SlideShare a Scribd company logo
1 of 62
Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
Internet Information Concerns Privacy Security Bandwidth Content Public Access Commercialization
Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
Balancing Act on Privacy
Basic Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ You have zero privacy  [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
Public Interest In Protecting Individual Privacy
The Children's Online Privacy Protection Act (COPPA) ,[object Object],[object Object],[object Object]
The Children's Online Privacy Protection Act (COPPA) ,[object Object]
The Children's Online Privacy Protection Act (COPPA) ,[object Object],[object Object],[object Object],[object Object]
Gender and Electronic Privacy ,[object Object],[object Object],[object Object],[object Object]
Case of Amy Boyer ,[object Object],[object Object],[object Object],[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object],[object Object],[object Object]
Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts.  Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations.  Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more.  Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is "relevant" to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation.  This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
Cookies ,[object Object],[object Object]
Cookies ,[object Object],[object Object],[object Object],[object Object]
Cookie Concerns ,[object Object],[object Object],[object Object],[object Object],Fixing browser  bugs eliminated cookie concerns EXCEPT for User Profiling > Briefly < And now … Super Cookies
Have you been spammed?
Have you been spammed? Junk mail  … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who  would not otherwise  choose to receive it.
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
Spam mail – printer toner #  From    Date    Subject 1  [email_address] 20-JUN-1999  copier & laser printer supplies 2  cc123@boardermail.com  27-JUN-1999  copier & laser printer supplies 3  hunt25@boardermail.com  12-JUL-1999  copier & laser printer supplies 4  art123@ureach.com  23-AUG-1999  laser printer toner advertisement 5  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 6  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 7  art123@techpointer.com  26-SEP-1999  laser printer toner advertisement 8  art222@techpointer.com  3-OCT-1999  laser printer toner advertisement 9  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 10  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 11  art123@visto.com  20-OCT-1999  laser printer toner advertisement 12  [email_address] 27-NOV-1999  laser printer toner advertisement 13  [email_address] 27-NOV-1999  laser printer toner advertisement 14  bmark@atlantaoffice. com 28-NOV-1999  laser printer toner advertisement 15  bmark@guestbooks.net  13-DEC-1999  laser printer toner advertisement 16  bmark@crosswinds.net  28-FEB-2000  laser printer toner advertisement 17  bmark1@crosswinds.net  28-FEB-2000  laser printer toner advertisement 18  bps@buffymail.com  28-MAR-2000  laser printer toner cartridges 19  r2d2@ureach.com  28-MAR-2000  laser printer toner advertisement 20  bps@buffymail.com  20-JUN-2000  laser printer toner cartridges
Spam Case study:  One person, six years
Software ,[object Object],[object Object],[object Object],Contained (GUID) Globally Unique Identifier [Called a Microsoft System ID (MSID) by MS that included the NIC ethernet address] All searches  (Yahoo…) routed through Microsoft ,[object Object],[object Object],Reports media use to Microsoft Contains unique ID serial number accessible by web http://www.computerbytesman.com/privacy/supercookiedemo.htm
Spyware More than 800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
Web Browsers Every time you visit a site  on the Internet you provide  information about yourself.
Verifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Bugs Do you see the web bug?
What is a Web Bug? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why a Web Bug? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specialized Privacy Probes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advertisement Competition A browser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners  Free, advertising supported application for filling in forms
Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital.  http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
What can Librarians Do? Educate yourself so you can inform the patrons of the library
Software ,[object Object],[object Object],[object Object],UNCHECK
Anonymous web surfing ,[object Object],[object Object],[object Object],[object Object],http://www.anonymizer.com/
Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
P3P Platform for Privacy Preferences ,[object Object],[object Object],[object Object],http://www.w3.org/P3P/
P3P Tool Privacy Bird  automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
Non-secure site
Secure site
Cookies are optional ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookie Rejection  Default Preferred
Check the cookie jar http://www.karenware.com/powertools/ptcookie.html
Manage the Cookie Jar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
Cookie Cop Plus http://www.pcmag.com/print_article/0,3048,a=7719,00.asp
What to do about spam ,[object Object],[object Object],[object Object],[object Object],[object Object]
What  NOT  to do about spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Avoiding web spambots ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address]
Pop-Up Delete Pop-Up and Pop-Under windows that don’t have a close box can only be removed by using < A l t >  -  < F 4 >
Specialized Privacy Probes Disable JAVA Script In  E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
Firewall Tiny Personal Firewall 2.0 http://www.tinysoftware.com/
Firewall http://www.agnitum.com/products/outpost/ Open Architecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
Spyware Firewall http://www.zonealarm.com/ Check both INCOMING and OUTGOING requests
Anti-Spyware http://www.lavasoft.de/
Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
PC Cleaner http://www.bmesite.com/ Internet Sweeper
Where is the source? http://www.neoworx.com/products/ntx/default.asp
Provide accurate  personal information  ONLY  if appropriate for the services requested. Would you give personal  information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
How to protect your privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion: Remember, the Internet is a public network If you are connected, protect yourself
ANY QUESTIONS? ,[object Object]

More Related Content

What's hot

[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
CODE BLUE
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
Art Bowker
 
Childpornographybill
ChildpornographybillChildpornographybill
Childpornographybill
kikanovais
 

What's hot (20)

Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
[CB20] Keynote1:Reforming cybercrime legislations to support vulnerability re...
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
Childpornographybill
ChildpornographybillChildpornographybill
Childpornographybill
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 

Viewers also liked

Social problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_healthSocial problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_health
University of Dayton
 
Nanjing Roadside Memorial Presentation
Nanjing Roadside Memorial PresentationNanjing Roadside Memorial Presentation
Nanjing Roadside Memorial Presentation
University of Dayton
 

Viewers also liked (17)

Twitter Talk 2009
Twitter Talk 2009Twitter Talk 2009
Twitter Talk 2009
 
Revised Twitter Talk 2009
Revised Twitter Talk 2009Revised Twitter Talk 2009
Revised Twitter Talk 2009
 
Social problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_healthSocial problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_health
 
Roadside memorial powerpointv6
Roadside memorial powerpointv6Roadside memorial powerpointv6
Roadside memorial powerpointv6
 
Roadside Memorial Powerpointv4
Roadside Memorial Powerpointv4Roadside Memorial Powerpointv4
Roadside Memorial Powerpointv4
 
Revised Twitter Talk 2009
Revised Twitter Talk 2009Revised Twitter Talk 2009
Revised Twitter Talk 2009
 
Nust presentation
Nust presentationNust presentation
Nust presentation
 
Crim methods2
Crim methods2Crim methods2
Crim methods2
 
Twitter tweet presentation_2011
Twitter tweet presentation_2011Twitter tweet presentation_2011
Twitter tweet presentation_2011
 
Hardest Hatev2
Hardest Hatev2Hardest Hatev2
Hardest Hatev2
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
Jd Powerpointsv1
Jd Powerpointsv1Jd Powerpointsv1
Jd Powerpointsv1
 
Nanjing Roadside Memorial Presentation
Nanjing Roadside Memorial PresentationNanjing Roadside Memorial Presentation
Nanjing Roadside Memorial Presentation
 
An Introduction To Hate Crime
An Introduction To Hate CrimeAn Introduction To Hate Crime
An Introduction To Hate Crime
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Community Presentation
Community PresentationCommunity Presentation
Community Presentation
 
Types of communities
Types of communitiesTypes of communities
Types of communities
 

Similar to OLC Presentation Jipson

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
anitramcroberts
 

Similar to OLC Presentation Jipson (20)

Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
trial
trialtrial
trial
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

OLC Presentation Jipson

  • 1. Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
  • 2. Internet Information Concerns Privacy Security Bandwidth Content Public Access Commercialization
  • 3. Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
  • 5.
  • 6. “ You have zero privacy [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
  • 7. Public Interest In Protecting Individual Privacy
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations. Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more. Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is &quot;relevant&quot; to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation. This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
  • 15.
  • 16.
  • 17.
  • 18. Have you been spammed?
  • 19. Have you been spammed? Junk mail … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
  • 20.
  • 21. Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
  • 22. Spam mail – printer toner # From Date Subject 1 [email_address] 20-JUN-1999 copier & laser printer supplies 2 cc123@boardermail.com 27-JUN-1999 copier & laser printer supplies 3 hunt25@boardermail.com 12-JUL-1999 copier & laser printer supplies 4 art123@ureach.com 23-AUG-1999 laser printer toner advertisement 5 art1234@ureach.com 30-AUG-1999 laser printer toner advertisement 6 art1234@ureach.com 30-AUG-1999 laser printer toner advertisement 7 art123@techpointer.com 26-SEP-1999 laser printer toner advertisement 8 art222@techpointer.com 3-OCT-1999 laser printer toner advertisement 9 art1235@visto.com 19-OCT-1999 laser printer toner advertisement 10 art1235@visto.com 19-OCT-1999 laser printer toner advertisement 11 art123@visto.com 20-OCT-1999 laser printer toner advertisement 12 [email_address] 27-NOV-1999 laser printer toner advertisement 13 [email_address] 27-NOV-1999 laser printer toner advertisement 14 bmark@atlantaoffice. com 28-NOV-1999 laser printer toner advertisement 15 bmark@guestbooks.net 13-DEC-1999 laser printer toner advertisement 16 bmark@crosswinds.net 28-FEB-2000 laser printer toner advertisement 17 bmark1@crosswinds.net 28-FEB-2000 laser printer toner advertisement 18 bps@buffymail.com 28-MAR-2000 laser printer toner cartridges 19 r2d2@ureach.com 28-MAR-2000 laser printer toner advertisement 20 bps@buffymail.com 20-JUN-2000 laser printer toner cartridges
  • 23. Spam Case study: One person, six years
  • 24.
  • 25. Spyware More than 800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
  • 26. Web Browsers Every time you visit a site on the Internet you provide information about yourself.
  • 27.
  • 28. Web Bugs Do you see the web bug?
  • 29.
  • 30.
  • 31.
  • 32. Advertisement Competition A browser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners Free, advertising supported application for filling in forms
  • 33. Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital. http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
  • 34. What can Librarians Do? Educate yourself so you can inform the patrons of the library
  • 35.
  • 36.
  • 37. Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
  • 38.
  • 39. P3P Tool Privacy Bird automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
  • 42.
  • 43. Cookie Rejection Default Preferred
  • 44. Check the cookie jar http://www.karenware.com/powertools/ptcookie.html
  • 45. Manage the Cookie Jar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
  • 46. Cookie Cop Plus http://www.pcmag.com/print_article/0,3048,a=7719,00.asp
  • 47.
  • 48.
  • 49.
  • 50. Pop-Up Delete Pop-Up and Pop-Under windows that don’t have a close box can only be removed by using < A l t > - < F 4 >
  • 51. Specialized Privacy Probes Disable JAVA Script In E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
  • 52. Firewall Tiny Personal Firewall 2.0 http://www.tinysoftware.com/
  • 53. Firewall http://www.agnitum.com/products/outpost/ Open Architecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
  • 54. Spyware Firewall http://www.zonealarm.com/ Check both INCOMING and OUTGOING requests
  • 56. Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
  • 58. Where is the source? http://www.neoworx.com/products/ntx/default.asp
  • 59. Provide accurate personal information ONLY if appropriate for the services requested. Would you give personal information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
  • 60.
  • 61. Conclusion: Remember, the Internet is a public network If you are connected, protect yourself
  • 62.