HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES? - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?

Description:

THE INTERNET THREATENS THE RIGHT TO PRIVACY. IS YOUR ... 'SNIFFER' PROGRAMS. HACKERS SOMETIMES USE THESE PROGRAMS THAT SEARCH THE NET TO LOOK FOR CODES AND ... – PowerPoint PPT presentation

Number of Views:37
Avg rating:3.0/5.0
Slides: 32
Provided by: SethMe9
Category:

less

Transcript and Presenter's Notes

Title: HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?


1
CHAPTER 4
  • HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?

2
ATL135001-F99
  • SETH MELLOTT
  • ELLEN VIRGO
  • BRANDON ROHRBAUGH
  • DEANNA LEE
  • ALLISON MIRIANI
  • SARAH LESNOFF

3
THE INTERNET THREATENS THE RIGHT TO PRIVACY
4
IS YOUR E-MAIL PRIVATE?
  • NO..E-MAIL IS RELAYED THROUGH NUMEROUS TRANSFER
    POINTS WHICH MAKES THEM EASILY INTERCEPTED BY
    HACKERS.

5
SNIFFER PROGRAMS
  • HACKERS SOMETIMES USE THESE PROGRAMS THAT SEARCH
    THE NET TO LOOK FOR CODES AND CHARACTERS DURING
    LOG ON.
  • THESE ALSO CAPTURE SCREEN NAMES, PASSWORDS, AND
    CREDIT CARD INFORMATION.

6
LEAVING A TRAIL..
  • AN ELECTRONIC TRAIL IS LEFT EVERYTIME ONE SURFS
    THE INTERNET.
  • THE TRAIL LEAVES INFORMATION SUCH AS WHERE YOU
    VISITED, FOR HOW LONG AND WHAT YOU VIEWED.
  • THIS IS HOW PEOPLE RECEIVE JUNK E-MAIL.

7
INTERNET PROBLEMS.
  • INTERNET BREAK-INS
  • THE KEVIN MITNICK CASE
  • LEGAL EFFORTS BY CORPORATIONS.
  • WHAT IS UNDER ATTACK?
  • CREDIT CARD NUMBERS
  • PASSWORDS
  • MEDICAL/HEALTH RECORDS.

8
THE INTERNETS INVASION OF PRIVACY IS
EXAGERATED!
9
PRIVACY ISSUES
  • Of course, the website owner knows what youre
    doing while youre there. What place other than
    your own home, can you go where it will allow you
    full anonymity?
  • Joseph Burns

10
PLEASE ENTER YOUR CREDIT CARD NUMBER
11
HERES YOUR COOKIEBUT YOU CANT EAT IT!!!!!
  • A COMPUTER COOKIE IS A FILE THAT SOME SERVERS
    PUT ON YOUR COMPUTER UPON ENTRY TO A SITE.
  • THIS CAN COUNT HOW MANY TIMES YOU COME TO THE
    SITE.

12
CENSORING VIOLATES FREE SPEECH
  • AMERICANS CIVIL LIBERTIES UNION (ACLU) - AN
    ORGANIZATION DEDICATED TO PROTECTING THE RIGHTS
    GUARANTEED BY THE US CONSTITUTION.
  • FEDERAL COMMUNICATIONS DECENCY ACT (CDA) - WANTS
    BLOCKAGE OF INTERNET SITES.
  • THE ACLU ARGUES THAT FREE SPEECH IS THREATENED BY
    SOFTWARE PROGRAMS THAT WOULD RATE OR BLOCK
    CONTROVERSIAL MATERIAL.

13
IS CYBER SPACE BURNING?
  • THE WHITE HOUSE IS ENCOURAGING USERS TO
    VOLUNTARILY RATE THEIR SPEECHES.
  • INDUSTRY LEADERS ARE BEING ASKED TO DEVELOP WAYS
    TO BLOCK INAPPROPRIATE SPEECH.

14
A HOMOGENIZED INTERNET
  • PEOPLE WHO MAKE THEIR OWN PAGES OR POST
    CONTROVERSIAL NEWS GROUPS WILL BE FILTERED.
  • RENO VS. ACLU WAS THE FIRST CENSORSHIP CASE.
  • CONTROVERSIAL SPEECH WILL BE CENSORED.

15
THE THIRD PARTY RATING
  • AN INDEPENDENT PARTY WORKS WITH PICS LABELING.
  • UNRATED SITES WILL BE BLOCKED.
  • BLOCKAGE LIMITS DIVERSITY.

16
USER BASED BLOCKING
  • WORDS ARE BLOCKED BASED ON KEY WORDS.
  • NET NANNY CAN BE USED.
  • PRELIMINARY INFORMATION IS WRITTEN ABOUT
    WEBSITES.

17
COMPUTER ENCYRPTION CODES ARE NECESSARY TO
PROTECT PRIVACY
18
HISTORY
  • ENCRYPTION HAS BEEN USED THROUGHOUT HISTORY.
  • AMERICAS FOUNDERS REALIZED THE POTENTIAL OF
    ENCRYPTION AND ALLOWED IT TO BE PART OF OUR
    SOCIETY.

19
OUR GOVERNMENT
  • KEY ESCROW ENCRYPTION GIVES THE GOVERNMENT
    ACCESS TO DECODE ENCRYPTION AND THE ABILITY TO
    READ YOUR PRIVATE MAIL.
  • WITH THE GOVERNMENT HAVING ALL ENCRYPTION CODES,
    THEY ARE ABLE TO DO SEARCHES WITHOUT WARRANTS.
  • THE CLINTON ADMINISTRATION PROPOSED AN ID CARD.

20
BUSINESS
  • INFORMATION YOU GIVE ONE PARTICULAR COMPANY
    SHOULD BE KEPT CONFIDENTIAL.
  • WITH ENCRYPTION CODES AVAILABLE, OTHER
    CORPORATIONS ARE MORE LIKELY TO HAVE ACCESS TO
    YOUR PRIVATE INFORMATION.

21
EXPLICIT MATERIAL MUST BE CENSORED
  • PROTECT OUR CHILDREN FROM INDECENT EXPOSURE!

22
INDECENT MATERIAL NEEDS TO BE CESORED BECAUSE
  • KIDS RECEIVE WRONG VIEWS ABOUT PORNOGRAPHY AND
    OTHER EXPLICIT MATERIAL
  • OBJECTIFICATION OF WOMEN OR MEN
  • ILLEGAL FOR MINORS TO POSSES PORNOGRAPHY

23
WHAT KIND OF MATERIALS NEED TO BE CENSORED?
  • PORNOGRAPHY
  • DRUG USE
  • ALCOHOL AND TOBACCO ADVERTISING
  • SEDITIOUS MATERIALS

24
COMMUNICATIONS DECENCY ACT OF 1996.
  • THIS ACT CENSORED FREE SPECH AND UNDECENT
    MATERIAL FROM INTERNET.
  • CENSORSHIPED THROUGH PROGRAMS INSTALLED IN
    COMPUTER.

25
WHAT PROGRAMS CAN BE USED TO CENSOR MATERIAL?
  • BLACK RIBBON
  • CYBERQUEER
  • FAMILY-FRIEND SITE
  • X-STOP
  • CYBER-NANNY
  • NET-NANNY

26
TALES FROM THE ENCRYPTION
  • THE SCARY SIDE OF DATA ENCRYPTION

27
OVERVIEW OF ENCRYPTION
  • WHAT IS ENCRYPTION?
  • WHO USES IT?

28
TYPES OF ENCRYPTION
  • 40 BIT (BREAKABLE) - PRE 1991 AND MOST POWERFUL
    ENCRYPTION EXPORTED.
  • 56 BIT (BREAKABLE) - RESTRICTED EXPORTATION.
  • 128 BIT (NON-BREAKABLE) - MUNITION- SO POWERFUL
    CONSIDERED A WEAPON.

29
SHAREWARE AND BROWSERS
  • PRETTY GOOD PRIVACY (SHAREWARE)
  • NETSCAPE
  • BOTH USE 128 BIT ENCRYPTION IN THE U.S. AND
    CANADA
  • ONLY 40 BIT ALLOWED OUTSIDE OF CANADA.

30
HOT BUTTON ISSUEWAR IN WASHINGTON
  • EXECUTIVE- LOUIS FREEH, JANET RENOBILL CLINTON.
  • LEGISLATIVE- HOUSE REP GOODLATTE
    (ANTI-RESTRICTION)..SENATE JOHN MCCAIN AND
    ROBERT KERREY (PRO-RESTRICTION)
  • JUDICIAL - BERNSTEIN VS. U.S
  • ALL BRANCHES WANT TO PROTECT 1 AND 4 WHILE STILL
    BEING ABLE TO PROSECUTE OFFENDERS.
  • KEYS AND THIRD PARTIES

31
BUSINESSES TAKE A STAND
  • MICROSOFT IBM
  • THE U.S. IS THE ONLY MAKER OF ENCRYPTION PROGRAM.
  • PROFIT POTENTIAL DOWN DUE TO EXPORT RESTRICTIONS
  • MICROSOFT WORKS WITH THE GOVERNMENT.
Write a Comment
User Comments (0)
About PowerShow.com