13-1 believed Pres. Bush crossed the line
11-3 would not like to see CCTV installed in
9-5 believed CCTV is a invasion of priacy
10-4 would not feel safer with the installment of
13-1 believe the “Naked Scaner” is an invasion of
10-4 would take the machine over a frisk
9-0 would not fly if they had to wear only a
8-6 believe with the advancement of RFID
How long has is taken for 2.5 million CCTV
cameras to be installed in the UK?
The use of CCTV began in the 70’s and 80’s on a
One of the first cases of outdoor CCTV was in
Bournemouth in 1985
CCTV started on the big scale in the 1990’s
With the passing of CCTV: Looking Out for you
issued by Home Office in 1994, CCTV took off
More Quick Fixes
Is there a special type of holder available to
prevent the use of an unwanted scanner?
There are other protections used as well:
The chips come installed with extra layers of metal
The chips can also sense a differentiation in thermal and
UV light usage.
Legal in public place
Legal if non profit
Illegal in place where privacy is expected
( bathroom, bedroom)
Illegal if ease dropping
Illegal if you slander what people have
said (Borat the Movie)
RFID on Containers
Currently two government initiatives to help
the screening process of shipping containers:
•CSI (Container Security Initiative)
•SST (Smart and Secure Tradelanes)
•The primary advantage to RFID in a port is
it is automatic data collection. Two benefits:
• Accurate and complete data collection
•Better utilization of employees’ time.
• CSI is intended to extend the U.S.’s zone
of security outward, making them the last
line of defense.
• CSI consists of four core elements:
• Establish security criteria for identifying high
risk containers based on advance information
• Pre-screen containers ASAP
• Use technology to quickly pre-screen high
• Develop secure and "smart" containers.
Trying to improve the security and
productivity of cargo shipments with the
technology available including RFID
Monitor container’s security at all times
Speed shipments through the supply chain
Verify the container was loaded securely
Reduce probability of a tamper event
Gather data to conduct a "virtual inspection"
Make sure containers meet governmental
Receive "green lane" through customs
Avoid delays in the shipment process
Minimize the cost of handling
RFID Security Features
RFID also allows increase in security in
Show video clip: Email Phishing
The act of “phishing” is referred to as an attempt to
fraudulently obtain personal information such as credit
card numbers, passwords, and/or your social security
A “phishing” email contains official looking urls,
addresses, and logos to gain your trust so you are easily
persuaded to hand over your information on a platter.
On February 28th 2005, the Anti-Phishing Act was
passed. The act in a nutshell criminalized Internet
scams involving fraudulently obtaining personal
information, commonly known as phishing.
QuickTime™ an d a
TIFF (Uncompressed) decompressor
are need ed to see this picture.
How to protect yourself from a phishing
Report the suspicious website
Don’t click any links on the email you receive
Check the security certificates of the website
Type the url of the website you need directly
Don’t type personal information into pop up
Update prevention software