CSCE 201 Open Source Information Privacy Reading List

  • Slides: 22
Download presentation
CSCE 201 Open Source Information Privacy

CSCE 201 Open Source Information Privacy

Reading List l Recommended reading: – Open Source Intelligence: Private Sector Capabilities to Support

Reading List l Recommended reading: – Open Source Intelligence: Private Sector Capabilities to Support Do. D Policy, Acquisitions, and Operations , http: //www. fas. org/irp/eprint/oss 980501. ht m – The Economic Espionage Act, 1996 http: //www. usdoj. gov/criminal/cybercrime /eea. html CSCE 201 - Farkas 2

Open Source l Unclassified information in the public domain or available from commercial services

Open Source l Unclassified information in the public domain or available from commercial services l Example: newspapers, magazines, scientific publications, television and radio broadcasting, databases, etc. CSCE 201 - Farkas 3

Open Source Intelligence l Intelligence operation that uses open source data l Goal: answer

Open Source Intelligence l Intelligence operation that uses open source data l Goal: answer specific question in support of some mission l Process: – Requirement analysis – Data collection/filtering/analysis – Information integration Intelligence about CSCE 201 - Farkas 4

Open Source Intelligence Generally legal (uses readily available information) l Attacker gains access to

Open Source Intelligence Generally legal (uses readily available information) l Attacker gains access to protected information, e. g. , l – Business trade secrets – Military strategy, – Personal information l Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data CSCE 201 - Farkas 5

Open Source Intelligence l l l Widely used (e. g. , Department of Defense)

Open Source Intelligence l l l Widely used (e. g. , Department of Defense) Cheap, fast, or timely Most often legal Advantages: no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages: may not discover important information, assurance of discovery(? ) CSCE 201 - Farkas 6

Online Open Source Intelligence l Large amount of public data online – Web pages,

Online Open Source Intelligence l Large amount of public data online – Web pages, online databases, digital collections, organizations on line, government offices, etc. l Freedom and Information Act (FOIA): industry data l U. S. Patent Office: copies of U. S. patents l Trade shows, public records, etc. CSCE 201 - Farkas 7

Privacy l Use open source to find out confidential data about people l Find

Privacy l Use open source to find out confidential data about people l Find confidential data about people while they browse through open source (e. g. , Web searches) CSCE 201 - Farkas 8

Online Investigative Tools l Find out confidential data for small fee – Net Detective

Online Investigative Tools l Find out confidential data for small fee – Net Detective (http: //ndet. jeanharris. com/ – Dig Dirt (http: //www. classified 3. com/ ) l Privacy Tools (http: //www. epic. org/privacy/tools. html ) CSCE 201 - Farkas 9

Legislations Privacy Act of 1974, U. S. Department of Justice (http: //www. usdoj. gov/oip/04_7_1.

Legislations Privacy Act of 1974, U. S. Department of Justice (http: //www. usdoj. gov/oip/04_7_1. html ) l Family Educational Rights and Privacy Act (FERPA), U. S. Department of Education, (http: //www. ed. gov/policy/gen/guid/fpco/ferpa/index. html ) l Health Insurance Portability and Accountability Act of 1996 (HIPAA), (http: //en. wikipedia. org/wiki/Health_Insurance_Portability_and _Accountability_Act ) l Telecommunications Consumer Privacy Act (http: //www. answers. com/topic/electronic-communicationsprivacy-act ) l CSCE 201 - Farkas 10

Privacy Violations l Snooping via Open Sources l Online activities – Questionnaires – Customers’

Privacy Violations l Snooping via Open Sources l Online activities – Questionnaires – Customers’ data – Web site data collection (Cookies, IP address, operating system, browser, requested page, time of request, etc. ) – without user’s permission CSCE 201 - Farkas 11

Other Open Source Attacks Piracy – Available in open source, but still protected by

Other Open Source Attacks Piracy – Available in open source, but still protected by copyright, patent, trademark, etc. l Copyright Infringement – Acquisition of protected work without the owner’s permission and sold for a fee – Human perception: not serious crime – Significant loss for marketing/manufacturing/owner l – Berman Bill (http: //www. news. com/2100 -1023 - 946316. html ) – Copyright Law of the United States (http: //www. copyright. gov/title 17/ ) CSCE 201 - Farkas 12

What is Intelligence? l Information l Activities l Organization CSCE 201 - Farkas 13

What is Intelligence? l Information l Activities l Organization CSCE 201 - Farkas 13

Information “…relevant to a government’s formulation and implementation of policy to further its national

Information “…relevant to a government’s formulation and implementation of policy to further its national security interests and to deal with threats from actual or potential adversaries. ” (Silent Warfare) l Examples: – Military matters of foreign nations – Diplomatic activities and intentions of foreign nations – Intelligence activities of foreign nations l Other party may or may not want to keep it secret l Raw data and analyses and assessments based on raw data l CSCE 201 - Farkas 14

Activity l Activities: – Collection and analysis on intelligence information – Counterintelligence Collection: wide

Activity l Activities: – Collection and analysis on intelligence information – Counterintelligence Collection: wide range (e. g. , wiretapping, broadcasts, newspapers, research publications, aerial photography, espionage, etc. ) l Analysis: quality of data, correctness of analysis, timeliness, etc. l CSCE 201 - Farkas 15

Organization l Secrecy! l Secret activities -- Covert actions – Same organization vs. two

Organization l Secrecy! l Secret activities -- Covert actions – Same organization vs. two organizations l Central CSCE 201 - Farkas Intelligence Agency 16

Scope of Intelligence l Government -- national security – Range from peace time to

Scope of Intelligence l Government -- national security – Range from peace time to war time intelligence – Type of government l l l Domestic Intelligence -- depends on nature of regime Business corporations – competitive advantage Economics and Intelligence – Government-run economy – Economic well-being of nation l Non-traditions Intelligence – Environmental issues CSCE 201 - Farkas 17

Intelligence and Law Enforcement Transnational threats: – Do not originate primarily from a foreign

Intelligence and Law Enforcement Transnational threats: – Do not originate primarily from a foreign government – Serious threats for nation’s well-being – Fall within law enforcement rather than intelligence – Examples: narcotics trafficking, international terrorism l Law enforcement: waiting until a crime has been committed l Intelligence: collection of convincing evidence l Criminal investigation vs. criminal intelligence investigation – Punishment of a given criminal act or struggle with an organization engaged in criminal activity l CSCE 201 - Farkas 18

Intelligence – Information Age l l l Advent of information age Change the mode

Intelligence – Information Age l l l Advent of information age Change the mode of operations for business corporations and government Technology: communicating and processing information Behavioral and institutional change: information as the key of organizational activities Intelligent Services vs. competing organizations CSCE 201 - Farkas 19

Intelligence and Information Age l Globalization – Flow of information across borders – International

Intelligence and Information Age l Globalization – Flow of information across borders – International trade – Division of labor – Increased travel – Increased penetration by news media CSCE 201 - Farkas 20

Open Source Collection l l l Goal oriented Publications and broadcast Additional information available

Open Source Collection l l l Goal oriented Publications and broadcast Additional information available from nonintelligence sources Special sources (e. g. , speeches of political leaders, legal documents, demographic data, etc. ) Large amount of openly available data Need processing power CSCE 201 - Farkas 21

Problem of Increased Availability l How to locate sources l How to evaluate source

Problem of Increased Availability l How to locate sources l How to evaluate source reliability l How to analyze information and integrate with other intelligence information l How to protect confidentiality of policy maker’s interest CSCE 201 - Farkas 22