1 / 30

HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES

ATL135:001-F99. SETH MELLOTTELLEN VIRGOBRANDON ROHRBAUGHDEANNA LEEALLISON MIRIANISARAH LESNOFF. THE INTERNET THREATENS THE RIGHT TO PRIVACY. IS YOUR E-MAIL PRIVATE?. NO

kaycee
Download Presentation

HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. CHAPTER 4 HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?

    2. ATL135:001-F99 SETH MELLOTT ELLEN VIRGO BRANDON ROHRBAUGH DEANNA LEE ALLISON MIRIANI SARAH LESNOFF

    3. THE INTERNET THREATENS THE RIGHT TO PRIVACY

    4. IS YOUR E-MAIL PRIVATE? NO…..E-MAIL IS RELAYED THROUGH NUMEROUS TRANSFER POINTS WHICH MAKES THEM EASILY INTERCEPTED BY HACKERS.

    5. “SNIFFER” PROGRAMS HACKERS SOMETIMES USE THESE PROGRAMS THAT SEARCH THE NET TO LOOK FOR CODES AND CHARACTERS DURING LOG ON. THESE ALSO CAPTURE SCREEN NAMES, PASSWORDS, AND CREDIT CARD INFORMATION.

    6. LEAVING A TRAIL….. AN ELECTRONIC TRAIL IS LEFT EVERYTIME ONE SURFS THE INTERNET. THE TRAIL LEAVES INFORMATION SUCH AS WHERE YOU VISITED, FOR HOW LONG AND WHAT YOU VIEWED. THIS IS HOW PEOPLE RECEIVE JUNK E-MAIL.

    7. INTERNET PROBLEMS. INTERNET BREAK-INS THE KEVIN MITNICK CASE LEGAL EFFORTS BY CORPORATIONS. WHAT IS UNDER ATTACK? CREDIT CARD NUMBERS PASSWORDS MEDICAL/HEALTH RECORDS.

    8. THE INTERNET’S INVASION OF PRIVACY IS EXAGERATED!

    9. PRIVACY ISSUES “Of course, the website owner knows what you’re doing while you’re there. What place other than your own home, can you go where it will allow you full anonymity?” Joseph Burns

    10. PLEASE ENTER YOUR CREDIT CARD NUMBER:

    11. HERE’S YOUR COOKIE…BUT YOU CAN’T EAT IT!!!!! A COMPUTER “COOKIE” IS A FILE THAT SOME SERVERS PUT ON YOUR COMPUTER UPON ENTRY TO A SITE. THIS CAN COUNT HOW MANY TIMES “YOU” COME TO THE SITE.

    12. CENSORING VIOLATES FREE SPEECH AMERICAN’S CIVIL LIBERTIES UNION (ACLU) - AN ORGANIZATION DEDICATED TO PROTECTING THE RIGHTS GUARANTEED BY THE US CONSTITUTION. FEDERAL COMMUNICATIONS DECENCY ACT (CDA) - WANTS BLOCKAGE OF INTERNET SITES. THE ACLU ARGUES THAT FREE SPEECH IS THREATENED BY SOFTWARE PROGRAMS THAT WOULD RATE OR BLOCK CONTROVERSIAL MATERIAL.

    13. IS CYBER SPACE BURNING? THE WHITE HOUSE IS ENCOURAGING USERS TO VOLUNTARILY RATE THEIR SPEECHES. INDUSTRY LEADERS ARE BEING ASKED TO DEVELOP WAYS TO BLOCK “INAPPROPRIATE” SPEECH.

    14. A HOMOGENIZED INTERNET PEOPLE WHO MAKE THEIR OWN PAGES OR POST CONTROVERSIAL NEWS GROUPS WILL BE FILTERED. RENO VS. ACLU WAS THE FIRST CENSORSHIP CASE. CONTROVERSIAL SPEECH WILL BE CENSORED.

    15. THE THIRD PARTY RATING AN INDEPENDENT PARTY WORKS WITH PICS LABELING. UNRATED SITES WILL BE BLOCKED. BLOCKAGE LIMITS DIVERSITY.

    16. USER BASED BLOCKING WORDS ARE BLOCKED BASED ON KEY WORDS. NET NANNY CAN BE USED. PRELIMINARY INFORMATION IS WRITTEN ABOUT WEBSITES.

    17. COMPUTER ENCYRPTION CODES ARE NECESSARY TO PROTECT PRIVACY

    18. HISTORY ENCRYPTION HAS BEEN USED THROUGHOUT HISTORY. AMERICA’S FOUNDERS REALIZED THE POTENTIAL OF ENCRYPTION AND ALLOWED IT TO BE PART OF OUR SOCIETY.

    19. OUR GOVERNMENT “KEY ESCROW ENCRYPTION” GIVES THE GOVERNMENT ACCESS TO DECODE ENCRYPTION AND THE ABILITY TO READ YOUR PRIVATE MAIL. WITH THE GOVERNMENT HAVING ALL ENCRYPTION CODES, THEY ARE ABLE TO DO SEARCHES WITHOUT WARRANTS. THE CLINTON ADMINISTRATION PROPOSED AN ID CARD.

    20. BUSINESS INFORMATION YOU GIVE ONE PARTICULAR COMPANY SHOULD BE KEPT CONFIDENTIAL. WITH ENCRYPTION CODES AVAILABLE, OTHER CORPORATIONS ARE MORE LIKELY TO HAVE ACCESS TO YOUR PRIVATE INFORMATION.

    21. EXPLICIT MATERIAL MUST BE CENSORED “PROTECT OUR CHILDREN FROM INDECENT EXPOSURE!”

    22. INDECENT MATERIAL NEEDS TO BE CESORED BECAUSE…… KIDS RECEIVE WRONG VIEWS ABOUT PORNOGRAPHY AND OTHER EXPLICIT MATERIAL OBJECTIFICATION OF WOMEN OR MEN ILLEGAL FOR MINORS TO POSSES PORNOGRAPHY

    23. WHAT KIND OF MATERIALS NEED TO BE CENSORED? PORNOGRAPHY DRUG USE ALCOHOL AND TOBACCO ADVERTISING SEDITIOUS MATERIALS

    24. COMMUNICATIONS DECENCY ACT OF 1996. THIS ACT CENSORED: FREE SPECH AND UNDECENT MATERIAL FROM INTERNET. CENSORSHIPED THROUGH PROGRAMS INSTALLED IN COMPUTER.

    25. WHAT PROGRAMS CAN BE USED TO CENSOR MATERIAL? BLACK RIBBON CYBERQUEER FAMILY-FRIEND SITE X-STOP CYBER-NANNY NET-NANNY

    26. TALES FROM THE ENCRYPTION THE SCARY SIDE OF DATA ENCRYPTION

    27. OVERVIEW OF ENCRYPTION WHAT IS ENCRYPTION? WHO USES IT?

    28. TYPES OF ENCRYPTION 40 BIT (BREAKABLE) - PRE 1991 AND MOST POWERFUL ENCRYPTION EXPORTED. 56 BIT (BREAKABLE) - RESTRICTED EXPORTATION. 128 BIT (NON-BREAKABLE) - “MUNITION”- SO POWERFUL CONSIDERED A WEAPON.

    29. SHAREWARE AND BROWSERS PRETTY GOOD PRIVACY (SHAREWARE) NETSCAPE BOTH USE 128 BIT ENCRYPTION IN THE U.S. AND CANADA ONLY 40 BIT ALLOWED OUTSIDE OF CANADA.

    30. HOT BUTTON ISSUE WAR IN WASHINGTON EXECUTIVE- LOUIS FREEH, JANET RENO……BILL CLINTON. LEGISLATIVE- HOUSE REP GOODLATTE (ANTI-RESTRICTION)……..SENATE JOHN MCCAIN AND ROBERT KERREY (PRO-RESTRICTION) JUDICIAL - BERNSTEIN VS. U.S ALL BRANCHES WANT TO PROTECT 1 AND 4 WHILE STILL BEING ABLE TO PROSECUTE OFFENDERS. “KEYS” AND THIRD PARTIES

    31. BUSINESSES TAKE A STAND MICROSOFT & IBM THE U.S. IS THE ONLY MAKER OF ENCRYPTION PROGRAM. PROFIT POTENTIAL DOWN DUE TO EXPORT RESTRICTIONS MICROSOFT WORKS WITH THE GOVERNMENT.

More Related