25
Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook Article by Simon Garfinkel Presentation by Adam Miller

Article by Simon Garfinkel Presentation by Adam Miller

Embed Size (px)

Citation preview

Privacy Requires Security, Not Abstinence: Protecting an

Inalienable Right in the Age of Facebook

Article by Simon GarfinkelPresentation by Adam Miller

The Constitution◦ There are no laws specifically stating the right to

privacy◦ Amendments imply privacy rights

Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively)

The Computer◦ Consumer data banks

Computers made it easier to store vast amounts of personal data (credit agencies)

Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them

Computer (cont.)◦ Govt. developed Code of Fair Information Practice

Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure

The Internet◦ All activity on the Internet is mediated

Companies could use information stored for financial gain

Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”

Life after 9/11◦ Raised the question: Privacy or Security?◦ Total (Terrorist) Information Awareness

Used advances in technology to attempt to catch terrorists before they attack

Congress shut down organization because it treated everyone as a suspect

Facebook◦ When using Facebook applications, the user is

asked to “Allow access?” How much information is being pulled by the app? By agreeing, you are saying you trust the app and

Facebook’s security and privacy controls

Where We Are Now◦ Data theft by insiders can be solved

Paying employees enough Auditing their work Limiting authority Harshly punishing those who abuse employer’s trust

◦ Answering the question of Security or Privacy The problem isn’t that the information is out there,

it’s that it isn’t secure Spending now on better security in systems will

prevent having to spend a lot more when faulty security is breached

The Constitution explicitly states your right to privacy. True or False?

Questions

False•Which of these is NOT a way to prevent data theft by insiders?• A: Having employees keep data on personal

storage devices• B: Auditing employee work• C: Paying them enough• D: Limiting the authority of any one employee

Answer: A

TIDE (Terrorist Identities Datamart Environment

Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US

Exponential Growth (100,000 files in 03; 435,000 now)

A Growing Watch ListBy Shawn McSweeney

Half of triggered names in 04 and 05 were misidentified (10 of thousands in total)

Cat Stevens Story Security Issues

Issues

Roughly how many pieces of data does TIDE currently store? ◦ A. 100,000◦ B. 435,000◦ C. 755,000◦ D. 2.3 Million

A quarter of the triggered watch list names were misidentified.

Questions

“People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.”

The Software WarsBy Stephanie Moore

Common Mistakes in Software Creation◦ “Metaphysical Absence”◦ Unreachable deadlines◦ Shortages of “can-do” attitudes

Why you can’t understand your computer!

Obtain the correct tools Keep it simple Don’t stifle creativity!

Suggestions for Future Software Inventors

Questions1. The nonexistence of abstract thought is known as:a. technical confusinonb. metaphysical absence c. daydreamingd. psychological absence

Answer: B

2. Setting unreachable goals will motivate employees to give their best efforts.True or False?

Answer: False

The Evolution of Cyber Warfare

ByGreg Bruno

Presentation by: Khaing Oo

Cyber Warfare Spring of 2007, Russia Estonian monument was moved by the Red

Army from capital city to the outskirt of town

Bogus Requests-Requests for information from computers around the world

Banks, Media Outlets, and Ministries were hacked

Most publicized hack in recent history

China Most active for hacking computers Washington accused China of hacking into

government computer networks June 2007-Hacked into Pentagon Network Suspected of hacking in Britain, France,

Germany, South Korea, and Taiwan Russian and China both denied the

accusations.

U.S. Cyber Warfare William Arkin, Defense Analyst

◦ “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.”

U.S. has technologies capable of penetrating and jamming enemy networks

Cyber-Warfare Tactics

Request information while masking the location of primary attacker

Use of malware, spyware, and other programs to steal information without user’s knowledge

Cyber attacks aimed at critical infrastructure-less common, but more serious and damaging◦ Nuclear Power Plant Control Systems◦ Banks and Subways

Patching the Hole Until recently, U.S. government did not

emphasize on safety from cyber attacks Difficulty in finding the cyber threat This is getting more serious and more time

demanding U.S. is a big target Cyber attacks on the U.S. economy may be

the worst case U.S. claimed that their systems are secure

and safe

Review Questions What country is mostly blame for cyber

attacks?

TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?

Article by William J. Astore Presentation by Raphael Martinez

Geeks and Hackers, Uncle Sam’s Cyber Force Wants you!

• Full spectrum dominance• Air Force stated goal: gain control and

access to any and all networked computers• Contractor bids: “dominant cyber offensive

engagement”• Headquarters throughout United States• Surveys and propaganda

“Above All vision”

Uncertain technical benefits Inflated prices SPADOC (ugly baby)-updated computer

system Air Force Mission Support System- Pilots

planning missions with latest technology Out dated and Basic Disaster

Ugly Babies and Air Force Computer Systems

Total Dominance isn’t realistic Too Expensive Day late and Billion Dollars short

Loving Big “Cyber” Brother

The goal of the Air Force is to gain control and access to any and all networked computers. T or F?

True Air Force computer systems are relatively

inexpensive and cost-efficient. T or F? False

Questions