WHO WANTS THE LIVE IN A GLASS HOUSE?

Slides:



Advertisements
Similar presentations
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Advertisements

The Fourth Amendment What Are Your Rights? Mr. Carr Social Studies.
Ellie Ingbritsen and Rosie Parmigiani Board of Education of Independent School District #92 of Pottawatomie County et. al v Earls et. al.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Teaching American History: Moot Courts and Constitutional Concepts.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
POLICE LAW & SOCIETY What are the distinct characteristics of police in U.S. society? Police play multiple roles Law prescribes parameters of police practice.
Fourth Amendment Assignment. Amendment 4: Right to Search and Seizure The right of the people to be secure in their persons, houses, papers, and effects,
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
It really is easier that you think!. Why use learning objectives  If you don't know where you are going, any road will take you there.  Lewis Carroll,
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
The Use and Effectiveness of Digital Video in the Classroom Presented by: Traci Evans.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Arrest and Detainment How do you know you’ve been arrested?
Unit 1 Day 13 Quote: “The essence of Government is power; and power, lodged as it must be in human hands, will ever be liable to abuse.” - James Madison.
Understanding the Constitution
Privacy and the Law.
Limiting the Right of Search
Evidence Collection at the Crime Scene and Constitutional Law
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Cloud computing and government surveillance
Amendments in Action Search and Seizure.
Criminal Investigation and the Law
PRIVACY AND TECHNOLOGY
Surveillance in Society
Grab a book off the shelf and look it up. (Article V)
Looking for Evidence at the Crime Scene
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Amendments in Action Search and Seizure.
Fourth Amendment.
Fourth Amendment And Probable Cause.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Bell Work (Think of your response and be prepared to share)
4th amendment By: KEila Aguilar.
Mandatory testing Civil Rights – Constitution of the United States, Article IV (of the original Bill of Rights) and Article XIV (State law versus Federal.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
Warm Up – February 11 Grab the handouts from the front table
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Arrest.
Ch. 3-1 Criminal Procedure and the Constitution
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

CYBER SECURITY- PRIVACY in Mobile Environments CAN YOU PROTECT YOURSELF IN CYBERSPACE? REALLY????

WHO WANTS THE LIVE IN A GLASS HOUSE?

WHO WANTS THE LIVE IN THIS FUTURE?

CYBER SPACE

CYBER SPACE: A Dangerous Place?

CYBER SPACE: USA’s Infrastructure- Partial

CYBER SPACE: Global Traffic

CYBER SPACE: China’s Infrastructure

SCOPE OF CYBER SPACE

VULNARABILITES OF CYBER SPACE: Instantaneous Action at a Distance

VULNARABILITES OF CYBER SPACE: Asymmetries of Cyber Space

VULNARABILITES OF CYBER SPACE: Anonymity

VULNARABILITES OF CYBER SPACE: Lack of Borders

VULNARABILITES OF CYBER SPACE: Difficulty of Distinction

PRIVACY: Who is after your private Data GOVERNMENT

PRIVACY: Who is after your private Data CORPORATIONS WE COOPERATE WITH CORPORATE SURVEILLANCE BECAUSE IT PROMISES US CONVENIENCE, AND WE SUBMIT TO GOVERNMENT SURVAILLANCE BECAUSE IT PROMISES US PROTECTION.

PRIVACY: Who is after your private Data CYBER CRIMINALS

PRIVACY:HOW CAN YOU PROTECT YOURSELF HDD ENCRYPTION-Bit Locker, PGP

PRIVACY:HOW CAN YOU PROTECT YOURSELF FILE ENCRYPTION- EFS, FILEVAULT (MAC)

PRIVACY:HOW CAN YOU PROTECT YOURSELF SECURE E-MAIL: S-MIME, PGP, MAILVELOPE, GMAIL-STAKE

PRIVACY:HOW CAN YOU PROTECT YOURSELF ANTIVIRUS-MALWARE- SPYWARE-FIREWALLS

PRIVACY:HOW CAN YOU PROTECT YOURSELF PASSWORD MANAGEMENT- LastPass - Keeper

PRIVACY:HOW CAN YOU PROTECT YOURSELF DELETING DATA- ERASER

PRIVACY:HOW CAN YOU PROTECT YOURSELF SECURE CLOUD STORAGE- SPIDEROAK

PRIVACY:HOW CAN YOU PROTECT YOURSELF SECURE PRIVATE BROWSING- TOR

PRIVACY:HOW CAN YOU PROTECT YOURSELF SECURE PRIVATE SEARCH ENGINE- DUCK DUCK GO

PRIVACY:HOW CAN YOU PROTECT YOURSELF SECURE WIRELESS CONNECTION-WPA2

THE US CONSTITUTION AND CYBERSPACE FOURTH AMENDMENT The Fourth Amendment of the U.S. Constitution provides, "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.“ The ultimate goal of this provision is to protect people’s right to privacy and freedom from arbitrary governmental intrusions. The protection under the Fourth Amendment can be waived if one voluntarily consents to or does not object to evidence collected during a warrantless search or seizure. Private intrusions not acting in the color of governmental authority are exempted from the Fourth Amendment.

GOOGLE PRIVACY POLICY

DATA COLLECTED BY APPS: EXAMPLE Take pictures and videos Record audio Location information (Approximate, Precise) Read your Web bookmarks and history Modify or delete contents of your SD card Control NFC Add or remove accounts Change your audio settings Read sync settings Install shortcuts Access Mobile Device Management (MDM) content prividers

CONCLUSIONS