+ All Categories
Home > Documents > Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they...

Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they...

Date post: 03-Jan-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
52
Privacy & Cyberspace II By: Marcus Everson Forrest Falk Anthony Fammartino Christopher Furseth Rudy Garcia Leonard Gomez
Transcript
Page 1: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Privacy & Cyberspace IIBy:

Marcus Everson Forrest FalkAnthony FammartinoChristopher FursethRudy GarciaLeonard Gomez

Page 2: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Table of Contents

● Google Subpoena● Privacy Enhancing Technologies (PETs)● Data Mining & Privacy● Privacy Legislation● Public Webcams● Computers in Cars

Page 3: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Google Subpoena

Page 4: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● In January 2006, the US government asked to review users’ search records from major web search engines○ Part of Justice Department’s case for tougher anti-

pornography laws○ Current laws blocked on grounds of violating free

speech○ Justice Department wanted to show web-filtering

software did not protect children from obscene material

Page 5: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Request for users’ search information by law enforcement routine○ Can detect suspicious search patterns○ Gathers evidence for prosecution○ Limited to specific individuals who are already

under investigation● Justice Department Subpoena includes all

users and all information

Page 6: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Google refuses to comply○ Cites user privacy, trade secrets○ Earns support from civil liberties groups for

protecting users’ privacy○ Raises questions about just what kind of

information search engines retain

Page 7: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Search engines store cookies on users’ computers○ Cookies store information on users’ browsing

habits and what sites they like○ Returns better search results and targets

advertising○ Google’s cookies do not expire until 2036

Page 8: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Search engines with e-mail services store personal information○ Conducting searches while signed in allows search

engines to store your search preferences and search habits

● Buying services from search engines allows them to store your credit card information○ Can be used to discover your personal information

Page 9: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Search engine data could be used for criminal purposes○ Identity theft○ Spam

■ Spam with embedded malware and viruses■ Phishing

● Search data could harm real world reputation○ A separate user of your IP address could search for

suspicious or disreputable material

Page 10: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Possible ways to protect your personal data during web searches○ Delete cookies○ Clear Internet files○ Use a browser’s private browsing settings○ Use proxy servers for anonymous browsing

■ Proxy servers hide your IP address■ Slow surfing speeds■ Some web pages block anonymous browsing

Page 11: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Privacy Enhancing Technologies (PETs)

Anthony Fammartino

Page 12: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

What are PETs?Technical and organizational concepts that aim at protecting personal identities.[9]

Technical concepts■ Online tools■ Specific programs

Organizational concepts■ Industry standard ideas■ Government regulation

Page 13: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

What do PETs accomplish?Secure Data (Technical)

■ Personal Information● Medical records● Name or Email● Address or phone number

■ Search history and web browsing● Saved search history● Site access

Standardize Privacy Protection(Organizational)

■ Online Vendor's Privacy Policies● Backed by trusted third-parties

Page 14: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Organizational■ Privacy Seals

● TRUSTe○ CommerceNet

Consortium[8]

● WebTrust○ Online Privacy

Alliance[8]

■ Web Features● Platform for

Privacy Protection (P3P)

ExamplesTechnical

■ Anonymizer● Anonymizer Universal

■ Encryption Tools● Symantec's PGP

■ Opt-out Technologies● Do Not Track

Page 15: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

AnalyzationAnonymizers

■ Concealment of Identities

Online Vendors■ Privacy Policy■ Government Regulations

● Online Entrepreneur

Cloud Databases■ To trust or not to trust

Page 16: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Data Mining & PrivacyMarcus Everson

Page 17: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

What is data mining?

Generally - The process of analyzing data from different perspectives and summarizing it into useful information. Information that can be used to cut costs or increase revenue.

Technically - data mining is the process of finding correlations or patterns among fields in large relational databases.

Page 18: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

How It Works...

Data mining software analyzes relationships and patterns in stored transaction data based on open-ended user queries.

Generally, four types of relationshipsClasses - Uses stored data to locate data in predetermined groups Ex. Restaurant stores data about when and what customers eat.

Clusters - data items are grouped according to logical relationships Ex. Used to identify market segments

Page 19: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Associations - data can be mined to identify associations between multiple products Ex. Stores will place products next to each other, that are most likely bought together

Sequential Patterns - data is used to anticipate behavior patterns and trendsEx. Used to anticipate the sale of one product based on the purchase of other products

5 Major Elements- extract, transform, and load data onto the data warehouse system

- store and manage the data in a multidimensional database system

- provide data access to analysts and professionals

- analyze the data by application software

- present the data in a useful format such as a graph or table

Page 20: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Who Uses it? - Companies that have a strong consumer focus

Retail, Financial, Communication, and Marketing organizations

Data Mining Software

Oracle Data Miner 11g ARMiner

SQL Server DataDetective

Tiberious GhostMiner

CART ... and many more

Page 21: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

...And Privacy

Sears Case: Sears ran an online feature (My SHC) that invited consumers to

download software onto their pc that according to the FTC "asked asked them to journal their shopping and purchasing behaviour." The program ran continuously and collected personal information such as: details about bank accounts, medical prescriptions, emails, and instant messages.

The FTC declared Sears' practice to be "deceptive" and ordered the data be destroyed

Data Mining typically gathers large amounts of personal information so that companies can market better and the biggest problem is keeping such sensitive information secure.

Page 22: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

LexisNexis Case:

In 2005, a LexisNexis integration team spotted irregularities with users accounts.

An investigation revealed that unauthorized persons used IDs and passwords of actual customers, and had access to social security numbers, and drivers license numbers.

They reviewed and analyzed search activity across their own database from the previous 27 months.

They discovered additional incidents where there was a chance that unauthorized persons had access to personal identifying information of at least 208,000 individuals.

Page 23: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Privacy LegislationLeonard Gomez

Page 24: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Digital privacy rules taking shape

● The Federal Trade Commission (FTC) announced that they were going to enact new online privacy legislation.

● They said that creating all new laws would "level the playing field" between companies that already have privacy policies and those that lacked them.

● They say right now, there is not much of a way to deal with companies that do not have a written privacy policy. And even when companies do lie or go against their own rules, it is very hard to do anything about it.

● The FTC says that creating new laws on privacy and giving them the right to enforce the laws with civil penalties, would promote internet commerce by improving the trust Americans put in online transactions

Page 25: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● The FTC wrote a 73 page report on the issue hoping that many companies would change themselves under the suggested regulations, but they threatened to make laws if no one would change voluntarily

● One of the things the FTC wanted to see happen was a "do not track" button on web browsers by the end of the year. Companies could not agree with what "do not track" meant and as of right now the best the FTC has accomplished is a "do not target" button that would get rid of targeted ads, but would not stop data from being collected. This would be implemented by about 400 companies

● For the first time the FTC also went after offline data brokers who sell and buy personal information like addresses and names.

● The FTC wanted them to create a central website where all of the information would be hosted so consumers could edit their information and see what has been collected about them.

● data brokers have refused so far because they say it would be much too expensive and that the information they deal with is not hurting anyone

Page 26: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Mobile privacy legislation

● A new bill in the US congress would require any app developer, mobile phone manufacturer, and network provider to let all customers know about any monitoring software installed on their devices.

● The mobile device privacy act, introduced by representative Ed Markey, would also make it so that they would need the customer to agree to let them monitor their device and collect data.

● The goal of this legislation is to make app developers and others who collect data on customers, to be more transparent with how and what they monitor and what they do with that information.

Page 27: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● The legislation would require companies that collect personal information through mobile devices to put policies in place that would keep data safe.

● It would also allow the FTC, Federal Communications Commission, and state attorneys to take action against mobile companies that do not follow their own policies, lie, or violate regulations.

● Customers would also be able to then file lawsuits against companies that have violated their privacy.

● Something that this is a step in the right direction but may not solve anything yet, because it might not even pass

Page 28: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Some say that we should take a light approach when regulating app developers and that regulations should not be too heavy.

● The app development industry has gone from almost nothing 4 years ago to over US$20 billion today

● Many of them need this data to expand and grow and if we regulate it to much, it could hurt the industry and its growth.

Page 29: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Search warrants needed for email and cell tracking

● There is new privacy legislation that would require the police to get warrants to check through Ameircans emails and to track thier cell phones.

● It is a big point of conflict for law enforcment and companies like Google and Amazon.com

Page 30: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Companies Backing it● Google

● Amazon.com

● Apple

● AT&T

● eBay

● Intel

● Microsoft

● Twitter

Page 31: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Law Enforcement officials say that this legislation would cause them many problems and hurt investigations.

● It would hinder their ability to quickly gather information in serious crimes and it would take longer for them to act on anything.

● Tougher standards for location data would make it harder for the government to gather information when they need to.

● Groups that are for it says that although it might slow some investigations down a bit and takes away some of their power when it comes to gathering information quickly, it would be for the best

● It would keep them from going overboard on surveillance

● Updating the laws would help deal with changing technology, old laws were not meant to deal with issues like "the cloud" and were writen with floppy drives in mind.

Page 32: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Public WebcamsForrest Falk

Page 33: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

WebcamsWhat is a Webcam?● A video camera which feeds its real time images into a computer

or computer network. ● These images can then be processed onto a website as a video

feed or still images.

Uses● Recording Social Videos● Security Surveillance ● Computer Vision● Video Broadcasting● Streaming over the World Wide Web

Page 34: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Public Webcams Examples

University of Oregon - Microservices Front Desk

Route 202 Buenos Aire

Sniff Dog HotelPortland, Oregon

Case Western Reserve University

Page 35: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Webcam Policy● Webcams broadcasting still or streaming images via the internet

are valuable tools in CERN's education and outreach efforts.

Concern of Privacy ○ Members of the CERN community ○ Other individuals captured by the webcam○ The reputation of the CERN organization

CERN Computer Security

Page 36: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

1. Visible signs stating the use of recording equipment

2. Broadcast to employees who work in the area

3. "On Air" indicator

4. "Blind Spots" to work in

5. Privacy shall be respected to the maximum extent

6. Presenters must sign CERN Speaker's Release

7. No intrusive recordings

8. Recording personal e-mail or internet use is prohibited

CERN Webcam Regulations

Page 37: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

They want to share...● Daily operations● up-to-date information● Enhance communication with colleagues● Open up the global scientific community

Without● Leaking any important project information● Supervising its members' activities● The use for security purposes● Disturbing the privacy of the organization or its members

CERN Webcam Regulations

Page 38: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Robbins v. Lower Merion School District

Background● Philadelphia, Pennsylvania ● Lower Merion School District issued 2,306 Apple MacBooks ● Installed anti-theft software "TheftTrack"● Track down stolen/lost computers● Takes a picture every 15 minutes and records application

history.

Page 39: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Robbins v. Lower Merion School District"WebcamGate" Scandal

● Schools secretly spied on students while in the privacy of their own homes.

● November 11, 2009, Blake Robbins was punished for his behavior at his home.

● The "evidence" used a picture taken of the student in his room.

Conclusion● October 2010, agreed to pay $610,000 to settle the lawsuit● The computers snapped over 66,000 photos● Photos contained photos of students sleeping, partially

dressed, and their parents.● School district never obtained the consent from the students

or parents.

Page 40: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● Webcams are great for communicating ideas, sharing experiences, or gathering information from a distance.

● The ethical problem comes when people misuse this technology to supervise or track people. This can lead to a violation of that individual's privacy and personal information.

● Usually, these individuals do not know that they are even being watched.

Public Webcam Conclusion

Page 41: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Computers in CarsChristopher Furseth

Page 42: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

GPS ● Global Positional System

○ Uses satellites to determine location

● Police use to track position○ Didn't need warrant in past

Page 43: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Black Box ● Also known as an Event Data Collector in cars● Been being used in cars as early as 1994

○ GM first used it to monitor airbag deployment● Records Pre-crash Data

○ Was the seat belt used?○ Speed○ Brakes

● Section 31406 of Senate Bill 1813○ Starting in 2015 mandatory in new vehicles

● Insurance firm fights against claim

Page 44: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

OnStar - What it is● Formed in 1995 by General Motors

● Services○ 24-hour Helpline ○ Remote Diagnostics○ Turn-by-Turn Navigation○ Security○ Hands Free Calling

Page 45: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

OnStar - Privacy● OnStar uses a 2 way system with their technology

○ Tracks driving data ■ Locations, Driving Habits, etc.

● OnStar withholds the right to sell this information ● After contract termination OnStar keeps compiling

this data

Page 46: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Hacking

● Repo companies remotely shut off cars

● Security Risks?

● 100 cars turned off/hacked○ Who has access to controls?

● UofC Research 2011○ Security Risks○ ECU leaves vehicle vulnerable

Page 47: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do
Page 48: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Discussion Questions

●●

Page 49: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

Thinking Questions● How much and what information should the government obtain from

the computers located in vehicles? Should companies have the rights to sell your information on things such as driving habits?

● What information should people be allowed to gather from public webcams? (traffic numbers, facial recognition, license plates) Are there cases where these should be allowed?

● Should strict regulations be put on companies that collect user data? Is it ok for them to monitor you without you knowing? and how far can they go with what they do with that information? Should you have a say in it?

Page 50: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● http://www.npr.org/templates/story/story.php?storyId=5165854

● http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm

● http://www.the-data-mine.com/Software/DataMiningSoftware

● http://www.time.com/time/nation/article/0,8599,2059237,00.html

● http://www.ethicapublishing.com/ethical/3CH16.pdf

● http://abovethelaw.com/2009/06/lexisnexis-privacy-breach/

● http://www.lexisnexis.com/presscenter/SanfordTestimonyJudiciary.pdf

● [8]http://www.uschamber.com/issues/technology/online-privacy-seal-programs

● [9]http://delivery.acm.org.ezproxy1.lib.asu.edu/10.1145/580000/572278/p6-tavani.pdf?ip=129.219.247.33&acc=ACTIVE%20SERVICE&CFID=121709361&CFTOKEN=18196419&__acm__=1349048518_66b63845a522816a5d1c834202621082

References

Page 51: Privacy & Cyberspace II...Cookies store information on users’ browsing habits and what sites they like Returns better search results and targets advertising Google’s cookies do

● http://content.usatoday.com/communities/ondeadline/post/2010/02/school-district-accused-of-issuing-webcam-laptops-to-spy-on-students/1#.UGlAnU3A-vY

● http://articles.philly.com/2010-07-28/news/24972175_1_webcam-monitoring-system-culinary-school

● http://lmsd.org/documents/news/100503_l3_report.pdf

● https://security.web.cern.ch/security/rules/en/webcams.shtml

● http://www.opentopia.com/hiddencam.php

● http://www.startribune.com/business/130539798.html?refer=y

● http://www.atlanta-insurance-claims-resource.com/car-black-box.html

● http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars/

● http://content.usatoday.com/communities/driveon/post/2011/01/car-theives-can-eaisly-hack-remote-keyless-systems-swiss-research-discovers/1#.UGiYJlGSWu8

● esearchers at the University of California

References


Recommended