next up previous
Next: Should a Health Database Up: The DeCODE Proposal for Previous: When are de-identified data

Why the DeCODE Proposals are Inadequate

This leads to the reasons why I consider the security proposals made by DeCODE to be unsatisfactory, and the level of technical expertise shown by them so far to be inadequate.

The point that users must not have access to a Turing powerful query language is a point that DeCODE have failed to understand; at the 12th October briefing, it emerged that their technical expert did not even understand the phrase `Turing powerful'. I am convinced that this is not simply a linguistic misunderstanding, as even after I had explained the requirement for user queries to be strictly limited, and the difficulty of doing so, during the morning on the 12th October, DeCODE continued to maintain at a further meeting during the afternoon that writing a filter to police user queries would be simple.

A security expert should have been aware that this is not the case. For example, much of the expenditure in banking computer security relates to extensive quality control procedures whereby all programs are examined and tested by multiple independent people, to reduce the risk that a programmer could credit a large sum of money to his own account. Another example comes from military computer security, where systems prevent information flows from a higher security level to a lower one independently of the application programs, in order to prevent an application programmer from writing code that could leak information. Yet another example is given by the popular `Java' programming language, which is designed in order to let users download programs from the Internet and run them in their web browsers with relatively little risk that these programs could steal personal information, destroy data or otherwise misbehave. In short, the problem of which software one must trust, and to what extent, is the central issue in computer security.

The other security proposals by DeCODE, and in particular the claims made about encryption, also indicate a lack of expertise:

For these reasons, I cannot accept DeCODE's claim to have adequate expertise in computer security, or their claim that they do have adequate security plans but that these have simply not been disclosed to me [7]. The lack of competence at computer security is quite evident in their proposal.


next up previous
Next: Should a Health Database Up: The DeCODE Proposal for Previous: When are de-identified data
Ross Anderson
1998-10-20