1 / 43

Can I See You Now?

Can I See You Now?. Closed Circuit TV (CCTV). Boston – 450 cameras Chicago - 2250 New York City – 3000 cameras London –200,000 cameras (individuals caught on camera 300 times a day). Boston is Watching. 450 Surveillance cameras In the T. Cambridge is Watching.

prem
Download Presentation

Can I See You Now?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Can I See You Now?

  2. Closed Circuit TV (CCTV) • Boston – 450 cameras • Chicago - 2250 • New York City – 3000 cameras • London –200,000 cameras (individuals caught on camera 300 times a day)

  3. Boston is Watching 450 Surveillance cameras In the T

  4. Cambridge is Watching

  5. 18 CCTV public areas and parking lots

  6. Cell Phones • E911 service - Reverse directory – call routed to a Public Safety Answering Point • The Missouri Department of Transportation will monitor the movements of individuals on highways via their cell phones -- without their knowledge or consent • Cell phone company can track to within 100 meters.

  7. Cell Phone Tracking • Third Generation phones are more secure against casual eavesdropping • The government can tap mobile phones with the cooperation of the phone company • "IMSI-catcher" fools both caller and mobile phone company while stripping out encryption or other

  8. EZ Pass • Expanding to more and more states • Used for crime fighting • Traffic violations • Airport Parking • MacDonalds

  9. Tracking You with GPS • 24 satellites, which continuously transmit microwave signals regarding their locations at a given time • Through analysis of the data coming in from various satellites, a GPS receiver can determine its own location (for instance, if it's in a car, it can determine the car's location). • And if a GPS device has a transmitter, as well as a receiver, it can also broadcast its location to third parties.

  10. Radio Frequency ID (RFID) • Undetectable and transmits several meters or more • Currently – no regulation • Passports • Clothing • Pets • Money? • You?

  11. Who You Are . . . • Today’s possibility - Pizza demo • Tomorrow’s - A life recorder? 200 Gb/year for audio, 700 Gb/year for video • Today we produce our information by choice • Tomorrow we emit our information without knowing . . .

  12. Magnetic Strips • Drivers license • Student ID • Credit Card • Loyalty Cards • Frequent Flyer

  13. Real ID = National ID? • Starting three years from now – used for all government transactions • At a minimum: name, birth date, sex, ID number, a digital photograph, address, and a "common machine-readable technology" • Technologies to prevent fraud and copying • Homeland Security is permitted to add additional requirements--such as a fingerprint or retinal scan--on top of those. • With standardized technology - who might want to swipe? Bars, banks, airlines? • police can demand to see ID from law-abiding U.S. citizens.

  14. Bentley ID • Meal Plan • Discretionary • Card Key • Hand Check for access

  15. Biometrics http://en.wikipedia.org/wiki/Biometrics

  16. Cell Phone Cameras • The Video Voyeurism Prevention Act of 2004 passed through Congress virtually unopposed.. • Prohibits the photographing or videotaping of a naked person without his or her permission in a gym, tanning salon, dressing room or anywhere else where one expects a "reasonable expectation of privacy." • Violators can expect fines of up to $100,000 and/or up to a year in prison.

  17. Are you Watched in the Bathroom? H.L.C. [108HR582] 110TH CONGRESS 1ST SESSION H. R. ll To protect employees from invasion of privacy by employers by prohibiting certain video monitoring and audio monitoring of employees by their employers, and for other purposes. IN THE HOUSE OF REPRESENTATIVES Mr. ANDREWS introduced the following bill; which was referred to the Committee on llllllllllllll A BILL To protect employees from invasion of privacy by employers by prohibiting certain video monitoring and audio monitoring of employees by their employers, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ‘‘Employee ChangingRoom Privacy Act’’.

  18. Where Do You Live? What Is your Home Worth? Who Lives Near You?

  19. What you Type Yahoo, MSN – gave search histories to FBI for research purposes on child pornography – not a criminal investigation. AOL - In August 2006, AOL published 650,000 users' search histories on its website Amazon – Retain your search history and might sell it should Amazon get a new owner. Google Desktop - the new "Search Across Computers" feature will store copies of the user's Word documents, PDFs, spreadsheets and other text-based documents on Google's own servers, to enable searching from any one of the user's computers.

  20. Google Search A search for “cars” inktomi1-lng.server.ntl.com - 25/Mar/2003 10:15:32 -  http://www.google.com/search?q=cars" - MSIE 6.0; Windows NT 5.1 - 740674ce2123e969 Simplified inktomi1-lng.server.ntl.com(my internet address, resolved to a domain name) 25/Mar/2003 10:15:32(date and time I searched) http://www.google.com/search?q=cars(my search request, containing the word cars in it) MSIE 6.0; Windows NT 5.1(shows the browser I used and operating system, MS Internet Explorer 6 on Windows XP) 740674ce2123e969(my unique cookie ID,assigned to my browser the first time I visited

  21. Google GMail • Gmail is supported by advertisers who buy keywords, • Gmail uses "content extraction" on all incoming and outgoing e-mail in order to target the advertising to the user. For example, if the user is having an e-mail conversation about applying for a job, Gmail might present the user with ads about online job search sites and resume writing services. • Nonsubscriber email is also searched • Gmail can be profiled across Google product lines • Unlimited data retention

  22. Facebook’s New Service 2,100 Colleges 22,000 High Schools 15,000 Corporations Military News Feed - Broadcasting your updates as headlines to your friends. Protest “Calm. down. breathe. We hear you,"

  23. CRT Emissions

  24. Online Eavesdropping • Packet Sniffing • Spyware • Keystroke Logger • CRT Emissions

  25. Learn the Language Personally identifying information Aggregate information Opt Out Opt In Privacy Policies Good Practices Clean machine - Firewall Do not share personal information Write email and post on facebook like the whole world will read it. Use anonymizers Encrypt Pray What Can We Do?

  26. And Finally • 79% of credit reports contain errors • 25% of credit reports have errors serious enough to cause life problems • Choicepoint lost 145,000 records • Bank of America – 1.2 m customer records • Citigroup – 3.9 m • And on and on and on . . .

  27. Identity Theft Geek Weight Lifter

  28. What is it? • Account Takeover • Application Fraud • Cell Phone Fraud • Criminal Identity Theft • Scams and Fraud Sources:http://www.privacyrights.org/fs/fs17-it.htm#crime

  29. What Happens to You? • Credit Cards - Often responsible for the first $50 of loss (Truth in Lending Act, Fair Credit Billing Act, 15 USC sec. 1601) • Debit card users have less protection. Your checking account can be wiped out and you may be liable for the entire. (Electronic Funds Transfer Act, 15 USC sec. 1693) • Criminal Identity Theft you get arrested and are responsible for insuring that criminal records are revised to restore your innocent status • For more about credit card and debit card laws, read the Federal Reserve's Consumer Handbook, www.federalreserve.gov/pubs/consumerhdbk. Source: http://www.privacyrights.org/fs/fs17-it.htm#crime

  30. How do they get it? • "Dumpster diving" in trash bins for unshredded credit card and loan applications and documents containing SSNs. • Stealing mail from unlocked mailboxes to obtain newly issued credit cards, bank and credit card statements, pre-approved credit offers, investment reports, insurance statements, benefits documents, or tax information. Unfortunately, even locked mailboxes may not stop the most determined thief. • Finding identifying information on Internet sources, via public records sites and fee-based information broker sites. • No help from corporations Source: http://www.privacyrights.org/fs/fs17-it.htm#crime

  31. Choicepoint • 19 billion records • Its customers include employers, debt collectors, loan officers, media organizations, law offices, law enforcement, among others. • ChoicePoint compiles data from many sources including public records (court records, property tax assessor files, professional licenses, vehicle registration, bankruptcy records, and so on), along with credit reports, and consumer demographic and lifestyle data. • tenant rental history includes landlord debt, criminal, eviction, registered sex offender and FBI searches. • Their employment background check report includes information on arrest and conviction history including fugitive files, state and county criminal record repositories, prison, parole and release files from state Department of Corrections, Administrative Office of Courts and other state agencies, in addition to credit history, employment verification, education verification, license credentials and certification verification, and business or personal reference verification. See what they have on you!

  32. How Much is There? As of September, 2007 166,021,210 Records stolen Because companies don’t protect your information

  33. Watch out for ATMsDon’t let anyone watch over your shoulder

  34. Phishing • Test your understanding • Get updates on the latest

  35. Reduce Access to your Personal Data • Do not carry anything with your social security number or extra credit cards, passport, or birth certificate around • Remove your name from marketing lists • Sign up on the Do Not Call Registry • Opt out of sharing of your financial information ( privacy notices) • Send bills in post office boxes, not outside your house

  36. Handle your Information Responsibly • Carefully review your financial and phone statements • Convert bill paying to automatic deductions • Shred pre-approved credit offers • Use gel pens when writing checks • Store your statements and other financial information in a locked space

  37. Passwords and PINs • Do not use any name or number central to your life (birthday, pet name) • Mix letters and numbers – better if they make no sense • Use reminder questions that no one would guess (elementary school) • Don’t let people see you type in your password

  38. Safeguards on Your Computer and the Internet • Use a firewall and a router on your home computer • Keep virus and spyware protection updated and use it regularly • Password protect financial files • Do not use file sharing programs • Don’t be a sucker to phishing or other scams

  39. Careful with your Social Security Numbers • This is required for tax forms, employment, and banking – otherwise “NO” • If the government asks, check for a privacy policy • Use alternative numbers on your driver’s license • Do not give to merchants for check verification • If it is on a health card, carry a copy and cut out the SS#

  40. Credit • Do not use debit cards online • Limit the number you have and do not carry them • Watch what waitstaff does with your card • Keep a list of all cc#, phone numbers and expiration dates • Never give out any numbers unless YOU initiated the transaction • Do not throw out receipts in a public trash can

  41. Are you at risk? IQ Test What is your Safety Score? What do you do?

  42. Credit Reporting Agencies PhoneOnline Equifax (888) 766-0008 www.equifax.com Experian (888) EXPERIAN (397-3742) www.experian.com TransUnion (800) 680-7289 www.transunion.com

  43. What to Do • Check your credit report 3 times a year • Remove your name from marketing lists • 888-5optout • Sign up on the National Do Not Call Registry • www.donotcall.gov or 888-382-1222 • Remove your name from state lists http://www.ftc.gov/bcp/conline/edcams/donotcall/statelist.html • Have your name removed from the phone book and reverse directories • Report any false charges to the police • File a Federal Affidavit

More Related