Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSCE 201 Open Source Information Privacy. CSCE 201 - Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.

Similar presentations


Presentation on theme: "CSCE 201 Open Source Information Privacy. CSCE 201 - Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities."— Presentation transcript:

1 CSCE 201 Open Source Information Privacy

2 CSCE 201 - Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations, http://www.fas.org/irp/eprint/oss980501.ht m http://www.fas.org/irp/eprint/oss980501.ht m – The Economic Espionage Act, 1996 http://www.usdoj.gov/criminal/cybercrime /eea.html http://www.usdoj.gov/criminal/cybercrime /eea.html

3 CSCE 201 - Farkas3 Open Source Unclassified information in the public domain or available from commercial services Example: newspapers, magazines, scientific publications, television and radio broadcasting, databases, etc.

4 CSCE 201 - Farkas4 Open Source Intelligence Intelligence operation that uses open source data Goal: answer specific question in support of some mission Process: – Requirement analysis – Data collection/filtering/analysis – Information integration Intelligence about

5 CSCE 201 - Farkas5 Open Source Intelligence Generally legal (uses readily available information) Attacker gains access to protected information, e.g., – Business trade secrets – Military strategy, – Personal information Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data

6 CSCE 201 - Farkas6 Open Source Intelligence Widely used (e.g., Department of Defense) Cheap, fast, or timely Most often legal Advantages: no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages: may not discover important information, assurance of discovery(?)

7 CSCE 201 - Farkas7 Online Open Source Intelligence Large amount of public data online – Web pages, online databases, digital collections, organizations on line, government offices, etc. Freedom and Information Act (FOIA): industry data U.S. Patent Office: copies of U.S. patents Trade shows, public records, etc.

8 CSCE 201 - Farkas8 Privacy Use open source to find out confidential data about people Find confidential data about people while they browse through open source (e.g., Web searches)

9 CSCE 201 - Farkas9 Online Investigative Tools Find out confidential data for small fee – Net Detective (http://ndet.jeanharris.com/http://ndet.jeanharris.com/ – Dig Dirt (http://www.classified3.com/ )http://www.classified3.com/ Privacy Tools (http://www.epic.org/privacy/tools.html )http://www.epic.org/privacy/tools.html

10 CSCE 201 - Farkas10 Legislations Privacy Act of 1974, U.S. Department of Justice (http://www.usdoj.gov/oip/04_7_1.html )http://www.usdoj.gov/oip/04_7_1.html Family Educational Rights and Privacy Act (FERPA), U.S. Department of Education, (http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html )http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html Health Insurance Portability and Accountability Act of 1996 (HIPAA), (http://en.wikipedia.org/wiki/Health_Insurance_Portability_and _Accountability_Act )http://en.wikipedia.org/wiki/Health_Insurance_Portability_and _Accountability_Act Telecommunications Consumer Privacy Act (http://www.answers.com/topic/electronic-communications- privacy-act )http://www.answers.com/topic/electronic-communications- privacy-act

11 CSCE 201 - Farkas11 Privacy Violations Snooping via Open Sources Online activities – Questionnaires – Customers’ data – Web site data collection (Cookies, IP address, operating system, browser, requested page, time of request, etc.) – without user’s permission

12 CSCE 201 - Farkas12 Other Open Source Attacks Piracy – Available in open source, but still protected by copyright, patent, trademark, etc. Copyright Infringement – Acquisition of protected work without the owner’s permission and sold for a fee – Human perception: not serious crime – Significant loss for marketing/manufacturing/owner – Berman Bill ( http://www.news.com/2100-1023- 946316.html ) http://www.news.com/2100-1023- 946316.html – Copyright Law of the United States (http://www.copyright.gov/title17/ )http://www.copyright.gov/title17/

13 CSCE 201 - Farkas13 What is Intelligence? Information Activities Organization

14 CSCE 201 - Farkas14Information “…relevant to a government’s formulation and implementation of policy to further its national security interests and to deal with threats from actual or potential adversaries.” (Silent Warfare) Examples: – Military matters of foreign nations – Diplomatic activities and intentions of foreign nations – Intelligence activities of foreign nations Other party may or may not want to keep it secret Raw data and analyses and assessments based on raw data

15 CSCE 201 - Farkas15 Activity Activities: – Collection and analysis on intelligence information – Counterintelligence Collection: wide range (e.g., wiretapping, broadcasts, newspapers, research publications, aerial photography, espionage, etc.) Analysis: quality of data, correctness of analysis, timeliness, etc.

16 CSCE 201 - Farkas16 Organization Secrecy! Secret activities -- Covert actions – Same organization vs. two organizations Central Intelligence Agency

17 CSCE 201 - Farkas17 Scope of Intelligence Government -- national security –Range from peace time to war time intelligence –Type of government Domestic Intelligence -- depends on nature of regime Business corporations – competitive advantage Economics and Intelligence –Government-run economy –Economic well-being of nation Non-traditions Intelligence –Environmental issues

18 CSCE 201 - Farkas18 Intelligence and Law Enforcement Transnational threats: –Do not originate primarily from a foreign government –Serious threats for nation’s well-being –Fall within law enforcement rather than intelligence –Examples: narcotics trafficking, international terrorism Law enforcement: waiting until a crime has been committed Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence investigation –Punishment of a given criminal act or struggle with an organization engaged in criminal activity

19 CSCE 201 - Farkas19 Intelligence – Information Age Advent of information age Change the mode of operations for business corporations and government Technology: communicating and processing information Behavioral and institutional change: information as the key of organizational activities Intelligent Services vs. competing organizations

20 CSCE 201 - Farkas20 Intelligence and Information Age Globalization – Flow of information across borders – International trade – Division of labor – Increased travel – Increased penetration by news media

21 CSCE 201 - Farkas21 Open Source Collection Goal oriented Publications and broadcast Additional information available from non- intelligence sources Special sources (e.g., speeches of political leaders, legal documents, demographic data, etc. ) Large amount of openly available data  Need processing power

22 CSCE 201 - Farkas22 Problem of Increased Availability How to locate sources How to evaluate source reliability How to analyze information and integrate with other intelligence information How to protect confidentiality of policy maker’s interest


Download ppt "CSCE 201 Open Source Information Privacy. CSCE 201 - Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities."

Similar presentations


Ads by Google