Privacy vs. Security: Concerns Over NSA’s Power and Cybersecurity Leadership
In March 2009, Beckstrom raised alarms about the concentration of power within the NSA, emphasizing the need for checks and balances in cybersecurity. Experts Dale Meyerrose and Amit Yoran echoed these concerns, stressing the importance of civil liberties and the risks of letting the NSA take the lead on cyber programs due to potential conflicts of interest. This ongoing debate highlights the tension between privacy and security, which must be addressed by adhering to ethical standards, like those outlined in the ACM/IEEE Code of Ethics, to protect public welfare.
Privacy vs. Security: Concerns Over NSA’s Power and Cybersecurity Leadership
E N D
Presentation Transcript
Cyber-Security Your Privacy and the NSA
Beckstrom Resigns fromNational Cyber Security Center • March 2009 • “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”
Dale Meyerrose • Said that while intelligence officials need to be mindful of civil liberties concerns in the cybersecurity debate, the N.S.A. must have a leading role in that effort because of its technical expertise.
Amit Yoran • “There is a tremendous amount of expertise at N.S.A. but I also agree that it would be a significant detriment to the nation to let the N.S.A. be the lead agency running cyberprograms. There is an inherent conflict of interest between their intelligence mission and the mission of the folks doing cyber.”
Privacy versus Security Privacy Security Existential Realistic Idealistic Pragmatic
ACM/IEEE Code of Ethics • Work to develop software and related documents that respect the privacy of those who will be affected by that software. • In all these judgments concern for the health, safety and welfare of the public is primary.
References • ACM/IEEE Code of Ethics • Barger, Robert; Computer Ethics • Risen, James and Lichtblau, Eric; “Control of Cybersecurity Becomes Divisive Issue”; April 16, 2009