CS 3043 Social Implications Of Computing

advertisement
CS 3043 Social Implications Of Computing
Class 8
Privacy Continued
Keith A. Pray
Instructor
socialimps.keithpray.net
3/23/2016
© 2004 Keith A. Pray
1
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
2
CS 3043 Social Implications Of Computing
Joe – Positive Example of
Contribute to Society



Free Geek
FEMA database
Access for the handicapped.
3/23/2016
© 2007 Keith A. Pray
3
CS 3043 Social Implications Of Computing
Mali - MafiaBoy




Mike Calce, “Script kiddie” that successfully launched
DoS attacks against major websites such as yahoo,
amazon, ebay, cnn.
FBI caught him -> records of him announcing on IRC
that he was responsible * Sentenced to 8 months of open
custody, one year of probation and restricted use of the
internet.
Published estimates of damages up to 1.2 billion, but
estimate given by prosecutor is $7.5 million.
31.25 thousand dollars per day in youth detention center.
3/23/2016
© 2007 Keith A. Pray
4
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
5
CS 3043 Social Implications Of Computing
Kate – Work Visas

Types of visa
Temporary Business or Tourism (B1/B2)
 Temporary Work (H, L)




Student or Exchange Programs (F, M, J)




3/23/2016
Nonimmigrant Worker (H)
Intracompany Transfer (L)
Student Visas (F, M)
Exchange Visas (J)
Summer Work & Travel Program For Students
Other: Crew Members and/or Transit (C1/D), Journalists (I),
Religious Occupations (R), Fiance(e) Visas (K-1/K-2),
Spouse/Children of U.S. Citizen (K-3/K-4)
© 2007 Keith A. Pray
6
CS 3043 Social Implications Of Computing
Kate – Work Visas

Green Card


3/23/2016
The United States Government
issues 55,000 permanent resident
cards (Green Cards) every year
through the Diversity Immigrant Visa
Program, commonly known as the
Green Card Lottery. Applicants are
selected randomly by a computergenerated drawing. If selected, the
main applicant, spouse and all
unmarried children under 21 years of
age will have a chance to apply for
permanent resident status in the
United States.
A Green Card or Permanent Resident
Card discloses information that
provides an individual’s proof of
lawful permanent resident status in
the United States. An individual with
a Green Card has the right to live
and work permanently in the United
States.

Temporary Work Visas




H-1B Work Visa for College Educated
Professionals
H-2B Work Visa for Skilled and
Unskilled Workers
H-3 Trainee Visa
Foreign Programmers Hoping to Work
in U.S. Need Right Employer

© 2007 Keith A. Pray
More high-level programmers from
foreign countries are coming to the
United States because the demand
for them is exceeding supply. U.S.
companies turn to IT staffing firms
to supply those experts.
7
CS 3043 Social Implications Of Computing
Joe – Work Visas in Israel

Requirements:




Your company must request a permit for you
Visa must be extended after one year regardless
You can only work in the designated trade
Bottom line: Obtaining a work visa in Israel is
rather easy
3/23/2016
© 2007 Keith A. Pray
8
CS 3043 Social Implications Of Computing
Elliot - Work Permits in South Africa


Intra-Company
Secondary







Temporary Business
Company Visits for > 25% Share Ownership
Films, Commercials, Documentaries
Religious Volunteers
Consulting from Abroad
Effective Time
Processing Time
3/23/2016
© 2007 Keith A. Pray
9
CS 3043 Social Implications Of Computing
Mali – Getting an Education Here
and then Going Home

Gives an edge during resume screening:



My take: Probably is ethical.




Tougher to get a good CS education in Turkey that is up to date and
sufficient to let students work “in the field” immediately
Harder to get enthusiastic programmers as opposed to people who studied
CS because they “ended up” that way => Fault of the educational system
Company's best interest is to hire the best candidate available.
If this means hiring someone who studied in the US because of the above
reasons, this is fair.
Deciding solely on this basis => Unfair. Discrimination.
Sources:


3/23/2016
Evren Gulcig, uChicago graduate
Murat Aladag, Georgia Tech graduate
© 2007 Keith A. Pray
10
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
11
CS 3043 Social Implications Of Computing
Wike - American 4th Amendment:
Searches and seizures



The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place
to be searched, and the persons or things to be seized.
Provisions must not be violated
Secure against searches and seizures in:






Persons
Houses
Papers
Effects
Provision must not be violated
Need for probable cause
3/23/2016
© 2007 Keith A. Pray
12
CS 3043 Social Implications Of Computing
Wike - Nigerian Act 4 Chapter 21A
233E 1-8
Search and Seizure



(1)
Subject to the provisions of this Chapter, if a magistrate is satisfied by information on oath that there is
reasonable ground for suspecting that articles deemed to he obscene for the purposes of this Chapter are, or are from
time to time, kept for publication for gain in any premises or on any stall or vehicle in the State, the magistrate may
issue a warrant under his hand empowering any constable to enter (if need he by force) and search the premises, or
to search the stall or vehicle, within fourteen days -from the date of the warrant, and to seize and remove any
articles found therein or thereon which the constable has reason to believe to be obscene articles for the purposes of
this Chapter and to be kept for publication for gain.
(2)
A warrant under subsection (1) of this section shall, if any obscene articles are seized under the warrant,
also empower the seizure and removal of any documents found in the premises or, as the case may be, on the stall or
vehicle which relate to a trade or business carried on at the premises or from the stall or vehicle.
(3)
Articles seized under subsection (1) of, this section may be brought before the magistrate who issued the
warrant or before any other magistrate, and the magistrate before whom the articles are brought may thereupon issue
a summons to the occupier of the premises, or, as the case may be, the user of the stall or vehicle to appear on a day
specified in the summons before a magistrate's court to show cause why the articles or any of them should not be,
forfeited. If the court is satisfied, as respects any of the articles, that at the time when they were seized they were
obscene articles kept for publication for gain, the court shall order those articles to be forfeited; but no order shall be
made under this subsection in default of appearance by the person summoned unless service of the summons is
proved.
3/23/2016
© 2007 Keith A. Pray
13
CS 3043 Social Implications Of Computing
Wike - Nigerian Pinal code
cont…



(4)
In addition to the person summoned, any other person being the owner, author
or maker of any of the articles brought before the court, or any other person through
whose hands they had passed before being seized, shall be entitled to appear before the
court on the day specified in the summons to show cause why they should not be
forfeited.
(5)
Where an order is made under this section for the forfeiture of any articles, any
person who appeared, or was entitled to appear, to show cause against the making of the
order may appeal to the High Court; and no such order shall take effect until the
expiration of fourteen days after the day on which the order is made, or, if before the
expiration thereof notice of appeal is duly given, until the final determination or
abandonment of the proceedings on the appeal.
(6)
If as respects any articles brought before it the court does not order forfeiture,
the court may if it thinks fit order the person on whose information the warrant for the
seizure of the articles was issued to pay such costs as the court thinks reasonable to any
person who has appeared before the court to show cause why those articles should not be
forfeited; and costs ordered to be paid under this subsection shall be enforceable as a
civil debt.
3/23/2016
© 2007 Keith A. Pray
14
CS 3043 Social Implications Of Computing
Wike - Nigerian Pinal code
cont…


(7)
For the purposes of this section, the question whether an article is obscene
shall be determined on the assumption that copies of it would be published in any
manner likely having regard to the circumstances in which it was found, but in no other
manner.
(8)
Nothing in this section shall be construed to preclude the making of any order
for the purposes of section 263 of the Criminal Procedure Act (which relates to disposal
of property produced before a court).
3/23/2016
© 2007 Keith A. Pray
15
CS 3043 Social Implications Of Computing
Wike - Nigerian Penal code -Translation

Essentially, anything that a magistrate deems to
be morally offensive can be confiscated by a
“constable”.
3/23/2016
© 2007 Keith A. Pray
16
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
17
CS 3043 Social Implications Of Computing
Greg - Census


Individual census records are actually kept by the
government after the report is compiled
They are made public 70 years after the year they
were taken

3/23/2016
Most recent data available is from 1930
© 2007 Keith A. Pray
18
CS 3043 Social Implications Of Computing
Tim R. – Keylogging Remotely


Key loggers are used to gather all of the information typed into ones keyboard
into a file to be accessed later
Piece of hardware directly connected to the keyboard or the actual keyboard, or
a piece of software


Key loggers are available many places on the internet


Generally software tools
Can be run by viruses, Trojans and locally or remotely on the box
The biggest issue when using a key logger is retrieving the information
gathered without being traced

Most common practice is to have thing information post itself to a
newsgroup or discussion board


Avoids emailing directly to the person who wants the information, or sending it
directly to a hostname or ip address which would be more easily traceable
Installing a key logger remotely is possible via a terminal, or another way of
accessing the computer remotely.
3/23/2016
© 2007 Keith A. Pray
19
CS 3043 Social Implications Of Computing
Craig - Echelon




Echelon is the name used by the world media for a international system of
satellites allegedly capable of intercepting and monitoring all wired and
wireless communication on a global scale
In actuality this is not the case as in 2001 a parliamentary investigation was
able to determine that their was a very low possibility that the system had the
capability to monitor all electronic communication but rather concluded that it
is used to monitor foreign individuals and organizations chosen for surveillance
through traditional HUMINT means
No proof has been able to be generated as to whether or not the NSA has used
the system on US Citizens or Foreign governments have used it on US
Citizens.
From the information gathered it actually seems much easier for the NSA to
hand any electronic surveillance domestically over to the FBI and have it get a
warrant to use its Carnivore System.
3/23/2016
© 2007 Keith A. Pray
20
CS 3043 Social Implications Of Computing
Dan - Carnivore



Revealed through ISP challenge to use
Public criticism essentially killed it
FBI switched to commercial software circa 2001
3/23/2016
© 2007 Keith A. Pray
21
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
22
CS 3043 Social Implications Of Computing
Government




What kinds of info should a government
legitimately have about its citizens or others?
What kinds of info should a government not
have?
What good things (for society) could a
government do with info?
What bad things could a government do?
3/23/2016
© 2007 Keith A. Pray
23
CS 3043 Social Implications Of Computing
What Safeguards Are There?

In US:


Census
Taxes
Federal
 Local




3/23/2016
Search warrants
Wiretaps
Inter-agency sharing
© 2007 Keith A. Pray
24
CS 3043 Social Implications Of Computing
Other Factors





Police: outstanding warrants
Combos: child support /driver’s license
Immigration
Public health
Security of Information
3/23/2016
© 2007 Keith A. Pray
25
CS 3043 Social Implications Of Computing
Other Factors II







Surveillance
Freedom of association
Anonymity? Newsgroups, email, snail mail,
posters & flyers, ads.
Criminal background
Sexual harassment
Discrimination
Gun registration
3/23/2016
© 2007 Keith A. Pray
26
CS 3043 Social Implications Of Computing
Companies




What kinds of info should a company
legitimately have about its customers, employees,
or others?
What kinds of info should a company not have?
What good things (for society) could a company
do with info?
What bad things could a company do?
3/23/2016
© 2007 Keith A. Pray
27
CS 3043 Social Implications Of Computing
Safeguards

Privacy policies





Special for children
Sharing within / between companies
Right to correct / comment
Privacy in the workplace
Surveillance of employees & customers
3/23/2016
© 2007 Keith A. Pray
28
CS 3043 Social Implications Of Computing
Other Business Things


Bankruptcy
Fraud
3/23/2016
© 2007 Keith A. Pray
29
CS 3043 Social Implications Of Computing
Technology


Overall computer security
Encryption
3/23/2016
© 2007 Keith A. Pray
30
CS 3043 Social Implications Of Computing
Overview
1.
2.
3.
4.
5.
6.
Clean Up Past Topics - Students Present
Work And Study Abroad - Students Present
Privacy - A Nigerian Perspective - Student Presents
Privacy - Technology Concerns - Students Present
Closing On Privacy Topic
Assignment
3/23/2016
© 2007 Keith A. Pray
31
CS 3043 Social Implications Of Computing
Assignment

Intellectual Property



Read Chapter 6.
Short paper:
Answer short individual questions assigned
during class.
3/23/2016
© 2007 Keith A. Pray
32
CS 3043 Social Implications Of Computing
Assignment Self Search Project

For each source of data you posted reply to that
posting with a link to the privacy policy for the
hosting site.
3/23/2016
© 2007 Keith A. Pray
33
CS 3043 Social Implications Of Computing
Assignment Group Project

Due Monday

Cite scenes and section in your text which are
related.
You are only responsible for the topics covered in class
so far.
 Keep in mind that as we cover new topics you will need
to revisit the movie to see what scenes, if any, are
relevant.

3/23/2016
© 2007 Keith A. Pray
34
CS 3043 Social Implications Of Computing
Class 8
The End
Keith A. Pray
Instructor
socialimps.keithpray.net
3/23/2016
© 2004 Keith A. Pray
35
Download