CSCE 201 Open Source Information Privacy Reading List
- Slides: 22
CSCE 201 Open Source Information Privacy
Reading List l Recommended reading: – Open Source Intelligence: Private Sector Capabilities to Support Do. D Policy, Acquisitions, and Operations , http: //www. fas. org/irp/eprint/oss 980501. ht m – The Economic Espionage Act, 1996 http: //www. usdoj. gov/criminal/cybercrime /eea. html CSCE 201 - Farkas 2
Open Source l Unclassified information in the public domain or available from commercial services l Example: newspapers, magazines, scientific publications, television and radio broadcasting, databases, etc. CSCE 201 - Farkas 3
Open Source Intelligence l Intelligence operation that uses open source data l Goal: answer specific question in support of some mission l Process: – Requirement analysis – Data collection/filtering/analysis – Information integration Intelligence about CSCE 201 - Farkas 4
Open Source Intelligence Generally legal (uses readily available information) l Attacker gains access to protected information, e. g. , l – Business trade secrets – Military strategy, – Personal information l Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data CSCE 201 - Farkas 5
Open Source Intelligence l l l Widely used (e. g. , Department of Defense) Cheap, fast, or timely Most often legal Advantages: no risk for collector, provides context, mode of information acquisition, cover for data discovery by secret operations Disadvantages: may not discover important information, assurance of discovery(? ) CSCE 201 - Farkas 6
Online Open Source Intelligence l Large amount of public data online – Web pages, online databases, digital collections, organizations on line, government offices, etc. l Freedom and Information Act (FOIA): industry data l U. S. Patent Office: copies of U. S. patents l Trade shows, public records, etc. CSCE 201 - Farkas 7
Privacy l Use open source to find out confidential data about people l Find confidential data about people while they browse through open source (e. g. , Web searches) CSCE 201 - Farkas 8
Online Investigative Tools l Find out confidential data for small fee – Net Detective (http: //ndet. jeanharris. com/ – Dig Dirt (http: //www. classified 3. com/ ) l Privacy Tools (http: //www. epic. org/privacy/tools. html ) CSCE 201 - Farkas 9
Legislations Privacy Act of 1974, U. S. Department of Justice (http: //www. usdoj. gov/oip/04_7_1. html ) l Family Educational Rights and Privacy Act (FERPA), U. S. Department of Education, (http: //www. ed. gov/policy/gen/guid/fpco/ferpa/index. html ) l Health Insurance Portability and Accountability Act of 1996 (HIPAA), (http: //en. wikipedia. org/wiki/Health_Insurance_Portability_and _Accountability_Act ) l Telecommunications Consumer Privacy Act (http: //www. answers. com/topic/electronic-communicationsprivacy-act ) l CSCE 201 - Farkas 10
Privacy Violations l Snooping via Open Sources l Online activities – Questionnaires – Customers’ data – Web site data collection (Cookies, IP address, operating system, browser, requested page, time of request, etc. ) – without user’s permission CSCE 201 - Farkas 11
Other Open Source Attacks Piracy – Available in open source, but still protected by copyright, patent, trademark, etc. l Copyright Infringement – Acquisition of protected work without the owner’s permission and sold for a fee – Human perception: not serious crime – Significant loss for marketing/manufacturing/owner l – Berman Bill (http: //www. news. com/2100 -1023 - 946316. html ) – Copyright Law of the United States (http: //www. copyright. gov/title 17/ ) CSCE 201 - Farkas 12
What is Intelligence? l Information l Activities l Organization CSCE 201 - Farkas 13
Information “…relevant to a government’s formulation and implementation of policy to further its national security interests and to deal with threats from actual or potential adversaries. ” (Silent Warfare) l Examples: – Military matters of foreign nations – Diplomatic activities and intentions of foreign nations – Intelligence activities of foreign nations l Other party may or may not want to keep it secret l Raw data and analyses and assessments based on raw data l CSCE 201 - Farkas 14
Activity l Activities: – Collection and analysis on intelligence information – Counterintelligence Collection: wide range (e. g. , wiretapping, broadcasts, newspapers, research publications, aerial photography, espionage, etc. ) l Analysis: quality of data, correctness of analysis, timeliness, etc. l CSCE 201 - Farkas 15
Organization l Secrecy! l Secret activities -- Covert actions – Same organization vs. two organizations l Central CSCE 201 - Farkas Intelligence Agency 16
Scope of Intelligence l Government -- national security – Range from peace time to war time intelligence – Type of government l l l Domestic Intelligence -- depends on nature of regime Business corporations – competitive advantage Economics and Intelligence – Government-run economy – Economic well-being of nation l Non-traditions Intelligence – Environmental issues CSCE 201 - Farkas 17
Intelligence and Law Enforcement Transnational threats: – Do not originate primarily from a foreign government – Serious threats for nation’s well-being – Fall within law enforcement rather than intelligence – Examples: narcotics trafficking, international terrorism l Law enforcement: waiting until a crime has been committed l Intelligence: collection of convincing evidence l Criminal investigation vs. criminal intelligence investigation – Punishment of a given criminal act or struggle with an organization engaged in criminal activity l CSCE 201 - Farkas 18
Intelligence – Information Age l l l Advent of information age Change the mode of operations for business corporations and government Technology: communicating and processing information Behavioral and institutional change: information as the key of organizational activities Intelligent Services vs. competing organizations CSCE 201 - Farkas 19
Intelligence and Information Age l Globalization – Flow of information across borders – International trade – Division of labor – Increased travel – Increased penetration by news media CSCE 201 - Farkas 20
Open Source Collection l l l Goal oriented Publications and broadcast Additional information available from nonintelligence sources Special sources (e. g. , speeches of political leaders, legal documents, demographic data, etc. ) Large amount of openly available data Need processing power CSCE 201 - Farkas 21
Problem of Increased Availability l How to locate sources l How to evaluate source reliability l How to analyze information and integrate with other intelligence information l How to protect confidentiality of policy maker’s interest CSCE 201 - Farkas 22
- Cvs privacy awareness and hipaa training answers
- While reading activities
- 영국 beis
- Flight information display system and open source
- Issues surrounding information privacy
- âq1
- Wrt os
- Is hadoop open source
- Open source electronics prototyping platform
- Pbx architecture
- Nato open source intelligence handbook
- Open source sdn projects
- Intrusion prevention system open source
- Open source java games
- Suse open source
- Job scheduler open source
- Pentaho bi platform
- Dual mode in os
- Open source search engines
- Open source vpn
- Open source unified communication
- Open source integrator
- Open source software disadvantages