Compsci 82, Fall 2009 10.1 Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Privacy Chapter The Fourth Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Privacy. Privacy Quotes Search my house with a fine tooth comb Turn over everything ’cause I won’t be at home Set up your microscope and tell me what.
Would the Founders approve?. Would the Founders allow flag-burning?
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Privacy & Personal Information -- Why do we care or do we?
BY: Alexis Stern, Mikey Thompson and Hao Pang.  Freedom of Press- Hazelwood v. Kuhlmeier. This affects us because it tells us our boundaries on to what.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
PRIVACY. What is the Right to Privacy?? The Right to Privacy – Gavison Three basic components: Secrecy (confidentiality): The extent to which we are.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
California vs. Acevedo By: Caroline Correa & Raul Perez.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
“You have zero privacy,” “You own your data,” and other Myths Dr. Gilad L. Rosner Visiting Researcher Horizon Digital Economy Research Institute
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
Fourth Amendment Search and Seizure Civil Liberties.
Rights of the Accused. 1. Arrest With a warrant: a) based on probable cause b) warrant obtained from a judge presented with probable cause With a warrant:
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Arrest and Detainment How do you know you’ve been arrested?
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Is there a state action? (i.e. search by police, not private party) Is the search conducted by a state or federal actor? 4 th amendment doesn’t apply to.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
CLASS NO. 2 4 TH Amendment. Review Incorporation Doctrine Retroactivity –Gen. Rule: Decisions are not retroactive for habeas corpus cases –Exceptions:
Key management issues in PGP
Privacy and the Law.
STATES AREN’T DUNN DISAGREEING ON THE FOURTH AMENDMENT
WHO WANTS THE LIVE IN A GLASS HOUSE?
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Surveillance in Society
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
INFO/CSE 100, Spring 2005 Fluency in Information Technology
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Arrest.
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.privacy UN, Universal Declaration of Human Rights l Privacy not mentioned, per se, in US Constitution, but rights upheld by SCOTUS

Compsci 82, Fall Privacy and the Internet I smile every time someone says, "Privacy is dead" or the "Facebook generation doesn't care about privacy." If there is one issue that people feel passionately about today, that literally unites everyone who goes online, it is the interest in privacy. Marc Rotenberg EPIC You already have zero privacy, get over it. Scott McNealy Sun

Compsci 82, Fall Privacy once upon a time … Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops.”

Compsci 82, Fall Privacy, continued It is our purpose to consider whether the existing law affords a principle which can properly be invoked to protect the privacy of the individual; and, if it does, what the nature and extent of such protection is. Of the desirability -- indeed of the necessity -- of some such protection, there can, it is believed, be no doubt.

Compsci 82, Fall Privacy Continued The press is overstepping in every direction the obvious bounds of propriety and of decency. Gossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To satisfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers. The Right to Privacy, Samuel Warren and Louis Brandeis, Harvard Law Review, 1890

Compsci 82, Fall Privacy, the Internet, and Technology l Privacy in our home, privacy on our hard- drive, privacy in our network habits (home?)  What does “privacy” mean in these contexts? l Best way to keep information private  Don’t use the Internet  Understand privacy policy l Trust: industry, government, friends, tech.

Compsci 82, Fall Privacy, Technology and the Internet l What does government know about you?   Dated:   l What is FISA/FISC? What is the NSA?  Where do we look for information? 

Compsci 82, Fall Court cases and privacy What does it mean to “spy”? What can the government do? What can companies do?

Compsci 82, Fall Kyllo v United States The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. (4 th Amendment to US Constitution) l police look at everything police look at everything

Compsci 82, Fall Kyllo Details l Police suspicious, imager finds surplus heat  Based on image, get warrant, find plants  Upheld on appeal (no intimate details, no attempt to conceal), SCOTUS overturns l Thermal imager/technology violated privacy  Compare California v. Ciraolo, 1986, aerial surveillance from 1,000 ft,  Compare Katz v. US, 1967, gambling by phone, phone-booth is private

Compsci 82, Fall Privacy, Anonymity, Security l How can we get better privacy?  What is private browsing? FF? IE?  Can we surf the web anonymously? What does this mean? l What about cookies? What, where, when,…?  Can you browse without them?  Can you delete when done?  Flash and LSOs (local shared objects)

Compsci 82, Fall Anonymous R er, Web surfing l What does “anonymous” mail mean?  Receiver doesn’t know sender?  No one can track the ? l Anonymous r er Anonymous r er   Craigslist, is this anonymous? Pseudo?

Compsci 82, Fall Ethical? Smart?

Compsci 82, Fall Privacy to Security via Cryptography l Keeping digital information private?  Keep it to ourselves  Don’t go online  Use cryptography to protect it l When should we really insist on security?  Facebook? Gmail?  Bank?  Other?

Compsci 82, Fall Cryptography l For encryption to work  Not to hard to encrypt (time, money)  Easy to decrypt if allowed (time, money)  Impossible to decrypt if not allowed (??) l Mathematics is the basis for cryptography  Very hard to factor numbers  Easy to determine if a number is prime  No “security through obscurity”

Compsci 82, Fall PKI: Public Key Infrastructure l From PGP to Hushmail  PGP is “pretty good privacy”, Phil Zimmerman    Distributed as book due to “munitions export restrictions” (1990’s, 40 bit)  Web of trust for public key/private key l How do circumvent these systems?  Keylogging software by federal agents

Compsci 82, Fall Can you send encrypted ? l “Why Johnny Can’t Encrypt”

Compsci 82, Fall Certificate of trust, SSL?, MD5?

Compsci 82, Fall In Re Boucher 2007 WL