Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.

Similar presentations


Presentation on theme: "Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter."— Presentation transcript:

1 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter 5: Privacy

2 1-2 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-2 Chapter Overview (1/2) Introduction Perspectives on privacy Disclosing information Ways information becomes public U.S. legislation Public records

3 1-3 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-3 Chapter Overview (2/2) Covert government surveillance U.S. legislation authorizing wiretapping Data mining Identity theft Encryption

4 1-4 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-4 1.1 Introduction Information collection, exchange, combination, and distribution easier than ever More information access  less privacy Trade-offs –Privacy vs. need for credentials –Privacy vs. desire for free expression –Privacy vs. safety / security

5 1-5 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 5.2 Perspectives on Privacy 1-5

6 1-6 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-6 Defining Privacy Privacy related to notion of access Access –Physical proximity to a person –Knowledge about a person Edmund Byrne: Privacy is a “zone of inaccessibility” Edward Bloustein: Privacy violations are an affront to human dignity Too much individual privacy can harm society Where to draw the line?

7 1-7 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-7 Harms of Privacy Cover for illegal or immoral activities Burden on the nuclear family Hidden dysfunctional families Ignored people on society’s fringes

8 1-8 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-8 Benefits of Privacy Individual growth Individual responsibility Freedom to be yourself Intellectual and spiritual growth Development of loving, trusting, caring, intimate relationships

9 1-9 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-9 Is There a Natural Right to Privacy? Morton Levine: Privacy rights stem from property rights: “a man’s home is his castle” Coercive Acts before American Revolution led to 3 rd Amendment to U.S. Constitution Samuel Warren and Louis Brandeis: People have “the right to be let alone” Judith Jarvis Thomson: “Privacy rights” overlap other rights Stanley Benn and Jeffrey Reiman: Privacy is a prudential right

10 1-10 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Do People Have the Right to Be Left Alone? 1-10 Chris Uncle / Film Magic / Getty Images

11 1-11 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley National Do Not Call Registry FTC responded to public opinion –Created Do Not Call Registry in 2003 –More than 50 million phone numbers registered before it even took affect Example of how privacy is treated as a prudential right –Benefit of shielding people from telemarketers judged to be greater than harm caused by limiting telephone advertising 1-11

12 1-12 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-12 Privacy and Trust Modern life more private Challenge: living among strangers Remedy: establishing reputations –Ordeal, such as lie detector test or drug test –Credential, such as driver’s license, key, ID card, college degree Establishing reputation is done at the cost of reducing privacy

13 1-13 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Solove’s Taxonomy of Privacy A wide variety of activities can lead to privacy concerns Privacy-related activities can be put into 4 categories: –Information collection: gathering personal information –Information processing: storing, manipulating, and using information that has been collected –Information dissemination: spreading personal information –Invasion: intruding upon a person’s daily life 1-13

14 1-14 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Case Study: Secret Monitoring Act utilitarian evaluation Rule utilitarian evaluation Kantian evaluation Social contract theory evaluation Alternative courses of action that would be morally acceptable 1-14

15 1-15 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-15 5.3 Disclosing Information Public record: information for public access Public information: information revealed to an organization that has right to share it Personal information: undisclosed information Types of disclosures –Voluntary –Involuntary –Statutory

16 1-16 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Disclosures Make Personal Information Public 1-16

17 1-17 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 5.4 Public Information 1-17

18 1-18 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-18 Ways Information Becomes Public Rewards or loyalty programs Body scanners Digital video recorders Automobile “black boxes” Enhanced 911 service RFIDs Implanted chips Cookies Spyware

19 1-19 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Body Scanner Takes Measurements 1-19 AP/Wideworld Photos

20 1-20 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley RFID Tags Speed Inventory Process 1-20 Courtesy of Tibbett & Britten

21 1-21 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-21 5.5 U.S. Legislation

22 1-22 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-22 Fair Credit Reporting Act Promotes accuracy and privacy of information used by credit bureaus Major credit bureaus: Equifax, Experian, Trans Union Negative information kept only 7 years Exceptions –Bankruptcies: 10 years –Criminal convictions: indefinitely

23 1-23 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-23 Fair and Accurate Credit Transactions Act Passed in 2004 Requires three major credit bureaus to provide consumers a free copy of their credit report every 12 months Not automatic: consumers must request credit reports Provisions to reduce identity theft

24 1-24 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-24 Family Education Rights and Privacy Act (FERPA) Rights given to –Students 18 years and older –Parents of younger students Rights include –Reviewing educational records –Requesting changes to erroneous records –Preventing release of records without permission

25 1-25 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-25 Employee Polygraph Protection Act Passed in 1988 Prohibits private employers from using lie detector tests under most conditions Cannot require test for employment Exceptions –Pharmaceutical companies and security firms may give test to certain classes of employees –Employers who have suffered a theft may administer tests to reasonable suspects –Federal, state, and local governments exempt

26 1-26 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-26 Video Privacy Protection Act Videotape service providers cannot disclose rental records without consumer’s written consent Rental stores must destroy personal information related to rentals within a year of when it is no longer needed

27 1-27 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-27 Financial Services Modernization Act Also called Gramm-Leach-Bliley Act of 1999 Creates “financial supermarkets” offering banking, insurance, and brokerage services Privacy-related provisions –Privacy policies must be disclosed to customers –Notices must provide an opt-out clause –Companies must develop procedures to protect customers’ confidential information

28 1-28 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-28 Children’s Online Privacy Protection Act Reduces amount of public information gathered from children Online services must gain parental consent before collecting information from children 12 and under

29 1-29 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-29 Health Insurance Portability and Accountability Act Limits how doctors, hospitals, pharmacies, and insurance companies can use medical information Health care providers need signed authorization to release information Health care providers must provide patients with notice describing how they use medical information

30 1-30 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Genetic Information Nondiscrimination Act Health insurance companies –can’t request genetic information –Can’t use genetic information when making decisions about coverage, rates, etc. –Doesn’t apply to life insurance, disability insurance, long-term care insurance Employers –can’t take genetic information into account when hiring, firing, promoting, etc. –Small companies (< 15 employees) are exempt 1-30

31 1-31 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 5.6 Public Records 1-31

32 1-32 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-32 Census Records Census required to ensure every state has fair representation Number of questions steadily rising Sometimes Census Bureau has broken confidentiality requirement –World War I: draft resistors –World War II: Japanese-Americans

33 1-33 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-33 Internal Revenue Service Records Much personal information on tax forms Some IRS employees have misused access to IRS records IRS has also misplaced tapes and diskettes containing records

34 1-34 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-34 FBI National Crime Information Center 2000 NCIC –Collection of databases related to various crimes –Contains > 39 million records Successes –Helps police solve hundreds of thousands of cases every year –Helped FBI tie James Earl Ray to assassination of Dr. Martin Luther King, Jr. –Helped FBI apprehend Timothy McVeigh for bombing of federal building in Oklahoma City

35 1-35 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-35 Criticisms of the NCIC Erroneous records have led to false arrests Police have arrested innocent people with same name as someone in NCIC database FBI has used NCIC to keep records of people not suspected of any crime Corrupt law-enforcement employees have sold information and altered records Some law-enforcement employees illegally access the NCIC

36 1-36 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-36 OneDOJ Database Database being constructed by U.S. Department of Justice Gives state and local police officers access to information provided by five federal law enforcement agencies –Incident reports –Interrogation summaries –Other information not available through NCIC Criticisms –OneDOJ gives local police access to information about people who have not been charged with a crime –There is no way to correct misinformation in raw police reports

37 1-37 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-37 Code of Fair Information Practices No secret databases People should have access to personal information in databases Organizations cannot change how information is used without consent People should be able to correct or amend records Database owners, users responsible for reliability of data and preventing misuse

38 1-38 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-38 Privacy Act of 1974 Falls Short Applies only to government databases Only covers records indexed by a personal ID No federal employee responsible to enforcing Privacy Act provisions Allows agencies to share records with other agencies

39 1-39 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 5.7 Covert Government Surveillance 1-39

40 1-40 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-40 4 th Amendment to U.S. Constitution “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

41 1-41 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-41 Wiretaps and Bugs Omstead v. United States  wiretapping OK Federal Communications Act  wiretapping made illegal Nardone v. United States  wiretapping not OK FBI continues secret wiretapping Katz v. United States  bugs not OK

42 1-42 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-42 Operation Shamrock Continuation of World War II interception of international telegrams National Security Agency (1952) Expanded to telephone calls Kennedy –Organized crime figures –Cuba-related individuals and businesses Johnson and Nixon –Vietnam war protesters Nixon –War on drugs

43 1-43 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-43 Carnivore Surveillance System Created by FBI in late 1990s Monitored Internet traffic, including email exchanges Carnivore = Windows PC + “packet-sniffing” software Captured packets going to/from a particular IP address Used about 25 times between 1998 and 2000 Replaced with commercial software

44 1-44 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-44 Covert Activities after 9/11 September 11, 2001 attacks on World Trade Center and Pentagon President Bush authorized new, secret, intelligence-gathering operations inside United States

45 1-45 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-45 National Security Administration Wiretapping President Bush signed presidential order –OK for NSA to intercept international phone calls & emails initiated by people inside U.S. –No search warrant required Number of people monitored –About 500 people inside U.S. –Another 5,000-7,000 people outside U.S. Two al-Qaeda plots foiled –Plot to take down Brooklyn bridge –Plot to bomb British pubs and train stations

46 1-46 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-46 TALON Database Created by U.S. Department of Defense in 2003 Supposed to contain reports of suspicious activities or terrorist threats near military bases Reports submitted by military personnel or civilians Reports assessed as “credible” or “not credible” by military experts Reports about anti-war protests added to database Many of these reports later deleted from database In 2007 new Under Secretary of Defense for Intelligence recommended that TALON be terminated

47 1-47 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-47 5.8 U.S. Legislation Authorizing Wiretapping

48 1-48 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-48 Title III Part of Omnibus Crime Control and Safe Streets Act of 1968 Allows a police agency with a court order to tap a phone for up to 30 days In 1972 U.S. Supreme Court again rejected warrantless wiretapping, even for national security

49 1-49 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-49 Electronic Communications Privacy Act Passed by Congress in 1986 Allows police to attach two kinds of surveillance devices to a suspect’s phone line –Pen register: displays number being dialed –Trap-and-trace device: displays caller’s phone number Court order needed, but prosecutors do not need to show probable cause Allows police to do roving wiretaps (following suspect from phone to phone)

50 1-50 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-50 Communications Assistance for Law Enforcement Act Passed in 1994 Designed to ensure police can still do wiretapping as digital networks are introduced FBI asked for new abilities, such as ability to intercept digits typed by caller after phone call placed Federal Communications Commission included these capabilities in its guidelines to phone companies Privacy-rights advocates argued that new capabilities went beyond Congress’s intent

51 1-51 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-51 USA PATRIOT Act Provisions –Greater authority to monitor communications –Greater powers to regulate banks –Greater border controls –New crimes and penalties for terrorist activity Critics say Act undermines 4 th Amendment rights –Pen registers on Web browsers –Roving surveillance –Searches and seizures without warrants –Warrants issued without need for showing probable cause

52 1-52 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-52 Patriot Act Successes Charges against 361 individuals –Guilty pleas or convictions for 191 people –Shoe-bomber Richard Reid –John Walker Lindh More than 500 people removed from United States Terrorist cells broken up in Buffalo, Seattle, Tampa, and Portland (“the Portland Seven”)

53 1-53 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-53 Patriot Act Failure March 11, 2004 bombings in Madrid Spain FBI makes Brandon Mayfield a suspect –Claims partial fingerprint match –Conducts electronic surveillance –Enters home without revealing search warrant –Copies documents and computer hard drives Spanish authorities match fingerprint with an Algerian –Judge orders Mayfield released –FBI apologizes Civil rights groups: Mayfield was targeted for his religious beliefs

54 1-54 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-54 Patriot Act Renewal Patriot Act renewed in 2006 Nearly all provisions made permanent Four-year sunset clause on two provisions –Roving wiretaps –FBI ability to seize records from financial institutions, libraries, doctors, and businesses with approval from secret Foreign Intelligence Surveillance Court

55 1-55 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-55 5.9 Data Mining Data mining –Searching for patterns or relationships in one or more databases –Way to generate new information Secondary use: information collected for one purpose used for another purpose Information about customers is a valuable commodity

56 1-56 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Secondary Uses of Information 1-56

57 1-57 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-57 Marketplace: Households Lotus Development Corporation developed CD with information on 120 million Americans Planned to sell CD to small businesses that wanted to create mailing lists based on various criteria, such as household income More than 30,000 consumers complained to Lotus about invasion of privacy Lotus dropped plans to sell CD

58 1-58 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-58 IRS Audits IRS uses computer matching and data mining to look for possible income tax fraud Computer matching: matching tax form information with information provided by employers, banks, etc. Data mining: searching through forms to detect those that appear most likely to have errors resulting in underpayment of taxes

59 1-59 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-59 Syndromic Surveillance System Created by New York City Analyzes more than 50,000 pieces of information every day –911 calls –Visits to emergency rooms –Purchases of prescription drugs Looks for patterns that might indicate an epidemic, bioterrorism, or an environmental problem

60 1-60 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-60 Telecommunications Records Database Created by National Security Agency after 9/11 Contains phone call records of tens of millions of Americans NSA analyzing calling patterns to detect terrorist networks Phone records voluntarily provided by several major telecommunications companies USA Today revealed existence of database in May 2006 Several dozen class-action lawsuits filed August 2006: Federal judge in Detroit ruled program illegal and unconstitutional July 2007: U.S. Court of Appeals overturned ruling, saying plaintiffs did not have standing to bring suit forward

61 1-61 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-61 Total Information Awareness Proposed by Information Awareness Office of U.S. Defense Advanced Research Projects Agency (DARPA) Goal: identify terrorists Means: capture “information signatures” and looks for terrorist-like patterns of activity Financial, medical, communication, travel, and other records examined

62 1-62 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-62 Criticisms of the TIA Program Large security and privacy risks Increase risk of identity theft No ability for citizens to check data reliability May hurt competitiveness of U.S. companies Identity theft introduces noise into database False positives could unfairly target millions of Americans Knowing about TIA will change people’s behavior

63 1-63 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-63 Ownership of Transaction Information Who controls transaction information? –Buyer? –Seller? –Both? Opt-in: consumer must explicitly give permission for the organization to share info Opt-out: consumer must explicitly forbid an organization from sharing info

64 1-64 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Facebook Beacon Fandango, eBay, and 42 other online businesses paid Facebook to do “word of mouth” advertising Facebook users surprised to learn information about their purchases was shared with friends Beacon was based on an opt-out policy Beacon strongly criticized by various groups Facebook switched to an opt-in policy regarding Beacon 1-64

65 1-65 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-65 5.10 Identity Theft

66 1-66 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-66 Background Identity theft: misuse of another person’s identity to take actions permitted the owner Credit card fraud #1 type of identity theft Ease of opening accounts online contributes to problem About 10 million U.S. victims in 2008 Typical for a victim to spend hundreds of hours cleaning up problem

67 1-67 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-67 Gaining Access to Information 43% of cases involve stolen wallet, credit card, checkbook, or other physical document 13% of cases are “friendly thefts” Dumpster diving Shoulder surfing Skimmers (wedges)

68 1-68 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Phishing and Pharming Phishing: gathering personal information via a fraudulent spam message Pharming: creation of an authentic-looking Web site to fool people into revealing personal information Phishing and pharming often linked; spam message contains link to fraudulent Web site 1-68

69 1-69 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Stealing Information from Large Institutions LexisNexis database ChoicePoint Bank of America T-Mobile 1-69

70 1-70 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-70 History, Role of Social Security Number Social Security cards first issued 1936 Originally used only for SS purposes Use of SSN has gradually increased SSN is a poor identification number –Not unique –Rarely checked –No error-detecting capability

71 1-71 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-71 Arguments for a National ID Card Current ID cards are second-rate Would reduce illegal entry to U.S. Would prevent illegal aliens from working Would reduce crime Other democratic countries have national ID cards

72 1-72 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-72 Arguments against a National ID Card No card positively guarantees identification No biometric-based system is 100% accurate No evidence it will reduce crime Makes government data mining simpler Make law-abiding people more vulnerable to fraud and indiscretions

73 1-73 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-73 The REAL ID Act Signed in May 2005 Significantly changes driver’s licenses in the United States New licenses –Issued by end of 2013 –Required to open bank account, fly on commercial airplane, or receive government service –Requires applicants to supply 4 different IDs –Will probably contain a biometric identifier –Must contain data in machine-readable form Some states have resisted implementation of REAL ID; doubtful 2013 deadline will be met

74 1-74 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-74 Possible Consequences of New Licenses Better identification means better law enforcement People won’t be able to change identities –Parents ducking child support –Criminals on the run New, centralized databases could lead to more identity theft

75 1-75 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-75 5.11 Encryption Process of transforming a message in order to conceal its meaning Valuable tool for maintaining privacy

76 1-76 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-76 Symmetric Encryption Single key used to encrypt and decrypt a message Both sender and receiver must have the key Problem: How does sender get key to receiver? If “bad guy” gets key, security is broken

77 1-77 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-77 Public Key Encryption An example of asymmetric encryption Each person has two keys: public and private To send R a message, encrypt it with R’s public key R decrypts message with R’s private key No need to communicate keys Strong encryption: virtually impossible to figure out private key, given public key U.S. had export restrictions on strong encryption technology

78 1-78 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Public Key Encryption, Part I 1-78

79 1-79 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Public Key Encryption, Part 2 1-79

80 1-80 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-80 Pretty Good Privacy Phil Zimmerman created PGP He made it available on Internet Many people downloaded PGP U.S. government threatened legal action

81 1-81 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-81 Clipper Chip “Clipper”: NSA’s encryption technology 1993: President Clinton announced Clipper as national standard for telephone encryption Justice Department issued guidelines for release of keys Huge public outcry 1994: Clipper designated a voluntary standard

82 1-82 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-82 Effects of U.S. Export Restrictions Additional burden on U.S. software industry –Strong encryption okay for U.S. customers –Weak encryption needed for foreign customers Reduced international competitiveness of U.S. companies Two federal appeals courts ruled export restrictions violated freedom of speech (1999, 2000) U.S. State Department dropped export restrictions

83 1-83 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-83 Digital Cash Digital cash –Anonymous electronic money –Relies upon blind signature protocol Two kinds of digital cash –Digital coins –Electronic checks Two implementations –Online system –Off-line system Benefits and harms –Benefit: promote privacy –Harm: simplify money laundering

84 1-84 Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Bruce Schneier’s Physical Analogy to Explain Blind Signature Protocol 1-84 This analogy is from Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2 nd Edition. New York: John Wiley & Sons, 1996, p.142. Copyright © 1996 John Wiley & Sons, Inc. All Rights Reserved.


Download ppt "Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter."

Similar presentations


Ads by Google