Skip Navigation

Syllabus - CSCI 435 - Anti-Forensics and Digital Privacy

Basic Information

Instructor Information

Dr. Mike Murphy

Please see the About Me page for contact information, and check my Schedule for office hours information.

Catalog Description

This course complements CSCI 434 by focusing on techniques to reduce the amount of information collected and stored by computer systems, with an emphasis on protecting the system and user from fraud and identity theft resulting from a compromised or stolen system. Concepts related to privacy in the digital world are discussed. Vulnerabilities in digital devices are explored in the context of a dystopian society in which citizens are under perpetual surveillance.

Course Student Learning Outcomes

Upon successful completion of this course, students should be able to:

  1. Describe ways in which modern computer systems, televisions, mobile phones, and other consumer electronics devices can be used to spy on users and bystanders.
  2. Explain how personal information, collected with or without consent, can be used to impersonate, manipulate, extort, rob, sue, prosecute, or coerce an individual.
  3. Articulate a personal threat model with vulnerabilities and controls.
  4. Implement anti-forensic data safeguards and procedures to reduce exposure to undesired data collection and discovery.
  5. Define identity theft and implement personal and corporate security controls to reduce the risk of victimization.
  6. Identify ways in which governments can utilize consumer electronics as part of a large-scale surveillance system.

Measured Competencies

The interview-based assessment mechanism in this course will measure the following competencies:

  1. Ability to configure a Web browser to improve online privacy.
  2. Understanding how digital forensics tools can be used both to solve and to facilitate crime.
  3. Recognition of the inability to protect personal privacy on a Windows or macOS computer.
  4. Recognition of cybersecurity terminology (confidentiality, integrity, availability, threat, vulnerability, control, threat actor, critical vulnerability).
  5. Ability to identify threat actors in the context of digital privacy.
  6. Understanding market and political forces that oppose greater regulation of privacy-invasive technologies.
  7. Understanding how corporations collect personal information from often unsuspecting users.
  8. Recognition of possible consequences of voluntary or involuntary disclosure of private information.
  9. Recognition of the loss of constitutional protections for electronically stored data.
  10. Understanding the basic theme and plot of 1984.
  11. Recognition of the privacy-invasive technologies found in 1984 and how modern devices are equivalent or worse.
  12. Recognition of privacy-related terminology (PII, personal data, sensitive PII, sensitive personal data, notice, awareness, choice, consent, access, participation, direct PII, linked PII, linkable PII, classification, data breach, high confidentiality impact, moderate confidentiality impact, low confidentiality impact, de-identification, data controller, data processor, data subject, data protection officer, personal information, threat model).
  13. Ability to articulate ethical obligations concerning privacy, as stipulated by the ACM and IEEE Codes of Ethics.
  14. Understanding Fair Information Practice Principles.
  15. Recognition of benefits and obligations under the GDPR and CCPA.
  16. Ability to assess the potential impact of a data breach on an individual or corporation.
  17. Ability to articulate a personal threat model.
  18. Understanding the dangers of using “smart” devices.
  19. Understanding specific privacy risks of using mobile devices (including cell phones) and available mitigations.
  20. Understanding the benefits, drawbacks, and limitations of using a VPN or Tor for online privacy.
  21. Recognition of the potential privacy dangers inherent with online and cloud computing services.
  22. Understanding the benefits of encryption and why back doors in encryption systems are a fundamentally bad idea.
  23. Recognition of cryptanalysis techniques, including rubber-hose cryptanalysis.
  24. Understanding how artifact minimization and control (anti-forensic techniques) can be used to improve privacy.

ABET Assessment

This course measures the following Performance Indicators:

Texts and Materials

Grading

This course does not use grades in the traditional sense. Instead, mastery of course competencies is measured through an interview-based evaluation system. You will have several interviews with me over the course of the semester, each of which will measure competencies related to the course material. At the end of the semester, letter grades for the course will be assigned based upon satisfying the course competencies:

Letter Grade Description
A All course competencies are met.
B+ One (1) course competency is missed.
B Two (2) course competencies are missed.
C+ Three (3) course competencies are missed.
C Four (4) course competencies are missed.
D+ Five (5) course competencies are missed.
D Six (6) course competencies are missed.
F Seven (7) or more course competencies are missed.

During the semester, course competencies that have already been evaluated are assigned a status of “met,” “deferred,” or “missed.” For more detailed information, please see the Competency-Based Evaluation document.

Midterm Rule

Notwithstanding the above letter grade mapping, if you miss five (5) or more competencies before the last day to drop the course with a W, you will receive a course grade of F if the course is not dropped. Exceptions to this policy will be given only in circumstances that are both extensive and would otherwise meet the criteria for an excused absence under University Policy STUD-332: Class Attendance. An extensive circumstance is one that is ongoing for a period of two (2) or more weeks. For the purpose of this policy, you must give me documentation and request an exception no later than 5:00 PM ET on the day prior to the last day to drop the course with a W, unless you are hospitalized or deployed on active military duty on that date.

The purpose of this rule is to protect your GPA. In my experience, students who fall far behind during the first part of the semester rarely catch up in the end. Taking a D or F in a course has a significantly detrimental impact on your GPA, while dropping with a W has zero impact.

For the last day to drop a course with a W, please see the official Academic Calendar.

Grade Curve

In the event that unforeseen circumstances require a grade curve at the end of the semester, the number of satisfied competencies required to achieve a given final letter grade would be lowered. You should not expect such a curve. IF a curve is required, it might not be uniform with respect to each letter grade. Students who will be assigned a course grade of F as a result of the Midterm Rule, and students who are found to be in violation of the University Academic Integrity Code in this course, are NOT eligible for any grade curve.

Quarantine or Isolation

Since the interviews for this course are conducted electronically, quarantine or isolation by itself (e.g. for COVID-19) is not a valid excuse for any exception to a course policy or deadline, including the Midterm Rule. A symptomatic illness that is significant enough to interfere with your ability to complete your work would qualify for an exception, provided the illness lasts at least two (2) weeks. Documentation of the illness and its duration may be required.

Additional Policies and Information

The following policies and documents are incorporated into this syllabus by reference:

Disclaimer

Portions of this course may deal with issues related to cost analysis, laws, and ethics. The instructor of this course is not a lawyer, accountant, or financial advisor, and no portion of this class constitutes legal or financial advice. This syllabus and schedule are tentative and subject to change with notice to the student during the semester. If a portion of this syllabus is found to be non-compliant with University policies or applicable laws, the remainder of this syllabus will remain effective.