300 likes | 308 Views
Learn about internet fraud, types of fraud, employee monitoring, and the role of technology in border control and surveillance.
E N D
In the sky…. Monitoring & Privacy Watching…. By Jeff Haas Katie Sandy Ryan Beebe Gil Herskovitz YOU….
-Table of Contents- Jeff – Internet privacy Katie – Employee Monitoring Ryan – Government Security Gil - Government Security
Last year, close to 14 billion dollars were lost as a result of internet fraud. This is a 9 billion dollar increase from the 5 billion reported in 2004. This fraud took shape in a variety of tools; online auctions, fake checks, Nigerian member clubs, phishing, and basic merchandise purchases, for people all over the US. Internet Security
Types of Fraud • Phishing- When companies ask individuals from personal account information, while pretending to be a credit card service, broker, or an e-retailer like Ebay.
Nigerian Lottery Scam- Emails were sent out to people about entering a lottery. After a few exchanges they were told they won and asked to send fees and taxes. Then received no winnings. Ramping- Millions of people are sent emails about a new innovative feature of a particular company to increase the value of the stock. The people sending the info. Already own many shares and then sell them off. Types of Fraud
Types of Fraud • Cookies- used to track where users click and navigate to on sites • Click Fraud- when a company puts a link to another site on their own. They are paid per click on their site, but have found unethical ways to employ this marketing tactic.
Internet Security and Us • As discussed in class, employers today are utilizing items like Facebook and MySpace in their hiring practices. • Employers are even having their interns access their own accounts so HR personnel can research applicants. • Newscast on Facebook: http://www.collegerecruiter.com/weblog/archives/2006/05/nbc_interview.php
Employer arguments: Increase customer satisfaction Improve employee performance Enhance productivity Employee arguments: Increased stress Privacy issues Trust between employee/employer The Employee vs. Employer Issue
Types of Employee Monitoring • Call Monitoring • Video Surveillance • Computer Monitoring
Call Monitoring: Observer’s Role Evaluation and feedback purposes Costs: $150/seat-$120,000 The Stress Factor Video Surveillance: Employee awareness Videos must be reviewed by management Uses: misconduct, monitor performace, safety Cost: $150-$1000/camera Objectivity Types of Monitoring (cont.)
Computers are used to monitor employees’: Keystrokes Errors Internet access Email accounts Costs: $900-$10,000 Quantitative vs. Qualitative Focus Types of Monitoring (Cont.):Computer Monitoring
Employee Monitoring and the Law • Public vs. private sector employees • State laws (California) • Electronic Communications Privacy Act of 1986 • “prohibits the intentional or willful interception, accession, disclosure, or use of one’s electronic communication.”
Electronic Communications Privacy Act of 1986: The Exceptions • Provider exception • United Airlines case • Ordinary cause of business exception • Content vs. context approach • Consent exception • “applies when one party to the communication has given prior consent, actual or implied, to the interception or accession of the communication.”
Case Law • Smith vs. Pillsbury • Inappropriate messages to co-workers • Private email usage at Pillsbury • Court decision: upheld employee’s termination • Shoars vs. Epson • Manager reviewed employees emails • Court Decision: systematic reviews of email do not violate the Electronic Comm. Privacy Act • Bourke vs. Nissan Motors • Use of email for excessive personal use • Court decision: no reasonable expectation of privacy
No Fly List -Database of passengers deemed to be an aviation threat -Composed from FBI, Secret Service, INS, NSA databases -Problems -Solutions
E-Passports • Issued to public beginning August 14, 2006 • “Smart Passports” • Microchip stores basic data • Features • Benefits from E-passports
RFID in Humans • RFID in Humans • Nanotechnology • Size of a grain of Rice • Stores unique serial number • Benefits
Border Security • U.S. Customs and Border Protection • Secure Fence Act of 2006 • Use of Seismic and Thermal Technology • $64 million for Border Patrol Surveillance and Sensor Technology • $10 million for Unmanned Aerial Vehicles
Border Control Technologies • Omni Eye • Thermal Imaging • Seismic Activity
Patriot Act -Title II: Enhanced Surveillance Procedures -Title IX: Improved Intelligence -A federal agency whose primary mission is to help prevent, protect against, and respond to acts of terrorism on United States soil.
-Google Earth -Is a free-of-charge, downloadable virtual globe program. It maps the earth by superimposing images obtained from satellite imagery, aerial photography and GIS over a 3D globe.
Satellite Technology some things we may not know -U.S. satellites won’t be watching alone -More sex offenders tracked by satellites
- What is really going on? ON -LIVE 24/7: More than 4 million cameras are trained on Britons, posted from downtown to roadways, residential areas to churches.
Who’s baby is that…???? How Cute!!!! -TOYS….. - Expensive toys that do a lot more!