Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Advertisements

HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
USA PATRIOT ACT USA PATRIOT ACT
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 17 Controls and Security Measures
Developing a Records & Information Retention & Disposition Program:
Chapter 10 Privacy and Security McGraw-Hill
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
1 Good Security and Privacy Things Steven M. Bellovin
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Ethical Use of Computers. Ethics and Responsibilities in the Computing Process Every profession operates with a set of ethics that help to define the.
Encryption Export Controls in the US Preliminary Research.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Research Oversight at ASU: Issues related to Foreign Travel.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Anonymity, Security, Privacy and Civil Liberties
Authentication Question: how does a receiver know that remote communicating entity is who it is claimed to be?
1 Foreign Trade Regulations Mandatory Automated Export System Christina Farr September 15, 2008 Foreign Trade Division Regulations, Outreach and Education.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Unit 2 Human Rights Part 3 Civil and Human Rights.
More about Databases. Data Entry through Forms Table View (Data sheet view) is useful for data entry of new records But sometimes customization would.
Government, Cryptography and the Right To Privacy Jenny Shearer and Peter Gutmann Presented by Paul Conti 4/3/00.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Encryption Policy & Market Trends By Dorothy E. Denning, professor of Computer Science at Georgetown University Presented by Yves Lepouchard.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter 3 Encryption Algorithms & Systems (Part D)
20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
13 Implementing a Security Plan Implementing a Security Plan
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.
Operator security, the right to know and the need to know. Essentially, the purposes of these concepts are to maintain data security and individual privacy.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Privacy and the Law.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Applications of Cryptography
COEN 350 Network Security Introduction.
PowerPoint® Slides to Accompany
Army FOIA/Privacy/Records Management Course
Role of US Security and Intelligence Agencies
Presentation transcript:

Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free speech  Ineffective regulations

The Last Decade  DES 56-bit (1977)  1993 Clipper Chip 1: Key Escrow  1995 Clipper Chip 2: Allow Export of Key Escrow  1996 Clipper Chip 3: Proposed Key Management  1998 Increased bit-length allowance  1999 Major reform announced  2000 Reform enacted: Export Restrictions Lifted

Which side do you prefer?  Increased National Security through government monitoring of communications  Freedom to communicate without eavesdropping  Safer computer systems through better development and deployment of encryption

Reasons to Fear the Government  1950’s: Government identified 26,000 “potentially dangerous” persons who should be rounded up in the event of a “national emergency”  1960’s: Army created files on about 100,000 civilians  : CIA opened and photographed about 250,000 first class letters within the U.S. and compiled a 1.5 million name database.  1990’s: Hundreds of IRS employees caught snooping in files of in- laws, neighbors, etc.  What else?

Restrictions Have Failed to Help Anyone  Cannot prohibit external development of cryptography  Cannot prevent criminal export of cryptography  Other mediums of export are less secure: –Physical transport –Books

The Government Versus...

Updated Regulations: January 13, 2000  Rests on 3 principals –One-time technical review of products in advance of sale –Steamlined post-export reporting system –Government review of strong encryption to foreign powers  Unlimited key length can be exported after review  64-bit and under is freely exportable  Authorize $80 million to FBI against use of encryption by criminals

Analysis  Restricting export has not restricted international use of encryption  Unclear that encryption regulations hinder crime  Universal Declaration of Human Rights correctly includes a right to privacy.  Individuals should have right to choose any security option