Tech Topic Privacy


Published on

Published in: Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • SOURCE: /
  • Picture: Case and point is that Michael McConnell, Director of National Intelligence, is "leading the way for the US government to have unfettered warrant-less access to citizen's search histories, emails, and other online activities. As Ryan Singel, the author of a recent article in Wired, reported that "the NSA was able to devise legislation by the strong-armed passage of the Protect America Act which was an amendment to FISA (Foreign Intelligence Surveillance Act). " As Singel puts it, "This legislation single-handedly allowed for the NSA to turn GMail servers and AT&T switches into de-facto arms of the surveillance industrial complex without any court oversight." There are obvious reasons on why citizens should be concerned over this type of warrant-less access to personal, private information.
  • Tech Topic Privacy

    1. 1. Tech Topic: Privacy By: David Chait, Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki
    2. 2. What is Computer Privacy? <ul><ul><li>The ability to control what information one reveals about oneself, and to control who can access that information. </li></ul></ul>
    3. 3. Summary <ul><li>History and cases of privacy </li></ul><ul><li>Current legislation </li></ul><ul><li>Future potential concerns and threats </li></ul><ul><li>Tips on how to protect yourself </li></ul>
    4. 4. DIGITAL U: A Loss of Privacy? VIDEO
    5. 5. Whose privacy is at risk?
    6. 6. Everyone Is At Risk <ul><li>Applicants </li></ul><ul><li>Students </li></ul><ul><li>Individuals Engaged with Large Firms </li></ul><ul><li>The Unsuspecting Public </li></ul>
    7. 7. Applicants <ul><li>Harvard’s student database was hacked exposing over 10,000 applicants from 2007 </li></ul><ul><li>This information was placed on Bittorrent </li></ul>
    8. 8. Students <ul><li>Our information has been made widely available within our own institutions, and at times is vulnerable to loss. </li></ul><ul><li>University of Texas at Austin – McCombs School of Business was compromised on April 24, 2006 placing 197,000 people at risk </li></ul><ul><li>In May of 2006, the Texas Student Loan Corporation lost the records of 1.7 million borrowers. </li></ul>
    9. 9. Individuals Engaged with Large Firms <ul><li>Stanford suffers a theft of 72,000 records relating to employees hired prior to September of 2007. </li></ul><ul><li>Ernst and Young loses a laptop containing thousands of IBM employee Records </li></ul><ul><li>On May 22,2006 The Department of Veterans Affairs reports the theft of 28,600,000 records (All vets discharged between 1975 and 2006). </li></ul><ul><ul><li>The information was stolen from an employee’s home computer </li></ul></ul><ul><ul><li>A federal Judge has ordered restitution over 20 million dollars due to this attack </li></ul></ul>
    10. 10. The Unsuspecting Public <ul><li>Data Aggregation - The warehousing, repackaging, and resale of information about us. </li></ul><ul><li>ChoicePoint loses information about 145,000 individuals with which it has no business relationship. </li></ul>
    11. 11. Legislation & Beyond
    12. 12. Key Legislation <ul><ul><li>Patriot Act </li></ul></ul><ul><ul><li>Foreign Intelligence Surveillance Act (FISA) </li></ul></ul><ul><ul><li>Real ID Act - The Creation of a National ID Card.  </li></ul></ul>
    13. 13. Surveillance Technology     <ul><ul><li>ECHELON  </li></ul></ul><ul><ul><ul><li>Used by the United States National Security Agency (NSA) to intercept and process international communications through satellites </li></ul></ul></ul><ul><ul><ul><li>System is able to intercept messages over the internet messages over the internet </li></ul></ul></ul><ul><ul><ul><li>System can also use orbiting satellites to monitor signals anywhere on the earth’s surface </li></ul></ul></ul><ul><ul><ul><li>MAIN PURPOSE: to extract information and intelligence illicitly from millions of messages every day, across the globe </li></ul></ul></ul><ul><ul><ul><li>NSA and allies have worked to limit/prevent privacy of international telecommunications </li></ul></ul></ul><ul><ul><ul><li>The Echelon system has abilities to eavesdrop on everyday communications and to watch everything that is being said and done in the world </li></ul></ul></ul>
    14. 14. Advertising Technologies <ul><li>Technologies </li></ul><ul><ul><li>Cookies </li></ul></ul><ul><ul><li>Pixels </li></ul></ul><ul><ul><li>Web Bugs </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><li>Implications </li></ul><ul><ul><li>Building Profiles of everyone.  </li></ul></ul><ul><ul><li>Understanding everyone's interests. </li></ul></ul><ul><ul><li>Tracking your movement all around the web.   </li></ul></ul><ul><ul><li>Overall...knowing what you do, when you do it, what you like, who you know, and what your opinion is on certain topics is very sensitive information.  </li></ul></ul>
    15. 15. Privacy / Civil Liberty Organizations <ul><ul><li>Electronic Frontier Foundation ( </li></ul></ul><ul><ul><li>American Civil Liberties Union (ACLU) </li></ul></ul><ul><ul><li>Electronic Privacy Information Center (EPIC) </li></ul></ul><ul><ul><li>Privacy Coalition   </li></ul></ul><ul><li>  </li></ul><ul><li>Advice: Be aware of the services you use and the data you provide to each of them. Be informed of the latest privacy battles happening in the media and understand that everything you do online is archived forever!  </li></ul>
    16. 16. Potential Concerns and Threats
    17. 17. Threats : Spam <ul><li>Abuse of electronic messaging systems to send unsolicited messages constantly </li></ul><ul><li>Mostly found in your emails </li></ul>
    18. 18. Spyware <ul><li>A type of malware that is installed on computers and collects little bits of information at the time about users without their knowledge </li></ul>
    19. 19. Malware <ul><li>Software designed to infiltrate a computer system without the owner’s informed consent </li></ul><ul><li>It includes worms, trojans, and rootkits </li></ul><ul><li>Make sure you computer has protection </li></ul>
    20. 20. Hackers <ul><li>A person who breaks into computers usually by gaining access to administrative controls </li></ul><ul><li>Beware, they are out there </li></ul>
    21. 21. Identity Theft <ul><li>Fraud that involves someone pretending to be someone else in order to steal money or get other benefits. </li></ul><ul><li>Anytime you put your credit card number or any other personal information out on the web, its capable of being stolen. </li></ul>
    22. 22. Phishing
    23. 23. Phishing Scams VIDEO
    24. 24. Certain ways your privacy is viewed <ul><li>Cookies, which has been around for awhile. </li></ul><ul><li>Facebook, Twitter, and Myspace are websites where people in our society today post personal information about themselves, which can be viewed by anyone including employers. </li></ul>
    25. 25. Tips on How to Protect Yourself
    26. 26. Software <ul><li>Anti-virus (AVG) </li></ul><ul><li>Anti-spyware (Lavasoft Ad-aware) </li></ul><ul><li>Firewall (ZoneAlarm) </li></ul><ul><li>P2P (PeerBlock) </li></ul><ul><li> </li></ul>
    27. 27. The Browser <ul><li>Security/Privacy Add-ons (Cookie Management) </li></ul><ul><li>Website Security </li></ul><ul><ul><li>HTTPS and Padlock </li></ul></ul><ul><ul><li>Privacy Policies </li></ul></ul><ul><ul><li>Privacy Seals (TRUSTe) </li></ul></ul>
    28. 28. Protecting your E-mail <ul><li>Use different e-mails for different web activities. </li></ul><ul><li>Free webmail services (Hushmail, Mailvault, S-mail) </li></ul><ul><li>Pretty Good Privacy (PGP) </li></ul>
    29. 29. Browsing the Internet <ul><li>TOR, The Onion Router, Sponsored by the Electronics Frontier Foundation. </li></ul><ul><li>Anonymizer browsing services </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>Yahoo – 90 Days </li></ul><ul><li>Google – 9 Months </li></ul><ul><li>Microsoft – 18 Months </li></ul>
    30. 30. Summary <ul><li>History and cases of privacy </li></ul><ul><li>Current legislation </li></ul><ul><li>Future potential concerns and threats </li></ul><ul><li>Tips on how to protect yourself </li></ul>
    31. 31. VIDEO
    32. 32. WORKS CITED LIST <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>