Download presentation
Presentation is loading. Please wait.
Published byMabel Andrews Modified over 9 years ago
1
CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 1 Class 5 Privacy Keith A. Pray Instructor socialimps.keithpray.net
2
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 2 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
3
CS 3043 Social Implications Of Computing Quiz 1. List problems with using biometrics for identification. 2. List advantages of using biometrics for identification. 3. A denial of service attack shuts down a bunch of retailer, stock brokerage, large corporate entertainment and information web sites. For each possible guilty party state what penalties are appropriate and why? a. Terrorist who aimed to cause billions of damage to U.S. economy. b. Protest organization opposing commercialization of the web and corporate manipulation of consumers. c. Script kiddie just having fun with tools he found on the web. d. Show off hacker in search of bragging rights. 4. Extra points for naming laws/acts under which these people could be prosecuted. © 2009 Keith A. Pray 3 8/29/2015
4
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 4 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
5
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 5 8/29/2015 Logistics For Individual Presentations follow the guidelines at: http://socialimps.keithpray.net/assignments/index.js p?content=Individual_Presentations.txt
6
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 6 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
7
CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins U.S. Code Title 18 Crimes and Criminal Procedure Sections 2314 and 2315 NSPA makes it unlawful to deal with “matters” pertaining to stolen “property” across: State boundaries International boundaries
8
CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins These “matters” include: Transportation (2314) Transmittal Transfer Receipt (2315) Possession Concealment Storage Barter Sale (2315) Disposal
9
CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins The “property” includes: Goods Wares Merchandise Securities Money Articles
10
CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins In order to violate the NSPA, the “property” must be: Made Forged Altered Counterfeited These actions are meant in the literal and non- literal sense
11
CS 3043 Social Implications Of Computing National Stolen Property Act (NSPA) – Francis Collins The crime is subject to the NSPA regardless of whether: The property was stolen in the U.S The property was possessed in the U.S
12
CS 3043 Social Implications Of Computing United States vs. Dowling (1985) – Francis Collins Does not apply to the taking of purely intangible property Vague definition of property Example for information processing Dowling: if someone steals $5000 worth of information processing technology they should be convicted If someone steals $1 worth of information processing technology, but $4999 worth of data, they cannot be convicted
13
CS 3043 Social Implications Of Computing United States vs. Dowling (1985) – Francis Collins Example for information processing (continued) United States Since data is transferable and accessible, it should be treated as the physical property would Court ruled in favor of Dowling NSPA also fails to bring more severe charges against the viewing of computer data Usually just charges with trespassing NSPA rarely used in information processing crimes because of this flaw
14
CS 3043 Social Implications Of Computing References – Francis Collins "National Stolen Property Act." International Cultural Property Protection Home Page. 31 Mar. 2009. "National Stolen Property Act Lawyers." Find a Lawyer | Find an Attorney. 31 Mar. 2009. "Fighting computer crime by combining federal & state law." Uplink Productions - Home of affordable, quality and custom website design and programming. 31 Mar. 2009.
15
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 15 8/29/2015 Effective in October 30, 1998. Penalties up to 15 years imprisonment and a maximum fine of $250,000. Establishes that the person whose identity was stolen is a true victim. Identity theft and Assumption Deterrence Act` Viktoras Truchanovicius
16
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 16 8/29/2015 Enables law enforcement agencies to combat this crime. Allows for the identity theft victim to seek restitution if there is a conviction. Establishes the Federal Trade Commission as a central agency to act as a clearinghouse for complaints. Provides leverage to influence law enforcement to investigate one’s case. Benefits of the Act` Viktoras Truchanovicius
17
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 17 8/29/2015 The primary source of data on the prevalence of identity theft is the FTC's Identity Theft Data Clearinghouse Theft Data Clearinghouse Viktoras Truchanovicius
18
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 18 8/29/2015 Viktoras Truchanovicius WHAT CONSTITUTES IDENTITY THEFT?
19
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 19 8/29/2015 Viktoras Truchanovicius Production of an identification or any legal document. Transfer of identification or any legal document. Possession of five or more identification documents with intent to use unlawfully. Possession of identification with intent to defraud the United States. Summary of the Act
20
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 20 8/29/2015 Viktoras Truchanovicius Production or possession of a document-making implement with intent to use. Possession of a stolen or fake identification document of the United States. Transfer or uses a means of identification of another person with intent to unlawful activity. Summary of the Act (Cont’d)
21
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 21 8/29/2015 Viktoras Truchanovicius www.consumer.gov/idtheft 1-800-ID THEFT Contact your state Attorney General to file a complaint For Victims
22
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 22 8/29/2015 Viktoras Truchanovicius http://www.ckfraud.org/title_18.html. Accessed 2009-03-31 http://www.ftc.gov/os/statutes/itada/itadact.htm. Accessed 2009-03-31 http://www.spendonlife.com/guide/identity-theft-and-assumption- deterrence-act. Accessed 2009-03-31 http://www.aarp.org/research/frauds-scams/fraud/aresearch-import-919- DD102.html. Accessed 2009-04-02 http://www.shreddinghouston.net/paper-shredding-blog/wp- content/uploads/2008/06/paper-shredding.jpg. Accessed 2009-04-02 http://www.idtheftawareness.com/images/NumIdTheftComplaints.gif. Accessed 2009-04-02 http://www.stopthem.org/stop_them/identity_theft.htm. Accessed 2009-04- 02 Resources
23
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 23 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
24
CS 3043 Social Implications Of Computing Methods of Achieving Anonymity - Greg Barrett I will discuss Proxies Tor Virtual Private Networks (VPN) Many others exist, such as I2P: Similar to Tor, routes your connection through other users Darknet: Connect to only users you know and trust
25
CS 3043 Social Implications Of Computing Proxy - Greg Barrett Provides a node between you and your destination Not necessarily encrypted Can be detected Open proxies exist, but some services ban requests from their IPs Your Computer Internet Destination Proxy Server
26
CS 3043 Social Implications Of Computing Tor - Greg Barrett Onion routing system Works at TCP stream level Provides high degree of anonymity Vulnerabilities: Exit nodes can see unencrypted packets Your Computer Tor Node Exit Node Internet Destination Tor Server
27
CS 3043 Social Implications Of Computing Virtual Private Network (VPN) Greg Barrett Provides an encrypted connection between a user and a VPN server Users requests can then be serviced by the provider or forwarded anonymously to their destination Used by businesses, WPI, P2P users… IPREDator: The Pirate Bay’s new VPN offering Your Computer Internet Destination VPN Provider
28
CS 3043 Social Implications Of Computing Sources - Greg Barrett IPREDator: http://arstechnica.com/telecom/news/2009/03/the- pirate-bay-to-roll-out-secure-vpn-service.ars http://arstechnica.com/telecom/news/2009/03/the- pirate-bay-to-roll-out-secure-vpn-service.ars Tor: http://www.torproject.org/index.html.en Darknet http://www.bearcave.com/misl/misl_tech/msdrm/ darknet.htm http://www.bearcave.com/misl/misl_tech/msdrm/ darknet.htm
29
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 29 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
30
CS 3043 Social Implications Of Computing Privacy Topics Is privacy a right? Our privacy compared to 100 or 200 years ago? Rewards and loyalty programs. Body scanners. Data collected about you. © 2009 Keith A. Pray 30 8/29/2015
31
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 31 8/29/2015 Overview 1. Quiz 2. Logistics 3. Students Present Crime 4. Students Present Privacy 5. Privacy 6. Assignment
32
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 32 8/29/2015 Assignment Read Chapter 3 - Freedom Of Speech. Self Search Group Project – Master Timeline Clean Up Contest
33
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 33 8/29/2015 Assignment - Self Search Wiki Post ways one can search for information about a person. Do not repeat an entry already made. Keep entries sorted alphabetically. For each search method listed post your result on your own page. Pages will be created for each you ahead of time. Provide a description if you’d rather not post the details. For each search method answer: Exactly how did the data get there? How can this data be used? Did you authorized use of the data? Is this a secondary use? If not, request its use be discontinued and post the correspondence. Dig deeper than a basic search engine’s (Google, etc.) results. This assignment requires you revisit the Wiki frequently as new search methods are posted.
34
CS 3043 Social Implications Of Computing Group Project - Master Timeline Clean Up Contest On an entry that is not for your group 1 point will be awarded for: Removing a duplicate entry Fixing all typos and grammar problems Replacing encyclopedic references with valid ones. Encyclopedic references can be moved to an interesting reading portion of an entry. Adding the access date for all web site references. Adding a comment when the entry does not explain what it is. Adding a comment when the entry does not explain why it is important to information processing. For each entry belonging to your group 1 point will be deducted when another group completes an item from above. © 2009 Keith A. Pray 34 8/29/2015
35
CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 35 Class 5 The End Keith A. Pray Instructor socialimps.keithpray.net
36
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 36 8/29/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -- Fourth Amendment to the US Constitution
37
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 37 8/29/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?
38
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 38 8/29/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important. Beyond secrecy.
39
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 39 8/29/2015 Privacy Expectations of privacy are: Cultural Philosophical Political Personal Who has the right to know?
40
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 40 8/29/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?
41
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 41 8/29/2015 What Safeguards Are There? In US: Census Taxes Federal Local Search warrants Wiretaps Inter-agency sharing
42
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 42 8/29/2015 Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information
43
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 43 8/29/2015 Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, email, snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration
44
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 44 8/29/2015 Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do?
45
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 45 8/29/2015 Safeguards Privacy policies Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers
46
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 46 8/29/2015 Other Business Things Bankruptcy Fraud
47
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 47 8/29/2015 Technology Overall computer security Encryption
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.