of National Intelligence (DNI), who in turn, reports directly to the President. Delegates only have the direct power to implement changes within the organizations they represent; however, as a collective body, the committee will draft a plan of action that will be reviewed and considered by the DNI for further action. This summit will be held in real time with real time events. The days will progress faster in crisis but you will be updated on how much time has passed.

7 Topic: Civil Liberties and Technology in Security Intelligence

8 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 8 Historical Background Topic One: Civil Liberties and Technology in Security Intelligence NSA Internet Surveillance When former NSA employee Edward Snowden leaked to The Guardian about how the National Security Agency (NSA) had been collecting domestic phone records, he sparked public outraged and set forth a serious of deliberations of the importance of security and privacy. 1 The debate increased when the public learned of the PRISM program, a data collection program that compels major technology companies to turn over communications and data to the NSA. In a declassified 2011 Foreign Intelligence Surveillance Court (FISC) opinion, it was revealed that the NSA collects more than 250 million Internet communications annually using the PRISM program, through the authority of the Foreign Intelligence Surveillance Act. 2 The majority of these are obtained through internet service providers, and are intended for international targets, but it severely raised concerns about personal privacy and the companies we give information to. The public also found it alarming to learn of the cybersecurity risk from NSA activities through the Office of Tailored Access Operation. This office engages in secretive cyber operations that undermine internet encryptions in various well used software; cataloging these vulnerabilities to exploit them for information collection purposes. 3 The dialogue about privacy, technology, and security has exploded after these revelations, with many citizens around the globe taking an interest in the increased protection of their privacy not limited to companies, the internet, and of course, government surveillance programs. The largest issue of this debate has been the question of how much of your privacy should be undermined for your security. This is not only an age old debate in politics, but now seriously affecting every aspect of our technology industry and national security. 1 MacAskill, Ewen, Gabriel Dance, Feilding Cage, Greg Chen, Kenan Davis, Kenton Powell, and Nadja Popovich. "NSA files decoded: Edward Snowden's surveillance revelations explained." theguardian.com. Guardian News and Media, 1 Nov Web. 1 Aug < 2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/3>. 2 Foreign Intelligence Surveillance Court opinion, October 3, 2011 at 20, available at 3 Kehl, Danielle, Kevin Bankston, Robyn Greene, and Robert Morgus. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity.". Open Technology Institute, 1 July Web. 1 Aug <

9 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 9 Robert S. Litt claims Security and privacy are not zero-sum. We have an obligation to give full meaning to both, to protect security while at the same time protecting privacy and other constitutional rights. 4 This problem is finding the point it is no longer vital to sacrifice personal freedoms to uphold the mandate of protecting our national security. The surveillance state could be a severe infringement on the liberties of citizens, but it also could be essential to their safety. Consumer Privacy Other privacy concerns have also arisen in regards to the consumer and company relationship. While customer information produces more competitive markets, driving pricing down it also requires personal data, usually given by a customer. For example, Netflix and Amazon have a system track your shopping preferences, making consumer s shopping tailored to their tastes. However, some feel companies have too much information about their customers. Critics feel that not only is it a violation of a person s privacy, but also having so much data in one place can make it easier for the information to fall into the hands of criminals. There is a continued argument that the cost of better protecting one s privacy from consumers is too high for the reward, as increased regulations raise overall consumer costs which may include longer wait times and larger fees, while the risk of fraudulent behavior is low. 5 Consumers are increasingly asking for meaning behind what data they share with companies and to whom those companies share that information with as well. While some wait for Federal Trade Commission actions, others say companies should be more open with how and why they use the data, since many claim that this consumer data collection helps consumers. 6 4 "Privacy, Technology and National Security: An Overview of Intelligence Collection." The Brookings Institution. Brookings Institute, 19 July Web. 1 Aug < 5 Lenard, Thomas, and Paul Rubin. "Privacy and the Commercial Use of Personal Information: The Case of Customer Propriety Network Information.". Technology Policy Institute, 15 Aug Web. 1 Aug < 6 Baskin, Jonathan. "Beware a Public Debate About Data Privacy." Advertising Age Special Report 2013 Opinion Issue RSS. Advertising Age, 2 Jan Web. 1 Aug < opinion-issue/beware-a-public-debate-data-privacy/245801/>.

10 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 10 However, the debate must not be limited to the privacy impacts. There are very real and severe economic impacts of the information leaked by Edward Snowden, including loss of faith in American companies, crippling data protection laws, and cybersecurity. 7 Reports on the PRISM program claiming that the NSA was tapping into the servers of companies to obtain customer data has severely hindered the trust necessary for our technology companies, most notably cloud computing companies. American companies such as Dropbox and Amazon reported significant losses to overseas competition after the revelations, creating a large competitive advantage for non-american companies. 8 This loss of trust has largely influenced international sales, with companies such as IBM and Microsoft reporting late 2013 sales in places such as China down as a result of these revelations. 9 Additionally, the software vulnerabilities the NSA has been cataloguing and exploiting has left the door wide open for criminal operations which only serve to hurt and hinder the reputation and business of these technology companies. Laws in Cyberspace Borderless cyberspace has always raised questions of legality and now these issues are front and center. National data localization has become a hot topic across the globe, in an effort for these countries to protect their citizen s privacy rights. However, there are concerns about whether these efforts allow for easier censorship and surveillance over their local population. These laws further hamper the American technology industry which might have to set up local overseas data centers and costs of implementing such a policy. Localization of internet traffic will also change how internet traffic is routed, requiring a certain physical location instead of the most efficient route possible. 10 While the United States has been a prolonged proponent of a free, open and integrated global internet, after the NSA revelations the message has become muddled. The fallout from the revelations is that it discredits the agenda for a free internet, giving more life to the debate of internet regulations and governance, such as data localization. 11 In December 2010, the FCC passed its Open Internet Order, which is intended to provide Net Neutrality protections 7 Danielle Kehl, Kevin Bankston, Robyn Greene, and Robert Morgus. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity." 8 Idem. 9 Idem. 10 Idem. 11 Idem.

11 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 11 (the idea all internet traffic should be treated the same by internet service providers) and protect the idea of an open Internet. 12 However, there has been a legal battle following from companies who wish to relax open Internet regulations as it hampers their business "Regulating Internet Access as a Public Utility: A Boomerang on Tech If It Happens." 13 "How to Save the Internet." Free Press. Save the Internet,

12 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 12 Timeline 1966 Freedom of Information Act 1974 Privacy Act of Foreign Intelligence Surveillance Act 1996 Telecommunications Act of Electronic Communications Privacy Act of 1986 SEP 2001 September 11 Attacks OCT 2001 USA Patriot Act 2002 Homeland Security Act JUNE 5, 2013 Edward Snowden Leaks OCT 2013 Freedom Act

13 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 13 Timeline Narrative 1966 Freedom of Information Act Enshrines the right to access information from the federal government Privacy Act of 1974 Established the code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies Foreign Intelligence Surveillance Act 1978 Authorizes electronic surveillance to obtain foreign intelligence information and established the Foreign Intelligence Surveillance Court Electronic Communications Privacy Act of 1986 Implements government restrictions on wire taps and electronic communications Telecommunications Act of 1996 Regulates the communications market, including the internet September 2001 September 11, 2001 Attacks October 2001 USA Patriot Act 2001Oct Homeland Security Act 2002 Established the Department of Homeland Security to prevent terrorist attacks, reduce vulnerability to terrorist attacks, and to minimize the damage of terrorist attacks "What is FOIA?." FOIA.gov. N.p., 1 Jan Web. 19 July < 15 "Privacy Act of 1974." Welcome to the United States Department of Justice. N.p., 1 Jan Web. 1 Aug < 16 McAdams, James. "Foreign Intelligence Surveillance Act: An Overview.". Federal Law Enforcement Training Centers, n.d. Web. 22 July < 17 Helft, Miguel, and Claire Miller. "Web Outruns Privacy Law." The New York Times. The New York Times, 9 Jan Web. 1 Aug < 18 "Homeland Security." Act of Department of Homeland Security, n.d. Web. 1 Aug <

14 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 14 June 2013 Edward Snowden Leaks June October 2013 USA Freedom Act (Bill) October 19, 2013 (Bill Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet- Collection and Online Monitoring Act) Aims to rein in collection of data and increase transparency of the Foreign Intelligence Security Court Current Situation In the present, the American public is still recovering from the shocking revelations of the Edward Snowden leaks. Happening only one-year prior, the event is still in the minds of the populace and remains as fuel for criticism towards the United States government. Companies utilize customer information as a tool of enhancing the consumer experience; however, they are dealing with accusations of lack of customer confidentiality. Public concerns of invasions of privacy are preset, yet the concern for security, while not immediately emphasized, is always relevant. As delegates of this committee, you must be prepared to represent your organization in the matters that concern the United States policies on security intelligence. Day one of this summit will start with debating the overall future of these issues, with each delegate standing up for what they want changed the most. From the results of the first meetings, there will be updates and changes that will require delegates to think on their feet to propose new changes and react to the events. Think carefully about what you want to accomplish and contingency plans if they fail!

15 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 15 Bibliography "What is FOIA?" FOIA.gov. N.p., 1 Jan Web. 19 July < "Privacy Act of 1974." Welcome to the United States Department of Justice. N.p., 1 Jan Web. 1 Aug < McAdams, James. "Foreign Intelligence Surveillance Act: An Overview." Federal Law Enforcement Training Centers, n.d. Web. 22 July < Helft, Miguel, and Claire Miller. "Web Outruns Privacy Law." The New York Times. The New York Times, 9 Jan Web. 1 Aug < "HowStuffWorks "How the Patriot Act Works". HowStuffWorks. N.p., n.d. Web. 1 Aug < "Homeland Security." Act of Department of Homeland Security, n.d. Web. 1 Aug < MacAskill, Ewen, Gabriel Dance, Feilding Cage, Greg Chen, Kenan Davis, Kenton Powell, and Nadja Popovich. "NSA files decoded: Edward Snowden's surveillance revelations explained." theguardian.com. Guardian News and Media, 1 Nov Web. 1 Aug. Foreign Intelligence Surveillance Court opinion, October 3, 2011 at 20, available at Kehl, Danielle, Kevin Bankston, Robyn Greene, and Robert Morgus. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity.". Open Technology Institute, 1 July Web. 1 Aug < nal.pdf>. "Privacy, Technology and National Security: An Overview of Intelligence Collection." The Brookings Institution. Brookings Institute, 19 July Web. 1 Aug < <

16 SECURITY INTELLIGENCE GEORGIA TECH MODEL UNITED NATIONS XVII 16 Lenard, Thomas, and Paul Rubin. "Privacy and the Commercial Use of Personal Information: The Case of Customer Propriety Network Information.". Technology Policy Institute, 15 Aug Web. 1 Aug < Baskin, Jonathan. "Beware a Public Debate About Data Privacy." Advertising Age Special Report 2013 Opinion Issue RSS. Advertising Age, 2 Jan Web. 1 Aug < Kehl, Danielle, Kevin Bankston, Robyn Greene, and Robert Morgus. "Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity.". Open Technology Institute, 1 July Web. 1 Aug < nal.pdf>. "Regulating Internet Access as a Public Utility: A Boomerang on Tech If It Happens." The Brookings Institution. Brookings Institute, 2 June Web. 1 Aug < "How to Save the Internet." Free Press. Save the Internet, n.d. Web. 1 Aug <

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Draft Resolution. Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011

Draft Resolution. Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011 Committee A: Net Neutrality and Internet Access Draft Resolution Submitted for revision by the delegations to the Model United Nation, College of Charleston, Spring 2011 The General Assembly Reaffirming

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Revealed: how US and UK spy agencies defeat internet privacy and security

Revealed: how US and UK spy agencies defeat internet privacy and security http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect

More information

CSA Survey Results Government Access to Information July 2013

CSA Survey Results Government Access to Information July 2013 CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.

More information

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

Economic Impact of PRISM on Cloud Services & Safe Harbor

Economic Impact of PRISM on Cloud Services & Safe Harbor Economic Impact of PRISM on Cloud Services & Safe Harbor SESSION ID: TRND-R04A Craig Spiezle Executive Director & President, Online Trust Alliance https://otalliance.org Challenges & Risks Privacy Balkanization

More information

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire Working paper GTJMCE-2015-1 This working paper along with others in the same series can be found online at:

More information

Freedom of Information Act Request and Request for Expedited Processing

Freedom of Information Act Request and Request for Expedited Processing February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL nsdfoia@usdoj.gov

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty!

Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty! JonathanA.Obar,AndrewClement InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$Track Citation

More information

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006 Politics and Cryptography in the United States Syvale Lee April 11, 2006 Outline Bill of Rights Security versus Freedom Current Trends in Computer Security Export Control on Cryptography Pretty Good Privacy

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity

Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity July 2014 New America s Open Technology Institute Policy Paper Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity Danielle Kehl with Kevin Bankston, Robyn Greene & Robert

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

Privacy and Civil Liber0es Oversight Board

Privacy and Civil Liber0es Oversight Board Privacy and Civil Liber0es Oversight Board Report on the Surveillance Program Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act JULY 2, 2014 PRI V ACY AND CI VIL LI BE RTIES

More information

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

The Internet, Human Rights, and the Private Sector

The Internet, Human Rights, and the Private Sector The Internet, Human Rights, and the Private Sector An Interview with Michael A. Samway GJIA: You stated in a November 2008 C-SPAN interview that in addition to heading Yahoo! s international legal team,

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE CYBER SECURITY AND INFORMATION ASSURANCE RESEARCH AND DEVELOPMENT SENIOR STEERING GROUP OF THE FEDERAL NETWORKING AND INFROMATION TECHNOLOGY

More information

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

July 15, 2014. President Barack H. Obama The White House 1600 Pennsylvania Ave Washington, D.C. 20500

July 15, 2014. President Barack H. Obama The White House 1600 Pennsylvania Ave Washington, D.C. 20500 President Barack H. Obama The White House 1600 Pennsylvania Ave Washington, D.C. 20500 cc: Office of Science & Technology Policy Executive Office of the President Eisenhower Executive Office Building 1650

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment IAPP Conference 2010 Samuel P. Jenkins Director for Privacy, Defense Privacy & Civil Liberties

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

S. 21 IN THE SENATE OF THE UNITED STATES

S. 21 IN THE SENATE OF THE UNITED STATES II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

EU- US NGO Letter on 1 To Secretary Pritzker

EU- US NGO Letter on 1 To Secretary Pritzker November 13, 2015 Secretary Penny Pritzker U.S. Department of Commerce 1401 Constitution Ave., NW Washington, D.C. 20230 Commissioner Věra Jourová Justice, Consumers and Gender Equality European Commission

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

Under the Cybersecurity Law, network operators are obligated to consider the following security

Under the Cybersecurity Law, network operators are obligated to consider the following security On July 6, 2015, the Standing Committee of the National People s Congress (NPCSC) of the People s Republic of China published a draft on Cybersecurity Law. A public comment period on the Cybersecurity

More information

Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament

Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament September 5, 2012 Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament Lara Comi Rapporteur, Committee on Internal market and Consumer Protection

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

JOINT MOTION FOR A RESOLUTION

JOINT MOTION FOR A RESOLUTION EUROPEAN PARLIAMENT 2009-2014 Plenary sitting inofficial consolidated version prepared by Jan Philipp Albrecht after adoption in Plenary on 23 October 2013 JOINT MOTION FOR A RESOLUTION pursuant to Rule

More information

Homeland Open Security Technology HOST Program

Homeland Open Security Technology HOST Program Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research

More information

The firestorm of controversy

The firestorm of controversy 0100100000011001100110 1001011100100110010101 1100110111010001101111 0111001001101101001000 0001101111011001100010 0000011000110110111101 1011100111010001110010 0110111101110110011001 0101110010011100110111

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

Security Management in the

Security Management in the Security Management in the Internet Era 8 th : Personal Information and Security (2) November 10, 2011 Jun Murai Keio University Suguru Yamaguchi Nara Institute of Science and Technology Schedule 01st

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cybersecurity and Data Protection - First Principles By Chris Connolly

More information

POLICY BRIEF Why Trade Agreements are not Setting Information Free

POLICY BRIEF Why Trade Agreements are not Setting Information Free POLICY BRIEF Why Trade Agreements are not Setting Information Free Susan Ariel Aaronson, Ph.D. In December 2012, IIEP published a policy brief, Can Trade Policy Set Information Free? which compared US,

More information

Cyber After Snowden. Can DC Help Protect Your Networks? Matthew Rhoades, Director, Cyberspace & Security Program

Cyber After Snowden. Can DC Help Protect Your Networks? Matthew Rhoades, Director, Cyberspace & Security Program Cyber After Snowden Can DC Help Protect Your Networks? Matthew Rhoades, Director, Cyberspace & Security Program Truman Project Members Cyberspace & Security Program Agenda Looking Back How we got here

More information

The Year 2013 Has Become 1984

The Year 2013 Has Become 1984 The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International

More information

Statement on ischool responses to the challenges of NSA mass state surveillance

Statement on ischool responses to the challenges of NSA mass state surveillance Statement on ischool responses to the challenges of NSA mass state surveillance April 7, 2015 We members of the ischool community/iconference 2015 attendees recognize that: 1. Widespread mass suspicion-less

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

How To Get A Law Passed In The United States

How To Get A Law Passed In The United States HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the

More information

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection

More information

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

UAS Privacy Best Practices Discussion Draft. Center for Democracy & Technology DRAFT 09/24/15

UAS Privacy Best Practices Discussion Draft. Center for Democracy & Technology DRAFT 09/24/15 UAS Privacy Best Practices Discussion Draft Center for Democracy & Technology DRAFT 09/24/15 This goal of this draft is to advance constructive discussion on UAS privacy best practices. This straw man

More information

OPEN ACCESS, PRIVACY AND HACKER CULTURE

OPEN ACCESS, PRIVACY AND HACKER CULTURE OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013

More information

Internet Governance Forum Baku 2012

Internet Governance Forum Baku 2012 Internet Governance Forum Baku 2012 Workshop Cloudy Jurisdiction: Addressing the Thirst for Cloud Data in Domestic Legal Processes Workshop organized by Tamir Israel, Staff Lawyer, Samuelson- Glushko Canadian

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

engagement will not only ensure the best possible law, but will also promote the law s successful implementation.

engagement will not only ensure the best possible law, but will also promote the law s successful implementation. US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements J. Howard Beales Chair, DHS Data Privacy and Integrity Advisory Committee Via Hand Delivery Secretary Janet Napolitano Department of Homeland Security Washington, DC 20528 Ms. Mary Ellen Callahan Chief

More information

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Cyber-Security. FAS Annual Conference September 12, 2014

Cyber-Security. FAS Annual Conference September 12, 2014 Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy

More information

Re: Request for Comments on the Preliminary Cybersecurity Framework

Re: Request for Comments on the Preliminary Cybersecurity Framework Submitted Electronically Patrick Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology U.S. Department of Commerce 1401 Constitution Avenue, NW Washington, DC 20227 Re: Request for

More information

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill Marcus Christian Partner +1 202 263 3731 mchristian@mayerbrown.com Howard W. Waltzman

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

Statement for the Record of The Electronic Privacy Information Center (EPIC)

Statement for the Record of The Electronic Privacy Information Center (EPIC) Statement for the Record of The Electronic Privacy Information Center (EPIC) Marc Rotenberg, EPIC President Ginger McCall, Director, EPIC Open Government Project Hearing on "DHS Monitoring of Social Networking

More information

Privacy Issues Airports

Privacy Issues Airports Privacy and Data Breaches A GROWING AIRPORT CONCERN Dominic Nessi Los Angeles World Airports Privacy in General There is none Google and other search engines, cookies Growth of on-line commerce Social

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information