Behind the Machine: Anonymity and Free Speech Bill of Rights protects free speech But – there are still times when we do not want to be identified? Examples?

Slides:



Advertisements
Similar presentations
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Phishing “ In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
What is identity theft, and how can you protect yourself from it?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Anonymity and SPAM The Good, the Bad and the Ugly!
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Phishing “ In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Reliability & Desirability of Data
Computer Ethics.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
What is Spam? d min.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Learn how to protect yourself against common attacks
ISYM 540 Current Topics in Information System Management
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Information Security Session October 24, 2005
Behind the Machine “The Good, The Bad, and the Ugly”
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Presentation transcript:

Behind the Machine: Anonymity and Free Speech Bill of Rights protects free speech But – there are still times when we do not want to be identified? Examples? Copyright © 2008 by Helene G. Kershner

Behind the Machine: Anonymity and Free Speech The ability to post anonymously is good. Is it? Is it always good? How do we filter truth from fiction? How do we protect ourselves from libel or defamation of character? Copyright © 2008 by Helene G. Kershner

Behind the Machine: Anonymity and Free Speech juicycampus.com “JuicyCampus is a college-focused startup aiming to give students the ability to post and comment online anonymously (a perfect environment for gossip).” The site’s main feature is a message board that can be sorted so that students can look at posts only about people on their campus. Posts can be sorted by most discussed, most viewed and “Juiciest”. Posts are often highly inflammatory as they talk about who the sluttiest girl on campus. “Think Jerry Springer + an anonymous version of Facebook and you’ll have some idea of JuicyCampus” Copyright © 2008 by Helene G. Kershner

Behind the Machine: Anonymity and Free Speech JuicyCampus.com is a website focusing on gossip, rumors and rants related to US colleges and universities. The site describes itself as an enabler of "online anonymous free speech on college campuses." Through various services such as IP cloaking and offering of anonymous IP servers, it allows users to post messages and comments without possibility of identification. Readers can vote on which posts they find "juiciest," or most provocative. Timothy Chester, chief information officer of Pepperdine University, described the purpose of JuicyCampus in a letter to Google as to create a "virtual bathroom wall' for abusive, degrading, and hateful speech."[ 3] 3] More on this topic Copyright © 2008 by Helene G. Kershner

Behind the Machine: Do computers make us more anonymous? Anonymity and Free Speech Protecting the Many from the Few This Can limit Free Speech because the basic rules of our legal system change! To do so – we become Innocent until proven guilty Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM Does Free Speech extend to SPAM? SPAM: Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited . … Real spam is generally advertising for some product sent to a mailing list or newsgroup. SPAM: The Internet version of junk mail. Spamming is sending the same message to a large number of mailing lists or newsgroups usually to advertise something. Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM A survey shows American business users consider the difference between spam and desired to be whether the user has previously transacted business with the sender. Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM First Amendment – Guarantees Free Speech Is SPAM a variant of Free Speech? Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM and Free Speech Can the use of filters by organizations and companies such as AOL, MSN, Gmail and ISPs to “protect” users from SPAM be viewed as violations of the sender or the receivers free speech? OR Is AOL like a membership organization with “property” where SPAM is an invasion of private property or like the Post Office? Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM and Free Speech What about anti-SPAM listing services that provide lists of “SPAMers.” Who get included? Who decides? Is a Harris Poll survey SPAM? Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM and Free Speech and the Legal System Thirty-six states have tried to restrict SPAM by enacting anti-spam laws Only two state prosecutions were ever successfully brought against spammers, and only one was able to enforce its law against an out- of-state spammer. Copyright © 2008 by Helene G. Kershner

Behind the Machine: SPAM and Free Speech and the Legal System CAN-SPAM Act of 2003 The Controlling the Assault of Non-Solicited Pornography and Marketing Act requires unsolicited commercial messages to be labeled (though not by a standard method) and to include opt-out instructions and the sender's physical address. It prohibits the use of deceptive subject lines and false headers in such messages. The FTC is authorized (but not required) to establish a "do-not- " registry. The CAN-SPAM Act took effect on January 1, The act has largely been unenforced. States cannot enact stronger local legislation. Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing “ In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an or an instant message. The term phishing arises from the use of increasingly sophisticated lures to "fish" for users' financial information and passwords. “ Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing – In the Beginning In the 1990s unethical AOL users created false accounts with “algorithmically generated credit card numbers — these accounts could last weeks or even months until new ones were required. AOL eventually brought in measures in late 1995 to prevent this, so early AOL crackers resorted to phishing for legitimate AOL accounts.” Individuals involved in such measures were often those involved in illegal sale and distribution of boot leg software. Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing – In the Beginning The phisher or cracker would “pose as an AOL staff member and send an instant message to a potential victim, asking the victim to reveal his or her password.” Stutz, Michael: “AOL: A Cracker's Paradise?”, Wired News, January 29, 1998.Stutz, MichaelAOL: A Cracker's Paradise?Wired News The phisher would use the now all to common technique of sending some kind of message to the unsuspecting AOL user asking to give “up sensitive information … include text such as "verify your account" or "confirm billing information". Once the victim had submitted his or her password, the attacker could then access the victim's account and use it for various criminal purposes, such as spamming.” Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing – Moving on from AOL In 1977 AOL adjusted its security policies making it very difficult for such illegal activities to occur. As a result these activities migrated elsewhere on the Internet. Phishing is now unfortunately Everywhere! Estimated losses from phishing from May 2004-May 2005 exceed three billion dollars to individuals and businesses in the US alone. More than 1.2 million US citizens were effected. Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing Examples? FAFSA.com “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.” “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.” Copyright © 2008 by Helene G. Kershner

Phishing Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing What can be done? Educate users Make pages more difficult to “spoof” Anti-phishing software “smart” - spam filters Legislation Industry/government/law enforcement working groups Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing The FTC suggests If you get an or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Area codes can mislead. Some scammers send an that appears to be from a legitimate business and ask you to call a phone number to update your account or access a “refund.” Because they use Voice Over Internet Protocol technology, the area code you call does not reflect where the scammers really are. Copyright © 2008 by Helene G. Kershner

Behind the Machine: Phishing Don’t personal or financial information if requested by a message to you! Look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins “ (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some phishers have forged security icons Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Copyright © 2008 by Helene G. Kershner