1 The Broader Picture Chapter 12 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Security, Privacy, and Ethics Online Computer Crimes.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Chapter 1 Introduction to Security
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Unethical use of Computers and Networks
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Lecture 11: Law and Ethics
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Cybercrime What is it, what does it cost, & how is it regulated?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Privacy, Security and Ethics
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 4: Laws, Regulations, and Compliance
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Bellwork Think about this…. Historical Event
Surveillance around the world
Chapter 10 Cyberlaw, Social Media, and Privacy
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Chapter 4 Law, Regulations, and Compliance
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
INFS 452 – Computer Ethics & Society
Introduction to Digital Forensics
Presentation transcript:

1 The Broader Picture Chapter 12 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall

2 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

3 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Enabling Legislation  Computer Fraud and Abuse Act of 1986  National Information Infrastructure Protection Act of 1996  Homeland Security Act of 2002

4 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Prohibitions  Criminalizes intentional access of protected computers without authorization or in excess of authorization (Hacking)

5 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Prohibitions  Criminalizes the transmission of a program, information, code, or command that intentionally causes damage without authorization of a protected computer (Denial-of-Service and Viruses)

6 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Punishment  For first offenses, usually 1-5 years; usually 10 years for second offenses  For theft of sensitive government information, 10 years, with 20 years for repeat offense  For attacks that harm or kill people, up to life in prison

7 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 47 Electronic Communications Privacy Act of 1986 (ECMA) Prohibits the reading of information in transit and in storage after receipt  Other federal laws for fraud, etc.

8 Figure 12-1: Laws Governing Hacking U.S. State Laws  Federal laws only protect some computers  State laws for purely intrastate crimes vary widely

9 Figure 12-1: Laws Governing Hacking Laws Around the World Vary  The general situation: lack of solid laws in many countries Major virus attacks were not prosecuted in Taiwan and the Philippines for lack of relevant law

10 Figure 12-1: Laws Governing Hacking Laws Around the World Vary  Cybercrime Treaty of 2001 Signatories must agree to create computer abuse laws and copyright protection Nations must agree to work together to prosecute attackers

11 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

12 Figure 12-2: Consumer Privacy Introduction  Scott McNealy of SUN Microsystems: “You have zero privacy now. Get over it!”  But privacy is strong in European Union countries and many other countries

13 Figure 12-2: Consumer Privacy Credit Card Fraud and Identity Theft  Widespread Concern (Gartner) One in 20 consumers had suffered credit card number theft in 2002 One in 50 consumers had suffered identity theft in 2002 Only about a fifth of this is online, but online theft is growing the most rapidly

14 Figure 12-2: Consumer Privacy Credit Card Fraud  “Carders” steal credit card numbers  Many merchants fail to protect credit card numbers stored on their servers  Carders test and sell credit card numbers  Criminals make unauthorized purchases  In U.S., limited to $50 loss if report promptly  Merchants also suffer fraud from carders

15 Figure 12-2: Consumer Privacy Identity Theft Fraud  Criminals steal or compile considerable information about a person—name, credit card numbers, date of birth, social security number, address, etc.  Impersonate the victim to get buy things, get loans, etc.  With credit card fraud, victims find a problem in their next statement; but with identity theft, they may not know until they discover much later that their credit rating is ruined

16 Figure 12-2: Consumer Privacy Tracking Customer Behavior  Within a website and sometimes across websites  Some information is especially sensitive (health, political leanings, etc.)  Access to data and analysis tools are revolutionizing the ability to learn about people

17 Figure 12-2: Consumer Privacy Tracking Customer Behavior  What consumers wish for Disclosure of policies for  What information will be collected?  How this information will be used by the firm collecting the data?  Whether and with whom the information will be shared

18 Figure 12-2: Consumer Privacy Tracking Customer Behavior  What consumers wish for Ability of consumer to see and correct inaccurate personal information Limiting collection and analysis to operational business needs  Limiting these needs Opt in: No use unless customer explicitly agrees

19 Figure 12-2: Consumer Privacy Corporate Responses  Privacy disclosure statements  TrustE certifies that corporate privacy behavior is consistent with the company’s stated privacy policy NOT that the policy is good for consumers  Platform for Privacy Preferences (P3P); Standard format for searches of policy statements

20 Figure 12-2: Consumer Privacy Corporate Responses  Federal Trade Commission Enforces privacy statements Does not specify what should be in the privacy statement Imposes fines and required long-term auditing

21 Figure 12-2: Consumer Privacy Corporate Responses  Opt out: Customer must take action to stop data collection and sharing  No opt: No way to stop data collection and sharing  Passport and Liberty Alliance Identity management services Register once, giving personal information Give out to merchants selectively

22 Figure 12-2: Consumer Privacy Consumer Reactions  Checking privacy disclosure statements (rare)  Not accepting cookies (rarer)  Anonymous websurfing services (extremely rare)

23 Figure 12-2: Consumer Privacy U.S. Privacy Laws  No general law  Health Information Portability and Accountability Act (HIPAA) of 1996 Protects privacy in hospitals and health organizations Focuses on protected information that identifies a patient

24 Figure 12-2: Consumer Privacy U.S. Privacy Laws  Gramm-Leach-Bliley Act (GLBA) of 1999 Protects financial data Allows considerable information sharing Opt out can stop some information sharing

25 Figure 12-2: Consumer Privacy U.S. Privacy Laws  Children’s Online Privacy Protection Act of 1998 Protects the collection of personal data from children under 13 Applies in child-oriented sites and any site that suspects a user is under 13. No protection for older children  State privacy laws vary widely

26 Figure 12-2: Consumer Privacy International Laws  European Union Charter of Fundamental Rights Right to protection of personal information Personal information must be processed for specific legitimate purposes Right to see and correct data Compliance overseen by independent authority

27 Figure 12-2: Consumer Privacy International Laws  E.U. Data Protection Directive of 1995 Implements Charter privacy protections Opt out with opt in for sensitive information Access for review and rectification Independent oversight agency Data can be sent out of an EU country only to countries with “adequate” protections

28 Figure 12-2: Consumer Privacy International Laws  Safe harbor Rules that U.S. firms must agree to follow to get personal data out of Europe Are GLBA rules to be considered in financial industries? E.U. is resisting.

29 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

30 Figure 12-3: Employee Workplace Monitoring Monitoring Trends  American Management Association survey  monitoring use grew from 15% to 46% between 1997 and 2001  Internet connections in 2001: 63% monitored  In 2001, 76% had disciplined an employee; 31% had terminated an employee

31 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Loss of productivity because of personal Internet and use Significant personal Internet and use is occurring Employees and companies generally agree that a small amount of personal use is acceptable Biggest concern is abnormally heavy personal use Some employees are addicted to personal use

32 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Harassment Title VII of the Civil Rights Act of 1964: sexual and racial harassment Pornography, other adult content are fairly common Monitoring for keywords can reduce pornography and harassment and provide a legal defense

33 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Viruses and other malware due to unauthorized software  Trade secrets: Both sending and receiving must be stopped  Commercially damaging communication behavior: Can harm reputation, generate lawsuits, and run afoul of stock manipulation laws

34 Figure 12-3: Employee Workplace Monitoring The Legal Basis for Monitoring  Electronic Privacy Communications Act of 1986 Allows reading of communications by service provider (firm) Allows reading if subject agrees (make condition of employment)  Courts have ruled that employee has no right to privacy when using corporate computers

35 Figure 12-3: Employee Workplace Monitoring The Legal Basis for Monitoring  In United States, at-will employees can be disciplined, dismissed easily  Must not discriminate by selective monitoring of target individual

36 Figure 12-3: Employee Workplace Monitoring The Legal Basis for Monitoring  Unions often limit disciplining, agreement to be monitored However, new hires usually can be required to submit to monitoring as a condition of employment  In multinational firms, stronger privacy and employment rules might exist

37 Figure 12-3: Employee Workplace Monitoring Should a Firm Monitor?  Danger of backlash  Are the negative consequences worth the gain?

38 Figure 12-3: Employee Workplace Monitoring Computer and Internet Use Policy Should Specify the Following  No expectation of privacy  Business use only (or very limited private use)  No unauthorized software  No pornography and harassment  Damaging communication behavior  Punishment for violating the policy Employee Training in Policy is Crucial

39 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

40 Figure 12-4: Government Surveillance U.S. Tradition of Protection from Improper Searches  No privacy protection in Constitution  Fourth Amendment: No unreasonable searches and seizures Can search only with probable cause Can only search specific things  FBI misuse of data collection during Hoover’s leadership

41 Figure 12-4: Government Surveillance Telephone Surveillance  Wiretapping Federal Wiretap Act of 1968 for domestic crimes Foreign Intelligence Surveillance Act of 1978 (FISA) for international terrorists and agents of foreign governments Need warrant with probable cause and inability to get information by other means

42 Figure 12-4: Government Surveillance Telephone Surveillance  Pen registers and trap and trace orders Pen registers: List of outgoing telephone numbers called Trap and trace: List of incoming telephone numbers Not as intrusive as wiretap because content of the call is not captured

43 Figure 12-4: Government Surveillance Telephone Surveillance  Pen registers and trap and trace orders Electronic Communications Privacy Act of 1986 allows Must be based on information to be collected being likely to be relevant to ongoing investigation (weak) Judge cannot turn down warrant

44 Figure 12-4: Government Surveillance Telephone Surveillance  Communications Assistance for Law Enforcement Act (CALEA) of 1994 Requires communication providers to install the technology needed to be able to provide data in response to warrants

45 Figure 12-4: Government Surveillance Telephone Surveillance  Patriot Act of 2001 Extends roving wiretaps to FISA—follow the target across media Get billing information from telecommunications providers Get information on library usage

46 Figure 12-4: Government Surveillance Internet Surveillance  Extends pen register and trap and trace to Internet traffic  Same weak justification as for telephone traffic  But much more intrusive: addresses, URLs (which can be visited), etc.

47 Figure 12-4: Government Surveillance Carnivore  Monitoring computer placed at ISP  FBI installs Carnivore computer, collects information  Can limit filtering to restrictions of warrant  No accountability through audit trails

48 Figure 12-4: Government Surveillance The Possible Future of Government Surveillance  Intrusive airport security through face scanning  Possible national ID cards  New ability to gather and analyze information from many databases

49 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

50 Figure 12-5: Cyberwar and Cyberterror Threats  Attacking the IT infrastructure  Using computers to attack the physical infrastructure (electrical power, sewage, etc.)  Using the Internet to coordinate attacks

51 Figure 12-5: Cyberwar and Cyberterror Cyberwar  Conducted by governments  Direct damage  Disrupting command and control  Intelligence gathering  Propaganda  Industrial espionage  Integrating cyberwar into war-fighting doctrines

52 Figure 12-5: Cyberwar and Cyberterror Cyberterrorism  By semi-organized or organized groups  Psychological focus Indirect economic impacts (for example, losses because of reduced travel after September 11, 2001, terrorist attacks) Goals are publicity and recruitment  Indiscriminate damage

53 Figure 12-5: Cyberwar and Cyberterror Cyberterrorism  Hacktivism—politically motivated attacks by unorganized or loosely organized groups  Who is a terrorist? Spectrum from activism to full cyberterror

54 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

55 Figure 12-5: Cyberwar and Cyberterror Building a National and International Response Strategy  National governments Coordinated responses Intelligence gathering Research and training Economic incentives

56 Figure 12-5: Cyberwar and Cyberterror Building a National and International Response Strategy  Private enterprise Importance of hardening individual firms Requiring hardening to meet responsibilities

57 Figure 12-5: Cyberwar and Cyberterror Hardening the Internet  Hardening the telecommunications infrastructure with decentralization and other methods  International cooperation is needed because of worldwide attackers  Hardening the underlying telecommunications system  Adding security to dialogs with VPNs

58 Figure 12-5: Cyberwar and Cyberterror Hardening the Internet  Hardening Internet protocols IETF is making progress by adding confidentiality, authentication, and other protections to core Internet protocols  The decision to do this is called the Danvers Doctrine Generally not using digital certificates in a public key infrastructure for strongest authentication

59 Figure 12-5: Cyberwar and Cyberterror Hardening the Internet  Making the Internet forensic ISPs might be forced to collect and retain data for long periods of time ISPs might be forced to do egress filtering to stop attacks at the source The cost to ISPs would be high

60 Topics Covered Laws Governing Hacking and Other Computer Crimes  U.S. National Laws Title 18, Section 1030 for hacking, DoS, and viruses—only for “protected” computers Title 47 Prohibits the reading of information in transit and in storage after receipt  State laws for other computers vary widely

61 Topics Covered Laws Governing Hacking and Other Computer Crimes  Laws Around the World Vary The general situation: lack of solid laws in many countries Cybercrime Treaty of 2001 requires signatories to create laws, cooperate in enforcement

62 Topics Covered Consumer Privacy  Consumer Privacy Concerns Credit card fraud: steal and use credit card numbers Identity theft: impersonate individual to take out loans, etc. Sensitive personal information (medical records, etc.) Tracking during website visits

63 Topics Covered Consumer Privacy  Consumers want disclosure of policies for what information is collected and how it is used and shared  Opting Opt in Opt out No opt

64 Topics Covered Consumer Privacy  Corporate Responses Privacy disclosure statements Federal Trade Commission enforces privacy disclosure statements but does not specify what is in them  Consumer Responses Rarely check privacy disclosure statements; even more rarely refuse cookies or do anonymous surfing

65 Topics Covered Consumer Privacy  U.S. Privacy Laws No privacy protection in U.S. Constitution No general privacy law HIPAA for medical information Gramm-Leach-Bliley Act (GLBA) for financial information Children’s Online Privacy Protection Act of 1998 (courts have denied enforcement) State laws vary widely

66 Topics Covered Consumer Privacy  European Union European Union Charter of Fundamental Rights guarantees privacy protections E.U. Data Protection Directive of 1995 implements these protections U.S. compliance through Safe Harbor behavior  In rest of the world, varies widely

67 Topics Covered Employee Workplace Monitoring  Widespread Internet workplace monitoring and job actions as a result of infractions  Why monitor? Loss of productivity To stop harassment, guard against lawsuits Stop viruses and worms Prevent leakage of trade secrets, commercially damaging communication

68 Topics Covered Employee Workplace Monitoring  Legal Basis for Monitoring Electronic Privacy Communications Act of 1986  Can monitor own network, especially if employee signs acceptance Also, courts have ruled that employee has no right to privacy when using corporate computers

69 Topics Covered Employee Workplace Monitoring  In United States, at-will employees can be disciplined, dismissed easily Unions may restrict this, but hiring contracts can limit union actions Multinational companies may follow frequently stricter international standards for discipline

70 Topics Covered Employee Workplace Monitoring  Should a firm monitor? Danger of backlash  Need clear computer and Internet use policy  Need strong employee training

71 Topics Covered Government Surveillance  U.S. Tradition of Protection from Improper Searches No privacy protection in Constitution Fourth Amendment: Searches and seizures only for probable cause  Wiretapping Federal Wiretap Act of 1968 for domestic crimes Foreign Intelligence Surveillance Act of 1978 (FISA) Need warrant with probable cause

72 Topics Covered Government Surveillance  Pen registers and trap and trace orders Pen registers: List of outgoing telephone numbers called Trap and trace: List of incoming telephone numbers Less intrusive than wiretaps, so weaker justification is OK  Communications Assistance for Law Enforcement Act (CALEA) of 1994 Requires communication providers to install the technology needed to be able to provide data in response to warrants

73 Topics Covered Government Surveillance  Patriot Act of 2001 extends information collection, including to library usage Extends trap and trace and pen registers to Internet traffic More intrusive than telephone trap and trace (URLs give content visited)  Communications Assistance for Law Enforcement Act (CALEA) of 1994 Requires communication providers to install the technology needed to be able to provide data in response to warrants

74 Topics Covered Government Surveillance  The Possible Future of Government Surveillance Intrusive airport security through face scanning Possible national ID cards New ability to gather and analyze information from many databases

75 Topics Covered Cyberwar and Cyberterror  Threats Attacking the IT infrastructure Using computers to attack the physical infrastructure (electrical power, sewage, etc.) Using the Internet to coordinate attacks  Cyberwar is conducted by governments  Cyberterror is conducted by organized terrorists, hactivist groups, and even individuals

76 Topics Covered Hardening the Internet Against Attack  Building a National and International Response Strategy  Not happening  Hardening the telecommunications infrastructure  Hardening Internet protocols (Danvers Doctrine)  Requiring ISPs to collect forensic data and stop attacks at ingress