Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller.

Slides:



Advertisements
Similar presentations
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Advertisements

Red Flag Rules: What they are? & What you need to do
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Database Woes Plague Homeland Security and Law Enforcement.
Springfield Technical Community College Security Awareness Training.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Security & Encryption Thomas Fenske & Joseph Minter.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
USA PATRIOT ACT USA PATRIOT ACT
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
Information Security Management The Implicit Need for Privacy Requirements or How Ignoring Privacy Can Kill Your Program.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
6/23/ :43 PM Lecture 13: Evaluation James Hook CS 591: Introduction to Computer Security.
1 Information and Data Privacy: An Indian Perspective  Why is this important? Public concern about privacy.  Considerable concern in developed countries.
Privacy & Personal Information -- Why do we care or do we?
Data Mining & Data Warehousing PresentedBy: Group 4 Kirk Bishop Joe Draskovich Amber Hottenroth Brandon Lee Stephen Pesavento.
Network security policy: best practices
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Corporate Purchasing Card Enhanced Reporting January 2015 Web Version 1.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
Research paper: Web Mining Research: A survey SIGKDD Explorations, June Volume 2, Issue 1 Author: R. Kosala and H. Blockeel.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
The Patriot Act Protecting the US or Violating People’s Freedoms.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Data Mining as Pre-EDD Investigatory Tool Team 9.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Information Sharing Challenges, Trends and Opportunities
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
Banking on Analytics Dr A S Ramasastri Director, IDRBT.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
The USA PATRIOT Act An Overstatement of ALA Concerns?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Effective Interface Between the FIU, Law Enforcement and the Financial Industry Presented by NiiBen C. A Ayivorh AML/CFT Consultant Nii-Int’l LLC June.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Data mining in web applications
Add video notes to lecture
Responding to a Data Breach 360° of IT Compliance
Partnering to Minimize the Impact of Data Compromises
Terrorism Training for Law Enforcement
Privacy and Information
CompTIA Security+ Study Guide (SY0-401)
Clemson University Red Flags Rule Training
Electronic Surveillance, Post 9/11
A Gift of Fire Third edition Sara Baase
Personal Privacy and the Public Internet
IT and Society Week 2: Privacy.
Presentation transcript:

Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller

Background  Uses data warehouses comprised of large amounts of data to find trends  Increased usage after terrorist attacks (Dept. of Homeland Security)  Data Mining Uses –improving service or performance –detecting fraud, waste, and abuse –analyzing scientific and research information –detecting criminal activities or patterns –analyzing intelligence and detecting terrorist activities

Sources of Data  Directly from individuals –Surveys  Web Crawlers –Indexing Services like search engines  Government Agencies –National Oceanic and Atmospheric Administration  Private Sector Sources –Credit Card Companies –Banks and other Financial Institutions

GAO Study of Data Mining  Government agencies required to provide notice to individual respondents explaining why the information is being collected –Only 2 of 5 agencies in GAO study provided this notice –Agency compliance with key security requirements was inconsistent  122 of 199 data mining efforts used personal information –student loan application data –bank account numbers –credit card information –taxpayer identification numbers  Results: “Until agencies fully comply with these requirements, they lack assurance that individual privacy rights are being appropriately protected”

Inherent Data Mining Issues  Can reveal patterns and relationships but doesn’t tell the value or significance of these patterns  Can identify connections between behaviors and/or variables  DOES NOT necessarily identify a causal relationship –Leads to false positives and incorrect conclusions

Data Mining Ineffectiveness The New York Times confirmed that point, with its report that the NSA has sent the FBI a "flood" of tips generated by mass domestic eavesdropping and data mining, virtually all of which led to dead ends that wasted the FBI's resources. "We'd chase a number, find it's a schoolteacher with no indication they've ever been involved in international terrorism," one former FBI agent told the Times. "After you get a thousand numbers and not one is turning up anything, you get some frustration.” ACLU.org - Eavesdropping 101: What Can The NSA Do?

Data Mining Ineffectiveness 1)Detect: Terrorists Enjoy Driving El Caminos 2)Classify: El Camino lovers classifies person as potential terrorist 3)ID: John Bagby internet queries reveals El Camino interests 4)Track: Bagby tracked searching for El Camino availability at 5)Understand: Bagby works for a university that does research for sensitive government projects 6)Preempt: Bagby’s door kicked down by government agents

Privacy Violations  Pentagon’s Total Information Awareness System –Violation of 4 th Amendment rights because warrants needed to search a particular place as opposed to blanket searches –Right of people to be secure…in their papers  Data mining and warehousing efforts hastily implemented after 9/11 –Few privacy considerations

Further Problems  Compromise of personal data by hackers or data misuse –Many data warehousing efforts performed by private businesses