CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 1 Class 5 Privacy Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Consumer Issues Chapter 28.
COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Law for Business and Personal Use
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Nicholas Beckworth Annie Billings Steven Blair Nimmida Kulwattanasopon Thomas Wootten.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 5 – The Constitution and the Regulation of Business Copyright © 2011 by Jeffrey Pittman.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Computer Security By Duncan Hall.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
Privacy and the Law.
Surveillance around the world
Add video notes to lecture
Limiting the Right of Search
Chapter 7 Criminal Law and Cyber Crimes
Bill of Rights.
Chapter 8 Criminal Law and Cyber Crimes
Fundamentals of Information Systems
Bill of Rights.
When you get caught for Identity Theft
A Gift of Fire Third edition Sara Baase
Ethical Use of Computers
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
IA455 Chris Danieli and Zachary gibson
The E-Commerce Act and the Right to Privacy
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Ch. 3-1 Criminal Procedure and the Constitution
Presentation transcript:

CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 1 Class 5 Privacy Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 2 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing Quiz 1. List problems with using biometrics for identification. 2. List advantages of using biometrics for identification. 3. A denial of service attack shuts down a bunch of retailer, stock brokerage, large corporate entertainment and information web sites. For each possible guilty party state what penalties are appropriate and why? a. Terrorist who aimed to cause billions of damage to U.S. economy. b. Protest organization opposing commercialization of the web and corporate manipulation of consumers. c. Script kiddie just having fun with tools he found on the web. d. Show off hacker in search of bragging rights. 4. Extra points for naming laws/acts under which these people could be prosecuted. © 2009 Keith A. Pray 3 8/29/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 4 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 5 8/29/2015 Logistics For Individual Presentations follow the guidelines at:  p?content=Individual_Presentations.txt

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 6 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins U.S. Code Title 18  Crimes and Criminal Procedure Sections 2314 and 2315 NSPA makes it unlawful to deal with “matters” pertaining to stolen “property” across:  State boundaries  International boundaries

CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins These “matters” include:  Transportation (2314)  Transmittal  Transfer  Receipt (2315)  Possession  Concealment  Storage  Barter  Sale (2315)  Disposal

CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins The “property” includes:  Goods  Wares  Merchandise  Securities  Money  Articles

CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins In order to violate the NSPA, the “property” must be:  Made  Forged  Altered  Counterfeited These actions are meant in the literal and non- literal sense

CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins The crime is subject to the NSPA regardless of whether:  The property was stolen in the U.S  The property was possessed in the U.S

CS 3043 Social Implications Of Computing United States vs. Dowling (1985) – Francis Collins Does not apply to the taking of purely intangible property  Vague definition of property Example for information processing  Dowling: if someone steals $5000 worth of information processing technology they should be convicted If someone steals $1 worth of information processing technology, but $4999 worth of data, they cannot be convicted

CS 3043 Social Implications Of Computing United States vs. Dowling (1985) – Francis Collins Example for information processing (continued)  United States Since data is transferable and accessible, it should be treated as the physical property would Court ruled in favor of Dowling NSPA also fails to bring more severe charges against the viewing of computer data  Usually just charges with trespassing NSPA rarely used in information processing crimes because of this flaw

CS 3043 Social Implications Of Computing References – Francis Collins "National Stolen Property Act." International Cultural Property Protection Home Page. 31 Mar "National Stolen Property Act Lawyers." Find a Lawyer | Find an Attorney. 31 Mar "Fighting computer crime by combining federal & state law." Uplink Productions - Home of affordable, quality and custom website design and programming. 31 Mar

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 15 8/29/2015 Effective in October 30, Penalties up to 15 years imprisonment and a maximum fine of $250,000. Establishes that the person whose identity was stolen is a true victim. Identity theft and Assumption Deterrence Act` Viktoras Truchanovicius

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 16 8/29/2015 Enables law enforcement agencies to combat this crime. Allows for the identity theft victim to seek restitution if there is a conviction. Establishes the Federal Trade Commission as a central agency to act as a clearinghouse for complaints. Provides leverage to influence law enforcement to investigate one’s case. Benefits of the Act` Viktoras Truchanovicius

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 17 8/29/2015 The primary source of data on the prevalence of identity theft is the FTC's Identity Theft Data Clearinghouse Theft Data Clearinghouse Viktoras Truchanovicius

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 18 8/29/2015 Viktoras Truchanovicius WHAT CONSTITUTES IDENTITY THEFT?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 19 8/29/2015 Viktoras Truchanovicius Production of an identification or any legal document. Transfer of identification or any legal document. Possession of five or more identification documents with intent to use unlawfully. Possession of identification with intent to defraud the United States. Summary of the Act

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 20 8/29/2015 Viktoras Truchanovicius Production or possession of a document-making implement with intent to use. Possession of a stolen or fake identification document of the United States. Transfer or uses a means of identification of another person with intent to unlawful activity. Summary of the Act (Cont’d)

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 21 8/29/2015 Viktoras Truchanovicius ID THEFT Contact your state Attorney General to file a complaint For Victims

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 22 8/29/2015 Viktoras Truchanovicius Accessed Accessed deterrence-act. Accessed DD102.html. Accessed content/uploads/2008/06/paper-shredding.jpg. Accessed Accessed Accessed Resources

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 23 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing Methods of Achieving Anonymity - Greg Barrett I will discuss  Proxies  Tor  Virtual Private Networks (VPN) Many others exist, such as  I2P: Similar to Tor, routes your connection through other users  Darknet: Connect to only users you know and trust

CS 3043 Social Implications Of Computing Proxy - Greg Barrett Provides a node between you and your destination Not necessarily encrypted Can be detected Open proxies exist, but some services ban requests from their IPs Your Computer Internet Destination Proxy Server

CS 3043 Social Implications Of Computing Tor - Greg Barrett Onion routing system Works at TCP stream level Provides high degree of anonymity Vulnerabilities: Exit nodes can see unencrypted packets Your Computer Tor Node Exit Node Internet Destination Tor Server

CS 3043 Social Implications Of Computing Virtual Private Network (VPN) Greg Barrett Provides an encrypted connection between a user and a VPN server Users requests can then be serviced by the provider or forwarded anonymously to their destination Used by businesses, WPI, P2P users… IPREDator: The Pirate Bay’s new VPN offering Your Computer Internet Destination VPN Provider

CS 3043 Social Implications Of Computing Sources - Greg Barrett IPREDator: pirate-bay-to-roll-out-secure-vpn-service.ars pirate-bay-to-roll-out-secure-vpn-service.ars Tor: Darknet darknet.htm darknet.htm

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 29 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing Privacy Topics Is privacy a right? Our privacy compared to 100 or 200 years ago? Rewards and loyalty programs. Body scanners. Data collected about you. © 2009 Keith A. Pray 30 8/29/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 31 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 32 8/29/2015 Assignment Read Chapter 3 - Freedom Of Speech. Self Search Group Project – Master Timeline Clean Up Contest

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 33 8/29/2015 Assignment - Self Search Wiki Post ways one can search for information about a person. Do not repeat an entry already made. Keep entries sorted alphabetically. For each search method listed post your result on your own page. Pages will be created for each you ahead of time. Provide a description if you’d rather not post the details. For each search method answer:  Exactly how did the data get there?  How can this data be used?  Did you authorized use of the data?  Is this a secondary use?  If not, request its use be discontinued and post the correspondence. Dig deeper than a basic search engine’s (Google, etc.) results. This assignment requires you revisit the Wiki frequently as new search methods are posted.

CS 3043 Social Implications Of Computing Group Project - Master Timeline Clean Up Contest On an entry that is not for your group 1 point will be awarded for:  Removing a duplicate entry  Fixing all typos and grammar problems  Replacing encyclopedic references with valid ones. Encyclopedic references can be moved to an interesting reading portion of an entry.  Adding the access date for all web site references.  Adding a comment when the entry does not explain what it is.  Adding a comment when the entry does not explain why it is important to information processing. For each entry belonging to your group 1 point will be deducted when another group completes an item from above. © 2009 Keith A. Pray 34 8/29/2015

CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 35 Class 5 The End Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 36 8/29/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  -- Fourth Amendment to the US Constitution

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 37 8/29/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 38 8/29/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important.  Beyond secrecy.

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 39 8/29/2015 Privacy Expectations of privacy are:  Cultural  Philosophical  Political  Personal Who has the right to know?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 40 8/29/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 41 8/29/2015 What Safeguards Are There? In US:  Census  Taxes Federal Local  Search warrants  Wiretaps  Inter-agency sharing

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 42 8/29/2015 Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 43 8/29/2015 Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, , snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 44 8/29/2015 Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 45 8/29/2015 Safeguards Privacy policies  Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 46 8/29/2015 Other Business Things Bankruptcy Fraud

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 47 8/29/2015 Technology Overall computer security Encryption