homewho are hackers?the riskswho's responsibleprotecting yourselfinterviews

How To Be Vigilant

Some Advice for the Average Computer Userarrow
Given by a victim of computer "identity theft" and two experts on security: Kirk Bailey, Manager. of Information Security, Frank Russell Company and Martha Stansell-Gamm, chief of U.S. Justice Dept's Computer Crime section.
hacked by a corporation?arrow
Cookies have become standard practice on the internet. Not only are they used by your favorite sites to provide you with a "personalized" experience, they're also used by marketers and advertising companies. Once you give companies access to write a cookie on your computer (this results from the 'cookie preferences' set up you've selected on your browser) then what? Is it harmless? How far can it go? Kevin Callahan, president and CEO of Seattle security firm Quavera, helps demystify cookies, web bugs, and other methods corporations use to keep track of you--and suggests steps you can take to stop or reduce this tracking.

Links on  How to Be Vigilant:
I've been hacked!arrow
This Department of Justice web site provides information on how to report internet-related crime.
Practical Privacy Toolsarrow
An online guide to software you can download to protect your privacy, including "cookie busters," programs that allow anonymous web surfing and email, and more, from the Electronic Privacy Information Center, (EPIC). EPIC is a public interest research center in Washington, D.C. focussing on issues relating to civil liberties, privacy, and freedom of expression in cyberspace. In addition to this guide, the EPIC web site provides a wealth of articles, news stories and fact sheets on privacy issues, and an extensive annotated guide to more online privacy resources.
The Privacy Foundationarrow
This organization provides research and education on communications technologies and services that may threaten personal privacy. Their web site includes a periodic "tip sheet" of advisories about new technologies or legislation that impact online privacy. For example, the February 2, 2001 tipsheet describes a "email wiretapping"--an exploit which allows someone to surreptitiously monitor written messages attached to forwarded email.
CIO's Response and Reporting Guidelinesarrow
In February 2002, CIO Magazine released these guidelines for responding to attacks on computer systems, which both the FBI and the U.S. Secret Service endorsed. According to The New York Times, it was the first time that that the FBI and the Secret Service -- the two federal agencies that are charged with fighting cybercrime -- had ever made such an endorsement.

home · who are hackers? · risks of the internet · who's responsible · how to be vigilant · interviews
discussion · video excerpts · synopsis · press · tapes · credits
FRONTLINE · wgbh · pbs online

some photos copyright ©2001 photodisc
web site copyright 1995-2014 WGBH educational foundation