Top Banner
Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook Article by Simon Garfinkel Presentation by Adam Miller
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Article by Simon Garfinkel Presentation by Adam Miller.

Privacy Requires Security, Not Abstinence: Protecting an

Inalienable Right in the Age of Facebook

Article by Simon GarfinkelPresentation by Adam Miller

Page 2: Article by Simon Garfinkel Presentation by Adam Miller.

The Constitution◦ There are no laws specifically stating the right to

privacy◦ Amendments imply privacy rights

Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively)

The Computer◦ Consumer data banks

Computers made it easier to store vast amounts of personal data (credit agencies)

Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them

Page 3: Article by Simon Garfinkel Presentation by Adam Miller.

Computer (cont.)◦ Govt. developed Code of Fair Information Practice

Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure

The Internet◦ All activity on the Internet is mediated

Companies could use information stored for financial gain

Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”

Page 4: Article by Simon Garfinkel Presentation by Adam Miller.

Life after 9/11◦ Raised the question: Privacy or Security?◦ Total (Terrorist) Information Awareness

Used advances in technology to attempt to catch terrorists before they attack

Congress shut down organization because it treated everyone as a suspect

Facebook◦ When using Facebook applications, the user is

asked to “Allow access?” How much information is being pulled by the app? By agreeing, you are saying you trust the app and

Facebook’s security and privacy controls

Page 5: Article by Simon Garfinkel Presentation by Adam Miller.

Where We Are Now◦ Data theft by insiders can be solved

Paying employees enough Auditing their work Limiting authority Harshly punishing those who abuse employer’s trust

◦ Answering the question of Security or Privacy The problem isn’t that the information is out there,

it’s that it isn’t secure Spending now on better security in systems will

prevent having to spend a lot more when faulty security is breached

Page 6: Article by Simon Garfinkel Presentation by Adam Miller.

The Constitution explicitly states your right to privacy. True or False?

Questions

False•Which of these is NOT a way to prevent data theft by insiders?• A: Having employees keep data on personal

storage devices• B: Auditing employee work• C: Paying them enough• D: Limiting the authority of any one employee

Answer: A

Page 7: Article by Simon Garfinkel Presentation by Adam Miller.

TIDE (Terrorist Identities Datamart Environment

Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US

Exponential Growth (100,000 files in 03; 435,000 now)

A Growing Watch ListBy Shawn McSweeney

Page 8: Article by Simon Garfinkel Presentation by Adam Miller.

Half of triggered names in 04 and 05 were misidentified (10 of thousands in total)

Cat Stevens Story Security Issues

Issues

Page 9: Article by Simon Garfinkel Presentation by Adam Miller.

Roughly how many pieces of data does TIDE currently store? ◦ A. 100,000◦ B. 435,000◦ C. 755,000◦ D. 2.3 Million

A quarter of the triggered watch list names were misidentified.

Questions

Page 10: Article by Simon Garfinkel Presentation by Adam Miller.

“People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.”

The Software WarsBy Stephanie Moore

Page 11: Article by Simon Garfinkel Presentation by Adam Miller.

Common Mistakes in Software Creation◦ “Metaphysical Absence”◦ Unreachable deadlines◦ Shortages of “can-do” attitudes

Why you can’t understand your computer!

Page 12: Article by Simon Garfinkel Presentation by Adam Miller.

Obtain the correct tools Keep it simple Don’t stifle creativity!

Suggestions for Future Software Inventors

Page 13: Article by Simon Garfinkel Presentation by Adam Miller.

Questions1. The nonexistence of abstract thought is known as:a. technical confusinonb. metaphysical absence c. daydreamingd. psychological absence

Answer: B

2. Setting unreachable goals will motivate employees to give their best efforts.True or False?

Answer: False

Page 14: Article by Simon Garfinkel Presentation by Adam Miller.

The Evolution of Cyber Warfare

ByGreg Bruno

Presentation by: Khaing Oo

Page 15: Article by Simon Garfinkel Presentation by Adam Miller.

Cyber Warfare Spring of 2007, Russia Estonian monument was moved by the Red

Army from capital city to the outskirt of town

Bogus Requests-Requests for information from computers around the world

Banks, Media Outlets, and Ministries were hacked

Most publicized hack in recent history

Page 16: Article by Simon Garfinkel Presentation by Adam Miller.

China Most active for hacking computers Washington accused China of hacking into

government computer networks June 2007-Hacked into Pentagon Network Suspected of hacking in Britain, France,

Germany, South Korea, and Taiwan Russian and China both denied the

accusations.

Page 17: Article by Simon Garfinkel Presentation by Adam Miller.

U.S. Cyber Warfare William Arkin, Defense Analyst

◦ “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.”

U.S. has technologies capable of penetrating and jamming enemy networks

Page 18: Article by Simon Garfinkel Presentation by Adam Miller.

Cyber-Warfare Tactics

Request information while masking the location of primary attacker

Use of malware, spyware, and other programs to steal information without user’s knowledge

Cyber attacks aimed at critical infrastructure-less common, but more serious and damaging◦ Nuclear Power Plant Control Systems◦ Banks and Subways

Page 19: Article by Simon Garfinkel Presentation by Adam Miller.

Patching the Hole Until recently, U.S. government did not

emphasize on safety from cyber attacks Difficulty in finding the cyber threat This is getting more serious and more time

demanding U.S. is a big target Cyber attacks on the U.S. economy may be

the worst case U.S. claimed that their systems are secure

and safe

Page 20: Article by Simon Garfinkel Presentation by Adam Miller.

Review Questions What country is mostly blame for cyber

attacks?

TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?

Page 21: Article by Simon Garfinkel Presentation by Adam Miller.

Article by William J. Astore Presentation by Raphael Martinez

Geeks and Hackers, Uncle Sam’s Cyber Force Wants you!

Page 22: Article by Simon Garfinkel Presentation by Adam Miller.

• Full spectrum dominance• Air Force stated goal: gain control and

access to any and all networked computers• Contractor bids: “dominant cyber offensive

engagement”• Headquarters throughout United States• Surveys and propaganda

“Above All vision”

Page 23: Article by Simon Garfinkel Presentation by Adam Miller.

Uncertain technical benefits Inflated prices SPADOC (ugly baby)-updated computer

system Air Force Mission Support System- Pilots

planning missions with latest technology Out dated and Basic Disaster

Ugly Babies and Air Force Computer Systems

Page 24: Article by Simon Garfinkel Presentation by Adam Miller.

Total Dominance isn’t realistic Too Expensive Day late and Billion Dollars short

Loving Big “Cyber” Brother

Page 25: Article by Simon Garfinkel Presentation by Adam Miller.

The goal of the Air Force is to gain control and access to any and all networked computers. T or F?

True Air Force computer systems are relatively

inexpensive and cost-efficient. T or F? False

Questions