300 likes | 493 Views
ATL135:001-F99. SETH MELLOTTELLEN VIRGOBRANDON ROHRBAUGHDEANNA LEEALLISON MIRIANISARAH LESNOFF. THE INTERNET THREATENS THE RIGHT TO PRIVACY. IS YOUR E-MAIL PRIVATE?. NO
E N D
1. CHAPTER 4 HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?
2. ATL135:001-F99 SETH MELLOTT
ELLEN VIRGO
BRANDON ROHRBAUGH
DEANNA LEE
ALLISON MIRIANI
SARAH LESNOFF
3. THE INTERNET THREATENS THE RIGHT TO PRIVACY
4. IS YOUR E-MAIL PRIVATE? NO…..E-MAIL IS RELAYED THROUGH NUMEROUS TRANSFER POINTS WHICH MAKES THEM EASILY INTERCEPTED BY HACKERS.
5. “SNIFFER” PROGRAMS HACKERS SOMETIMES USE THESE PROGRAMS THAT SEARCH THE NET TO LOOK FOR CODES AND CHARACTERS DURING LOG ON.
THESE ALSO CAPTURE SCREEN NAMES, PASSWORDS, AND CREDIT CARD INFORMATION.
6. LEAVING A TRAIL….. AN ELECTRONIC TRAIL IS LEFT EVERYTIME ONE SURFS THE INTERNET.
THE TRAIL LEAVES INFORMATION SUCH AS WHERE YOU VISITED, FOR HOW LONG AND WHAT YOU VIEWED.
THIS IS HOW PEOPLE RECEIVE JUNK E-MAIL.
7. INTERNET PROBLEMS. INTERNET BREAK-INS
THE KEVIN MITNICK CASE
LEGAL EFFORTS BY CORPORATIONS. WHAT IS UNDER ATTACK?
CREDIT CARD NUMBERS
PASSWORDS
MEDICAL/HEALTH RECORDS.
8. THE INTERNET’S INVASION OF PRIVACY IS EXAGERATED!
9. PRIVACY ISSUES “Of course, the website owner knows what you’re doing while you’re there. What place other than your own home, can you go where it will allow you full anonymity?”
Joseph Burns
10. PLEASE ENTER YOUR CREDIT CARD NUMBER:
11. HERE’S YOUR COOKIE…BUT YOU CAN’T EAT IT!!!!! A COMPUTER “COOKIE” IS A FILE THAT SOME SERVERS PUT ON YOUR COMPUTER UPON ENTRY TO A SITE.
THIS CAN COUNT HOW MANY TIMES “YOU” COME TO THE SITE.
12. CENSORING VIOLATES FREE SPEECH
AMERICAN’S CIVIL LIBERTIES UNION (ACLU) - AN ORGANIZATION DEDICATED TO PROTECTING THE RIGHTS GUARANTEED BY THE US CONSTITUTION.
FEDERAL COMMUNICATIONS DECENCY ACT (CDA) - WANTS BLOCKAGE OF INTERNET SITES.
THE ACLU ARGUES THAT FREE SPEECH IS THREATENED BY SOFTWARE PROGRAMS THAT WOULD RATE OR BLOCK CONTROVERSIAL MATERIAL.
13. IS CYBER SPACE BURNING? THE WHITE HOUSE IS ENCOURAGING USERS TO VOLUNTARILY RATE THEIR SPEECHES.
INDUSTRY LEADERS ARE BEING ASKED TO DEVELOP WAYS TO BLOCK “INAPPROPRIATE” SPEECH.
14. A HOMOGENIZED INTERNET
PEOPLE WHO MAKE THEIR OWN PAGES OR POST CONTROVERSIAL NEWS GROUPS WILL BE FILTERED.
RENO VS. ACLU WAS THE FIRST CENSORSHIP CASE.
CONTROVERSIAL SPEECH WILL BE CENSORED.
15. THE THIRD PARTY RATING
AN INDEPENDENT PARTY WORKS WITH PICS LABELING.
UNRATED SITES WILL BE BLOCKED.
BLOCKAGE LIMITS DIVERSITY.
16. USER BASED BLOCKING
WORDS ARE BLOCKED BASED ON KEY WORDS.
NET NANNY CAN BE USED.
PRELIMINARY INFORMATION IS WRITTEN ABOUT WEBSITES.
17. COMPUTER ENCYRPTION CODES ARE NECESSARY TO PROTECT PRIVACY
18. HISTORY
ENCRYPTION HAS BEEN USED THROUGHOUT HISTORY.
AMERICA’S FOUNDERS REALIZED THE POTENTIAL OF ENCRYPTION AND ALLOWED IT TO BE PART OF OUR SOCIETY.
19. OUR GOVERNMENT “KEY ESCROW ENCRYPTION” GIVES THE GOVERNMENT ACCESS TO DECODE ENCRYPTION AND THE ABILITY TO READ YOUR PRIVATE MAIL.
WITH THE GOVERNMENT HAVING ALL ENCRYPTION CODES, THEY ARE ABLE TO DO SEARCHES WITHOUT WARRANTS.
THE CLINTON ADMINISTRATION PROPOSED AN ID CARD.
20. BUSINESS
INFORMATION YOU GIVE ONE PARTICULAR COMPANY SHOULD BE KEPT CONFIDENTIAL.
WITH ENCRYPTION CODES AVAILABLE, OTHER CORPORATIONS ARE MORE LIKELY TO HAVE ACCESS TO YOUR PRIVATE INFORMATION.
21. EXPLICIT MATERIAL MUST BE CENSORED “PROTECT OUR CHILDREN FROM INDECENT EXPOSURE!”
22. INDECENT MATERIAL NEEDS TO BE CESORED BECAUSE……
KIDS RECEIVE WRONG VIEWS ABOUT PORNOGRAPHY AND OTHER EXPLICIT MATERIAL
OBJECTIFICATION OF WOMEN OR MEN
ILLEGAL FOR MINORS TO POSSES PORNOGRAPHY
23. WHAT KIND OF MATERIALS NEED TO BE CENSORED?
PORNOGRAPHY
DRUG USE
ALCOHOL AND TOBACCO ADVERTISING
SEDITIOUS MATERIALS
24. COMMUNICATIONS DECENCY ACT OF 1996. THIS ACT CENSORED: FREE SPECH AND UNDECENT MATERIAL FROM INTERNET.
CENSORSHIPED THROUGH PROGRAMS INSTALLED IN COMPUTER.
25. WHAT PROGRAMS CAN BE USED TO CENSOR MATERIAL? BLACK RIBBON
CYBERQUEER
FAMILY-FRIEND SITE
X-STOP
CYBER-NANNY
NET-NANNY
26. TALES FROM THE ENCRYPTION THE SCARY SIDE OF DATA ENCRYPTION
27. OVERVIEW OF ENCRYPTION WHAT IS ENCRYPTION?
WHO USES IT?
28. TYPES OF ENCRYPTION 40 BIT (BREAKABLE) - PRE 1991 AND MOST POWERFUL ENCRYPTION EXPORTED.
56 BIT (BREAKABLE) - RESTRICTED EXPORTATION.
128 BIT (NON-BREAKABLE) - “MUNITION”- SO POWERFUL CONSIDERED A WEAPON.
29. SHAREWARE AND BROWSERS
PRETTY GOOD PRIVACY (SHAREWARE)
NETSCAPE
BOTH USE 128 BIT ENCRYPTION IN THE U.S. AND CANADA
ONLY 40 BIT ALLOWED OUTSIDE OF CANADA.
30. HOT BUTTON ISSUEWAR IN WASHINGTON EXECUTIVE- LOUIS FREEH, JANET RENO……BILL CLINTON.
LEGISLATIVE- HOUSE REP GOODLATTE (ANTI-RESTRICTION)……..SENATE JOHN MCCAIN AND ROBERT KERREY (PRO-RESTRICTION)
JUDICIAL - BERNSTEIN VS. U.S
ALL BRANCHES WANT TO PROTECT 1 AND 4 WHILE STILL BEING ABLE TO PROSECUTE OFFENDERS.
“KEYS” AND THIRD PARTIES
31. BUSINESSES TAKE A STAND MICROSOFT & IBM
THE U.S. IS THE ONLY MAKER OF ENCRYPTION PROGRAM.
PROFIT POTENTIAL DOWN DUE TO EXPORT RESTRICTIONS
MICROSOFT WORKS WITH THE GOVERNMENT.