CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.

Slides:



Advertisements
Similar presentations
Privacy & Security After September 11 Professor Peter P. Swire Ohio State University University of Michigan Lecture December 4, 2001.
Advertisements

Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Chapter 17 Law and Terrorism.
Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Chapter 1 What is Security Engineering?. Security Engineering Building systems that remain stable Malice Error Mischance Focuses on Tool Processes Methods.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
9/4/20151 Computer Security Social Legal and Ethical issues.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy and the Law.
Surveillance around the world
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Confidentiality October 14, 2005.
Wiretapping and Encryption
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
U.S. Intelligence Oversight Reforms & the Cloud Act
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications assignment

CS 4001Mary Jean Harrold2 Intercepting Communications Thanks to Sherry Clark for her notes

CS 4001Mary Jean Harrold3 Outline ŸOverview of the Controversies ŸIntercepting Communications ŸCryptography and Its Uses ŸEncryption Policy: Access to Software, Keys, and Plaintext ŸFundamental Issues

CS 4001Mary Jean Harrold4 Overview of Controversies ŸCommunications Privacy Affected by ŸInterception of communications, including: ŸTelephone, , and Web activity. ŸRestrictions on secure encryption. ŸExportation of strong encryption was viewed as a threat to national security. ŸCALEA (Communications Assistance for Law Enforcement Act. ŸCommunications technology must assist law enforcement, not hinder. ŸGlobal surveillance systems. ŸThe constitutionality of domestic systems and the necessity of international systems are under question.

CS 4001Mary Jean Harrold5 Q: Can law enforcement intercept communications without a court order? Intercepting Communications (1) ŸWiretapping ŸTelephone: ŸPre-1934: used widely by government, businesses, and private sector. Ÿ1934: the Federal Communications Act disallowed unauthorized wiretaps; many ignored the law. Ÿ1968: the Omnibus Crime Control and Safe Streets Act restricted wiretapping by requiring a court order.

CS 4001Mary Jean Harrold6 Intercepting Communications (2) ŸWiretapping ŸNew Technologies: Ÿ1986: Electronic Communications Privacy Act (ECPA) and its amendments restricted government interception of , cell-phones, etc. Ÿ2001: USA Patriot Act loosened restrictions on government wiretapping and communications interception. Q : Does the USA Patriot Act supersede ECPAs restrictions?

CS 4001Mary Jean Harrold7 Q : Why did privacy advocates object to CALEA? Intercepting Communications (3) ŸDesigning Communications Systems for Interception and Tracking ŸObstacles to interception: ŸIncomplete pen-registers as a result of long distance service. ŸPacket-mode communications ( , file transfers, Internet phones). ŸSolutions: ŸCALEA: Requires telecommunications equipment be designed to ensure interception by law enforcement (with court order).

CS 4001Mary Jean Harrold8 Q: CALEA allows for the interception of PINs. Do you support this use? Intercepting Communications (4) ŸDesigning Communications Systems for Interception and Tracking (cont’d) ŸCALEA ŸCosts include modified hardware, software, and overuse by authorities. ŸWiretappable systems vulnerable to criminal hacking, industrial spies, etc.. ŸCompetition weakened due to restricted changes and diversities. ŸCivil liberties threatened by nationwide standard for surveillance.

CS 4001Mary Jean Harrold9 Q : Does Carnivore violate the 4 th Amendment? Intercepting Communications (5) ŸCarnivore ŸFBI’s system to intercept with a court order. ŸPro: Law enforcement needs this tool to fight crime. ŸCon: All goes through FBI’s Carnivore system.

CS 4001Mary Jean Harrold10 Q : Should the NSA be permitted to intercept all entering and leaving the U.S.? Intercepting Communications (6) ŸNSA and Echelon ŸNSA (National Security Agency): ŸCollects and analyzes communications to find threats to national security. ŸEchelon: ŸMember nations intercept communications for each other.

CS 4001Mary Jean Harrold11 Communications Assignment ŸDiscuss and work on in groups of 2-3