Cyber Secure: Who will own and protect online intelligence in the future?
More and more data on our daily activities is captured in email systems, CCTV, GPS on smartphones and social networks. And the security services are leading the way developing ways to evaluate this complex data: using gait recognition to identify individuals and sentiment analysis to understand the tone of online communication. As these techniques become more widespread, it won’t be just defence experts who have access to these tools. Local Authorities, banks or even neighbours could monitor activity, whilst also exasperating our vulnerabilities to cyber crime.
The controversial Communications Bill published by Theresa May’s Home Office in summer 2012 included new plans for monitoring the where, what and how of all UK citizen online activity. Yet if a few teenage hackers from Essex can tap into the CIA’s website, what confidence do we have in the governments’ capacity to keep our privacy information secure? Against this backdrop, this is a time to explore some of the privacy issues that the Bill throws up in the context of longer-term challenges in managing cyber security and monitoring techniques. The governance of cyber space is increasingly beyond the control of national borders, so what activities or policies are needed to help protect our online activities and personal data from malicious attack or manipulation? And is it even possible?
This event looks at some of the sophisticated and fast-evolving techniques in online intelligence in the context of broader questions of cyber governance and security:
- What sorts of monitoring techniques are out there? And how different are those used by the government, versus big businesses?
- How do different of monitoring interoperate? What kind of ‘picture’ does this build up? And why should we care?
- As our lives are increasingly online, do citizens really know what they are consenting to, and how vulnerable are we as a result?
- What benefits will be drawn from legislation such as the Communications Bill, and is it worth the risk?
- Realistically, how governable is cyber space? Can we ever be fully cyber secure, and what are the trade-offs for such security? Is more monitoring within the UK really the answer?
SPEAKERS: Professor Sadie Creese, Co-Director, Institute for the Future of Computing, Oxford Martin School, University of Oxford, Peter Jopling,Business Unit Executive, IBM Security Solutions responsible for the P&L in UK&I. Other speakers TBC
6pm registration for a 6.30pm start
For more information about the Next Big Thing events series, please visit www.policyexchange.org.uk/next-big-thing
What do you think the Next Big Thing will be? Vote for your choice on Policy Exchange’s facebook page www.facebook.com/policyexchange
When & Where
Nesta is the UK's innovation foundation. We help people and organisations bring great ideas to life. We do this by providing investments and grants and mobilising research, networks and skills. We are an independent charity and our work is enabled by an endowment from the National Lottery. Nesta is a registered charity in England and Wales 1144091 and Scotland SC042833. For more information, please visit: http://www.nesta.org.uk/about-us