CSCE 201 Open Source Information Privacy. CSCE 201 - Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.

Slides:



Advertisements
Similar presentations
Confidentiality and HIPAA
Advertisements

What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
IS3350 Security Issues in Legal Context
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Information Warfare Theory of Information Warfare
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Legal, Ethical, and Professional Issues in Information Security
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Chapter 21 Successfully Implementing The Information System
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
1 Trade Facilitation A narrow sense –A reduction/streamlining of the logistics of moving goods through ports or the documentation requirements at a customs.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Social and Economic Impacts of IT Professor Matt Thatcher.
Chapter 5 Intellectual Property & Internet Law
Licensing & Regulation Division Senior Sergeant Brett Kahan Presentation to the Association of Investigators & Security Professionals.
CH. 6 TECHNOLOGY-BASED INDUSTRIES AND THE MANAGEMENT OF INNOVATION ALLEN HICKS ANTHONY BROWN CHRISTIAN GRANDORF BRADEN WALKER.
Country Report for Nigeria for CI Regional Meeting on A2K, Kenya National President, Consumer Awareness Organisation, Enugu, Nigeria. 17 April 2009.
Copyright  2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 4-1 Internet Marketing Intelligence Chapter 4.
Enforcement of Intellectual Property Rights in the Republic of Macedonia State Office of Industrial Property of the Republic of Macedonia ______________________________.
Chapter Two Ethical & Legal Issues.
Chapter 5 E-environment
Intellectual Property in the Context of Growth and Development of the World Economy Luciano Daffarra, Attorney at Law Daffarra, d’Addio & Partners China-Italy.
Is Your State Funding Terrorism? Nik Divakaruni Account Executive Mike Yeschek Account Manager.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Legal and Ethical Issues in Computer Security
Offensive IW Open Sources. CSCE Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Information Warfare Playgrounds to Battlegrounds.
Professional, Legal and Ethical Issues CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison.
Intelligence Counterintelligence. CSCE Farkas2 What is Intelligence? Information Activities Organization.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Lecture 11: Law and Ethics
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
COPYRIGHT AND COPYRIGHT INFRINGEMENT SOME MEASUREMENT AND POLICY ISSUES The views expressed are those of the author in his private capacity and do not.
The National Security Bureaucracy. Key Agencies The State Department.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
 The Free Enterprise System.  Traits of Private Enterprise.
GIJ08 What happened to journalism after 9/11? For additional information:
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
© Haihong Liu, SISU Law School Nov Shan Zhai.
Definition : An analysis and evaluation process that businesses use to understand their current environment.
Information Warfare Playgrounds to Battlegrounds.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Incident Documentation Campus Security Officer Training.
Terms to Review Treaty Treaty Bureaucracy Bureaucracy Ambassador Ambassador Domestic vs foreign policy Domestic vs foreign policy Executive agreement Executive.
Legal and Ethical Issues in Computer Security Csilla Farkas
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Chapter 4: Laws, Regulations, and Compliance
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Maritime Security as an Integral Part of an
Chapter 8 Competing in Global Markets
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Observatory Work Programme 2015
Security.
A Comparative Legal and Economic View of Global Trade Secret Regimes
Health Care: Privacy in a Digital Age
Essentials of the legal environment today, 5e
Role of US Security and Intelligence Agencies
Presentation transcript:

CSCE 201 Open Source Information Privacy

CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations, m m – The Economic Espionage Act, /eea.html /eea.html

CSCE Farkas3 Open Source Unclassified information in the public domain or available from commercial services Example: newspapers, magazines, scientific publications, television and radio broadcasting, databases, etc.

CSCE Farkas4 Open Source Intelligence Intelligence operation that uses open source data Goal: answer specific question in support of some mission Process: – Requirement analysis – Data collection/filtering/analysis – Information integration Intelligence about

CSCE Farkas5 Open Source Intelligence Generally legal (uses readily available information) Attacker gains access to protected information, e.g., – Business trade secrets – Military strategy, – Personal information Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data

CSCE Farkas6 Open Source Intelligence Widely used (e.g., Department of Defense) Cheap, fast, or timely Most often legal Advantages: no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages: may not discover important information, assurance of discovery(?)

CSCE Farkas7 Online Open Source Intelligence Large amount of public data online – Web pages, online databases, digital collections, organizations on line, government offices, etc. Freedom and Information Act (FOIA): industry data U.S. Patent Office: copies of U.S. patents Trade shows, public records, etc.

CSCE Farkas8 Privacy Use open source to find out confidential data about people Find confidential data about people while they browse through open source (e.g., Web searches)

CSCE Farkas9 Online Investigative Tools Find out confidential data for small fee – Net Detective ( – Dig Dirt ( ) Privacy Tools ( )

CSCE Farkas10 Legislations Privacy Act of 1974, U.S. Department of Justice ( ) Family Educational Rights and Privacy Act (FERPA), U.S. Department of Education, ( ) Health Insurance Portability and Accountability Act of 1996 (HIPAA), ( _Accountability_Act ) _Accountability_Act Telecommunications Consumer Privacy Act ( privacy-act ) privacy-act

CSCE Farkas11 Privacy Violations Snooping via Open Sources Online activities – Questionnaires – Customers’ data – Web site data collection (Cookies, IP address, operating system, browser, requested page, time of request, etc.) – without user’s permission

CSCE Farkas12 Other Open Source Attacks Piracy – Available in open source, but still protected by copyright, patent, trademark, etc. Copyright Infringement – Acquisition of protected work without the owner’s permission and sold for a fee – Human perception: not serious crime – Significant loss for marketing/manufacturing/owner – Berman Bill ( html ) html – Copyright Law of the United States ( )

CSCE Farkas13 What is Intelligence? Information Activities Organization

CSCE Farkas14Information “…relevant to a government’s formulation and implementation of policy to further its national security interests and to deal with threats from actual or potential adversaries.” (Silent Warfare) Examples: – Military matters of foreign nations – Diplomatic activities and intentions of foreign nations – Intelligence activities of foreign nations Other party may or may not want to keep it secret Raw data and analyses and assessments based on raw data

CSCE Farkas15 Activity Activities: – Collection and analysis on intelligence information – Counterintelligence Collection: wide range (e.g., wiretapping, broadcasts, newspapers, research publications, aerial photography, espionage, etc.) Analysis: quality of data, correctness of analysis, timeliness, etc.

CSCE Farkas16 Organization Secrecy! Secret activities -- Covert actions – Same organization vs. two organizations Central Intelligence Agency

CSCE Farkas17 Scope of Intelligence Government -- national security –Range from peace time to war time intelligence –Type of government Domestic Intelligence -- depends on nature of regime Business corporations – competitive advantage Economics and Intelligence –Government-run economy –Economic well-being of nation Non-traditions Intelligence –Environmental issues

CSCE Farkas18 Intelligence and Law Enforcement Transnational threats: –Do not originate primarily from a foreign government –Serious threats for nation’s well-being –Fall within law enforcement rather than intelligence –Examples: narcotics trafficking, international terrorism Law enforcement: waiting until a crime has been committed Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence investigation –Punishment of a given criminal act or struggle with an organization engaged in criminal activity

CSCE Farkas19 Intelligence – Information Age Advent of information age Change the mode of operations for business corporations and government Technology: communicating and processing information Behavioral and institutional change: information as the key of organizational activities Intelligent Services vs. competing organizations

CSCE Farkas20 Intelligence and Information Age Globalization – Flow of information across borders – International trade – Division of labor – Increased travel – Increased penetration by news media

CSCE Farkas21 Open Source Collection Goal oriented Publications and broadcast Additional information available from non- intelligence sources Special sources (e.g., speeches of political leaders, legal documents, demographic data, etc. ) Large amount of openly available data  Need processing power

CSCE Farkas22 Problem of Increased Availability How to locate sources How to evaluate source reliability How to analyze information and integrate with other intelligence information How to protect confidentiality of policy maker’s interest