Download presentation
Presentation is loading. Please wait.
1
Can I See You Now?
2
Closed Circuit TV (CCTV) Boston – 450 cameras Chicago - 2250 New York City – 3000 cameras London –200,000 cameras (individuals caught on camera 300 times a day)
3
Boston is Watching 450 Surveillance cameras In the T
4
Cambridge is Watching
5
18 CCTV public areas and parking lots
6
Cell Phones E911 service - Reverse directory – call routed to a Public Safety Answering Point The Missouri Department of Transportation will monitor the movements of individuals on highways via their cell phones -- without their knowledge or consent Cell phone company can track to within 100 meters.
7
Cell Phone Tracking Third Generation phones are more secure against casual eavesdropping The government can tap mobile phones with the cooperation of the phone company "IMSI-catcher" fools both caller and mobile phone company while stripping out encryption or otherIMSI-catcher
8
EZ Pass Expanding to more and more states Used for crime fighting Traffic violations Airport Parking MacDonalds
9
Tracking You with GPS –24 satellites, which continuously transmit microwave signals regarding their locations at a given time – Through analysis of the data coming in from various satellites, a GPS receiver can determine its own location (for instance, if it's in a car, it can determine the car's location). –And if a GPS device has a transmitter, as well as a receiver, it can also broadcast its location to third parties.
10
Radio Frequency ID (RFID) Undetectable and transmits several meters or moreUndetectable Currently – no regulation Passports Clothing Pets Money? You?
11
Who You Are... Today’s possibility - Pizza demoPizza demo Tomorrow’s - A life recorder? 200 Gb/year for audio, 700 Gb/year for video Today we produce our information by choice Tomorrow we emit our information without knowing...
12
Magnetic Strips Drivers license Student ID Credit Card Loyalty Cards Frequent Flyer
13
Real ID = National ID? Starting three years from now – used for all government transactions At a minimum: name, birth date, sex, ID number, a digital photograph, address, and a "common machine-readable technology" Technologies to prevent fraud and copying Homeland Security is permitted to add additional requirements--such as a fingerprint or retinal scan-- on top of those. With standardized technology - who might want to swipe? Bars, banks, airlines? police can demand to see ID from law-abiding U.S. citizens.
14
Bentley ID Meal Plan Discretionary Card Key Hand Check for access
15
Biometrics http://en.wikipedia.org/wiki/Biometrics
16
Cell Phone Cameras The Video Voyeurism Prevention Act of 2004 passed through Congress virtually unopposed.. Prohibits the photographing or videotaping of a naked person without his or her permission in a gym, tanning salon, dressing room or anywhere else where one expects a "reasonable expectation of privacy." Violators can expect fines of up to $100,000 and/or up to a year in prison.
17
Are you Watched in the Bathroom? H.L.C. [108HR582] 110TH CONGRESS 1ST SESSION H. R. ll To protect employees from invasion of privacy by employers by prohibiting certain video monitoring and audio monitoring of employees by their employers, and for other purposes. IN THE HOUSE OF REPRESENTATIVES Mr. ANDREWS introduced the following bill; which was referred to the Committee on llllllllllllll A BILL To protect employees from invasion of privacy by employers by prohibiting certain video monitoring and audio monitoring of employees by their employers, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ‘‘Employee ChangingRoom Privacy Act’’.
18
Where Do You Live? What Is your Home Worth? Who Lives Near You?
19
What you Type Yahoo, MSN – gave search histories to FBI for research purposes on child pornography – not a criminal investigation. AOL - In August 2006, AOL published 650,000 users' search histories on its website Amazon – Retain your search history and might sell it should Amazon get a new owner. Google Desktop - the new "Search Across Computers" feature will store copies of the user's Word documents, PDFs, spreadsheets and other text-based documents on Google's own servers, to enable searching from any one of the user's computers.
20
Google Search A search for “cars” inktomi1-lng.server.ntl.com - 25/Mar/2003 10:15:32 - http://www.google.com/search?q=cars" - MSIE 6.0; Windows NT 5.1 - 740674ce2123e969 Simplified inktomi1-lng.server.ntl.com (my internet address, resolved to a domain name) 25/Mar/2003 10:15:32 (date and time I searched) http://www.google.com/search?q=cars (my search request, containing the word cars in it) MSIE 6.0; Windows NT 5.1 (shows the browser I used and operating system, MS Internet Explorer 6 on Windows XP) 740674ce2123e969 (my unique cookie ID, assigned to my browser the first time I visited
21
Google GMail Gmail is supported by advertisers who buy keywords, Gmail uses "content extraction" on all incoming and outgoing e-mail in order to target the advertising to the user. For example, if the user is having an e-mail conversation about applying for a job, Gmail might present the user with ads about online job search sites and resume writing services. Nonsubscriber email is also searched Gmail can be profiled across Google product lines Unlimited data retention
22
Facebook’s New Service 2,100 Colleges 22,000 High Schools 15,000 Corporations Military News Feed - Broadcasting your updates as headlines to your friends. Protest “Calm. down. breathe. We hear you,"
23
CRT Emissions
24
Online Eavesdropping Packet Sniffing Spyware Keystroke Logger CRT Emissions
25
What Can We Do? Learn the Language Personally identifying information Aggregate information Opt Out Opt In Privacy Policies Good Practices Clean machine - Firewall Do not share personal information Write email and post on facebook like the whole world will read it. Use anonymizers Encrypt Pray
26
And Finally 79% of credit reports contain errors 25% of credit reports have errors serious enough to cause life problems Choicepoint lost 145,000 records Bank of America – 1.2 m customer records Citigroup – 3.9 m And on and on and on...
27
Identity Theft Geek Weight Lifter
28
What is it? Account Takeover Application Fraud Cell Phone Fraud Criminal Identity Theft Scams and Fraud Sources:http://www.privacyrights.org/fs/fs17-it.htm#crime
29
What Happens to You? Credit Cards - Often responsible for the first $50 of loss (Truth in Lending Act, Fair Credit Billing Act, 15 USC sec. 1601) Debit card users have less protection. Your checking account can be wiped out and you may be liable for the entire. (Electronic Funds Transfer Act, 15 USC sec. 1693) Criminal Identity Theft you get arrested and are responsible for insuring that criminal records are revised to restore your innocent status For more about credit card and debit card laws, read the Federal Reserve's Consumer Handbook, www.federalreserve.gov/pubs/consumerhdbk. www.federalreserve.gov/pubs/consumerhdbk Source: http://www.privacyrights.org/fs/fs17-it.htm#crime
30
How do they get it? "Dumpster diving" in trash bins for unshredded credit card and loan applications and documents containing SSNs. Stealing mail from unlocked mailboxes to obtain newly issued credit cards, bank and credit card statements, pre- approved credit offers, investment reports, insurance statements, benefits documents, or tax information. Unfortunately, even locked mailboxes may not stop the most determined thief. Finding identifying information on Internet sources, via public records sites and fee-based information broker sites. No help from corporations Source: http://www.privacyrights.org/fs/fs17-it.htm#crime
31
Choicepoint 19 billion records Its customers include employers, debt collectors, loan officers, media organizations, law offices, law enforcement, among others. ChoicePoint compiles data from many sources including public records (court records, property tax assessor files, professional licenses, vehicle registration, bankruptcy records, and so on), along with credit reports, and consumer demographic and lifestyle data. tenant rental history includes landlord debt, criminal, eviction, registered sex offender and FBI searches. Their employment background check report includes information on arrest and conviction history including fugitive files, state and county criminal record repositories, prison, parole and release files from state Department of Corrections, Administrative Office of Courts and other state agencies, in addition to credit history, employment verification, education verification, license credentials and certification verification, and business or personal reference verification. See what they have on you!
32
How Much is There? As of September, 2007 166,021,210 Records stolen Because companies don’t protect your information
33
Watch out for ATMs Watch out for ATMs Don’t let anyone watch over your shoulder
34
Phishing Test your understanding Get updates on the latest
35
Reduce Access to your Personal Data Do not carry anything with your social security number or extra credit cards, passport, or birth certificate around Remove your name from marketing lists Sign up on the Do Not Call Registry Opt out of sharing of your financial information ( privacy notices) Send bills in post office boxes, not outside your house
36
Handle your Information Responsibly Carefully review your financial and phone statements Convert bill paying to automatic deductions Shred pre-approved credit offers Use gel pens when writing checks Store your statements and other financial information in a locked space
37
Passwords and PINs Do not use any name or number central to your life (birthday, pet name) Mix letters and numbers – better if they make no sense Use reminder questions that no one would guess (elementary school) Don’t let people see you type in your password
38
Safeguards on Your Computer and the Internet Use a firewall and a router on your home computer Keep virus and spyware protection updated and use it regularly Password protect financial files Do not use file sharing programs Don’t be a sucker to phishing or other scams
39
Careful with your Social Security Numbers This is required for tax forms, employment, and banking – otherwise “NO” If the government asks, check for a privacy policy Use alternative numbers on your driver’s license Do not give to merchants for check verification If it is on a health card, carry a copy and cut out the SS#
40
Credit Do not use debit cards online Limit the number you have and do not carry them Watch what waitstaff does with your card Keep a list of all cc#, phone numbers and expiration dates Never give out any numbers unless YOU initiated the transaction Do not throw out receipts in a public trash can
41
Are you at risk? IQ Test What is your Safety Score? What do you do?
42
Credit Reporting Agencies PhoneOnline Equifax (888) 766-0008 www.equifax.comwww.equifax.com Experian (888) EXPERIAN (397-3742) www.experian.com www.experian.com TransUnion (800) 680-7289 www.transunion.comwww.transunion.com
43
What to Do Check your credit report 3 times a year Remove your name from marketing lists 888-5optout Sign up on the National Do Not Call Registry www.donotcall.gov or 888-382-1222www.donotcall.gov Remove your name from state lists http://www.ftc.gov/bcp/conline/edcams/donotcall/statelist.html Have your name removed from the phone book and reverse directoriesphone book and reverse directories Report any false charges to the police File a Federal Affidavit
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.