The President’s Identity Theft Task Force Strategic Plan – Privacy Implications
Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft...
-
Upload
jack-johns -
Category
Documents
-
view
220 -
download
0
Transcript of Privacy & Surveillance COM125B. Introduction Privacy Online Identity Theft Prevention of ID Theft...
IntroductionIntroduction
• Privacy• Online Identity Theft• Prevention of ID Theft• Surveillance• Sousveillance
PrivacyPrivacy
• “freedom from unauthorized intrusion : state of being let alone and able to keep certain esp. personal matters to oneself”
•
Types of Privacy
• Bodily
• Political
• Medical
• Genetic
• Internet
• From corporations
• From government interference
We lose our privacy when…We lose our privacy when…
• Entering sweepstakes / competitions• In order to have a chance of winning a prize• Giving personal information to potential
employers• We use the Internet
- leave trails of information - computer can reveal web browser’s history, cache or logs- websites also have own logs showing IP address and other demographic data
Cons of giving up Privacy
• Details might be sold to other companies
• Information voluntarily shared is later stolen or misused
- Identity Theft
According to 2 studies in July 2003, (Gartner Research and Harris Interactive),
approximately 7 million people became victims of identity theft in the prior 12 months.
That equals 19,178 per day, 799 per hour, 13.3 per minute.
Source: Identity Theft Resource Center
Identity TheftIdentity Theft
• Crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.
• Personal data (Social Security Number, Bank account, credit card, telephone calling card number, etc) are unlink finger print which can be used easily.
Identity TheftIdentity Theft• Some criminals engage in
– Shoulder surfing– Dumpster driving
• Recently, the Internet has been the most appealing place for criminals to obtain identifying data such as “Password, Banking information”
• Online Identity Theft – Phishing: bogus website addresses in
spam email
Identity TheftIdentity Theft
• Online Identity Theft- Pharming - Vishing: Getting details through telephone calls- Spoof Page: voluntary giving out of information- Keystroke Logging- Screen Scrapers
Source: Readers Digest
Identity TheftIdentity Theft• In 1998 , Congress passed this law and made it as a
federal crime subject to as many as 15 years imprisonment.
• In 2006, according to the Central District Court of California– a man was indicted ,pleaded guilty to federal
charges and was sentenced to 27 months for obtaining private bank account information about a insurance company’s policy holders and using this information to deposits $764,000 in counterfeit checks into a bank account he established .
Identity Theft PreventionIdentity Theft Prevention
• Don’t give your personal information unless you have reason to trust them
• If you have a credit or debit card, check whether you have been receiving the list of transactions for the most recent month or reporting period
• Maintain careful records of your banking and financial account
Types of SurveillanceTypes of Surveillance• Clinical
– Occurrences of infectious diseases
• Computer– Spyware
• Natural– Prevention of crime
• Counter– Deleting a file
• Government– Carnivore– Echelon Spy System
• Inverse (also known as Sousveillance)Source: http://en.wikipedia.org/wiki/Surveillance
What is “sousveillance”?What is “sousveillance”?
• “Sous” – “watching from below” – derived from a contrasting French word, “sur” - surveillance “watching from above” (Wikipedia, 2006)
• Recording an activity by a participant in the activity
• Originated from Steve Mann, a University of Toronto computer engineering professor famous for turning himself into a cyborg.
What is “sousveillance”?What is “sousveillance”?
• Bringing the camera down to the human level– Physically: cameras
on people not building
– Hierarchically: ordinary citizen taking photos of police
Sousveillance Today?Sousveillance Today?
• Citizen journalism – enable one to contribute one’s voices and views to the world’s knowledge
• Examples:– “Global Viral” from
ABC
Sousveillance Today?Sousveillance Today?
• Examples:- The Straits Times’ STOMP- Hybrid- “ We want STOMP to become a forum of lively discussions - whether the topics are weighty national issues or where to get the best bak chor mee."
Image from www.stomp.com.sg
Sousveillance Today?Sousveillance Today?
• Inverse Sousveillance – hierarchical sousveillance
• Examples:– citizens
photographing police abuse
Image: http://www.takingitglobal.org/understanding/socialjustice/abuseofpower
Why “sousveillance”?Why “sousveillance”?
• To hold authorities to account• To gather evidence for friends involved in
confrontations with officials• To give people a sense of control over the
constant oversight that take place in the public spaces
• To document one’s life from one’s perspective
Source: New Scientist. (2006, June 24). Reed Business Information UK. Vol. 190. I.2557
How “Sousveillance” developed?How “Sousveillance” developed?
• The development of portable digital personal gadgets– Camera phone– Electronic eyeglasses
– “eyetap”
• The growth of “gift economy”