PRIVACY and CIVIL LIBERTIES OVERSIGHT BOARD Semi-Annual Report July 2019

Total Page:16

File Type:pdf, Size:1020Kb

PRIVACY and CIVIL LIBERTIES OVERSIGHT BOARD Semi-Annual Report July 2019 PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Semi-Annual Report July 2019 1 The Honorable Elijah E. Cummings Report Distribution Chairman U.S. House of Representatives Committee In accordance with Section 801 of the on Oversight and Government Reform Implementing Recommendations of the 9/11 Commission Act of 2007, the Privacy and Civil The Honorable Jim Jordan Liberties Oversight Board (PCLOB or the Ranking Member Board) is providing this Semi-Annual Report, U.S. House of Representatives Committee which covers the period from January-July on Oversight and Government Reform 2019, to the President and the Members of Congress listed below. The Honorable Jerrold Nadler Chairman The Honorable Richard Shelby U.S. House of Representatives Chairman Committee on the Judiciary U.S. Senate Committee on Appropriations The Honorable Doug Collins The Honorable Patrick Leahy Ranking Member Vice Chairman U.S. House of Representatives U.S. Senate Committee on Appropriations Committee on the Judiciary The Honorable Ron Johnson The Honorable Nita M. Lowey Chairman Chairwoman U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Gary C. Peters The Honorable Kay Granger Ranking Member Ranking Member U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Richard Burr The Honorable Bennie G. Thompson Chairman Chairman U.S. Senate Select Committee on Intelligence U.S. House of Representatives Committee on Homeland Security The Honorable Mark Warner Vice Chairman The Honorable Mike Rogers U.S. Senate Select Committee on Intelligence Ranking Member U.S. House of Representatives Committee The Honorable Lindsey Graham on Homeland Security Chairman U.S. Senate Committee on the Judiciary The Honorable Adam Schiff Chairman The Honorable Dianne Feinstein U.S. House of Representatives Permanent Select Ranking Member Committee on Intelligence U.S. Senate Committee on the Judiciary The Honorable Devin Nunes Ranking Member U.S. House of Representatives Permanent Select Committee on Intelligence 2 Table of Contents Introduction 4 Board Background and Authorities 4 Executive Summary of Board Activities During the Reporting Period 6 Oversight and Advice Activities During the Reporting Period 6 USA FREEDOM Act 6 Other New Oversight Projects 7 Other Active Oversight Projects 7 Advice Function 8 Cybersecurity: Executive Order 13636 8 Coordination of Executive Branch Privacy and Civil Liberties Activites 8 Organizational and Managerial Activities of the Board 9 Workforce and Nominations 9 IT Systems 9 Financial Controls and Contracting 10 Protecting Classified and Sensitive Information 10 Outreach to the Public, Congress, and Other Federal Agencies 11 Conclusion 12 Introduction The Privacy and Civil Liberties Oversight Board returned to a quorum upon the confirmation by the Senate and appointment by the President of three new Members in October 2018. On June 27, 2019, the Senate confirmed new Board Members Aditya Bamzai and Travis LeBlanc and also confirmed current Board Member Edward Felten to a full six-year term. These appointments return the Board to a full complement for the first time since July 2016. During the period covered by this report, the Board initiated several new oversight projects, completed one advice project, and initiated one new advice project. To inform the public about this work, the Board held two public forums during the reporting period. The Board also recently released a public inventory of its active projects, the first since 2014. That document, which is available on the Board’s website, will be updated biannually.1 The Board also continued to strengthen its institutional capacity. In particular, the Board has increased its staffing level by 60 percent since emerging from its recent sub-quorum period, hired an expert technologist to assist the Board in evaluating the implications of new and emerging technologies, and implemented various technical controls to increase the security and efficiency of its IT infrastructure. These developments reflect the Board’s ongoing commitment to providing timely, relevant, and actionable advice and oversight and to ensuring efficient, professional agency operations. Board Background and Authorities The Board is an independent agency within the Executive Branch, established in its current form by the Implementing Recommendations of the 9/11 Commission Act of 2007. The bipartisan, five-member Board is appointed by the President and confirmed by the Senate. The Board’s mission is to ensure that the Executive Branch’s efforts to prevent terrorism are balanced with the need to protect privacy and civil liberties. The Board’s enabling statute, 42 U.S.C. § 2000ee, authorizes it to review and analyze actions the Executive Branch takes to protect the nation from terrorism, ensuring that the need for such actions is balanced with the need to protect privacy and civil liberties, and to ensure that liberty concerns are considered in the development and implementation of laws, regulations, and policies related to efforts to protect the nation from terrorism. Under the statute, the Board has two primary functions: oversight and advice. 1 Privacy and Civil Liberties Oversight Board, Active Oversight Projects and Other Engagements: July 2019, https://www.pclob.gov/library/Agenda%20July%202019.pdf. 4 1) In its oversight role, the Board is charged with continually reviewing the regulations, policies, and procedures of the Executive Branch, as well as other actions to protect the nation from terrorism, to ensure that such actions (i) protect privacy and civil liberties; and (ii) are consistent with governing laws, regulations, and policies regarding privacy and civil liberties.2 2) Under the Board’s advice function, Executive Branch agencies are able to consult with the Board at an early stage in the development of new policies, programs, guidelines, or regulations, to ensure that privacy and civil liberties protections are factored into their initial design.3 The Board also has designated roles under the following authorities: • Executive Order 13636. Improving Critical Infrastructure Cybersecurity, issued in February 2013, calls upon multiple agencies to develop and implement a Cybersecurity Framework to minimize the risk of a cyberattack on critical infrastructure.4 Section 5 of the Executive Order requires the Department of Homeland Security (DHS) to prepare a report, in consultation with the Board, recommending ways to mitigate the privacy and civil liberties risks created by cybersecurity measures adopted under the order. The report must be reviewed on an annual basis and revised as necessary. • Coordinating Privacy Officers. Section 803 of the Implementing Recommendations of the 9/11 Commission Act of 2007 requires certain Executive Branch departments and agencies to designate at least one senior official as a privacy and civil liberties officer and issue reports about their activities.5 The Board’s authorizing statute directs the Board to make recommendations to these Privacy Officers regarding their activities and to coordinate those activities on relevant interagency matters.6 • Presidential Policy Directive 28 (PPD-28). PPD-28 articulates principles to guide how the United States conducts signals intelligence activities for authorized foreign intelligence and counterintelligence purposes.7 In the directive, the President encouraged the Board to provide him with an assessment of the implementation of any matters contained in the directive that fall within the Board’s mandate. In response, the Board issued a report on PPD-28, which was released in unclassified form in October 2018. The Board continues to monitor the status of the recommendations made in that report. 2 42 U.S.C. § 2000ee(d)(2). 3 Id. § 2000ee(d)(1). 4 E.O. 13636, Improving Critical Infrastructure Cybersecurity (Feb. 12, 2013). 5 Pub. L. No. 110-53 § 803 (2007), codified at 42 U.S.C. § 2000ee-1(a). The entities covered are the Office of the Director of National Intelligence, the Central Intelligence Agency, National Security Agency, Federal Bureau of Investigation, and the Departments of Defense, Health and Human Services, Homeland Security, Justice, and Treasury; Id. § 2000ee-1(f). Before its amendment in 2014, the statute required quarterly reports. 6 Id. § 2000ee(d)(3). In addition, the Board may designate new departments, agencies, or elements of the Executive Branch for coverage by the requirements of Section 803. See id. § 2000ee-1(a). 7 PPD-28, Signals Intelligence Activities (Jan. 17, 2014). 5 Executive Summary of Board Activities During the Reporting Period This section provides highlights of the Board’s oversight activities, provision of advice to other federal agencies, and organizational and managerial activities during the period covered by this report. These activities are described in greater detail in parts III and IV of this report. Oversight. The Board continued to conduct vigorous oversight of efforts by the Executive Branch to protect the nation against terrorism. Most notably, the Board is conducting oversight of the collection of call detail records under the USA FREEDOM Act of 2015, in advance of that authority’s impending sunset in December 2019. The Board held a public forum on May 31, 2019 to receive information from outside experts as part of this review. The Board also approved several other new oversight projects, including an examination of the
Recommended publications
  • Privacy and Civil Liberties Oversight Board
    PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Semi-Annual Report February 2020 1 2 The Honorable Carolyn B. Maloney Report Distribution Chairwoman U.S. House of Representatives Committee In accordance with Section 801 of the on Oversight and Reform Implementing Recommendations of the 9/11 Commission Act of 2007, the Privacy and Civil The Honorable Jim Jordan Liberties Oversight Board (PCLOB or the Ranking Member Board) is providing this Semi-Annual Report, U.S. House of Representatives Committee which covers the period from August 2019 - on Oversight and Reform January 2020, to the President and the Members of Congress listed below. The Honorable Jerrold Nadler Chairman The Honorable Richard Shelby U.S. House of Representatives Chairman Committee on the Judiciary U.S. Senate Committee on Appropriations The Honorable Doug Collins The Honorable Patrick Leahy Ranking Member Vice Chairman U.S. House of Representatives U.S. Senate Committee on Appropriations Committee on the Judiciary The Honorable Ron Johnson The Honorable Nita M. Lowey Chairman Chairwoman U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Gary C. Peters The Honorable Kay Granger Ranking Member Ranking Member U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Richard Burr The Honorable Bennie G. Thompson Chairman Chairman U.S. Senate Select Committee on Intelligence U.S. House of Representatives Committee on Homeland Security The Honorable Mark Warner Vice Chairman The Honorable Mike Rogers U.S. Senate Select Committee on Intelligence Ranking Member U.S.
    [Show full text]
  • Against Authority
    AGAINST AUTHORITY Freedom and The Rise of the Surveillance States by John Twelve Hawks for Thomas Pynchon ©2014 by John Twelve Hawks. All Rights Reserved. A LITTLE BOY IN A ROOM OF MIRRORS Both dogs and humans know when we’ve been caged. We sense instinctually when some other person—or an institution—has the power to direct or control our lives. And our first awareness of this reality occurs at an early age. The older kids on the schoolyard are bigger and stronger. They have the power to knock us down and tell us what to do. When I was growing up in the 1950s, I was quite aware of my own powerlessness. I couldn’t tell anyone what to do—not even a first grader. Although my brain was crammed with a great many words, I had a terrible stutter and couldn’t get the words out. Everyone in my elementary school class laughed when I struggled to speak, and sometimes even my teacher had to conceal her smile. By the time I was eight years old, I started to believe that a demon with a perverse sense of humor was in charge of my lips and tongue. On some days, he was a lazy demon, and I could talk on the phone or answer questions in class. Then the demon would get annoyed with me and I would spit and sputter over every word. On Sundays my family attended a Scotch Presbyterian church headed by a conservative pastor who preached about infant damnation. I was confused about the power of baptism, but I definitely understood the concept of hell.
    [Show full text]
  • Replanting Paradise on Page 2
    $4 at Newsstands and Bookstores SocialistViewpoint H The philosophers have only interpreted the world in various ways; the point is to change it. —Karl Marx H JULY/AUGUST 2016 VOL. 16 NO. 4 When Janis Joplin sang, “Freedom’s just another word for nothing left to lose,” she spoke perhaps unconsciously for millions of America’s victims in faraway places. Read Get Ready for Another World War on page 17. On the Front Cover: s Capitalism is destroying the planet. Read Replanting Paradise on page 2. French citizens take to the streets to stand up against the One Percent’s relentless attacks on living standards. Read French Stand Up on page 51. Replanting Paradise - Page 2 Let Them Drown, The Violence of Othering in a Warming World - Page 4 Once More on the European Union - Page 32 Supporting the “lesser evil,” because we can’t live with a Trump victory, is a tacit admission that the status quo is tolerable. Read Leap Manifesto - Page 49 Trumpophobia on page 19. Vol. 16, No. 4 SOCIALIST VIEWPOINT BC Muhammad Ali Fighter for Palestine By Palestinian Prisoner Solidarity Network On the occasion of the passing of leg- United States, and as a force against “U.S. my people is here. I will not disgrace endary athlete and struggler for justice, imperialism worldwide. He wrote poetry my religion, my people or myself by Muhammad Ali, Samidoun Palestinian in tribute to the Black leaders of the Attica becoming a tool to enslave those Prisoner Solidarity Network joins mil- prison uprising. At the height of his who are fighting for their own jus- lions around the world in remembering career, Muhammad Ali refused to fight in tice, freedom and equality.
    [Show full text]
  • Calendars of the United States House of Representatives and History of Legislation
    1 ONE HUNDRED FIFTEENTH CONGRESS CONVENED JANUARY 3, 2017 FIRST SESSION ! ADJOURNED JANUARY 3, 2018 SECOND SESSION ! CALENDARS OF THE UNITED STATES HOUSE OF REPRESENTATIVES AND HISTORY OF LEGISLATION FINAL EDITION E PL UR UM IB N U U S FIRST SESSION www.HouseCalendar.gov PREPARED UNDER THE DIRECTION OF KAREN L. HAAS, CLERK OF THE HOUSE OF REPRESENTATIVES: By the Office of Legislative Operations The Clerk shall cause the calendars of the House to be Index to the Calendars will be included on the first legislative day of distributed each legislative day. Rule II, clause 2(e) each week the House is in session U.S. GOVERNMENT PUBLISHING OFFICE : 2018 28–916 2 SPECIAL ORDERS SPECIAL ORDER The Speaker’s policy with regard to special-order speeches announced on February 11, SPEECHES 1994, as clarified and reiterated by subsequent Speakers, will continue to apply in the 115th Congress, with the following modifications. The Chair may recognize Members for special-order speeches for up to 4 hours. Such speeches may not extend beyond the 4-hour limit without the permission of the Chair, which may be granted only with advance consultation between the leader- ships and notification to the House. However, the Chair will not recognize for any special-order speeches beyond 10 o’clock in the evening. The 4-hour limitation will be divided between the majority and minority parties. Each party is entitled to reserve its first hour for respective leaderships or their designees. The second hour reserved to each party will be divided into two 30- minute periods.
    [Show full text]
  • Tom's Tidbits Our Feature Articles
    Tom's Tidbits Snowden and the NSA… keep your eye on the ball Our Feature Articles . Orwell was an optimist “Idiot Lights”? Only if you “1998 and newer” isn’t The best articles on the don’t understand them for everyone evolving NSA scandal What do your dashboard We’ll gladly work on our warning lights mean? existing client’s older vehicles Our Monthly Columns . "What NOW?!!" Toons Book Spotlight News To Make You Furious Our special Toon-of-the-Month Surprise! No one is innocent. Small problems… big guns Drew’s Kitchen Humorousness Kelley’s Creamed Potatoes and The lighter side of Orwellian Hell Peas Popcorn Shorts Shop Talk Cool and important stuff that's too Calendar nominations, road trip short for a big article tips, and an indestructible kitten Finally… Flying cars are Health Notes- here! The sweetener that gives Oregon officially agrees… monkeys tumors Corporations are not people! Sellwood Bridge Update FREE Sellwood Park What’s missing in this picture? concerts started with a bang Build your own swamp cooler Tom’s Tidbits Snowden and the NSA… keep your eye on the ball Greetings! Did Edward Snowden watch and learn from the lessons of Bradley Manning? More importantly, have we? Manning leaked information to WikiLeaks anonymously, and it wasn’t until his arrest two months later that we learned his name. That was the beginning of a three-year Kafkaesque odyssey, three years of silence from Manning as Julian Assange tried to make his case, and three years in which the government sequestered and tortured Manning and stonewalled the substance of his leaks.
    [Show full text]
  • SEP 2020 Part A.Pdf
    1 HZS C2BRNE DIARY – September 2020 www.cbrne-terrorism-newsletter.com 2 HZS C2BRNE DIARY – September 2020 HZS C2BRNE DIARY– 2020© September 2020 Website: www.cbrne-terrorism-newsletter.com Editor-in-Chief BrigGEN (ret.) Ioannis Galatas MD, MSc, MC (Army) PhD cand Consultant in Allergy & Clinical Immunology Medical/Hospital CBRNE Planner & Instructor Senior Asymmetric Threats Analyst Manager, CBRN Knowledge Center @ International CBRNE Institute (BE) Senior CBRN Consultant @ HotZone Solutions Group (NL) Athens, Greece Contact e-mail: [email protected] Editorial Team ⚫ Bellanca Giada, MD, MSc (Italy) ⚫ Hopmeier Michael, BSc/MSc MechEngin (USA) ⚫ Kiourktsoglou George, BSc, Dipl, MSc, MBA, PhD (UK) ⚫ Photiou Steve, MD, MSc EmDisaster (Italy) ⚫ Tarlow Peter, PhD Sociol (USA) A publication of HotZone Solutions Group Prinsessegracht 6, 2514 AN, The Hague, The Netherlands T: +31 70 262 97 04, F: +31 (0) 87 784 68 26 E-mail: [email protected] DISCLAIMER: The HZS C2BRNE DIARY® (former CBRNE-Terrorism Newsletter), is a free online publication for the fellow civilian/military CBRNE First Responders worldwide. The Diary is a collection of papers/articles related to the stated thematology. Relevant sources/authors are included and all info provided herein is from open Internet sources. Opinions and comments from the Editor, the Editorial Team or the authors publishing in the Diary do not necessarily represent those of the HotZone Solutions Group (NL) or the International CBRNE Institute (BE). Arabic in the cover says: “Remember Beirut!” www.cbrne-terrorism-newsletter.com 3 HZS C2BRNE DIARY – September 2020 www.cbrne-terrorism-newsletter.com 4 HZS C2BRNE DIARY – September 2020 Editorial Brig Gen (ret.) Ioannis Galatas, MD, MSc, MC (Army) Editor-in-Chief HZS C2BRNE Diary Dear Colleagues, In the news of September, two issues were monopolized our interest: schools opening and covid 19 vaccines.
    [Show full text]
  • Calendars of the United States House of Representatives and History of Legislation
    1 ONE HUNDRED FOURTEENTH CONGRESS CONVENED JANUARY 6, 2015 FIRST SESSION ! ADJOURNED DECEMBER 18, 2015 SECOND SESSION ! CALENDARS OF THE UNITED STATES HOUSE OF REPRESENTATIVES AND HISTORY OF LEGISLATION FINAL EDITION E PL UR UM IB N U U S FIRST SESSION www.HouseCalendar.gov PREPARED UNDER THE DIRECTION OF KAREN L. HAAS, CLERK OF THE HOUSE OF REPRESENTATIVES: By the Office of Legislative Operations The Clerk shall cause the calendars of the House to be Index to the Calendars will be included on the first legislative day of distributed each legislative day. Rule II, clause 2(e) each week the House is in session U.S. GOVERNMENT PUBLISHING OFFICE : 2016 99–687 2 SPECIAL ORDERS SPECIAL ORDER The Speaker’s policy with regard to special-order speeches announced on February 11, SPEECHES 1994, as clarified and reiterated by subsequent Speakers, will continue to apply in the 114th Congress, with the following modifications. The Chair may recognize Members for special-order speeches for up to 4 hours. Such speeches may not extend beyond the 4-hour limit without the permission of the Chair, which may be granted only with advance consultation between the leader- ships and notification to the House. However, the Chair will not recognize for any special-order speeches beyond 10 o’clock in the evening. The 4-hour limitation will be divided between the majority and minority parties. Each party is entitled to reserve its first hour for respective leaderships or their designees. The second hour reserved to each party will be divided into two 30- minute periods.
    [Show full text]
  • Department of Defense Insider Threats: Sharing and Oversight to Protect U.S
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Department of Defense Insider Threats: Sharing and Oversight to Protect U.S. Installations Yokeitha Anita Ramey Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Yokeitha A. Ramey has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Ian Cole, Committee Chairperson, Public Policy and Administration Faculty Dr. Olivia Yu, Committee Member, Public Policy and Administration Faculty Dr. Michael Brewer, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Department of Defense Insider Threats: Sharing and Oversight to Protect U.S. Installations by Yokeitha A. Ramey MS, Columbia Southern University, 2007 BGS, Louisiana State University and A&M College, 1997 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University May 2020 Abstract The growing threat of Islamic State of Iraq and the Levant and other terrorist organizations increases the Department of Defense’s (DoD’s) chance of encountering an insider threat, which creates the need for the DoD to develop programs to address this concern and mitigate the risk to national security.
    [Show full text]
  • Ethical Implications of the Snowden Revelations
    1 Ethical Implications of the Snowden Revelations Draft 12 for IJISPA (International Journal of Intelligence, Security, and Public Affairs) Michael Andregg, University of St. Thomas and University of Minnesota, St. Paul, Minnesota, USA. [email protected] abstract This paper addresses a number of ethical dilemmas and practical consequences of the revelations of Edward Snowden about massive electronic surveillance of telephone calls, emails, social media posts and other “Signals Intelligence” (or SIGINT) across the entire world, but especially including domestic American communications formerly thought immune to such surveillance unless authorized by judicial warrant. Practical consequences matter for all “utilitarian” ethical judgments. The author concludes that by far the largest issue is whether US intelligence professionals regard the US Constitution as supreme law in America, or non- disclosure contracts with individual agencies or the US government. Reactions to Snowden follow this pattern, with security cleared insiders generally considering him a traitor, and ordinary people generally considering him a hero for telling the public about illegal activity within the National Security agency directed against fundamental, and constitutionally protected civil liberties like freedom of speech. Introduction The most profound ethical question raised by revelations by Edward Snowden of vast increases in National Security Agency (NSA) surveillance, both foreign and domestic, is which is more important: An oath before God to preserve, protect and defend the US Constitution, or contracts with government agencies to guard every secret so classified from disclosure, even if those secrets suggest pervasive violations of the Constitution? This is the fissure that divides many practitioners, who think that Snowden is a traitor to their agencies and perhaps even to the people 2 at large, and a great many outsiders who think that Snowden is a hero for revealing massive wrongdoing under color of authority, shielded by excessive secrecy.
    [Show full text]
  • SECRET SOURCES Whistleblowers, National Security, and Free Expression SECRET SOURCES: WHISTLEBLOWERS, NATIONAL SECURITY, and FREE EXPRESSION
    SECRET SOURCES Whistleblowers, National Security, and Free Expression SECRET SOURCES: WHISTLEBLOWERS, NATIONAL SECURITY, AND FREE EXPRESSION November 10, 2015 © PEN American Center 2015. All rights reserved PEN American Center is the largest branch of PEN International, the world’s leading literary and human rights organization. PEN works in more than 100 countries to protect free expression and to defend writers and journalists who are imprisoned, threatened, persecuted, or attacked in the course of their profession. PEN America’s 4,200 members stand together with more than 20,000 PEN writers worldwide in international literary fellowship to carry on the achievements of such past members as James Baldwin, Robert Frost, Allen Ginsberg, Langston Hughes, Arthur Miller, Eugene O’Neill, Susan Sontag, and John Steinbeck. For more information, please visit www.pen.org. Cover (clockwise): Photograph of Pentagon by David B. Gleason. Photograph of the Central Intelligence Agency New Headquarters Building by the CIA. Photograph of the National Security Agency building by the NSA. CONTENTS Introduction 4 Methodology 6 U.S. and International Legal Provisions on Freedom of Expression and Access to Information 7 Current Law and Policy Relating to the Reporting and Disclosure of Government Practices 9 Protections Afforded to Intelligence Community Employees and Contractors: An Overview 9 Specific Legal Mechanisms to Protect National Security Whistleblowers 13 Laws and Policies Used Against National Security Leakers 17 Conclusion 27 Recommendations 27
    [Show full text]
  • Insider Threat Detection Study
    Markus Kont, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, Anna-Maria Osula Insider Threat Detection Study 1 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 2 Executive Summary This study focuses on the threat to information security posed by insiders (i.e., insider threat) as the recent cases of Edward Snowden, Chelsea Manning, and Herman Simm have highlighted the significant risks of “good guys gone bad” within a defence structure. Insider threat has to, in particular, be explored as most security frameworks focus on intrusions by external actors. But what happens if the malicious user is able utilise internal channels to access your systems? What if the perpetrator is someone who you trust? How do you detect and deal with a destructive and hostile insider with a security clearance? Our work provides a comprehensive overview of insider threat, examines a selection of high-profile incidents and existing research. The analysis takes an interdisciplinary approach, discussing insider threat from technical, legal, and behavioural perspectives.
    [Show full text]
  • A Rhetorical Hermeneutics of Danger: Leaks in the Digital Age
    A Rhetorical Hermeneutics of Danger: Leaks in the Digital Age. A DISSERTATION SUBMITTED TO THE FACULTY OF UNIVERSITY OF MINNESOTA BY Daniel Ladislau Horvath IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Advisor Ronald Walter Greene May 2015 © Daniel Ladislau Horvath 2015 Acknowledgements I would like to express the deepest appreciation to my mentor and advisor, Dr. Ronald Walter Greene. His truly inspiring work and his gentle soul have defined the trajectory of my entire academic career. I also want to thank my committee—Dr. Karlyn Kohrs Campbell, Dr. Arthur Walzer, Dr. Edward Schiappa—for their hard work and, above all, for their patience. Their attentive reading and thoughtful feedback have shaped the present argument, made me a better writer, and helped me become a more discerning thinker. I would also like to thank my writing and support group—Dr. Shannon Stevens, Erin Cole, and Dr. Dana Schowalter—for their unwavering support. My appreciation goes to the larger UMN family as well—professors, friends, colleagues—as integral parts of the universe that made this project possible. I also want to mention all my professors at UNLV who encouraged me to pursue my studies, none more adamantly so than my MA advisor Dr. Donovan Conley. On a personal note, my sister, Edith, my brother in law, Robert, and my niece, Petra, have provided a home far from home. I would not have survived let alone thrived in the U.S. without their love and support. I am also grateful for my parents’ patience. Silvia and Vasile paid the steepest price for my success: not being able to see their son in person for the last 10 years.
    [Show full text]