Proper Arrival Times: Calica, Jannah Mae B. 11/14/16 Bsee V-Eb1 Web Exercises Activity 7

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

CALICA, JANNAH MAE B.

11/14/16
BSEE V-EB1

WEB EXERCISES
Activity 7

Current rules of the FCC and the US Federal Aviation Administration ban in-fight cellular
calling. The primary FCC concern has been possible disruption of cellphone communication on
the ground. The FAAs worry is how cellphones must interfere with planes navigation and
electrical systems. However, plans are in the works to assign new bandwidths to allow
cellphone use in the air.

Do several keywords searches and find 3 reasons to allow cellphone use during airplane
flights, and 3 reasons not to allow it. Provide information to support each reason. What is your
opinion on this issue?

3 reasons to allow cellphone use during airplane flights

(1) Proper arrival times


No more will your long-suffering partner have to hang around an airport on the basis that
you might arrive at some point in the next four hours.
A simple ‘darling, we’re in an eternal queue above JFK, get another coffee’ will at least reveal
where the hell you are.

(2) No more nasty surprises


Few things are more worrying than the clang-clang of five ‘missed call’ text messages
when you return to terra firma. What’s happened? Have I been fired? Are you divorcing me? Is
the dog dead? Now, at least you will know of Mr Chuckle's tragic departure to the kennel in the
sky in good time.

(3) They will save us all from the thorny issue of bad movies
Last month, I watched almost half an hour – about 27 minutes, I think – of Noah, starring
Russell Crowe, on a transatlantic flight.
Had I been able to use my phone, I would have been spared this horror.

3 reasons NOT to allow cellphone use during airplane flights

(1) The quality of the line


Despite great advances in communications technology, there are frequently occasions
when you can be walking in the middle of London, Paris or New York, and still receive a call
where all you can hear down the line is what sounds like a double-decker bus reversing over
glass, 200 seagulls having a fight over a biscuit, or a cat let loose on yesterday’s newspaper.
Will the quality of the line be any better when you are not standing at the heart of a major
metropolis, but 36,000ft above Alaska, in a reinforced metal tube? We’re guessing ‘no’.

`But what’s this? If mobile phones are allowed on board, your e-mails will be permitted
too. And suddenly, your boss wants you to download that attachment about maximising
performance figures, blah blah, something about revenue, blah blah, Office Hawaiian Shirt Day on
Friday. Goodbye Vince and Owen. Hello that endless pile of paperwork.
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

(2) The guy in front’s voice


In the event that someone does decide to have a full phone conversation while in listening
range of 200 strangers, you can guarantee that their voice will not be one that sings blissful
melodies on chill-out albums, or features on adverts for spa weekends or luxury toilet paper.

It will be the nasal equivalent of a small hand drill being used on a blackboard, or 30,000
mosquitos having a ‘who has the highest whine’ competition inside your ear.

(3) It won’t be cheap


For mobile phones to work properly in transit, airlines will have to install extra technology
on their planes. Will they do this out of the goodness of their profit margins – or will the
additional cost be added discreetly to your next ticket? Don’t answer that.

And just wait until your service provider – never shy of foisting an extra lump sum onto your bill
because you downloaded one photo while in France – works out that you’ve been chatting in the
air. Hello Mr Bank Manager, I’d like to discuss a second mortgage.

*For me, cellphone use during airplane flights should not be allowed because it was
believed to be unsafe to use voice and data services. It may interfere the signals with flight
technology. Maybe they can use their cellphone before the flight and after it lands. Another is
because of it would create an unpleasant environment on airplanes. It may also affect the people
who were just sleeping and resting coz they might be distracted by the noise especially when
there are voice calls on each of the passenger who were using cellphone. Letting passengers talk
via phone calls nonstop during flights would be a burden for the other passengers and also to the
crew. Do you really want to hear the chatter of people sitting right next to you or away? Even if
the talks are muted through your noise-canceling headphones, that doesn't make it any better.
What if you just want to sleep through the flight? Or take a break from the always-on connected
life you have on the ground?
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

WEB EXERCISES
Activity 8

Now that cellphones have cameras, camera voyeurism is becoming a problem. The US
video voyeurism prevention act of 2004 has made this behavior a federal offense. This act
prohibits photography or video capturing (including with cellphones) a naked person without his
or her consent in any place where there can be “a reasonable expectations of privacy”.
Punishment includes fines of up tp $100,000 or up to year in prison, or both.

Cellphone vendors say this law maybe hard to enforce and may even be a deterrent to
promising technology and create a false sense of security. Some cellphone manufacturers deny
that voyeurs are any more likely to snoop using cellphone camera than using other technologies
such as digital cameras. But other people say that opportunity differs, that most people that
carry digital cameras around with them. With a cellphone camera there is more opportunity to
take snap shots of interesting images, and unfortunately this can include images that can
threaten privacy. Voyeurs using cellphone cameras could easily pretend to be doing something
else, such as dialing or talking.

Some state legislators have proposed legislation requiring camera phones sold to emit
an audible noise or flash a light when users press the shutter. But such noise and light would
disturb happy occasions such as weddings, where people use cellphone cameras to take
pictures and send them instantly to loved ones who couldn’t attend.

Research the camera phone voyeurism problem on the internet. How could you protect
your privacy in public situation?

-Voyeurism is the sexual interest in or practice of spying on people engaged in


intimate behaviors, such as undressing, sexual activity, or other actions usually considered to
be of a private nature.
The voyeur does not normally interact directly with the subject of his/her interest, who
is often unaware of being observed. The essence of voyeurism is the observing but may also
involve the making of a secret photograph or video of the subject during an intimate activity.

As many action-adventure films buffs know, when a missile is fired, the attack can
sometimes be foiled by launching counter-measures. Well, just like the movies, digital
photography is experiencing a new wave of attacks and corresponding counter maneuvers. The
attacks are perpetrated by a new breed of “perv-a-razzis” (perverts with cameras) armed with
their mobile cameras. The question is, can law-enforcement, legislatures, and electronics
manufacturers, keep one step ahead of lewd intrusions? The answer is “probably not.”
Voyeurism is alive and clicking. And in today’s age of ubiquitous smartphones, integrated with
high resolution digital cameras, the naughty boys are becoming ever more brazen. Mobile
cameras are often used to capture compromising photos of unsuspecting females. Shopping
malls, airports and subways are favored stalking grounds of the relentless perva-a-razzi. Their
ingenuity is never-ending. It seems every trick has been used … cellphone cameras strapped to
shoes, hidden in gym-bags, and iPhones concealed in backpacks with little camera peep-holes.
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

No where has the mobile camera “pervography” problem received more publicity than in
Japan. According to the National Police Agency, 1,741 cases of illicit photography were
reported nationwide last year (2011), a 60% rise from 2006 data.
The problem is so acute that many subway stations in Japan now display warning signs alerting
riders to be wary of smartphone toting men who carelessly (*ahem* intentionally) drop their
camera-phones below skirts, or down blouses, where they shoot compromising close-up photos
or videos of young victims.
While it may be popular to pick on brazen adolescent Japanese males (the posterboys of
upskirting) the problem is by no means confined to the Land of the Rising Sun. Arrests have
been made in dozens of countries for illicit “voyeurography.” There was even one arrest of a US
Airways pilot who was caught using his cellphone to snap a photo under a teenager’s skirt at
the Philadelphia International Airport. The pilot pleaded guilty to invasion of privacy. Sadly,
there have been many others (mostly male, yet all ages, races and cultures) who’ve been
caught in the act and managed to avoid consequences.
The rise of digital photography coupled with the phenomena of taking compromising
candids, caught law enforcement agencies and many courts, off guard. Taking “peek-a-booty”
candids in public, was perfectly legal in many countries, and before the explosion in Internet
photo/video postings, the problem was hidden and the outrage was not so palpable.
There were in fact several early cases where voyeur photographers were let go without
punishment due to legal technicalities. In 2000, a young Seattle woman and her boyfriend
chased down and caught a man who was shooting video under her skirt at a festival event. The
perv-a-razzi, Richard Sorrells, was arrested and convicted of voyeurism. But his conviction was
overturned in 2002 by the State Supreme Court. The Court ruled that Sorrells’ actions
while “disgusting and reprehensible,” were not against the law. At the time, Washington Sate’s
voyeurism statutes did not protect people from being filmed in any manner when in
a “public” place where there is “no reasonable expectation of privacy.” Yikes! Thankfully,
Washington State’s laws were changed in 2003.
Over the last decade, like Washington State, many countries, states and jurisdictions,
have updated their voyeurism laws and closed legal loop-holes. California now has one of the
most rigorous privacy statutes, which covers “high tech” intrusions and forbids the attempt to
capture and/or distribute compromising photos/videos made “in a manner that is offensive to a
reasonable person” or taken “under and through the clothing” or with “a visual or auditory
enhancing device.”
Guo Jingjing (郭晶晶) Transparent Swimsuit Infrared Video Scandal
You might ask why the legal phrasing “though the clothing” was necessary? Well, the
commercial availability of infrared “night vision” filters, along with some low-tech jerry rigging
of high definition photo and video cameras, has enabled the capture of x-ray (Superman vision)
images of fully clothed persons. Fabrics display quite differently under infrared. Some clothing is
more opaque and yet other fabrics become virtually see-through under night vision lenses. This
revelation led to shock and outrage by many who justifiably thought that they had properly
covered up.
The infrared “see everything” photo/video concerns, has led to extra vigilance by
parents, and most particularly when at the beach with their kids or when attending youth swim
meets. It was discovered that tight fitting Lyrca swimsuits become fully transparent by way of
infrared lenses. Camera makers reacted to the “thinly veiled” infrared criticism by modifying
internal electronics to prevent their cameras from producing night-vision style voyeuristic
viewing in bright sunlight conditions. However, these “counter-measures” can be overridden by
determined pervographers who have a bit of tech savvy. For understandable reasons, we will
not uncover these counter-counter-measures in this article.
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

Back to Japan … One of the counter-measures deployed by Apple was to maintain the
iPhone camera’s audible shutter (clicking) noise, regardless of any iPhone setting selected by
the user. For iPhones sold in Japan by Softbank and by KDDI, you cannot mute the shutter
noise. This makes it slightly more difficult for voyeurs to discreetly take lewd photos. In theory,
a victim could hear the shutter sound and call attention to the illicit activity, which might create
embarrassment or worse for the “peek-a-booty” iPhoneographer.
Apart from stealth photography, there are some cultural reasons why a silent camera is
desired in Japan. Many Japanese believe the shutter sound is an annoyance for people around
them. This kind of nuisance to others is called はた迷惑. This concern is enhanced in quiet
environments such as museums, art galleries, the ballet or classical music venues, etc. Yet
cameras with audible shutter noises have been in use for decades in Japan, and authorities
have determined that a moderately intrusive sound is a small price to pay versus the problems
with surreptitious voyeurograhpy.
ProCamera app (3.5.1), of course, has been respectful of Apple’s rules, which in turn,
are adhering with national “anti-voyeur” laws covering mobile phone cameras. In Japan the
camera shutter must be audible or produce a somewhat comical “say cheese” (Chizu) sound.
Consequently, ProCamera app will not mute the required shutter-click noise in countries where
Apple so mandates … currently in Japan and South Korea. Moreover, while using ProCamera’s
Volume Trigger makes it easy to snap photos without holding the iPhone in hand, it will not
disable the shutter noise in Japan or Korea.
There have been a number of apps which turn down or completely mute the iPhone
camera’s shutter sound, but most of these apps will not mute the sound when the camera is
facing (looking) upwards. Hence, low angle (upskirt) shots will still generate an audible “full
volume” shutter noise. But once again, there are new counter-counter-measures. Several new
apps advertise the ability to disable the shutter noise regardless of the camera angle used.
According to Daily Yomiuri Online:
A search for the Japanese words “muon” (silence)” and “kamera” (camera) on app sites
for Apple Inc. and Google Inc. smartphones turned up about 200 apps.
How far will mobile phone OEMs and the State go to “counter” these counter-measure apps? As
Daily Youiuri Online reports, there are limits to authority:
The (Japanese) Internal Affairs and Communications Ministry said it does not have the legal
authority to regulate these apps or mobilize government offices to issue administrative
guidance.
“Application markets aren’t covered by the Telecommunications Business Law,” an
official of the ministry’s information security section said.
However, Keio University Prof. Keiji Takeda, an expert on information security, said some rules
were needed for these apps.
“There are limits to legally regulating smartphones whose settings can easily be
changed,” Takeda said. “However, from a corporate ethics viewpoint, we shouldn’t ignore the
fact that they’re being misused for crimes. We need to consider guidelines for screening and
putting apps on the market.”
Apps which mute the shutter sound, from all angles, are not available in Apple’s App
Store in every country. Yet, the most determined perv-a-razzis will likely find a jail-breaking app
work-around.
Mobile digital photography is here to stay, and unfortunately so too is bad-behavior of
the adolescent-minded. Despite counter-measures, vigilance (i.e. awareness of one’s
surroundings and persons therein) appears one of the most effective ways to avoid becoming a
victim of the camera toting voyeurs. While we don’t advocate violence, a swift slap in the mug
might also do some good.
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

How could you protect your privacy in public situation?

1) Do not reveal personal information inadvertently.


You may be "shedding" personal details, including e-mail addresses and other contact
information, without even knowing it unless you properly configure your Web browser. In your
browser's "Setup","Options" or "Preferences" menus, you may wish to use a pseudonym instead
of your real name, andnot enter an e-mail address, nor provide other personally identifiable
information that you don't wish to share. When visiting a site you trust you can choose to give
them your info, in forms on their site;there is no need for your browser to potentially make this
information available to all comers. Also be on the lookout for system-wide "Internet defaults"
programs on your computer (some examples include Window's Internet Control Panel, and
MacOS's Configuration Manager, and the third-party Mac utility named Internet Config). While
they are useful for various things, like keeping multiple Web browers and other Internet tools
consistent in how the treat downloaded files and such, they should probably also be
anonymized just like your browser itself, if they contain any fields for personal information.
Households with children may have an additional "security problem" - have you set clear rules
for your kids, so that they know not to reveal personal information unless you OK it on a site-
by-site basis?

2) Turn on cookie notices in your Web browser, and/or use cookie management
software or infomediaries.
"Cookies" are tidbits of information that Web sites store on your computer, temporarily
or more-or-less permanently. In many cases cookies are useful and inocuous. They may be
passwords and user IDs, Mso that you do not have to keep retyping them every time you load a
new page at the site that issued the cookie. Other cookies however, can be used for "data
mining" purposes, to track your motions through a Web site, the time
you spend there, what links you click on and other details that the
company wants to record, usually for marketing purposes. Most cookies
can only be read by the party that created them. However, some companies
that manage online banner advertising are, in essence, cookie sharing rings. They
can track which pages you load, which ads you click on, etc., and share this information
with all of their client Web sites (who may number in the hundreds, even thousands.) Some
examples of these cookie sharing rings are DoubleClick, AdCast
and LinkExchange. For a demonstration of how they work, see:
http://privacy.net/track/ Browsers are starting to allow user control over cookies. Netscape, for
example, allows you to see a notice when a site tries to write a cookie file to your hard
drive, and gives you some information about it, allowing you to decide
whether or not to accept it. (Be on the lookout for cookies the
function of which is not apparent, which go to other sites than the one you are trying to load,
or which are not temporary). It also allows you to automatically block all
cookies that are being sent to third parties (or to block all cookies,
entirely, but this will make some sites inoperable). Internet Explorer has a cookie management
interface in addition to Netscape-like features, allowing you to selectively enable or disable
cookies on a site-by-site basis, even to allow cookies for a site generally, but delete a specific
cookie you are suspicious about. With Internet Explorer you can also turn on cookies for a site
temporarily then disable them when you no longer need them (e.g., at an online
bookstore that requires cookies to process an order, but whom you
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

don't want to track what books you are looking at, what links you are
following, etc., the rest of the time.) Turning on cookie warnings
will cause alert boxes to pop up, but after some practice you may learn
to hit "Decline" so fast that you hardly notice them any more. The
idea is to only enable cookies on sites that require them AND whom you trust. You may also
wish to try out "alternative" browsers like Mozilla (Windows, Mac, Linux), Opera (Windows, Mac,
Linux), Konqueror (Linux), and iCab (Mac), which may offer better cookie management. You
can also use cookie management software and services. One example is the Internet
Junkbuster Proxy ( http://www.junkbusters.com/ht/en/ijb.html ). It runs on Win95/98/NT and
Unix/Linux (no Mac version), and can selectively block cookies for you (and banner ads, to
boot). interMute ( http://www.intermute.com/ ) does likewise (and more - blocks popup
windows, etc.; only runs under Windows). Another Windows-only
solution is AdSubtract ( http://www.adsubtract.com/ ) A comparable product (Linux, Solaris,
Windows) is GuideScope ( http://www.guidescope.com/home/ ) A Java-based solution called
Muffin ( http://muffin.doit.org/ ) is also available. While it will run
on Mac, Windows and Unix systems, it is definitely for "power users", as it is complicated
to set up and operate effectively.

WARNING:
Do not confuse honest infomediaries with "identity managmenet services" like
Microsoft's Passport service or Novell's DigitalMe. While you may gain some temporary
convenience at sites that support them, you'll lose essential privacy, because these services are
not there to serve you but to serve marketing purposes by collecting a vast array of information
about you and selling it.
The best solution doesn't exist yet: Full cookie management abilities built
into the browsers themselves. Only increased user pressure on Microsoft, Netscape
and other browser makers can make this happen. Users should ultimately be able
to reject cookies on a whole-domain basis, reject all third-party cookies by default, reject all
cookies that are not essential for the transaction at hand, receive notice of exactly what a
cookie is intended for, and be able to set default behaviors and permissions rather than have to
interact with cookies on a page-by-page basis. This just isn't possible yet. You may wish to
contact the company that makes your browser software and demand these essential features in
the next version.

3) Keep a "clean" e-mail address.


When mailing to unknown parties; posting to newsgroups, mailing lists, chat rooms and
other public spaces on the Net; or publishing a Web page that mentions your e-mail address, it
is best to do this from a "side" account, some pseudonymous or simply alternate address, and
to use your main or preferred address only on small, members-only lists and with known,
trusted individuals. Addresses that are posted (even as part of message headers) in public
spaces can be easily discovered by spammers (online junk mailers) and added to their list of
targets. If your public "throw away" address gets spammed enough to become annoying, you
can simply kill it off, and start a new one. Your friends, boss, etc., will still know your "real"
address. You can use a free (advertising-supported) e-mail service provider like Yahoo Mail or
Hotmail for such "side" accounts. It is best to use a "real" Internet service provider for your
main account, and to examine their privacy policies and terms of service, as some "freemail"
services may have poor privacy track records.
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

4) Don't reveal personal details to strangers or just-met


"friends".
The speed of Internet communication is often mirrored in rapid online
acquaintanceships and friendships. But it is important to realize that you don't really know who
these people are or what they are like in real life. A thousand miles away, you don't have
friends-of-friends or other references about this person. Be also wary of face-to-face
meetings. If you and your new e-friend wish to meet in person, do it in a public place. Bringing
a friend along can also be a good idea. One needn't be paranoid, but one should not be an easy
mark, either. Some personal information you might wish to withhold until you know
someone much better would include your full name, place of employment, phone number, and
street address (among more obvious things like credit card numbers, etc.) Needless to say,
such information should not be put on personal home pages. (If you have a work home page, it
may well have work contact information on it, but you needn't reveal
this page to everyone you meet in a chat room.)
5) Realize you may be monitored at work, avoid sending highly
personal e-mail to mailing lists, and keep sensitive files on your
home computer.
In most US states and many if not most countries, employees have little if any privacy
protection from monitoring by employers. When discussing sensitive matters in e-mail or other
online media, be certain with whom you are communicating. If you replied to a mailing list
post, check the headers - is your reply going to the person you think it is, or to the whole list?
Also be aware that an increasing number of employers are monitoring and recording employee
Web usage, as well as e-mail. This could compromise home banking passwords and other
sensitive information. Keep private data and private Net usage private, at home.

6) Beware sites that offer some sort of reward or prize in exchange for your contact
information or other personal details
There's a very high probability that they are gathering this information for direct
marketing purposes. In many cases your name and address are worth much more to them
because they can sell it to other marketers (who can do the same in turn...) than what you are
(supposedly) getting from them. Be especially wary of sweepstakes and contests. You probably
won't win, but the marketer sure will if you give them your information.

7) Do not reply to spammers, for any reason.


"Spam", or unsolicited bulk e-mail, is something you are probably already familiar with (and
tired of). If you get a spammed advertisment, certainly don't take the sender up on whatever
offer they are making, but also don't bother replying with "REMOVE" in the subject line, or
whatever (probably bogus) unsubscribe instructions you've been given). This simply confirms
that your address is being read by a real person, and you'll find yourself on dozens more
spammers' lists in no time. If you open the message, watch your outgoing mail queue to make
sure that a "return receipt" message was not generated to be sent back to the spammer
automatically.
BrightMail
8) Be conscious of Web security.
Never submit a credit card number or other highly sensitive personal information without first
making sure your connection is secure (encrypted). In Netscape, look for an closed lock
(Windows) or unbroken key (Mac) icon at the bottom of the browser window. In Internet
Explorer, look for a closed lock icon at the bottom (Windows) or near the top (Mac) of the
CALICA, JANNAH MAE B. 11/14/16
BSEE V-EB1

browser window. In any browser, look at the URL (Web address) line - a secure connection will
begin https:// instead of "http://".

9) Be conscious of home computer security.


On the other side of the coin, your own computer may be a trouble spot for Internet
security. If you have a DSL line, broadband cable modem or other connection to the Internet
that is up and running 24 hours (including T1 at the office without a firewall or NAT), unlike a
modem-and-phone-line connection, be sure to turn your computer off when you are not using
it. Most home PCs have pitifully poor security compared to the Unix workstations that power
most commercial Web sites. System crackers search for vulnerable, unattended DSL-connected
home computers, and can invade them with surprising ease, rifiling through files looking for
credit card numbers or other sensitive data, or even "taking over" the computer and quietly
using it for their own purposes, such as lauching attacks on other computers elsewhere -
attacks you could initially be blamed for.
10) Examine privacy policies and seals.
When you are considering whether or not to do business with a Web site, there are
other factors than a secure connection you have to consider that are equally important to Web
security. Does the site provide offline contact information, including a postal address? Does the
site have a prominently-posted privacy policy? If so, what does it say? (Just because they call it
a "privacy policy" doesn't mean it will protect you - read it for yourself.

11) Remember that YOU decide what information about yourself to


reveal, when, why, and to whom.
Don't give out personally-identifiable information too easily. Just as you might think
twice about giving some clerk at the mall your home address and phone number, keep in mind
that simply because a site asks for or demands personal information from you does not mean
you have to give it. If they are generating mailings based on this information - presumably in
accordance with the terms of their privacy policy - they can probably weed such addresses out
and not waste the postage on them. Definitely do NOT use someone else's real
address!)
12) Use encryption!
Last but certainly not least, there are other privacy threats besides abusive marketers,
nosy bosses, spammers and scammers. Some of the threats include industrial espionage,
government surveillance, identity theft, disgruntled former associates, and system crackers.
Relatively easy-to-use e-mail and file encryption software is available for free, such as Pretty
Good Privacy (PGP, available at: http://www.pgpi.org/), which runs on almost all computers
and even integrates seamlessly with most major e-mail software. Good encryption uses very
robust secret codes, that are difficult if not impossible to crack, to protect your data. You can
also use specialized services (some free, some pay) that go beyond infomediary services,
including running all connections through a securely encrypted "tunnel", anonymous dialup,
even anonymous Web publishing. Another type of product is SSH tunnelling (port forwarding)
packages, such as FSecure SSH ( http://www.fsecure.com/products/ssh/ ), and SecureCRT
( http://www.vandyke.com/products/securecrt/ ). Hopefully some day soon, good encryption
and computer security will simply be included in all ISP services and operating systems, but for
now you have to actively seek out good service providers and add-on products.

You might also like