Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)

Slides:



Advertisements
Similar presentations
Surveillance and Social Control - 2 How monitored are we? Is Britain a Big Brother society?
Advertisements

10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Pesticide Storage Security Iraqi Surface to Air Missile This is a funny slide, however the threat of terrorism is serious. We all have to do our part.
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
What kinds of Information do you carry?? Have you ever heard about Ubiquitous Society??
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
GPS Chips and Implants By: Evan Kelly.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Steven Williams CIS Slide Content  1. What is a National ID card?  2. Origin of the National ID card  3. Supporters of National ID card 
Civics Principles & Citizenship
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
The Social Effect of Information System
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
BIG BROTHER Is Watching You
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Hardware & Software Developments Freedom of Speech & Movement.
1984 – Pre-Reading guide George Orwell’s classic tale of a future world gone horribly wrong.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
ENFORCING THE RULES OF A NATION UNIT 1 – PART 2E.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Are We Safer? PBS Frontline Video.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Society & Computers PowerPoint
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Step Forward Step Back 1.Those who would exchange freedom for security deserve neither. 2.To assure our country’s freedom, the government should be able.
1984 – Pre-reading guide George Orwell’s classic tale of a future world gone horribly wrong.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Is Big Brother Watching? Amber Douglas English 0310 (MW 8-10:30 a.m.) Spring 2014.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
The 4th Amendment Notes 5-3.
The individual and society
The 4th Amendment Notes 5-3.
George Orwell’s classic tale of a future world gone horribly wrong
Security of Data  
A Gift of Fire Third edition Sara Baase
George Orwell’s classic tale of a future world gone horribly wrong
15-5 Automated Fingerprint Identification System
Presentation transcript:

Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)

What is a surveillance society? A surveillance society is were citizens and other people are watched by government to insure the safety of the society. o Ex. Police cameras, traffic cameras, and cameras in public places.

History of Surveillance In ancient Egypt, rulers would keep records of taxation, military service, and immigration. The Norman government had records of all English land-holders. It was used to maintain power in their civilization by finding anyone working against them.

Modern Surveillance Cameras are set up in cities that watch 24/7. The use of social networks. Use of Id cards. Cell phone uses. GPS and satellites. No where is this more evident then in London

GPS Tracking Police/private investigators will put GPS receivers in handbags, cars, and other bags. Using four satellites, you can pick up the signal of wherever you placed the receiver at any time. Used to watch people under house arrest, parents wanting to know where their kids are, and in the workplace.

Mobile Phone Tracking Mobile phones can be tracked simply by their signal from any cell tower. o This is also called phone triangulation. Newer phones, like BlackBerry and IPhone 4, have GPS implanted in them; making the location of the phone much more accurate. This is used for families and by authorities currently.

London London, England is one of the most watched city in the world. There is 1 CCTV camera to every 14 people. A BBC article predicts that by 2016 people will be scanned before entering public buildings. In one day a person may be viewed on camera over a hundred times.

Big Brother The Government has access to your personal information and knows what you are doing. o Using your credit card, phone, GPS, or walking outside allows for the government to see what you are doing. Can we trust the government or security agencies to keep our lives private? o Or will it be like George Orwell’s 1984 where people are watched and then arrested because of any slight infringement?

Why use surveillance? Surveillance is used to protect society. o Ex. 9/11, IRA bombings, Oklahoma City bombing, ect... By citizens giving up some of their rights they can live in a safer environment. Surveillance is used, originally, to keep the public safe.

The PATRIOT Act Made in 2001 after the 9/11 attacks. Violation of personal freedoms and rights. o If you are suspected of terrorism you can be held without just cause. o The ability to look into your personal information like phone records, credit card usage, and others. o The act enables citizens to give up their privacy rights to try and catch terrorists.

Personal Data How much personal data does the Canadian government have? o Close to 10% of the population is in the national police computer. o Tax, job, purchasing, and other information. Due to a large expansion of information storage the government can store more information on computers.

The future of surveillance societies Some examples of new technologies that will increase surveillance: – Airports Iris and finger print scans. As well as passport chips. Criminal information, visa, health information and more. – Shopping Use of RFID scanners to pay for goods. Implanted chip in arm that can hold cash.

The future of surveillance societies – School Cards that monitor the food that the child is eating. Also includes attendance, marks, and after school programs. – Public Video cameras are installed through out cities. Important buildings will be barricaded in. – Jobs Employees are monitored on the computer. Physical and mental testing to insure proper health of employees. And gym attendance and lifestyle records may become electronic.

Works Cited Brittain as 'surveillance society'. BBC News: 02 Nov Web. 1 Feb "World cameras." Web. 1 Feb Web. 1 Feb "Abu Simbel Temple." Web. 1 Feb "Supercomputer." Web. 1 Feb "Uncle Sam." Web. 1 Feb "Mumbai attack." Web. 1 Feb "Big Brother." Web. 1 Feb Ball, FirstKirstie, and Murakami Wood. "A Report on the 'Surveillance Society'." Surveillance Studies Network (2006): Web. 1 Feb "CCTV." Web. 2 Feb Lyon, David. The Electronic Eye. 1st. Minneapolis: Polity Press, Print.

Works Cited United States. Support to Law Enforcement., Web. 1 Feb Schneier, Bruce. Beyond Fear. 1st. Copernicus Books, Print "Airport." Web. 1 Feb Silk, Stephanie. "View of the Future." SecuritySolutions.com. SecuritySolutions.com, 01 Nov Web. 1 Feb "Ministry of Love." Web. 1 Feb "Mobile Phone Tracking." Web. 2 Feb "Mobile Phone Tracking." Wikipedia Web.. "Private Investigator." Web. 2 Feb Hein, Treena. "GPS surveillance." CBC News In Depth (2006): n. pag. Web. 2 Feb "Iris Scan." Web. 2 Feb Web. 2 Feb

Big Brother is ALWAYS Watching