Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft...

30
Privacy & Privacy & Surveillance Surveillance COM125B COM125B

Transcript of Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft...

Privacy & SurveillancePrivacy & Surveillance

COM125BCOM125B

IntroductionIntroduction

• Privacy• Online Identity Theft• Prevention of ID Theft• Surveillance• Sousveillance

PrivacyPrivacy

• “freedom from unauthorized intrusion : state of being let alone and able to keep certain esp. personal matters to oneself”

Types of Privacy

• Bodily

• Political

• Medical

• Genetic

• Internet

• From corporations

• From government interference

We lose our privacy when…We lose our privacy when…

• Entering sweepstakes / competitions• In order to have a chance of winning a prize• Giving personal information to potential

employers• We use the Internet

- leave trails of information - computer can reveal web browser’s history, cache or logs- websites also have own logs showing IP address and other demographic data

Cons of giving up Privacy

• Details might be sold to other companies

• Information voluntarily shared is later stolen or misused

- Identity Theft

According to 2 studies in July 2003, (Gartner Research and Harris Interactive),

approximately 7 million people became victims of identity theft in the prior 12 months.

That equals 19,178 per day, 799 per hour, 13.3 per minute.

Source: Identity Theft Resource Center

Identity TheftIdentity Theft

• Crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.

• Personal data (Social Security Number, Bank account, credit card, telephone calling card number, etc) are unlink finger print which can be used easily.

Identity TheftIdentity Theft• Some criminals engage in

– Shoulder surfing– Dumpster driving

• Recently, the Internet has been the most appealing place for criminals to obtain identifying data such as “Password, Banking information”

• Online Identity Theft – Phishing: bogus website addresses in

spam email

Identity TheftIdentity Theft

• Online Identity Theft- Pharming - Vishing: Getting details through telephone calls- Spoof Page: voluntary giving out of information- Keystroke Logging- Screen Scrapers

Source: Readers Digest

Identity TheftIdentity Theft• In 1998 , Congress passed this law and made it as a

federal crime subject to as many as 15 years imprisonment.

• In 2006, according to the Central District Court of California– a man was indicted ,pleaded guilty to federal

charges and was sentenced to 27 months for obtaining private bank account information about a insurance company’s policy holders and using this information to deposits $764,000 in counterfeit checks into a bank account he established .

Identity Theft PreventionIdentity Theft Prevention

• Don’t give your personal information unless you have reason to trust them

• If you have a credit or debit card, check whether you have been receiving the list of transactions for the most recent month or reporting period

• Maintain careful records of your banking and financial account

BREAK

SurveillanceSurveillance

• “The act of monitoring behaviour”

• Maybe covert or overt

Types of SurveillanceTypes of Surveillance• Clinical

– Occurrences of infectious diseases

• Computer– Spyware

• Natural– Prevention of crime

• Counter– Deleting a file

• Government– Carnivore– Echelon Spy System

• Inverse (also known as Sousveillance)Source: http://en.wikipedia.org/wiki/Surveillance

SousveillanceSousveillance

“The watched become the watcher”

What is “sousveillance”?What is “sousveillance”?

• “Sous” – “watching from below” – derived from a contrasting French word, “sur” - surveillance “watching from above” (Wikipedia, 2006)

• Recording an activity by a participant in the activity

• Originated from Steve Mann, a University of Toronto computer engineering professor famous for turning himself into a cyborg.

What is “sousveillance”?What is “sousveillance”?

• Bringing the camera down to the human level– Physically: cameras

on people not building

– Hierarchically: ordinary citizen taking photos of police

Sousveillance Today?Sousveillance Today?

• Citizen journalism – enable one to contribute one’s voices and views to the world’s knowledge

• Examples:– “Global Viral” from

ABC

Sousveillance Today?Sousveillance Today?

• Examples:

– “Virtual China”

Sousveillance Today?Sousveillance Today?

• Examples:- The Straits Times’ STOMP- Hybrid- “ We want STOMP to become a forum of lively discussions - whether the topics are weighty national issues or where to get the best bak chor mee."

Image from www.stomp.com.sg

Sousveillance Today?Sousveillance Today?

• Inverse Sousveillance – hierarchical sousveillance

• Examples:– citizens

photographing police abuse

Image: http://www.takingitglobal.org/understanding/socialjustice/abuseofpower

Why “sousveillance”?Why “sousveillance”?

• To hold authorities to account• To gather evidence for friends involved in

confrontations with officials• To give people a sense of control over the

constant oversight that take place in the public spaces

• To document one’s life from one’s perspective

Source: New Scientist. (2006, June 24). Reed Business Information UK. Vol. 190. I.2557

How “Sousveillance” developed?How “Sousveillance” developed?

• The development of portable digital personal gadgets– Camera phone– Electronic eyeglasses

– “eyetap”

• The growth of “gift economy”

EyeTap Development PastEyeTap Development Past

Development of EyeTap - TodayDevelopment of EyeTap - Today

New Trends of “Sousveillance”New Trends of “Sousveillance”

• World Sousveillance Day• CARPE 2004

Presented by:Charlotte Ng

Liu Jia Wen, Carol

Nashrin Banu

Raihana Omar

Siti Zawiyah

Thu Ha Vo