Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.

Slides:



Advertisements
Similar presentations
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Intellectual Property Image: William J. Wynn.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
USA Patriot Act I  Immediately post 9/11  Expanded search authority  Roving wiretaps  Monitor private internet and traffic  Acquisition of library.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Privacy MGMT Summer 2012, Dannelly Night 3, Lecture Part 2.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
A brief walkthrough the world of the internet.  TCP/IP stands for Transmission Control Protocol/Internet Protocol  TCP/IP is the standard for transmitting.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
Online Privacy, Government, and Intellectual Property Rouda’s CSCI 101 class.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Application of the DMCA Steve Baron February 12, 2008.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
Agenda Last class: Digitization Today: Network Hardware Typing
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
The Islamic State & Media Law True Threats, Incitement, & Social Media Liability.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
Introduction to the Internet
Law and Terrorism Chapter 17.
Bellwork Think about this…. Historical Event
Legislative Powers!.
Facebook privacy policy
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
The Internet Industry Week Two.
Protection Or Violation ?
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Latest Updates on BlackHawk Mines Music : Privacy Policy
Computer ethics in computer science curriculum
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
WJEC GCSE Computer Science
Presentation transcript:

Big Brother Might be Watching

Agenda: US Patriot Act Copyright Infringement Social Media Packets

US Patriot Act: Basics Post September 11 Counter Terror Measure TITLE II- Surveillance Procedures Amendments to FISA and ECPA Contains 16 provision covering surveillance of suspected terrorists, computer fraud/abuse suspects, and suspicious foreign powers. USA PATRIOT Improvement and Reauthorization Act of of 16 provisions made permanent 3 controversial provisions extended

US Patriot Act: Controversy PATRIOT Sunsets Extension Act of Extends 3 controversial provisions until Roving Electronic Surveillance (Roving Wiretaps) 2.Business Records 3.“Lone Wolf” Terrorists *”Sneak and Peek” Warrants

US Patriot Act: Vs. Constitution Amendment I: Freedom of Speech and Association Amendment IV: Freedom from unreasonable searches Amendment VI: Right to a speedy and public trial

FACEBOOK ACTUALLY CIA TOOL

Did you know? Every activity you engage in on Facebook, Twitter and other social media sites have the potential of being tracked? Every you send can be tracked? Every website you visit can be tracked?

Be Careful!!!

Police Using Social Media Individual was charged in NY with murder and narcotic related crimes due to posting information about the crimes on Facebook. City of Cincinnati has arrested 71 people from social media posts. They created a database that gathered the data from Facebook and phone records to stop crime.

Big Data Large set of data being collected through cookies Cookies- messages that web servers pass to your web browser when you visit Internet sites Many marketing firms use the data collect from your computer to market specific products.

Copyright Infringement is Expensive!

Copyright Infringement Digital Millennium Copyright Act (DMCA) –Circumventing control measures Copyright Act of –Established basic rights of copyright holders –Defined penalties for infringement PENALTIES- Criminal- 5 years/$250,000 Civil- $750-$30,000 per work

Copyright Infringement: Who’s Watching? Recording Industry Association of America (RIAA) Motion Picture Association of America (MPAA) –Advocates for protecting creators and their works Copyrights Alert System (Six Strikes) –Slowing or suspension of internet –Internet Service Providers assisting

Copyright Infringement: But it’s not me! Detection relies on IP Addresses IP Addresses- e.g Numerical label assigned to each device in a computer network. Like an address so the Internet knows where to send the requested information. Different ISPs own blocks of addresses and assign to customers. IP addresses can be traced! IP addresses can help identify you.

Packet Sniffing Collects copies of network packets and analyzes contents. –What is a packet? One unit of binary data capable of being routed through a network

Packets Each message is broken into a certain size of bytes (packets--- each message contains many packets)

Quiz What is a cookie? (not the kind you eat) How is data transported over the internet? When was the Patriot Act Passed?