SlideShare una empresa de Scribd logo
1 de 62
Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
Internet Information Concerns Privacy Security Bandwidth Content Public Access Commercialization
Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
Balancing Act on Privacy
Basic Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ You have zero privacy  [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
Public Interest In Protecting Individual Privacy
The Children's Online Privacy Protection Act (COPPA) ,[object Object],[object Object],[object Object]
The Children's Online Privacy Protection Act (COPPA) ,[object Object]
The Children's Online Privacy Protection Act (COPPA) ,[object Object],[object Object],[object Object],[object Object]
Gender and Electronic Privacy ,[object Object],[object Object],[object Object],[object Object]
Case of Amy Boyer ,[object Object],[object Object],[object Object],[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object],[object Object],[object Object]
Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts.  Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations.  Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more.  Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is "relevant" to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation.  This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
Cookies ,[object Object],[object Object]
Cookies ,[object Object],[object Object],[object Object],[object Object]
Cookie Concerns ,[object Object],[object Object],[object Object],[object Object],Fixing browser  bugs eliminated cookie concerns EXCEPT for User Profiling > Briefly < And now … Super Cookies
Have you been spammed?
Have you been spammed? Junk mail  … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who  would not otherwise  choose to receive it.
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
Spam mail – printer toner #  From    Date    Subject 1  [email_address] 20-JUN-1999  copier & laser printer supplies 2  cc123@boardermail.com  27-JUN-1999  copier & laser printer supplies 3  hunt25@boardermail.com  12-JUL-1999  copier & laser printer supplies 4  art123@ureach.com  23-AUG-1999  laser printer toner advertisement 5  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 6  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 7  art123@techpointer.com  26-SEP-1999  laser printer toner advertisement 8  art222@techpointer.com  3-OCT-1999  laser printer toner advertisement 9  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 10  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 11  art123@visto.com  20-OCT-1999  laser printer toner advertisement 12  [email_address] 27-NOV-1999  laser printer toner advertisement 13  [email_address] 27-NOV-1999  laser printer toner advertisement 14  bmark@atlantaoffice. com 28-NOV-1999  laser printer toner advertisement 15  bmark@guestbooks.net  13-DEC-1999  laser printer toner advertisement 16  bmark@crosswinds.net  28-FEB-2000  laser printer toner advertisement 17  bmark1@crosswinds.net  28-FEB-2000  laser printer toner advertisement 18  bps@buffymail.com  28-MAR-2000  laser printer toner cartridges 19  r2d2@ureach.com  28-MAR-2000  laser printer toner advertisement 20  bps@buffymail.com  20-JUN-2000  laser printer toner cartridges
Spam Case study:  One person, six years
Software ,[object Object],[object Object],[object Object],Contained (GUID) Globally Unique Identifier [Called a Microsoft System ID (MSID) by MS that included the NIC ethernet address] All searches  (Yahoo…) routed through Microsoft ,[object Object],[object Object],Reports media use to Microsoft Contains unique ID serial number accessible by web http://www.computerbytesman.com/privacy/supercookiedemo.htm
Spyware More than 800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
Web Browsers Every time you visit a site  on the Internet you provide  information about yourself.
Verifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Bugs Do you see the web bug?
What is a Web Bug? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why a Web Bug? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specialized Privacy Probes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advertisement Competition A browser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners  Free, advertising supported application for filling in forms
Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital.  http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
What can Librarians Do? Educate yourself so you can inform the patrons of the library
Software ,[object Object],[object Object],[object Object],UNCHECK
Anonymous web surfing ,[object Object],[object Object],[object Object],[object Object],http://www.anonymizer.com/
Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
P3P Platform for Privacy Preferences ,[object Object],[object Object],[object Object],http://www.w3.org/P3P/
P3P Tool Privacy Bird  automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
Non-secure site
Secure site
Cookies are optional ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookie Rejection  Default Preferred
Check the cookie jar http://www.karenware.com/powertools/ptcookie.html
Manage the Cookie Jar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
Cookie Cop Plus http://www.pcmag.com/print_article/0,3048,a=7719,00.asp
What to do about spam ,[object Object],[object Object],[object Object],[object Object],[object Object]
What  NOT  to do about spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Avoiding web spambots ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address]
Pop-Up Delete Pop-Up and Pop-Under windows that don’t have a close box can only be removed by using < A l t >  -  < F 4 >
Specialized Privacy Probes Disable JAVA Script In  E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
Firewall Tiny Personal Firewall 2.0 http://www.tinysoftware.com/
Firewall http://www.agnitum.com/products/outpost/ Open Architecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
Spyware Firewall http://www.zonealarm.com/ Check both INCOMING and OUTGOING requests
Anti-Spyware http://www.lavasoft.de/
Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
PC Cleaner http://www.bmesite.com/ Internet Sweeper
Where is the source? http://www.neoworx.com/products/ntx/default.asp
Provide accurate  personal information  ONLY  if appropriate for the services requested. Would you give personal  information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
How to protect your privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion: Remember, the Internet is a public network If you are connected, protect yourself
ANY QUESTIONS? ,[object Object]

Más contenido relacionado

La actualidad más candente

Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreInternet Law Center
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...CODE BLUE
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
Childpornographybill
ChildpornographybillChildpornographybill
Childpornographybillkikanovais
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)Felipe Prado
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 

La actualidad más candente (20)

Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
Childpornographybill
ChildpornographybillChildpornographybill
Childpornographybill
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 

Destacado (17)

Twitter Talk 2009
Twitter Talk 2009Twitter Talk 2009
Twitter Talk 2009
 
Revised Twitter Talk 2009
Revised Twitter Talk 2009Revised Twitter Talk 2009
Revised Twitter Talk 2009
 
Social problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_healthSocial problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_health
 
Roadside memorial powerpointv6
Roadside memorial powerpointv6Roadside memorial powerpointv6
Roadside memorial powerpointv6
 
Roadside Memorial Powerpointv4
Roadside Memorial Powerpointv4Roadside Memorial Powerpointv4
Roadside Memorial Powerpointv4
 
Revised Twitter Talk 2009
Revised Twitter Talk 2009Revised Twitter Talk 2009
Revised Twitter Talk 2009
 
Nust presentation
Nust presentationNust presentation
Nust presentation
 
Crim methods2
Crim methods2Crim methods2
Crim methods2
 
Twitter tweet presentation_2011
Twitter tweet presentation_2011Twitter tweet presentation_2011
Twitter tweet presentation_2011
 
Hardest Hatev2
Hardest Hatev2Hardest Hatev2
Hardest Hatev2
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
Jd Powerpointsv1
Jd Powerpointsv1Jd Powerpointsv1
Jd Powerpointsv1
 
Nanjing Roadside Memorial Presentation
Nanjing Roadside Memorial PresentationNanjing Roadside Memorial Presentation
Nanjing Roadside Memorial Presentation
 
An Introduction To Hate Crime
An Introduction To Hate CrimeAn Introduction To Hate Crime
An Introduction To Hate Crime
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Community Presentation
Community PresentationCommunity Presentation
Community Presentation
 
Types of communities
Types of communitiesTypes of communities
Types of communities
 

Similar a OLC Presentation Jipson

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxanitramcroberts
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Peter Timusk
 

Similar a OLC Presentation Jipson (20)

Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
trial
trialtrial
trial
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 

Último

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

OLC Presentation Jipson

  • 1. Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
  • 2. Internet Information Concerns Privacy Security Bandwidth Content Public Access Commercialization
  • 3. Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
  • 5.
  • 6. “ You have zero privacy [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
  • 7. Public Interest In Protecting Individual Privacy
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations. Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more. Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is &quot;relevant&quot; to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation. This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
  • 15.
  • 16.
  • 17.
  • 18. Have you been spammed?
  • 19. Have you been spammed? Junk mail … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
  • 20.
  • 21. Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
  • 22. Spam mail – printer toner # From Date Subject 1 [email_address] 20-JUN-1999 copier & laser printer supplies 2 cc123@boardermail.com 27-JUN-1999 copier & laser printer supplies 3 hunt25@boardermail.com 12-JUL-1999 copier & laser printer supplies 4 art123@ureach.com 23-AUG-1999 laser printer toner advertisement 5 art1234@ureach.com 30-AUG-1999 laser printer toner advertisement 6 art1234@ureach.com 30-AUG-1999 laser printer toner advertisement 7 art123@techpointer.com 26-SEP-1999 laser printer toner advertisement 8 art222@techpointer.com 3-OCT-1999 laser printer toner advertisement 9 art1235@visto.com 19-OCT-1999 laser printer toner advertisement 10 art1235@visto.com 19-OCT-1999 laser printer toner advertisement 11 art123@visto.com 20-OCT-1999 laser printer toner advertisement 12 [email_address] 27-NOV-1999 laser printer toner advertisement 13 [email_address] 27-NOV-1999 laser printer toner advertisement 14 bmark@atlantaoffice. com 28-NOV-1999 laser printer toner advertisement 15 bmark@guestbooks.net 13-DEC-1999 laser printer toner advertisement 16 bmark@crosswinds.net 28-FEB-2000 laser printer toner advertisement 17 bmark1@crosswinds.net 28-FEB-2000 laser printer toner advertisement 18 bps@buffymail.com 28-MAR-2000 laser printer toner cartridges 19 r2d2@ureach.com 28-MAR-2000 laser printer toner advertisement 20 bps@buffymail.com 20-JUN-2000 laser printer toner cartridges
  • 23. Spam Case study: One person, six years
  • 24.
  • 25. Spyware More than 800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
  • 26. Web Browsers Every time you visit a site on the Internet you provide information about yourself.
  • 27.
  • 28. Web Bugs Do you see the web bug?
  • 29.
  • 30.
  • 31.
  • 32. Advertisement Competition A browser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners Free, advertising supported application for filling in forms
  • 33. Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital. http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
  • 34. What can Librarians Do? Educate yourself so you can inform the patrons of the library
  • 35.
  • 36.
  • 37. Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
  • 38.
  • 39. P3P Tool Privacy Bird automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
  • 42.
  • 43. Cookie Rejection Default Preferred
  • 44. Check the cookie jar http://www.karenware.com/powertools/ptcookie.html
  • 45. Manage the Cookie Jar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
  • 46. Cookie Cop Plus http://www.pcmag.com/print_article/0,3048,a=7719,00.asp
  • 47.
  • 48.
  • 49.
  • 50. Pop-Up Delete Pop-Up and Pop-Under windows that don’t have a close box can only be removed by using < A l t > - < F 4 >
  • 51. Specialized Privacy Probes Disable JAVA Script In E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
  • 52. Firewall Tiny Personal Firewall 2.0 http://www.tinysoftware.com/
  • 53. Firewall http://www.agnitum.com/products/outpost/ Open Architecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
  • 54. Spyware Firewall http://www.zonealarm.com/ Check both INCOMING and OUTGOING requests
  • 56. Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
  • 58. Where is the source? http://www.neoworx.com/products/ntx/default.asp
  • 59. Provide accurate personal information ONLY if appropriate for the services requested. Would you give personal information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
  • 60.
  • 61. Conclusion: Remember, the Internet is a public network If you are connected, protect yourself
  • 62.