Transcript of Personal Privacy Christina Lak Current Events Hour 4.
- Slide 1
- Personal Privacy Christina Lak Current Events Hour 4
- Slide 2
- Homeland Security It is the Presidents highest priority to keep
this country and the people inside it safe. He is obligated by oath
and morals to protect Americans from harm such as terrorist
attacks, natural disasters, and human wrongdoing. The Department of
Homeland Security was developed in 2003 as a direct result of the
Terrorist Attacks on September 11 th. It is there to reduce
Americas vulnerability to terrorism and minimize the damage from
attacks that do occur. This development also responds and protects
from natural disasters and man-made accidents as well, such as the
Hurricane Katrina catastrophe. DHS was created officially to ensure
that the Federal Government works with states and local
governments, and the private sector as close partners in a national
approach to prevention, mitigation, and response. This requires the
dedication of more than 230,000 employees in jobs that range from
aviation and border security to emergency response and cyber
security analyst. The Department of Homeland Security has a vital
mission: to secure the nation from the many threats America
faces.
- Slide 3
- Homeland Security The Department of Homeland Security has many
responsibility descriptions including: Emergency preparedness and
response (for both terrorism and natural disasters), including
volunteer medical, police, emergency management, and fire fighters
Domestic and International intelligence activities within the FBI
Border security; including within America and country boarders
transportation security, including buses, trains, flights, and
passports Detection of radioactive and radiology materials Research
on next-generation security technologies
- Slide 4
- Airport Security The extensive procedures when going through
airport security has always troubled Americans in general. Prior to
9/11/2001, passengers would be required to remove their shoes,
jewelry, wallets, belts and jackets before walking though a metal
detector. If something didnt seem right, or the detector when off,
they would go into further searching to ensure safety, then be on
their way. Today, in 2011, airports security search and seizure
process in America is much more extensive. Passengers must remove
all the previous items, as well as all liquids and gels under 3oz,
nail files and clippers, and cell phones. Then they proceed into a
dome-like structure called the Millimeter Wave Unit, that you stand
in with arms and legs spread apart while a scanner takes an x-ray
image of youre entire body. This makes some Americans unsettled
with how much TSA is seeing on each person. This method of security
is required for the prevention of people hiding weapons,
explosives, drugs, or any other harmful objects on/in themselves.
After the terrorist attacks that shook our country, this level of
security when boarding an airplane is what is thought to be
necessary.
- Slide 5
- Airport Security The measures taken at security checkpoints in
airports differ for different types of passengers. For example,
children 12 and under and able to leave their shoes on when passing
through security. Also, TSA has designed a new program to expedite
screening for airline pilots through positive identification
verification. Some passengers may not agree with this however for a
number of reasons. It has been reported in some cases previously
that known terrorists have attempted to plant weapons on theyre
children, as well as plan to. As for pilots and flight attendants
passing by security, there is almost no room for error. Officials
such as those have personal identification cards that are produced
by the airline they are flying for. These cards have been passed
through extensive background checks and verification that proves
theyre legitimacy. Also, pilots and flight attendants use finger
print scanners to further verify theyre identity matching up with
their card.
- Slide 6
- The Millimeter Wave Scanner
- Slide 7
- Cell Phone Records Americans have privacy over their cell phone
records through the company theyre signed up with. This means that
the company (i.e. Verizon, Sprint, AT&T etc...) that provides
service to the cell phone one is in possession of, has all the
records of calls, texts, emails, and multimedia on file. This is
protected from public view however, through rules and regulations
set by the corporation. The FBI and the National Security Agency
(NSA) can subpoena the cell phone company for phone records without
a prior warrant as a result of the 2001 Patriot Act in order help
prevent acts of terrorism. They can also wire tap, that is, listen
and record your cell phone conversations. However, it is illegal
under law that the cell phone company that has given over your cell
phone records to the FBI or NSA publically known or advertise the
fact that your phone was investigated.
- Slide 8
- Cell Phone Record Search Police have the right to search a
persons cell phone without a warrant only under certain conditions.
The only way an officer can search your phone is when it is
"incident to an arrest. Otherwise, if not related to the arrest, a
person can refuse a search of their cell phone on the spot and then
the police will have to apply for a search warrant to move any
further with the procedure. Traditional search warrant exceptions
apply to the search of cell phones. Thanks to numerous cases where
cell phone GPS tracking has saved lives and traced police to
discovery of missing persons, police now use that as an immediate
standard when a missing person is reported. For these reasons the
Federal Communications Commission (FCC) requires wireless network
providers to give the cell phone GPS tracking location information
for 911 calls that have been made from cell phones. It allows
carriers to provide tracking location information to third parties
for E911 emergency calls only, however not under any other
circumstances whatsoever without the consent of the cell phone
owner. Recent court hearings have disallowed the requests of law
enforcement agencies to obtain cell phone GPS tracking information
from the cell phone companies for suspects in criminal
investigations. Even though it may seem to some people that it is
an invasion of privacy to track the user by the cell phones GPS, it
has upset many people that companies wont provide the information
without user consent. If the police are conducting a search, and
the user is in dire need of being found, it is a necessary
procedure.
- Slide 9
- Identity Theft Identity theft is a form of stealing another
persons identity typically in order to access resources or obtain
credit and other benefits in that person's name. If the person who
is the victim cannot prove that the perpetrator's actions were not
done by them, they could be help accountable for what the theft
did. When a criminal fraudulently identifies himself to police as
another individual at the point of arrest, it is sometimes referred
to as "Criminal Identity Theft. It can be difficult for the victim
of a criminal identity theft to clear their record. The process can
be long drawn out and complicated. The victim can also suffer from
the consequences of having a false criminal record. The loss of a
job opportunity or the cancelation or overdrawn of credit. The
victim might need to locate the original arresting officers and
prove their own identity by some reliable means such as
fingerprinting or DNA fingerprinting, and may need to go to a court
hearing to be cleared of the charges. Medical identity theft occurs
when someone uses a person's name and sometimes other parts of
their identity, such as insurance information, without the person's
knowledge or consent to obtain medical services or goods. This can
cause tremendous problems for the victim and will be extremely
difficult to find the thief. Medical records could prove however
through bodily exams and samples that were possibly given by the
thief, that the person was not really who they said they were.
- Slide 10
- Techniques for Obtaining Your Identity Shred all files, mail,
documents, bills, and bank statements thoroughly before throwing
away Ensure adequate network security Always keep a safe lock
password on any laptop, tablet, or cell phone devise that can
access important information regarding your identity (If an item
like that is stolen or misplaced it can fall into the wrong hands
and turn into an identity theft situation) Never carry your social
security number on you in any form of document or in a cell phone
or computer of any sort (memorize the number) When entering a pin
number or credit card number, be aware of who is around you and
make sure no one sees what you are typing in Instead of signing
that back of your card, write see ID so the cashier knows to look
at the signature on your ID card When selling a phone or computer
of some sort, make sure to destroy all files and history that could
be traced to personal information Pay all your bills at the post
office. Never leave paid bills in your mailbox to be sent out. A
thief who raids your mailbox would be able to acquire critical
information in just one envelope. (your name, address, credit
account number, your bank information including the routing number
and account number from the bottom of the check, and a copy of your
signature from your check for forgery purposes)
- Slide 11
- Internet Use Privacy In today's day and age, people are
fearless when it comes to what they will put on the internet.
People think that they can control who sees what and if they delete
something, its gone forever. What many dont understand is literally
anyone can access every bit of information put online, and it will
always be available somehow. According to Steve Rambam, private
investigator specializing in Internet privacy cases says, "Privacy
is dead get over it. He is absolutely right and most people would
agree. There are millions of hackers (companies and random
personnel) that will break into a persons computer and have access
to all of their files in a click of a button.
- Slide 12
- Internet Usage Too Far Websites such as Facebook and MySpace
give the opportunity however, to hide what you dont want the
general public to see, and what you want only people you approve to
see. This gives users a sense of security and comfort, but
sometimes its too much comfort. People from ages 12-any age are
posting pictures, statuss and videos that would in reality, deem
inappropriate. In some cases, kids under legal age have posted
evidence of themselves drinking, partying, and doing illegal drugs.
This has sparked the attention of local law enforcement and forced
them to take action in a whole new way. Local police officers have
created numerous Facebook accounts posing as average students
similar to the ones at local schools. They then proceeded to add
the people doing underage illegal activity and used it as warrants
for arrest. Although this is an invasion of privacy in a clear
sense, its what officials have called acceptable due to the
circumstances.
- Slide 13
- Bibliography
http://communications-media.lawyers.com/privacy-law/Cell-Phone-
Privacy.html
http://communications-media.lawyers.com/privacy-law/Cell-Phone-
Privacy.html
http://www.ftc.gov/bcp/edu/microsites/idtheft/netsecurity.about.com/od
/newsandeditorial1/a/aaidenttheft_2.htm
http://www.ftc.gov/bcp/edu/microsites/idtheft/netsecurity.about.com/od
/newsandeditorial1/a/aaidenttheft_2.htm
http://www.tsa.gov/travelers/index.shtm
https://www.privacyrights.org/fs/fs18-cyb.htm
www.focus.com/fyi/state-internet/