Sie sind auf Seite 1von 46

Privacy

Alexandra Jimenez, Fernando Madrigal, Jenn Schopfer,


Jose Sanchez, Joshua Coon, Luigi D'Antonio, Martin
Almaraz, Pearce Reinsch, Miriam Flores
Table Of Content
1. Overview
2. Data Collection
3. Government Surveillance: Phone Tracking
4. Government Surveillance: Cameras
5. Personal Use of Drones
6. Advertisement Targeting
7. Consumer Privacy
8. Anonymity: Being Invisible on the Internet
9. Medical Devices/Wearables
10. Gattaca Genetic Testing
Overview
Privacy- the ability of an individual or
group to seclude themselves, or
information about themselves, and
thereby express themselves selectively.
(wikipedia)

As a group we will be focusing on the


privacy aspect within the government,
personal devices, data collection,
consumers and medical devices.

Group Website.
Data Collection
Pearce Reinsch
NSA Data Collection
How Internet data is collected - PRISM
How Internet data is collected cont.
How targeted Internet data is collected -
SECONDDATE
How encrypted traffic is cracked - BULLRUN
How data is stored - Data center
How much data is stored
How the data is accessed
Government Surveillance:
Phone Tracking

Alexandra Jimenez
Government Surveillance: Phone Tracking

Wikileaks: CIA & Allied Intelligence


services has compromised Apple &
Android phones, bypassing encryption
on Signal, WhatsApp & Telegram to
collect Audio and Message Traffic
before encryption is applied.
The agency can intercept the
messages & calls before its encrypted
or intercept on the other end after they
are decrypted.
CNN Coverage

http://ht3.cdn.turner.com/money/big/
news/2014/11/14/federal-spy-planes.c
nnmoney_1024x576.mp4
Ways to Track a Phones Location
Stingrays are physical antennas that pretend
to be cellphone towers & intercept phones
signals & record locations & whos contacted
Cell-Site Location Information (CSLI) is created
when a cell phones pings a tower, what towers
that the cellphone pings, the direction it came
from and what time it happened, without a
warrant
Tower Dump is CSLI info gathered from a
tower for a period of time to find a common
numbers (ex. Which cellphone numbers were
near this bank an hour before it was robbed?)
Government Surveillance:
Cameras
Jose Sanchez
Cameras
of US adults are recorded in police facial
recognition databases
The FBI has Next Generation Identification
(NGI) system which is interested in using it to
identify a random person in a crowd and track
them.
Government is looking towards using social
media platforms to get more images. (ex.
Facebook, Twitter, Google)
Government Surveillance: Drones

Police drones are already being used in reconnaissance missions to spy on


criminals and collect valuable information needed to make a bust.
In 2014, in California, the state assembly passed a bill to require every police
department in the entire state to get a search warrant every time they flew a
drone except for emergency cases. Governor Brown vetoed the bill as
Emergency case was too vague.
Drones
Fernando Madrigal
Personal Surveillance: Drones

What are drones?


What are drones used for?

Privacy

Trespassing
Stalking
Spying
Privacy Laws for Drones
Federal Aviation Administration (FAA) - is a national authority with powers to
regulate all aspects of civil aviation
31 states passed laws that limits drone use in private spaces, crowds, and
individual/s

Texas Privacy Act (Drones)

Zero tolerance for invading peoples privacy


$5,000 - $10,000 fine
Search or arrest warrants issued
Advertisement Targeting
Miriam Flores
Advertisement Targeting

Def: Form of targeting that is it trying to


reach a specific audience.

Inventory Targeting
User Targeting

Strategies

Demographic
Behavioral
Dayparting
Targeting Technologies

Cookies
First Party cookies
Third Party cookies
Web beacons

Persistent IDs

Third party vendors


Consumer privacy
Jenn Schopfer
Consumer Privacy
What is consumer privacy?

Consumer privacy laws and regulations seek to


protect any individual from loss of privacy due
to failures or limitations of corporate customer
privacy measures.
Loyalty Programs

A loyalty program According to a poll done by Boston University's


College of Communication
Agreement between a business and its
customers. 86 percent of American shoppers use
some form of store card or discount card
Customers agree to allow the business to
track purchases (and possibly other And the majority of them say the benefits
actions as well) of the card are worth giving up some
privacy.
In return, the business offers rewards.
Typical rewards include lower prices or a
free product or service.
Loyalty Programs

Running a loyalty card program is big


business

Often incurs heavy administrative costs.

CVS' ExtraCare program netted it an extra


30 million shoppers and $12 billion a year
in revenue across its 4,000 stores

Many retailers turn to third-party


merchants and marketers like Arthur Blank
and Alpha Cards to design and develop
their discount card programs.
Advantages & Drawbacks

Advantages Drawbacks

Convenience. Perceived savings.

Point building. Pressure to overspend.

Real savings and deals Too many cards and competition.

Practicality Unavailable products.


Tracked Consumer Data

Products purchased
Combinations of products purchased
together
Prices paid
Coupon or other discount offer used
Pages/products viewed
Time on site
Timing of site visits
Product reviews and information sharing
Offers or ads that the customer viewed
Privacy in Loyalty Programs

Consumers say actions by companies can push them to the breaking point.

Some of the weirdest requests that consumers say they have seen from companies include:

Using programs to access status updates or photos of friends.

Offering rewards to consumers who provide personal information.

Asking for credit card info from retailers in return for savings.

Allowing loyalty programs that consumers follow to offer rewards based on profile content.

Requesting personal information that can be used to target consumers based on demographics.
Anonymity
Joshua Coon
What is Anonymity?

Complete disconnect from your real identity


Obscured and untraceable path from end to end
Secure and encrypted communications
Anonymity
Live OS and encrypted USB

Encrypts files on OS

Has pre-configured
security settings

Pre-loaded with Tor


and I2P
Anonymity
Anonymous network (Tor or I2P)

Normal Internet Use: Anonymous Network Use:

Bad Exit Vulnerability


Anonymity
Encrypt data

OpenPGP Encryption: AES Encryption:


Wearable Technology
&
Medical Devices
Luigi DAntonio
Wearable Technology
Wearable technology, which includes medical devices is a wearable accessory or
device that can measure data or health information and transmit it to a computer.

It can be a simple:
as a watch, or wearable clothing

It can be as complex:
as a heart monitor, or Google glasses
The data that these devices collect can be either transmitted with a mobile device to the
internet, or the device can simply store the data to be connected later to a computer for
processing.
Collect Data
The information that these devices collect and share is being transmitted to both private companies as
well as government agencies. The ability for individuals to maintain privacy and security of this data is
very important, it can be hacked, or the information can be sold or shared without the person knowing it.

The collection of health data is proving to be very helpful. As you can see, this is one company that is
making great advances in medical devices

Scanadu:
https://www.scanadu.com/globalbodymap/
Gattaca Genetic Testing
Martin Almaraz
Gattaca Genetic Testing

Carrier Screening
Tests parents for recessive disorders
Done before conception
Job Specific Screening
Astronauts
Chemically Hazardous Jobs
Social Issues Post Testing
Disproportionates in Race
Exaggerated outcomes
Q&A
Thank you!

Das könnte Ihnen auch gefallen