Personal Privacy Christina Lak Current Events Hour 4.

download Personal Privacy Christina Lak Current Events Hour 4.

If you can't read please download the document

Transcript of Personal Privacy Christina Lak Current Events Hour 4.

  • Slide 1
  • Personal Privacy Christina Lak Current Events Hour 4
  • Slide 2
  • Homeland Security It is the Presidents highest priority to keep this country and the people inside it safe. He is obligated by oath and morals to protect Americans from harm such as terrorist attacks, natural disasters, and human wrongdoing. The Department of Homeland Security was developed in 2003 as a direct result of the Terrorist Attacks on September 11 th. It is there to reduce Americas vulnerability to terrorism and minimize the damage from attacks that do occur. This development also responds and protects from natural disasters and man-made accidents as well, such as the Hurricane Katrina catastrophe. DHS was created officially to ensure that the Federal Government works with states and local governments, and the private sector as close partners in a national approach to prevention, mitigation, and response. This requires the dedication of more than 230,000 employees in jobs that range from aviation and border security to emergency response and cyber security analyst. The Department of Homeland Security has a vital mission: to secure the nation from the many threats America faces.
  • Slide 3
  • Homeland Security The Department of Homeland Security has many responsibility descriptions including: Emergency preparedness and response (for both terrorism and natural disasters), including volunteer medical, police, emergency management, and fire fighters Domestic and International intelligence activities within the FBI Border security; including within America and country boarders transportation security, including buses, trains, flights, and passports Detection of radioactive and radiology materials Research on next-generation security technologies
  • Slide 4
  • Airport Security The extensive procedures when going through airport security has always troubled Americans in general. Prior to 9/11/2001, passengers would be required to remove their shoes, jewelry, wallets, belts and jackets before walking though a metal detector. If something didnt seem right, or the detector when off, they would go into further searching to ensure safety, then be on their way. Today, in 2011, airports security search and seizure process in America is much more extensive. Passengers must remove all the previous items, as well as all liquids and gels under 3oz, nail files and clippers, and cell phones. Then they proceed into a dome-like structure called the Millimeter Wave Unit, that you stand in with arms and legs spread apart while a scanner takes an x-ray image of youre entire body. This makes some Americans unsettled with how much TSA is seeing on each person. This method of security is required for the prevention of people hiding weapons, explosives, drugs, or any other harmful objects on/in themselves. After the terrorist attacks that shook our country, this level of security when boarding an airplane is what is thought to be necessary.
  • Slide 5
  • Airport Security The measures taken at security checkpoints in airports differ for different types of passengers. For example, children 12 and under and able to leave their shoes on when passing through security. Also, TSA has designed a new program to expedite screening for airline pilots through positive identification verification. Some passengers may not agree with this however for a number of reasons. It has been reported in some cases previously that known terrorists have attempted to plant weapons on theyre children, as well as plan to. As for pilots and flight attendants passing by security, there is almost no room for error. Officials such as those have personal identification cards that are produced by the airline they are flying for. These cards have been passed through extensive background checks and verification that proves theyre legitimacy. Also, pilots and flight attendants use finger print scanners to further verify theyre identity matching up with their card.
  • Slide 6
  • The Millimeter Wave Scanner
  • Slide 7
  • Cell Phone Records Americans have privacy over their cell phone records through the company theyre signed up with. This means that the company (i.e. Verizon, Sprint, AT&T etc...) that provides service to the cell phone one is in possession of, has all the records of calls, texts, emails, and multimedia on file. This is protected from public view however, through rules and regulations set by the corporation. The FBI and the National Security Agency (NSA) can subpoena the cell phone company for phone records without a prior warrant as a result of the 2001 Patriot Act in order help prevent acts of terrorism. They can also wire tap, that is, listen and record your cell phone conversations. However, it is illegal under law that the cell phone company that has given over your cell phone records to the FBI or NSA publically known or advertise the fact that your phone was investigated.
  • Slide 8
  • Cell Phone Record Search Police have the right to search a persons cell phone without a warrant only under certain conditions. The only way an officer can search your phone is when it is "incident to an arrest. Otherwise, if not related to the arrest, a person can refuse a search of their cell phone on the spot and then the police will have to apply for a search warrant to move any further with the procedure. Traditional search warrant exceptions apply to the search of cell phones. Thanks to numerous cases where cell phone GPS tracking has saved lives and traced police to discovery of missing persons, police now use that as an immediate standard when a missing person is reported. For these reasons the Federal Communications Commission (FCC) requires wireless network providers to give the cell phone GPS tracking location information for 911 calls that have been made from cell phones. It allows carriers to provide tracking location information to third parties for E911 emergency calls only, however not under any other circumstances whatsoever without the consent of the cell phone owner. Recent court hearings have disallowed the requests of law enforcement agencies to obtain cell phone GPS tracking information from the cell phone companies for suspects in criminal investigations. Even though it may seem to some people that it is an invasion of privacy to track the user by the cell phones GPS, it has upset many people that companies wont provide the information without user consent. If the police are conducting a search, and the user is in dire need of being found, it is a necessary procedure.
  • Slide 9
  • Identity Theft Identity theft is a form of stealing another persons identity typically in order to access resources or obtain credit and other benefits in that person's name. If the person who is the victim cannot prove that the perpetrator's actions were not done by them, they could be help accountable for what the theft did. When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft. It can be difficult for the victim of a criminal identity theft to clear their record. The process can be long drawn out and complicated. The victim can also suffer from the consequences of having a false criminal record. The loss of a job opportunity or the cancelation or overdrawn of credit. The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA fingerprinting, and may need to go to a court hearing to be cleared of the charges. Medical identity theft occurs when someone uses a person's name and sometimes other parts of their identity, such as insurance information, without the person's knowledge or consent to obtain medical services or goods. This can cause tremendous problems for the victim and will be extremely difficult to find the thief. Medical records could prove however through bodily exams and samples that were possibly given by the thief, that the person was not really who they said they were.
  • Slide 10
  • Techniques for Obtaining Your Identity Shred all files, mail, documents, bills, and bank statements thoroughly before throwing away Ensure adequate network security Always keep a safe lock password on any laptop, tablet, or cell phone devise that can access important information regarding your identity (If an item like that is stolen or misplaced it can fall into the wrong hands and turn into an identity theft situation) Never carry your social security number on you in any form of document or in a cell phone or computer of any sort (memorize the number) When entering a pin number or credit card number, be aware of who is around you and make sure no one sees what you are typing in Instead of signing that back of your card, write see ID so the cashier knows to look at the signature on your ID card When selling a phone or computer of some sort, make sure to destroy all files and history that could be traced to personal information Pay all your bills at the post office. Never leave paid bills in your mailbox to be sent out. A thief who raids your mailbox would be able to acquire critical information in just one envelope. (your name, address, credit account number, your bank information including the routing number and account number from the bottom of the check, and a copy of your signature from your check for forgery purposes)
  • Slide 11
  • Internet Use Privacy In today's day and age, people are fearless when it comes to what they will put on the internet. People think that they can control who sees what and if they delete something, its gone forever. What many dont understand is literally anyone can access every bit of information put online, and it will always be available somehow. According to Steve Rambam, private investigator specializing in Internet privacy cases says, "Privacy is dead get over it. He is absolutely right and most people would agree. There are millions of hackers (companies and random personnel) that will break into a persons computer and have access to all of their files in a click of a button.
  • Slide 12
  • Internet Usage Too Far Websites such as Facebook and MySpace give the opportunity however, to hide what you dont want the general public to see, and what you want only people you approve to see. This gives users a sense of security and comfort, but sometimes its too much comfort. People from ages 12-any age are posting pictures, statuss and videos that would in reality, deem inappropriate. In some cases, kids under legal age have posted evidence of themselves drinking, partying, and doing illegal drugs. This has sparked the attention of local law enforcement and forced them to take action in a whole new way. Local police officers have created numerous Facebook accounts posing as average students similar to the ones at local schools. They then proceeded to add the people doing underage illegal activity and used it as warrants for arrest. Although this is an invasion of privacy in a clear sense, its what officials have called acceptable due to the circumstances.
  • Slide 13
  • Bibliography http://communications-media.lawyers.com/privacy-law/Cell-Phone- Privacy.html http://communications-media.lawyers.com/privacy-law/Cell-Phone- Privacy.html http://www.ftc.gov/bcp/edu/microsites/idtheft/netsecurity.about.com/od /newsandeditorial1/a/aaidenttheft_2.htm http://www.ftc.gov/bcp/edu/microsites/idtheft/netsecurity.about.com/od /newsandeditorial1/a/aaidenttheft_2.htm http://www.tsa.gov/travelers/index.shtm https://www.privacyrights.org/fs/fs18-cyb.htm www.focus.com/fyi/state-internet/