Privacy and the Internet

LIS 386.13
Information Technologies
and the
Information Professions
Privacy and the Internet
R. E. Wyllys
Copyright © 2002 by R. E. Wyllys
Last revised 2002 Nov 8
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Lesson Objectives
• You will learn about
– Some of the threats to privacy stemming
from the growth of the Internet
– Tools with which to counter these threats
•
•
•
•
Filters
Virus-protection software
Firewalls
Cryptography
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
How the Internet Threatens Privacy
• The Internet has made it far easier than
ever before for others to find out much
about you.
– This is especially true of those of us who
use the Internet, but it holds even for those
who do not.
– Even non-users of the Internet are
vulnerable because information about them
is held by other people and institutions that
are Internet users.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
How the Internet Threatens Privacy
• This vulnerability has the potential for
lessening the control each of us has
over what others know about us. That
is to say, this vulnerability is a threat to
the privacy of each of us.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
A Definition of Privacy
• "Privacy . . . is the power to control what
others can come to know about you.
People gain knowledge about you in
only two ways—through monitoring or
searching (or by reports relying on the
results of monitoring and searching)."1
1 Lessig,
Lawrence. Code and Other Laws of Cyberspace. New
York, NY: Basic Books; 1999. ISBN:0-465-03913-8. Pp. 142-144.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Conceptions of Privacy
• Lawrence Lessig distinguishes three
conceptions of privacy1
– Utility: the minimization of intrusion
– Dignity: the individual's right to be left alone
– Governmental: constraints on the power of
the state to regulate behavior and thought
1 This
slide and the quotations on the next three slides are taken
from: Lessig, Lawrence. Code and Other Laws of Cyberspace. New
York, NY: Basic Books; 1999. ISBN:0-465-03913-8. Pp. 146-149.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Conceptions of Privacy (cont'd)
• Lessig's "first conception, . . . the utility
conception, seeks to minimize intrusion. We
want to be left alone, not interfered with, not
troubled. And so we want a protection that
minimizes the extent to which tranquility is
disturbed. Sometimes the state will have
reason to search us or to interfere with our
peace. But we want this interference kept at
a minimum. . . ."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Conceptions of Privacy (cont'd)
• "The second conception tracks dignity. Even if
a search does not bother you at all, or even if
you do not notice the search, this conception of
privacy holds that the very idea of a search of
your possessions is an offense to your dignity."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Conceptions of Privacy (cont'd)
• According to Lessig's third "conception, privacy
is a substantive limit on government's power.
As a restriction on the power of government to
enforce certain laws, it provides a substantive
limit on the kinds of regulation that government
can effectively impose. Understood this way,
privacy does more than protect dignity or limit
intrusion; privacy limits what government can
do."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Conceptions of Privacy (cont'd)
• Although Lessig phrases his three conceptions of
privacy in terms of constraints on government, it
is clear that the general concept of privacy
requires that individuals and organizations be
subject to the same kinds of constraints, in order
to restrict their possible intrusions against other
individuals and organizations.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Modes of Internet Attack on Privacy
• Some principal modes of attack on privacy via
the Internet include:
– Recording by Websites of visitors' IP addresses
– "Cookies," i.e., information placed on your computer by
Websites that you visit
– "Spam," i.e., unsolicited, undesired email messages
sent to large numbers of addressees
– Viruses, worms, Trojan horses, etc.; these are programs
designed to enter your computer as hidden portions of
files you receive, especially via downloads and email
– "Cracker" attacks on your computer made while it is
connected to the Internet
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Modes of Internet Attack on Privacy (cont'd)
– Curious or malicious persons investigating you, using
• the services of professional investigators, who are easily
locatable via the Internet (in August 2001 a search in AltaVista
on the term "Private Investigator" yielded 13,432 hits)
• Internet sites such as PublicData.com, US Search.com, and
the "People Search" and "Public Records Research" options at
Yahoo!.
– Curious or malicious persons seeking personal
information about you through government resources,
e.g., the real-estate appraisal records provided by the
Travis Central Appraisal District of Travis County, Texas.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Modes of Internet Attack on Privacy (cont'd)
• Two important resources for information about these
and other Internet security problems are the Privacy
Rights Clearinghouse, and the CERT Coordination
Center at Carnegie Mellon University.
– CERT offers a very readable overview entitled Home
Network Security, which deals with privacy and other related
issues.
• A useful collection of hyperlinks to various matters
concerning privacy, copyright, intellectual property,
and other related issues is the Gigalaw.com Webpage
on Legal Information for Internet Professionals.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Modes of Internet Attack on Privacy (cont'd)
• An encounter with malicious use of personal information
– During the spring of 2001, an unauthorized person obtained access
to hundreds of thousands of credit-card numbers stored by
Bibliofind, an Internet used-book locator service that has since
been acquired by Amazon.com. I had used a Visa account to
purchase books through Bibliofind. In June 2001 my Visa bill
showed two charges, totaling $41, that I had not made.
– I have no doubt that these charges were a result of the illegal
access at Bibliofind, for two reasons:
• The charges were placed shortly after the theft.
• The charges fitted a common pattern of the use of such stolen
accounts. Specifically, the thief initially uses the account for relatively
small amounts in the hope that the owner will turn out to be one of the
many people who fail to check their credit-card statements carefully. If
the thief gets away with small charges, he or she will then place a
substantial charge against the account.
– I immediately closed the account, and I disputed the charges—
successfully, I am happy to be able to say.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Websites and Records on Visitors
• Some Websites—no one knows how many—
keep records of those who visit them.
• What do such Websites do with this
information?
– The answer is undoubtedly, "Many different
things."
– Some of these things may strike many people as
undesirable: for examples, see the following two
slides.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Websites and Records on Visitors (cont'd)
• Recently the Senate Governmental Affairs
Committee reported that at least 7 U.S.
Government Websites have been keeping
records on their visitors. As reported by the
Associated Press1 on 2001 April 16, the following
Federal agencies, operating a total of 64
Websites, were involved:
– "Transportation Department: 23 Web sites, including
three contractor Web sites that collected personal data.
...
– "General Services Administration: 15 sites, including
one in which a contractor was given ownership of all
the data collected.
1From:
"Several agencies keep tabs on Web visitors."
Austin American-Statesman, 2001 Apr 17, p. A4.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Websites and Records on Visitors (cont'd)
– "Energy Department: 11 sites, prompting agency Inspector
General Gregory Friedman to say the department 'cannot
provide reasonable assurance' that the privacy of Web site
visitors will be protected.
– "Treasury Department: six sites. . . .
– "Education Department: four sites, three of which officials said
they were unaware information was being collected on.
– "NASA: three sites, but the space agency's inspector general
said NASA hasn't determined how many Web sites it operates,
so officials don't know how many might be gathering the
information.
– "Interior Department: two sites."
• If this is what U.S. Government Websites are doing, one
can only wonder who in the private sector is collecting
what kind of information on those of us who visit nongovernmental Websites.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Websites and Records on Visitors (cont'd)
• Information on the behavior of Websites with
respect to privacy is available from certain sites
dedicated to privacy concerns, including
– BBBOnLine, "a wholly owned subsidiary of the
Council of Better Business Bureaus [whose] mission
is to promote trust and confidence on the Internet
through the BBBOnLine Reliability and BBBOnLine
Privacy programs"
– TRUSTe.com, "an independent, non-profit privacy
initiative dedicated to building users' trust and
confidence on the Internet and accelerating growth of
the Internet industry [through] a third-party oversight
'seal' program that alleviates users' concerns about
online privacy"
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cookies" and Privacy
• Many Websites, when you visit them,
place on your computer small files of
information, called "cookies".
– Cookies serve to identify you to the
Website upon subsequent visits by you.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cookies" and Privacy (cont'd)
• Most cookies are harmless, but there is
nothing to prevent a malevolent person or
organization from placing cookies that could
cause damage.
• You can set your browser so that it will refuse
cookies, but if you do that, you forego
whatever convenience there may be in your
being quickly identified to the Website without
additional input from you.
• Cookies also have the potential of being used
to identify (e.g., to "crackers") many of the
Websites that you visit.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Spam" and Privacy
• "Spam" consists of email messages
sent out in large numbers to addressees
who have not sought them or indicated
their willingness to receive them.
– Spam does not include advertising that you
have indicated a willingness to accept
• For example, when you register a piece of
software, you are often asked to indicate
whether you would like to receive information
about upgrades and new products from that
vendor.
• If you answer "yes," then announcements from
that vendor will not constitute spam.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Spam" and Privacy (cont'd)
• Spam usually advertises products or
services that you might not learn about
otherwise, and thus it can sometimes be
useful to you.
• Spam has become a major problem
because it costs advertisers very little to
send out enormous numbers of emails,
in sharp contrast to high costs of
advertising by other means, such as
junk mail.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Spam" and Privacy (cont'd)
• Not much can be done about the generation
and dissemination of spam.
– In a few egregious cases, Internet Service
Providers have denied their facilities to spammers.
– In certain other cases, spammers have been
ordered by courts to desist. Unfortunately, such
spammers have been known to dissolve the
company to which the court order applied, and
form a new company with which they resumed
spamming.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Spam" and Privacy (cont'd)
• For individuals, the most effective defense
against spam is the use of filters in your email
program to delete messages of types that you
know you are not interested in receiving.
– For example, one of my email accounts seems
especially susceptible to spam. In this account I
have had to set up over a dozen filters that
automatically delete messages containing words
like "adult site," "teen girls," and certain
obscenities.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Viruses and Privacy
• Viruses, worms, and Trojan horses are programs that get
stored on your computer by stealth, e.g., by being a
disguised part of an email attachment or a downloaded file.
• The Webopedia defines a virus as: "A program or piece of
code that is loaded onto your computer without your
knowledge and [that] runs against your wishes. Most
viruses can also replicate themselves. All computer
viruses are manmade. A simple virus that can make a
copy of itself over and over again is relatively easy to
produce. Even such a simple virus is dangerous because
it will quickly use all available memory and bring the
system to a halt. An even more dangerous type of virus is
one capable of transmitting itself across networks and
bypassing security systems."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Viruses and Privacy (cont'd)
• The Webopedia defines a worm by saying: "Some
people distinguish between general viruses and
worms. A worm is a special type of virus that can
replicate itself and use memory, but cannot attach
itself to other programs."
– Worms pose much the same kinds of problems as do
other viruses.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Viruses and Privacy (cont'd)
• The Webopedia defines a Trojan horse as: "A
destructive program that masquerades as a
benign application. Unlike viruses, Trojan horses
do not replicate themselves, but they can be just
as destructive. One of the most insidious types of
Trojan horse is a program that claims to rid your
computer of viruses but instead introduces viruses
onto your computer."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Viruses and Privacy (cont'd)
• Once on your computer, viruses, worms, and
Trojan horses can act in various ways, from
prankish to vicious, even to the extent of
destroying all files on your computer.
• You can best defend yourself against viruses,
worms, and Trojan horses by
– Acquiring a good anti-virus program (e.g., from
McAfee, Network Associates, or Symantec)
– Installing it in such a way that it runs constantly on
your system
– Updating it with new data files at least once every
week (this step is especially important)
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cracker" Attacks on Privacy
• In a cracker attack, someone (the "cracker") tries to
gain access to some or all of the files on your
computer, thus potentially becoming able to
– Run programs (yours or his) on your computer
– Read and copy files containing information that may be
valuable to you and/or harmful if in the possession of
others (e.g., passwords, your financial data)
– Destroy and/or modify files on your computer
• "Crackers" are often called "hackers," but the latter
term properly refers to expert programmers in
general, not just to those—the "crackers"—who
use their skills unethically to break into computers
belonging to other people.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cracker" Attacks on Privacy (cont'd)
• You are especially vulnerable to cracker attacks if
your computer is connected to the internet for
extended periods of time, for example, via
– Cablemodems
– DSL (digital subscriber line) telephone connections
– Corporate or academic direct connections to the
Internet
• With these types of long-period connections, you
use a given Internet address long enough to give
crackers the opportunity to employ "trial and error"
tools against your computer.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cracker" Attacks on Privacy (cont'd)
• You can best defend yourself against
cracker attacks by using a "firewall," i.e., a
program that
– Runs constantly on your computer
– Monitors signals coming into your computer for
indications of illicit intent or activity
– Can completely prohibit the receiving of signals
from specific Internet addresses
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
"Cracker" Attacks on Privacy (cont'd)
• Examples of firewall programs are "Black
Ice," "McAfee Firewall," "Symantec
Personal Firewall," and "ZoneAlarm."
– Firewall programs change frequently to meet
changes in crackers' methods. Hence,
before acquiring a firewall, you should locate
some recent comparative evaluations of
available firewalls, and study them.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy
• By using methods drawn from the field of
cryptography, you can prevent others from
reading
– Files on your computer
– Messages and files that you send to, or receive
from, friends and colleagues via the Internet,
provided that these friends and colleagues
cooperate with you in using cryptographic
methods
• The word "cryptography" comes from Greek
roots meaning "secret writing."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy (cont'd)
• As employed today in computers, cryptography
consists of a sender's
– Adding, to the ASCII value of each letter in a message, a
number called a "key," thereby yielding a sequence of sums,
and
– Sending this sequence of sums to the recipient, who
– Subtracts the key from each sum in the sequence, thereby
yielding the original sequences of ASCII values, i.e., letters.
• The key comes from some process that generates
such numbers in an apparently random fashion
• The recipient of the encrypted message must have
access to the key (as will be explained later)
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy (cont'd)
• As an example, to encrypt "THE FOX" we
begin with the decimal ASCII values of the
letters:
T H E [space] F O X
84 72 69
32 70 79 88
• Next, we obtain a sequence of key numbers,
from some process that generates them in an
apparently random fashion. (This is called
"pseudo-random" generation.) Here is an
example of such a sequence:
10 48 01 77 15 66 41
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy (cont'd)
• Then we add the key numbers to the original
sequence of ASCII numbers (the example
uses the abbreviations PT for Plain Text [the
original text], K for Key, and CT for Cipher
Text):
PT:84 72 69 32 70 79 88
K:10 48 01 77 15 66 41
CT:94 10 60 09 85 35 29
• Note that the addition is done column by
column without carrying numbers from one
column to another. This is called "modular
addition."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy (cont'd)
• The cipher text, 94 10 60 09 85 35 29, is sent
to the recipient, who decrypts the message by
subtracting the key from the cipher text (using
column-by-column, i.e., modular, subtraction)
CT:94 10 60 09 85 35 29
K:10 48 01 77 15 66 41
PT:84 72 69 32 70 79 88
• The result is the original sequence of ASCII
values of the letters, THE FOX
• A major virtue of this process is that computers
can, of course, carry out such arithmetic
operations at enormously high speeds.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Cryptography and Privacy (cont'd)
• In traditional encryption and decryption, both the
sender and the recipient had to have a copy of the
stream of values of the key.
• Historically, this was often accomplished by providing
both sender and recipient with a copy of a page from a
"one-time pad," i.e., both sender and recipient would
have a copy of the same set of random numbers to be
used for encipherment and decipherment.
• Alternatively, both sender and recipient would be
provided with a a machine that could be set, by prearrangement, so as to generate the same "pseudorandom" key with which to process a given message.
Such machines are widely used by military and
diplomatic organizations.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
Public-Key Encryption and
Decryption (PKED)
• Today, the invention in the 1970s of public-key
encryption and decryption (PKED) has provided a
brilliant step up from traditional cryptographic
methods.
• PKED works with pairs of keys, each pair being
related to each other in a special way, for which the
following situation serves as a model:
– Imagine a box with a special fastener that can be opened
and closed by two tools, which we can call the "righthanded" and the "left-handed" tools. The right-handed tool
turns the fastener to the right; the left-handed tool turns it to
the left.
– If the box is closed with the right-handed tool, it can be
opened only with the left-handed tool; and vice versa.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
PKED (cont'd)
• In PKED, keys come in pairs that work in a fashion analogous to
the left-handed and right-handed tools.
– In each pair one key is called the "public" key; the other, the
"private" key.
– If a message is encrypted with a public key, then it can be decrypted
only with the corresponding private key, and vice versa.
• These public and private keys are not used directly as keys in
the way shown in the earlier slides entitled "Cryptography and
Privacy."
• Instead, the public and private keys are used to generate
sequences, of any length needed, of apparently random key
values. The public key and the private key in a pair will generate
the same sequence of apparently random key values, which are
used in the way sketched earlier; i.e., these sequences of key
values are added modularly to plain text to yield cipher text, or
subtracted modularly from cipher text to yield plain text.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
PKED (cont'd)
• A popular method of implementing PKED is a program
called "Pretty Good Privacy," or "PGP."
– PGP is available as freeware and in commercial versions from
PGP Security.
• To see how this works, we can suppose that two
people, Alice and Bob, want to exchange messages
and/or files with each other over the Internet, using the
protection of PKED.
– Each of them must use PGP (or a similar program) to establish
a pair of keys for himself or herself.
– Each then publishes his or her public key, e.g., by providing it
on his or her Website, but keeps his or her private key a
secret.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
PKED (cont'd)
• To send a message to Bob, Alice uses Bob's
public key to encrypt the message.
– To put it another way, Alice uses Bob's public key as a means of
producing a particular sequence of pseudo-random values with
which she encrypts the message, by adding the sequence of
values to the ASCII values of the letters in the message using
modular addition.
• When Bob receives the encrypted message, he
uses his private key to decrypt it.
– To put it another way, when Bob receives the encrypted
message, he uses his private key as a means of producing the
same sequence of pseudo-random values that Alice used, so
that he can decrypt the message by subtracting the sequence of
values from the ASCII values of the letters in the encrypted text,
using modular subtraction.
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
PKED (cont'd)
• To send a message to Alice, Bob uses
Alice's public key in the analogous fashion.
• This kind of procedure can be further
elaborated so as to provide a "digital
signature" that can be guaranteed to be
from the person from whom it purports to
come.
– For details, see "Cryptography and Pretty
Good Privacy."
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions
The Internet Can Threaten Your Privacy–
But You CAN Defend Yourself!
School of Information - The University of Texas at Austin
LIS 386.13, Information Technologies & the Information Professions