There has been a lot of coverage in recent months over the Australian Federal Governments proposition to implement a data retention policy. The debate is polarising and highly emotive, similar to that of the shelved mandatory Internet content filtering policy.
Some Australian citizens clearly dislike governments fiddling with their internetz. Likewise there are also a considerable number of logistical and technical challenges that such a program would need to overcome before being feasible, and if implemented, there are a number of circumvention techniques readily available, such as anonymous VPN services in “unregulated” countries who would benefit immensely by the patronage of those Australian internet users who wished to not have their activities recorded for posterity.
Essentially the Government has proposed tasking an agency, or Internet Service Providers (ISPs) with the requirement to store records of all internet user activity for a period of time. The reason for this is to enable law enforcement investigators (with reasonable cause) access to those records for evidence or to piece together cases.
There are almost as many arguments against this as there are for it--I don't wish to open that can of worms here. I would, however, like to expound upon a point raised by Sir Tim Berners-Lee when he was in Melbourne recently on a speaking tour. He espoused that even if it were technically possible, and the government enacted the legislation, and service providers complied with the requirement; where and who would be responsible for the storage of this data (particularly if this data were to be aggregated) it would be a pure gold-mine of sensitive, private information over an extended period of time—on every internet user in Australia.
How does the governance and security ensure 100% privacy for each service connected to the internet and the individuals who use those services? (Once this data is lost, there is no getting it back)
Suppose criminals got hold of some or all of it in the first-instance, and sold, released publicly or otherwise disseminated the material? Suppose, for example, insurance companies could see that a household’s internet service had been used to research a medical condition over a period of time? Even though there are a number of plausible reasons why someone might research it, a slight possibility that someone in that premises actually has that condition may be sufficient for the insurance company to consider the risk unacceptable, and not offer anyone in that premises coverage.
We all know that no data is 100 percent secure. The higher the value of the target information, the more chance of a breach there will be.
Sir Tim suggested that the handling of such sensitive, highly private data was akin to that of nuclear waste. It should be taken offline, far away from any network and stored in a highly secure bunker. The access process by any legitimate organisation would need to be onerous.
So those who are ambivalent argue we already have lawful intercept of transmissions for law enforcement investigations, things such as telephone calls are recorded as a component of the telcos’ billing systems. Phone tapping is an available tool if required. So what is the difference on the Internet?
This is the point, it is the internet. The average internet user expects the internet to be relatively anonymous, yet they also insist on using Google and Facebook. Many still wonder how ads appear targeted to their history and activities online, but key here is that those individuals have an option to participate or not.
If internet users were aware that big brother may be looking over their shoulders at any time, how would this affect their usage and experience of the Internet?
An interview with Ron Gula, CEO and CTO of Tenable Network Security conducted by David Braue, CSO Australia.
Safeguarding the crown Jewels
Our key industry moderators from each roundtable discussion will come to stage to discuss each table's challenges, considerations and key takeaways in a panel format including Q&A with the audience.
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator.