Uloga Knjižnice U Zaštiti Privatnosti Na Internetu I Borbi Protiv Masovnog Nadziranja

Total Page:16

File Type:pdf, Size:1020Kb

Uloga Knjižnice U Zaštiti Privatnosti Na Internetu I Borbi Protiv Masovnog Nadziranja Uloga knjižnice u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Džapo, Paula Master's thesis / Diplomski rad 2016 Degree Grantor / Ustanova koja je dodijelila akademski / stručni stupanj: University of Zadar / Sveučilište u Zadru Permanent link / Trajna poveznica: https://urn.nsk.hr/urn:nbn:hr:162:257447 Rights / Prava: In copyright Download date / Datum preuzimanja: 2021-10-06 Repository / Repozitorij: University of Zadar Institutional Repository of evaluation works Sveučilište u Zadru Odjel za informacijske znanosti Diplomski sveučilišni studij Informacijske znanosti - knjižničarstvo Paula Džapo Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Diplomski rad Zadar, 2016. Sveučilište u Zadru Odjel za informacijske znanosti Diplomski sveučilišni studij Informacijske znanosti - knjižničarstvo Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja Diplomski rad Student/ica: Mentor/ica: Paula Džapo doc. dr. sc. Martina Dragija Ivanović Zadar, 2016. Izjava o akademskoj čestitosti Ja, Paula Džapo, ovime izjavljujem da je moj diplomski rad pod naslovom Uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja rezultat mojega vlastitog rada, da se temelji na mojim istraživanjima te da se oslanja na izvore i radove navedene u bilješkama i popisu literature. Ni jedan dio mojega rada nije napisan na nedopušten način, odnosno nije prepisan iz necitiranih radova i ne krši bilo čija autorska prava. Izjavljujem da ni jedan dio ovoga rada nije iskorišten u kojem drugom radu pri bilo kojoj drugoj visokoškolskoj, znanstvenoj, obrazovnoj ili inoj ustanovi. Sadržaj mojega rada u potpunosti odgovara sadržaju obranjenoga i nakon obrane uređenoga rada. Zadar, 30. rujan 2016. Sadržaj 1. Uvod ...............................................................................................................................6 2. Privatnost........................................................................................................................8 2.1. Definicija privatnosti ................................................................................................8 2.2. Podjela privatnosti .................................................................................................. 11 3. Privatnost na internetu .................................................................................................. 15 3.1. Prijetnje privatnosti na internetu ............................................................................. 16 3.1.1. Kolačići ........................................................................................................... 17 3.1.2. Web preglednici i tražilice ............................................................................... 18 3.1.3. Društvene mreže.............................................................................................. 20 3.1.4. Phishing .......................................................................................................... 24 3.1.5. Spyware i Adware ........................................................................................... 25 4. Masovno nadziranje ...................................................................................................... 27 4.1. NSA nadziranje ...................................................................................................... 29 4.2. Programi za nadziranje komunikacije na internetu .................................................. 33 4.2.1. PRISM ............................................................................................................ 33 4.2.2. XKeyscore ...................................................................................................... 34 4.2.3. Tempora .......................................................................................................... 35 5. Knjižnice i borba za privatnost korisnika ...................................................................... 36 5.1. Knjižnice protiv masovnog nadziranja .................................................................... 36 5.1.1. Problemi u čuvanju privatnosti korisnika u knjižnicama .................................. 36 5.1.2. Borba za privatnost korisnika nakon Drugog svjetskog rata ............................. 38 5.1.3. Domovinski zakon (Patriot Act) i Zakon o slobodi (FREEDOM Act) .............. 40 5.2. Kako zaštiti privatnost knjižničnih korisnika na internetu ....................................... 45 5.2.1. Alati za zaštitu privatnosti na internetu ............................................................ 48 5.2.2. Projekti zaštite privatnosti knjižničnih korisnika na internetu ........................... 50 6. Istraživanje o zaštiti privatnosti na internetu među studentima Informacijskih znanosti u Zadru .................................................................................................................................... 54 6.1. Svrha i cilj istraživanja ........................................................................................... 54 6.2. Metodologija istraživanja ....................................................................................... 55 6.2.1. Metoda i instrument istraživanja ...................................................................... 55 6.2.2. Tijek istraživanja ............................................................................................. 56 6.3. Rezultati istraživanja .............................................................................................. 56 6.3.1. Rezultati ankete ............................................................................................... 56 6.4. Rasprava i zaključak istraživanja ............................................................................ 64 7. Zaključak ...................................................................................................................... 69 8. Literatura ...................................................................................................................... 72 9. Abstract ........................................................................................................................ 77 10. Prilozi ........................................................................................................................ 78 Sažetak Ovaj rad se bavi temom zaštite privatnosti na internetu i ulozi knjižnica u tome te borbi protiv masovnog nadziranja. Rad je podijeljen u dva dijela, teorijski dio koji se temelji na literaturi i istraživački dio. Teorijski dio se bavi pojmovima i definicijama privatnosti i zaštite privatnosti na internetu te knjižničnoj ulozi u toj zaštiti kao i pojmom masovnog nadziranja koje su provodile vlade i obavještajne agencije, poput američke Nacionalne sigurnosne agencije (eng. NSA) i njihovim programima za nadziranje milijuna ljudi diljem svijeta. Također, teorijski dio se bavi knjižničnom borbom protiv masovnog nadziranja i alatima koje knjižničari koriste i edukacijama koje provode kako bi zaštitili privatnost korisnika na internetu. Istraživački dio rada prikazuje istraživanje provedeno metodom ankete među studentima Informacijskih znanosti na Sveučilištu u Zadru čiji cilj je bio saznati na koji način studenti štite privatnost na internetu te doznati njihova mišljenja o ulozi knjižnica u zaštiti privatnosti na internetu te borbi protiv masovnog nadziranja. Istraživanjem se želi osvijestiti buduće knjižničare o opasnostima kršenja privatnosti na internetu i masovnog nadziranja kojima se ugrožava njihova i privatnost knjižničnih korisnika. Ovaj rad je namjenjen kao temelj za daljnja istraživanja o navedenoj temi i moguću provedbu edukacija u knjižnicama kao i ukazivanje na probleme koji prijete privatnosti na internetu. Ključne riječi: privatnost, internet, knjižnice, masovno nadziranje 1. Uvod U vrijeme kada su tehnologije dio svakodnevice i mnoge osobe koriste barem jednu društvenu mrežu i svakodnevno pretražuju internet u potrazi za informacijama i drugim podacima koji ih zanimaju, privatnost na internetu je važnija no ikada. Korisnici društvenih mreža na svojim profilima ostavljaju veliku količinu osobnih podataka, od imena i prezimena, slika do broja mobitela, kao i raznih mišljenja i objava koje dijele s drugima. Kada pojedinac svjesno i svojom voljom dijeli te informacije, to radi jer to želi, no postoji mnogo slučajeva kada se njegova privatnost narušava jer su podaci koje je ta osoba željela zadržati za sebe ili podijeliti samo s određenim brojem ljudi, završili u krivim rukama. Danas pojam privatnosti obuhvaća ne samo privatnost koju pojedinac ima u svome domu, onu koja je „opipljiva“, već i privatnost na internetu. Uzevši u obzir činjenicu da privatnosti na internetu skoro pa nema, ovaj rad se bavi zaštitom privatnosti na internetu, ulozi knjižnica u zaštiti te njihovoj borbi protiv masovnog nadziranja. U radu su prikazani pojmovi privatnosti i načini zaštite, uloga knjižnica u zaštiti privatnosti na internetu i borbi protiv masovnog nadziranja. Prvi dio rada bavi se različitim definicijama i podijelama privatnosti te zašto osobe žele zaštiti svoju privatnost, privatnosti na internetu i prijetnjama koje se tamo nalaze. Drugi dio rada se bavi pojmom masovnog nadziranja posebno nadziranjem koje su provodile američka vlada i obavještajne agencije poput Nacionalne sigurnosne agencije (NSA) koje je razotkrio Edward Snowden i programi kojima su se služili kako bi došli do podataka milijuna osoba diljem svijeta. Treći dio rada se bavio
Recommended publications
  • Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library
    ACRL Publications in Librarianship No. 72 Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library Editors Peter D. Fernandez and Kelly Tilton Association of College and Research Libraries A division of the American Library Association Chicago, Illinois 2018 The paper used in this publication meets the minimum requirements of Ameri- can National Standard for Information Sciences–Permanence of Paper for Print- ed Library Materials, ANSI Z39.48-1992. ∞ Cataloging-in-Publication data is on file with the Library of Congress. Copyright ©2018 by the Association of College and Research Libraries. All rights reserved except those which may be granted by Sections 107 and 108 of the Copyright Revision Act of 1976. Printed in the United States of America. 22 21 20 19 18 5 4 3 2 1 Contents Contents Introduction .......................................................................................................ix Peter Fernandez, Head, LRE Liaison Programs, University of Tennessee Libraries Kelly Tilton, Information Literacy Instruction Librarian, University of Tennessee Libraries Part I Contemplating Library Values Chapter 1. ..........................................................................................................1 The New Technocracy: Positioning Librarianship’s Core Values in Relationship to Technology Is a Much Taller Order Than We Think John Buschman, Dean of University Libraries, Seton Hall University Chapter 2. ........................................................................................................27
    [Show full text]
  • September 2, 2015 Dear Kilton Library Community, As Guardians Of
    September 2, 2015 Dear Kilton Library community, As guardians of knowledge and the freedom to read, librarians have long led the fight for free expression. In the Information Age —which has produced unprecedented access to information and mass surveillance— librarians are eager as ever to help their communities better understand and protect their privacy and intellectual freedom. Across the nation and around the globe, librarians are working with the Library Freedom Project (LFP) to make real the promise of intellectual freedom in the digital age. LFP, along with our partners the ACLU and the Tor Project, provides privacy trainings for library communities, teaching people their rights under the law, and how to find and use free and open source, privacy protective technologies. Thanks to generous funding from the Knight Foundation, LFP has over the past year run dozens of privacy workshops for libraries of all sizes across the United States. In a pilot project in the summer of 2015, the Kilton Library in Lebanon, New Hampshire, worked with LFP and the Tor Project to setup a Tor relay.1 Tor is a free, open network that helps people defend against mass surveillance by providing them anonymity online. While the Tor Project is responsible for maintaining the source code for Tor, the technology depends on thousands of volunteers who run "relays", or computer servers that support the Tor network. Libraries are ideal locations to host Tor relays because they are staunch supporters of intellectual freedom and privacy, and because they provide access to other essential internet services. The Kilton Library, with LFP's help, sought to become one among many such nodes in Tor's worldwide internet freedom system.
    [Show full text]
  • Verified, Tracked, and Visible: a History of The
    VERIFIED, TRACKED, AND VISIBLE: A HISTORY OF THE CONFIGURATION OF THE INTERNET USER by CHRISTOPHER J. ST. LOUIS A THESIS Presen ed " #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n an! #e Grad'( e S$#""l "& #e Un)+ers) y "& Oreg"n )n -art)al &'%&)%%*en "& #e re.')remen s &"r #e !egree "& Master "& S$)en$e Sep ember 0123 THESIS APPROVAL PAGE S '!en : C#rist"-#er J. S . L"')s T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#)s #esis #as been ($$ep ed an! (--ro+ed )n -art)al &'%&)%%*en "& #e req')remen s &"r #e Master "& S$)en$e !egree )n #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n by: Peter A%)%'nas C#()rperson B)swaru- Sen Member Tara F)$kle Member an! Sara D. H"!,es In eri* V)$e Pr"+"st an! Dean "& #e Gra!'( e S$#""l Or),)nal (--r"+al s),n( 'res are "n &)%e 5) # #e Un)+ers) y "& Oreg"n Grad'( e S$#""l. Degree (5arded Sep ember 0123. ii 6 0123 C#r)s "-#er J. S . L"')s SO/E RIGHTS RESERVED T#)s 5"r4 )s %)$ense! 'n!er ( Cre( )+e C"**"ns Attribution-ShareAlike 4.0 International License # -s:77$re( )+e$"**"ns."r,7%)$enses7by8s(79.17 iii THESIS ABSTRACT Chr)st"-#er J. S . L"')s Master "& S$)en$e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n Sep ember 0123 T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#e &),'re "& #e 'ser )s "& en "+erlo"ked )n In ernet #)st"r)es, 5#)$# &re.'en ly &"$'s "n %arger reat*en s "& )n&rastru$ 're, ,"+ernan$e, "r *(:"r $"n r)b' )"ns "& spec)&)$ )n!)+)!'als.
    [Show full text]
  • The Digital Divide in the Post-Snowden Era.Pdf
    ! " # $ %# $ "$ " ! " $ $ # $ "& # ! $# ' "$ " $ ( # )# ( * ! + " ! *$ , " " -!. / 0 1 22 !22"$2-!.3# # "# $ # + $ ! 4! 5 15.673 !6895 1 Introduction In late 2012/early 2013, Edward Snowden, a contractor working for the National Security Agency (NSA), approached two journalists with information about a programme of mass surveillance conducted by the US government (Carmon, 2013). The NSA’s security operations were designed to collect vast amounts of data regarding the internet use of everyone online. Furthermore, the revelations of surveillance operations suggested a relationship between the state and large corporations (MacAskill, 2013). His realisation of the extent of the surveillance of the American population (and beyond) prompted Snowden to approach Laura Poitras and Glenn Greenwald with information about the programmes being conducted (Maass, 2013). These revelations have forced us to confront the reality of the internet. Despite the technology's potential to broaden engagement in the democratic process, it has been increasingly utilised as a tool to manage and direct populations (Lyon, 2015). State and commercial surveillance has grown to such an extent, that its operation is comparable to that adopted by totalitarian states (Giroux, 2015). Rather than strengthening
    [Show full text]
  • Abstract from Grant Proposal Submitted to IMLS by Prof. Howard Besser of NYU on June 8, 2017
    Abstract from Grant Proposal Submitted to IMLS by Prof. Howard Besser of NYU on June 8, 2017 New York University (NYU), in partnership with the Library Freedom Project (LFP), a nonprofit organization fiscally sponsored by the Tor Project, Inc., seeks a two-year Laura Bush 21st Century Librarian project grant to facilitate the use of privacy tools in libraries and their communities through the development of a privacy-focused train-the-trainer program for librarians, which we will call the Library Freedom Institute (LFI). Building on their successful shorter programs, the project team will construct an extensive curriculum and use it to train 40 geographically dispersed Privacy Advocates, who can then serve as nodes of expertise in their regions by conducting workshops for community members and helping their own libraries become more privacy conscious. With almost weekly revelations of massive privacy attacks (on email providers, health care companies, governmental agencies, political campaigns, and other targets, including libraries), the public has developed a heightened awareness of the vulnerability of their private information. For marginalized people, the Internet is particularly hostile; Edward Snowden’s revelations about overbroad government surveillance, for example, showed that immigrants and Muslims are frequent targets. Data-driven advertising builds upon algorithmic bias to market exploitative products directly to consumers identified as economically disadvantaged. Elderly people lacking access to quality computer education are more likely to be the victims of fraud and identity theft. Recent headlines confirm the nature of the problem. Vice Media’s Motherboard recently proclaimed, “Digital Surveillance is Class Warfare,” citing a Data & Society Research Institute study that demonstrated greater reliance on smartphones for Internet browsing among poor families relative to wealthier ones—a troubling discovery, given that mobile phone usage is more vulnerable to surveillance than is browsing activity on the average laptop (Jordan Pearson, May 15, 2017).
    [Show full text]
  • Skills for (Private) Life: a Review and Multi- Site Case Study of Digital Privacy Initiatives In
    Skills for (private) life: A review and multi- site case study of digital privacy initiatives in UK public libraries Camille Regnault Department of Information Studies, University College London Abstract: Digital inclusion – a proposal to provide equal opportunities access to the benefits of the Internet – is a national initiative supported by 3000 public libraries in the UK. This article focuses on the activities of exemplary public library services in the UK, in order to report on the character of their digital privacy initiatives and in doing so, identify their rationales. The research explores their relevance to existing service strategies, the risks and barriers to implementation, and the potential for wider replication within the UK and produced a number of key findings: responses confirmed that each of the libraries had collaborated with an outside organisation to offer digital privacy initiatives, including ‘cryptoparties’; all of the respondents largely agreed that public libraries should engage with digital privacy issues as part of their commitment to library ethics and in order to support users make informed decisions. Keywords: Big data, cryptoparties, digital inclusion, encryption, intellectual privacy, mass surveillance, threat model. This is an Open Access article distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Journal of New Librarianship, 3 (2018) pp. 297-368 10.21173/newlibs/5/18 Introduction Background information Since at least the beginning of the 18th century, libraries in Britain have sought to lend agency to their citizenry and expand access to knowledge, as they shifted from closed parochial libraries (where books were often chained to desks) to lending libraries (Feather, 2008; Thomas, 1966).
    [Show full text]
  • Privacy in Libraries (RE‐95‐17‐0076)
    RE-95-17-0076-17 New York University New York University & Library Freedom Project: Privacy in Libraries (RE‐95‐17‐0076) Abstract New York University (NYU), in partnership with the Library Freedom Project (LFP), a nonprofit organization fiscally sponsored by the Tor Project, Inc., seeks a two-year Laura Bush 21st Century Librarian project grant to facilitate the use of privacy tools in libraries and their communities through the development of a privacy-focused train-the-trainer program for librarians, which we will call the Library Freedom Institute (LFI). Building on their successful shorter programs, the project team will construct an extensive curriculum and use it to train 40 geographically dispersed Privacy Advocates, who can then serve as nodes of expertise in their regions by conducting workshops for community members and helping their own libraries become more privacy conscious. With almost weekly revelations of massive privacy attacks (on email providers, health care companies, governmental agencies, political campaigns, and other targets, including libraries), the public has developed a heightened awareness of the vulnerability of their private information. For marginalized people, the Internet is particularly hostile; Edward Snowden’s revelations about overbroad government surveillance, for example, showed that immigrants and Muslims are frequent targets. Data-driven advertising builds upon algorithmic bias to market exploitative products directly to consumers identified as economically disadvantaged. Elderly people lacking
    [Show full text]
  • Critical Systems Librarianship Simon Barron and Andrew Preater
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by E-LIS repository Critical Systems Librarianship Simon Barron and Andrew Preater Introduction Library systems underpin the operation of a modern library and enable the services without which a library is not a library. Tis includes but is not limited to: circulation of items, acquisitions of serials, security and access control, analytics and reporting, electronic resources management, reading lists management, institutional repositories, research data management repositories, digital asset management systems, and loanable mobile devices. Contemporary librarianship, as practitioners have constructed it, could not exist without library systems. Mortimer defnes a systems librarian as, “a librarian responsible for a library’s computer systems,”1 suggesting a fairly basic defnition of a library worker with operational responsibility for information technology. Tis defnition treats systems librarianship as a focused branch of IT support, but in practice a systems librarian or systems team can be expected to ful- fll a whole range of duties which difer drastically from organization to organization depending on factors like the library’s specialism, research fo- cus, budget for library systems, and the relationship with the organization’s IT department. 1 Mary Mortimer, LibrarySpeak: A Glossary of Terms in Librarianship and Information Management (Friendswood, TX: TotalRecall, 2007), 209. Te Politics of Teory and the Practice of Critical Librarianship Systems workers2 tend to not only be responsible for operational man- agement of specialist library systems3 and IT support in the library but also for long-term strategic management of the library’s digital infrastructure and technological architecture as well as its overall approach to digital con- tent and online presence.
    [Show full text]
  • How Has the Fight for Anonymity and Privacy Advanced Since Snowden's
    MCS0010.1177/0163443719843867Media, Culture & SocietyColeman 843867research-article2019 Special section: Online Anonymity Media, Culture & Society 2019, Vol. 41(4) 565 –571 How has the fight for © The Author(s) 2019 Article reuse guidelines: anonymity and privacy sagepub.com/journals-permissions https://doi.org/10.1177/0163443719843867DOI: 10.1177/0163443719843867 advanced since Snowden’s journals.sagepub.com/home/mcs whistle-blowing? Gabriella Coleman McGill University, Canada Abstract This article examines the legal, social, and political forces in a post-Snowden era that clarified the stakes around privacy and anonymity all while pulling more people into the orbit of a contemporary privacy and anonymity movement. It compares and contrasts the 100-year period in which US courts fleshed out free speech ideals and recent grass-roots privacy and anonymity initiatives that have come to reach a critical mass, highlighting the importance of civil society, journalists, and especially hackers whose aggressive pursuit of practical solutions have created the conditions for acting anonymously and securing privacy in our current era. Keywords anonymity, hacktivism, post-Snowden era, privacy Today, thanks to the Internet, most people – not just traditional authors with access to publishers (Griffin, 1999) – have the ability to be, speak, and act anonymously. Whether its image boards, Internet chat rooms, ‘dark web’ marketplaces and communities, blogs, video games, mailing lists, or even some social media platforms like Twitter, scores of people can log onto these sites to write, speak, interact, and even act publicly without having to reveal one’s legal identity or location. In spite of these new-fangled possibili- ties for being anonymous or pseudonymous, the level of protection afforded by today’s technology is in fact only skin deep.
    [Show full text]