CS 3043 Social Implications Of Computing Class 8 Privacy Continued Keith A. Pray Instructor socialimps.keithpray.net 3/23/2016 © 2004 Keith A. Pray 1 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 2 CS 3043 Social Implications Of Computing Joe – Positive Example of Contribute to Society Free Geek FEMA database Access for the handicapped. 3/23/2016 © 2007 Keith A. Pray 3 CS 3043 Social Implications Of Computing Mali - MafiaBoy Mike Calce, “Script kiddie” that successfully launched DoS attacks against major websites such as yahoo, amazon, ebay, cnn. FBI caught him -> records of him announcing on IRC that he was responsible * Sentenced to 8 months of open custody, one year of probation and restricted use of the internet. Published estimates of damages up to 1.2 billion, but estimate given by prosecutor is $7.5 million. 31.25 thousand dollars per day in youth detention center. 3/23/2016 © 2007 Keith A. Pray 4 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 5 CS 3043 Social Implications Of Computing Kate – Work Visas Types of visa Temporary Business or Tourism (B1/B2) Temporary Work (H, L) Student or Exchange Programs (F, M, J) 3/23/2016 Nonimmigrant Worker (H) Intracompany Transfer (L) Student Visas (F, M) Exchange Visas (J) Summer Work & Travel Program For Students Other: Crew Members and/or Transit (C1/D), Journalists (I), Religious Occupations (R), Fiance(e) Visas (K-1/K-2), Spouse/Children of U.S. Citizen (K-3/K-4) © 2007 Keith A. Pray 6 CS 3043 Social Implications Of Computing Kate – Work Visas Green Card 3/23/2016 The United States Government issues 55,000 permanent resident cards (Green Cards) every year through the Diversity Immigrant Visa Program, commonly known as the Green Card Lottery. Applicants are selected randomly by a computergenerated drawing. If selected, the main applicant, spouse and all unmarried children under 21 years of age will have a chance to apply for permanent resident status in the United States. A Green Card or Permanent Resident Card discloses information that provides an individual’s proof of lawful permanent resident status in the United States. An individual with a Green Card has the right to live and work permanently in the United States. Temporary Work Visas H-1B Work Visa for College Educated Professionals H-2B Work Visa for Skilled and Unskilled Workers H-3 Trainee Visa Foreign Programmers Hoping to Work in U.S. Need Right Employer © 2007 Keith A. Pray More high-level programmers from foreign countries are coming to the United States because the demand for them is exceeding supply. U.S. companies turn to IT staffing firms to supply those experts. 7 CS 3043 Social Implications Of Computing Joe – Work Visas in Israel Requirements: Your company must request a permit for you Visa must be extended after one year regardless You can only work in the designated trade Bottom line: Obtaining a work visa in Israel is rather easy 3/23/2016 © 2007 Keith A. Pray 8 CS 3043 Social Implications Of Computing Elliot - Work Permits in South Africa Intra-Company Secondary Temporary Business Company Visits for > 25% Share Ownership Films, Commercials, Documentaries Religious Volunteers Consulting from Abroad Effective Time Processing Time 3/23/2016 © 2007 Keith A. Pray 9 CS 3043 Social Implications Of Computing Mali – Getting an Education Here and then Going Home Gives an edge during resume screening: My take: Probably is ethical. Tougher to get a good CS education in Turkey that is up to date and sufficient to let students work “in the field” immediately Harder to get enthusiastic programmers as opposed to people who studied CS because they “ended up” that way => Fault of the educational system Company's best interest is to hire the best candidate available. If this means hiring someone who studied in the US because of the above reasons, this is fair. Deciding solely on this basis => Unfair. Discrimination. Sources: 3/23/2016 Evren Gulcig, uChicago graduate Murat Aladag, Georgia Tech graduate © 2007 Keith A. Pray 10 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 11 CS 3043 Social Implications Of Computing Wike - American 4th Amendment: Searches and seizures The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Provisions must not be violated Secure against searches and seizures in: Persons Houses Papers Effects Provision must not be violated Need for probable cause 3/23/2016 © 2007 Keith A. Pray 12 CS 3043 Social Implications Of Computing Wike - Nigerian Act 4 Chapter 21A 233E 1-8 Search and Seizure (1) Subject to the provisions of this Chapter, if a magistrate is satisfied by information on oath that there is reasonable ground for suspecting that articles deemed to he obscene for the purposes of this Chapter are, or are from time to time, kept for publication for gain in any premises or on any stall or vehicle in the State, the magistrate may issue a warrant under his hand empowering any constable to enter (if need he by force) and search the premises, or to search the stall or vehicle, within fourteen days -from the date of the warrant, and to seize and remove any articles found therein or thereon which the constable has reason to believe to be obscene articles for the purposes of this Chapter and to be kept for publication for gain. (2) A warrant under subsection (1) of this section shall, if any obscene articles are seized under the warrant, also empower the seizure and removal of any documents found in the premises or, as the case may be, on the stall or vehicle which relate to a trade or business carried on at the premises or from the stall or vehicle. (3) Articles seized under subsection (1) of, this section may be brought before the magistrate who issued the warrant or before any other magistrate, and the magistrate before whom the articles are brought may thereupon issue a summons to the occupier of the premises, or, as the case may be, the user of the stall or vehicle to appear on a day specified in the summons before a magistrate's court to show cause why the articles or any of them should not be, forfeited. If the court is satisfied, as respects any of the articles, that at the time when they were seized they were obscene articles kept for publication for gain, the court shall order those articles to be forfeited; but no order shall be made under this subsection in default of appearance by the person summoned unless service of the summons is proved. 3/23/2016 © 2007 Keith A. Pray 13 CS 3043 Social Implications Of Computing Wike - Nigerian Pinal code cont… (4) In addition to the person summoned, any other person being the owner, author or maker of any of the articles brought before the court, or any other person through whose hands they had passed before being seized, shall be entitled to appear before the court on the day specified in the summons to show cause why they should not be forfeited. (5) Where an order is made under this section for the forfeiture of any articles, any person who appeared, or was entitled to appear, to show cause against the making of the order may appeal to the High Court; and no such order shall take effect until the expiration of fourteen days after the day on which the order is made, or, if before the expiration thereof notice of appeal is duly given, until the final determination or abandonment of the proceedings on the appeal. (6) If as respects any articles brought before it the court does not order forfeiture, the court may if it thinks fit order the person on whose information the warrant for the seizure of the articles was issued to pay such costs as the court thinks reasonable to any person who has appeared before the court to show cause why those articles should not be forfeited; and costs ordered to be paid under this subsection shall be enforceable as a civil debt. 3/23/2016 © 2007 Keith A. Pray 14 CS 3043 Social Implications Of Computing Wike - Nigerian Pinal code cont… (7) For the purposes of this section, the question whether an article is obscene shall be determined on the assumption that copies of it would be published in any manner likely having regard to the circumstances in which it was found, but in no other manner. (8) Nothing in this section shall be construed to preclude the making of any order for the purposes of section 263 of the Criminal Procedure Act (which relates to disposal of property produced before a court). 3/23/2016 © 2007 Keith A. Pray 15 CS 3043 Social Implications Of Computing Wike - Nigerian Penal code -Translation Essentially, anything that a magistrate deems to be morally offensive can be confiscated by a “constable”. 3/23/2016 © 2007 Keith A. Pray 16 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 17 CS 3043 Social Implications Of Computing Greg - Census Individual census records are actually kept by the government after the report is compiled They are made public 70 years after the year they were taken 3/23/2016 Most recent data available is from 1930 © 2007 Keith A. Pray 18 CS 3043 Social Implications Of Computing Tim R. – Keylogging Remotely Key loggers are used to gather all of the information typed into ones keyboard into a file to be accessed later Piece of hardware directly connected to the keyboard or the actual keyboard, or a piece of software Key loggers are available many places on the internet Generally software tools Can be run by viruses, Trojans and locally or remotely on the box The biggest issue when using a key logger is retrieving the information gathered without being traced Most common practice is to have thing information post itself to a newsgroup or discussion board Avoids emailing directly to the person who wants the information, or sending it directly to a hostname or ip address which would be more easily traceable Installing a key logger remotely is possible via a terminal, or another way of accessing the computer remotely. 3/23/2016 © 2007 Keith A. Pray 19 CS 3043 Social Implications Of Computing Craig - Echelon Echelon is the name used by the world media for a international system of satellites allegedly capable of intercepting and monitoring all wired and wireless communication on a global scale In actuality this is not the case as in 2001 a parliamentary investigation was able to determine that their was a very low possibility that the system had the capability to monitor all electronic communication but rather concluded that it is used to monitor foreign individuals and organizations chosen for surveillance through traditional HUMINT means No proof has been able to be generated as to whether or not the NSA has used the system on US Citizens or Foreign governments have used it on US Citizens. From the information gathered it actually seems much easier for the NSA to hand any electronic surveillance domestically over to the FBI and have it get a warrant to use its Carnivore System. 3/23/2016 © 2007 Keith A. Pray 20 CS 3043 Social Implications Of Computing Dan - Carnivore Revealed through ISP challenge to use Public criticism essentially killed it FBI switched to commercial software circa 2001 3/23/2016 © 2007 Keith A. Pray 21 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 22 CS 3043 Social Implications Of Computing Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do? 3/23/2016 © 2007 Keith A. Pray 23 CS 3043 Social Implications Of Computing What Safeguards Are There? In US: Census Taxes Federal Local 3/23/2016 Search warrants Wiretaps Inter-agency sharing © 2007 Keith A. Pray 24 CS 3043 Social Implications Of Computing Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information 3/23/2016 © 2007 Keith A. Pray 25 CS 3043 Social Implications Of Computing Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, email, snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration 3/23/2016 © 2007 Keith A. Pray 26 CS 3043 Social Implications Of Computing Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do? 3/23/2016 © 2007 Keith A. Pray 27 CS 3043 Social Implications Of Computing Safeguards Privacy policies Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers 3/23/2016 © 2007 Keith A. Pray 28 CS 3043 Social Implications Of Computing Other Business Things Bankruptcy Fraud 3/23/2016 © 2007 Keith A. Pray 29 CS 3043 Social Implications Of Computing Technology Overall computer security Encryption 3/23/2016 © 2007 Keith A. Pray 30 CS 3043 Social Implications Of Computing Overview 1. 2. 3. 4. 5. 6. Clean Up Past Topics - Students Present Work And Study Abroad - Students Present Privacy - A Nigerian Perspective - Student Presents Privacy - Technology Concerns - Students Present Closing On Privacy Topic Assignment 3/23/2016 © 2007 Keith A. Pray 31 CS 3043 Social Implications Of Computing Assignment Intellectual Property Read Chapter 6. Short paper: Answer short individual questions assigned during class. 3/23/2016 © 2007 Keith A. Pray 32 CS 3043 Social Implications Of Computing Assignment Self Search Project For each source of data you posted reply to that posting with a link to the privacy policy for the hosting site. 3/23/2016 © 2007 Keith A. Pray 33 CS 3043 Social Implications Of Computing Assignment Group Project Due Monday Cite scenes and section in your text which are related. You are only responsible for the topics covered in class so far. Keep in mind that as we cover new topics you will need to revisit the movie to see what scenes, if any, are relevant. 3/23/2016 © 2007 Keith A. Pray 34 CS 3043 Social Implications Of Computing Class 8 The End Keith A. Pray Instructor socialimps.keithpray.net 3/23/2016 © 2004 Keith A. Pray 35