20
Troy Lukkarila Elizabeth Perkins Charles Disalvo Chris Metcalfe Joshua Yount Jon Cobb

Troy Lukkarila Elizabeth Perkins Charles Disalvo Chris Metcalfe Joshua Yount Jon Cobb

Embed Size (px)

DESCRIPTION

Troy Lukkarila Elizabeth Perkins Charles Disalvo Chris Metcalfe Joshua Yount Jon Cobb. A Brief Tour of the Privacy Wiki. Where does your personal information go??? Malware Facebook Google Pharmacy Amazon. At the Pharmacy. - PowerPoint PPT Presentation

Citation preview

Page 1: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Troy LukkarilaElizabeth PerkinsCharles DisalvoChris MetcalfeJoshua Yount

Jon Cobb

Page 2: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

A Brief Tour of the Privacy Wiki

• Where does your personal information go???– Malware– Facebook– Google– Pharmacy– Amazon

Page 3: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

At the Pharmacy

• In 2003, a loophole was introduced by the Bush administration to HIPAA that allows patient information to be shared with “business associates” as long as said business associates fit under the thinly defined category of “patient care.”

Page 4: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

At the Pharmacy

• Privacy advocates claim that even with a patient’s personal identifying information removed from a record, cross matching data with public and private data sources can re-identify a patient.

Page 5: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

At the Pharmacy

• Pharmacies transfer your information to other pharmacies without your consent.

Page 6: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Malwareprogramming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. (Wikipedia)

2008 Report by Symantec:

Malware > Legitimate Software

Page 7: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Gator Software

• Controversial Software• Send personal information

to servers• Serve up Ads based on

visited web pages (current, past)

• Pop Ups, Pop Unders• Downloads updates

secretly• Sued websites for libel

Page 8: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

ICPP Foundation

• Extortion Trojan• No ties to RIAA/MPAA• Scans your hard drive• Offers settlement

Page 9: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Mac Shield

Malware for Mac!• Looks like anti virus• Fake Software• Hardcore Pornography• Security through Obscurity• Similar to Mac Guard, Mac

Defender• 5-step removal

Page 10: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

“Hackerville”• Râmnicu Vâlcea, Romainia• 1989 Revolution• Streets are now lined with

BMW’s and Mercedes• Apartment Buildings, Shopping

Centers, Night Clubs• $3-million dollar heist, 2010• 90 arrests, $20-mil eBay & CL

Page 11: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Facebook

• What does Facebook mean by “Everyone” ???• Connecting to applications and websites

through Facebook• Facebook and Advertisements• Social Security Number Exposure

Page 12: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

What is Google???

• Google started as a research project for Larry Page and Sergey Brin in 1996

• Generated $29.321 billion in revenue in 2010• Services include the following and then some:– Email Client (Gmail)– Mobile Phone Platform (Android)– Social Networking (Google+)

Page 13: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Critics of Google

• Not everyone is happy with Google and its business practices

• There are several watch-dog groups that keep an eye on Google and their privacy policies.– Privacy International (

https://www.privacyinternational.org)– Google Watch (http://google-watch.org)

Page 14: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy and Google

• Almost every service Google provides has potential to lead to privacy disasters

• Google can send you email to the government upon request

• You could inadvertently tell your parents about that party you had last night with Google+

Page 15: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy and Google

• You and your house could be on Google Street View (which was banned in Germany) without your knowledge

• I wonder what is going on here…• http://mashable.com/2007/05/31/top-15-goo

gle-street-view-sightings/#192472-Crime-in-Progress

Page 16: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy and Amazon

• Amazon collects every single piece of data your enter into their websites– Name– Address– Credit Card Number– Social Security Number

Page 17: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy and Amazon

• Amazon does not control information given to third party vendors

• Nor do they control any of your personal information given to shipping organizations that deliver your purchases.

Page 18: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy and Amazon

• Amazon compares your information for “accuracy” with affiliated businesses, such as Target.

• Personal information is also exchanged with companies and organizations for fraud protection and credit risk reduction.

Page 19: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

Privacy in the Future

• Commercial Privacy Bill or Rights Act of 2011– Senator John Kerry– Senator John McCain

• First legislation to attempt to distinguish between reasonable use of personal data and unreasonable invasions of privacy.

Page 20: Troy  Lukkarila Elizabeth Perkins Charles  Disalvo Chris Metcalfe Joshua  Yount Jon Cobb

To ask a question, please fill out the following form…

• Name* _____________• Address* _____________• Phone* _____________• DOB* _____________• SSN* _____________• Blood Type* _____________• Shoe Size* _____________