Title: HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?
1CHAPTER 4
- HOW DOES THE INTERNET AFFECT CIVIL LIBERTIES?
2ATL135001-F99
- SETH MELLOTT
- ELLEN VIRGO
- BRANDON ROHRBAUGH
- DEANNA LEE
- ALLISON MIRIANI
- SARAH LESNOFF
3THE INTERNET THREATENS THE RIGHT TO PRIVACY
4IS YOUR E-MAIL PRIVATE?
- NO..E-MAIL IS RELAYED THROUGH NUMEROUS TRANSFER
POINTS WHICH MAKES THEM EASILY INTERCEPTED BY
HACKERS.
5SNIFFER PROGRAMS
- HACKERS SOMETIMES USE THESE PROGRAMS THAT SEARCH
THE NET TO LOOK FOR CODES AND CHARACTERS DURING
LOG ON. - THESE ALSO CAPTURE SCREEN NAMES, PASSWORDS, AND
CREDIT CARD INFORMATION.
6LEAVING A TRAIL..
- AN ELECTRONIC TRAIL IS LEFT EVERYTIME ONE SURFS
THE INTERNET. - THE TRAIL LEAVES INFORMATION SUCH AS WHERE YOU
VISITED, FOR HOW LONG AND WHAT YOU VIEWED. - THIS IS HOW PEOPLE RECEIVE JUNK E-MAIL.
7INTERNET PROBLEMS.
- INTERNET BREAK-INS
- THE KEVIN MITNICK CASE
- LEGAL EFFORTS BY CORPORATIONS.
- WHAT IS UNDER ATTACK?
- CREDIT CARD NUMBERS
- PASSWORDS
- MEDICAL/HEALTH RECORDS.
8THE INTERNETS INVASION OF PRIVACY IS
EXAGERATED!
9PRIVACY ISSUES
- Of course, the website owner knows what youre
doing while youre there. What place other than
your own home, can you go where it will allow you
full anonymity? - Joseph Burns
10PLEASE ENTER YOUR CREDIT CARD NUMBER
11HERES YOUR COOKIEBUT YOU CANT EAT IT!!!!!
- A COMPUTER COOKIE IS A FILE THAT SOME SERVERS
PUT ON YOUR COMPUTER UPON ENTRY TO A SITE. - THIS CAN COUNT HOW MANY TIMES YOU COME TO THE
SITE.
12CENSORING VIOLATES FREE SPEECH
- AMERICANS CIVIL LIBERTIES UNION (ACLU) - AN
ORGANIZATION DEDICATED TO PROTECTING THE RIGHTS
GUARANTEED BY THE US CONSTITUTION. - FEDERAL COMMUNICATIONS DECENCY ACT (CDA) - WANTS
BLOCKAGE OF INTERNET SITES. - THE ACLU ARGUES THAT FREE SPEECH IS THREATENED BY
SOFTWARE PROGRAMS THAT WOULD RATE OR BLOCK
CONTROVERSIAL MATERIAL.
13IS CYBER SPACE BURNING?
- THE WHITE HOUSE IS ENCOURAGING USERS TO
VOLUNTARILY RATE THEIR SPEECHES. - INDUSTRY LEADERS ARE BEING ASKED TO DEVELOP WAYS
TO BLOCK INAPPROPRIATE SPEECH.
14A HOMOGENIZED INTERNET
- PEOPLE WHO MAKE THEIR OWN PAGES OR POST
CONTROVERSIAL NEWS GROUPS WILL BE FILTERED. - RENO VS. ACLU WAS THE FIRST CENSORSHIP CASE.
- CONTROVERSIAL SPEECH WILL BE CENSORED.
15THE THIRD PARTY RATING
- AN INDEPENDENT PARTY WORKS WITH PICS LABELING.
- UNRATED SITES WILL BE BLOCKED.
- BLOCKAGE LIMITS DIVERSITY.
16USER BASED BLOCKING
- WORDS ARE BLOCKED BASED ON KEY WORDS.
- NET NANNY CAN BE USED.
- PRELIMINARY INFORMATION IS WRITTEN ABOUT
WEBSITES.
17COMPUTER ENCYRPTION CODES ARE NECESSARY TO
PROTECT PRIVACY
18HISTORY
- ENCRYPTION HAS BEEN USED THROUGHOUT HISTORY.
- AMERICAS FOUNDERS REALIZED THE POTENTIAL OF
ENCRYPTION AND ALLOWED IT TO BE PART OF OUR
SOCIETY.
19OUR GOVERNMENT
- KEY ESCROW ENCRYPTION GIVES THE GOVERNMENT
ACCESS TO DECODE ENCRYPTION AND THE ABILITY TO
READ YOUR PRIVATE MAIL. - WITH THE GOVERNMENT HAVING ALL ENCRYPTION CODES,
THEY ARE ABLE TO DO SEARCHES WITHOUT WARRANTS. - THE CLINTON ADMINISTRATION PROPOSED AN ID CARD.
20BUSINESS
- INFORMATION YOU GIVE ONE PARTICULAR COMPANY
SHOULD BE KEPT CONFIDENTIAL. - WITH ENCRYPTION CODES AVAILABLE, OTHER
CORPORATIONS ARE MORE LIKELY TO HAVE ACCESS TO
YOUR PRIVATE INFORMATION.
21EXPLICIT MATERIAL MUST BE CENSORED
- PROTECT OUR CHILDREN FROM INDECENT EXPOSURE!
22INDECENT MATERIAL NEEDS TO BE CESORED BECAUSE
- KIDS RECEIVE WRONG VIEWS ABOUT PORNOGRAPHY AND
OTHER EXPLICIT MATERIAL - OBJECTIFICATION OF WOMEN OR MEN
- ILLEGAL FOR MINORS TO POSSES PORNOGRAPHY
23WHAT KIND OF MATERIALS NEED TO BE CENSORED?
- PORNOGRAPHY
- DRUG USE
- ALCOHOL AND TOBACCO ADVERTISING
- SEDITIOUS MATERIALS
24COMMUNICATIONS DECENCY ACT OF 1996.
- THIS ACT CENSORED FREE SPECH AND UNDECENT
MATERIAL FROM INTERNET. - CENSORSHIPED THROUGH PROGRAMS INSTALLED IN
COMPUTER.
25WHAT PROGRAMS CAN BE USED TO CENSOR MATERIAL?
- BLACK RIBBON
- CYBERQUEER
- FAMILY-FRIEND SITE
- X-STOP
- CYBER-NANNY
- NET-NANNY
26TALES FROM THE ENCRYPTION
- THE SCARY SIDE OF DATA ENCRYPTION
27OVERVIEW OF ENCRYPTION
- WHAT IS ENCRYPTION?
- WHO USES IT?
28TYPES OF ENCRYPTION
- 40 BIT (BREAKABLE) - PRE 1991 AND MOST POWERFUL
ENCRYPTION EXPORTED. - 56 BIT (BREAKABLE) - RESTRICTED EXPORTATION.
- 128 BIT (NON-BREAKABLE) - MUNITION- SO POWERFUL
CONSIDERED A WEAPON.
29SHAREWARE AND BROWSERS
- PRETTY GOOD PRIVACY (SHAREWARE)
- NETSCAPE
- BOTH USE 128 BIT ENCRYPTION IN THE U.S. AND
CANADA - ONLY 40 BIT ALLOWED OUTSIDE OF CANADA.
30HOT BUTTON ISSUEWAR IN WASHINGTON
- EXECUTIVE- LOUIS FREEH, JANET RENOBILL CLINTON.
- LEGISLATIVE- HOUSE REP GOODLATTE
(ANTI-RESTRICTION)..SENATE JOHN MCCAIN AND
ROBERT KERREY (PRO-RESTRICTION) - JUDICIAL - BERNSTEIN VS. U.S
- ALL BRANCHES WANT TO PROTECT 1 AND 4 WHILE STILL
BEING ABLE TO PROSECUTE OFFENDERS. - KEYS AND THIRD PARTIES
31BUSINESSES TAKE A STAND
- MICROSOFT IBM
- THE U.S. IS THE ONLY MAKER OF ENCRYPTION PROGRAM.
- PROFIT POTENTIAL DOWN DUE TO EXPORT RESTRICTIONS
- MICROSOFT WORKS WITH THE GOVERNMENT.