22
Internet Privacy & Internet Privacy & Security Security A Presentation to WPI Student A Presentation to WPI Student Pugwash Pugwash Michael J. Ciaraldi Michael J. Ciaraldi Professor of Practice, WPI Computer Professor of Practice, WPI Computer Science Science 2003/10/02 2003/10/02

Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Internet Privacy & SecurityInternet Privacy & Security

A Presentation to WPI Student PugwashA Presentation to WPI Student Pugwash

Michael J. CiaraldiMichael J. Ciaraldi

Professor of Practice, WPI Computer ScienceProfessor of Practice, WPI Computer Science

2003/10/022003/10/02

Why Are You Here Tonight?Why Are You Here Tonight?

• Instead of at the CLICK meeting.

Pugwash IdealsPugwash Ideals

• “…to bring scientific insight and reason to bear on threats to human security arising from science and technology in general…”

• “…pursued through debate, discussion and collaborative analysis in an atmosphere of candor and mutual respect…”– From the Pugwash Mission Statement

Be Glad You’re in CollegeBe Glad You’re in College

• You can discuss any topic…

• You can express any opinion…

• And nobody will try to kill you.

• You don’t have that freedom in the real world.

Internet Privacy and SecurityInternet Privacy and Security

• A huge topic.

• Tonight: An overview and some details.– Mostly on privacy.

TradeoffsTradeoffs

• Identify them.

• Analyze them.

• Make rational choices.

Whom Do You Fear Most?Whom Do You Fear Most?

• The Government?

• Big business?

• Criminals with your private data?

• Criminals in general.– Including terrorists, fanatics, etc.

A QuoteA Quote

• “Power tends to corrupt. Absolute power corrupts absolutely.”– -- Lord Acton.

Another QuoteAnother Quote• “The right of the people to be secure in their

persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”– -- Fourth Amendment to the US Constitution

One More QuoteOne More Quote

• “Big Brother Is Watching You.”– --George Orwell, 1984.

Kinds of Information on YouKinds of Information on You• Demographic

– Race, religion, ethnicity, disability

• Financial– Salary, credit history,

bankruptcy, debts

• Associates• Buying habits• Rentals• Reading• Medical

• Web surfing• Credit card• Memberships• Purchases• Email• Newsgroups• Grades & Degrees• Employment• Arrests• Passwords

Where Is This Information?Where Is This Information?

• Paper and electronic

• Company, government, organization, school.– Various groups and levels

Where Does This Info Come From?Where Does This Info Come From?

• Public records.

• Internal records.

• Forms you fill out.

• Reports from others.

QuestionsQuestions

• How accurate is this info?

• Is it up-to-date?

• Can you find out what it is?

• Can you find out if someone is using it?

• Can you correct and/or comment on it?

• Is it even about you?

It Gets Worse (or Better)It Gets Worse (or Better)When ElectronicWhen Electronic

• Easier to find data.

• Easier to correlate.– Quakers of Lithuanian descent who read

books on fireworks.

What Bad Can Happen?What Bad Can Happen?

• Persecuted by government.

• Targeted by criminals.

• Targeted by protesters.

• Job discrimination.

• Loan discrimination.

• Denied insurance.

• Deluged by junk mail.

What Good Can Happen?What Good Can Happen?

• Job qualifications confirmed.

• Criminals barred from sensitive jobs.

• Fugitives caught.

• Kidnap victims found.

• Medical history and interactions.

• E911 cellphone location.

What Safeguards Are There?What Safeguards Are There?

• Government inter-agency sharing.

• Census statistics.

• Search warrant / subpoena.

• Privacy policies.

• Right to examine and correct credit history.

A Few Things You Can DoA Few Things You Can Do

• Examine company privacy policies.

• Submit minimal information.

• Maintain separate email accounts.

• Use mail encryption, SSL, SSH, VPN, etc.

• Stimulate public debate.

Some QuestionsSome Questions

• What information should the government legitimately have about people?

• What information should companies legitimately have about people?

• What information should schools legitimately have about people?

Some Harder QuestionsSome Harder Questions

• What freedoms are you willing to give up?– To have security.– To preserve other freedoms.

• Who gets to decide?

Thank You!Thank You!