I am Very Most Definitely Blacklisted Due to this Project Anyway......

Slides:



Advertisements
Similar presentations
1 Is there privacy in the cloud? The Snowden Effect KP Chow Dept of Computer Science University of Hong Kong July 2013.
Advertisements

PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
Chapter 10 Privacy and Security McGraw-Hill
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Role of Computers in Surveillance ~ Katie Hatland.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Forensic Surveillance techniques Profiling techniques
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Intelligence Counterintelligence. CSCE Farkas2 What is Intelligence? Information Activities Organization.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
Discovery Tools for Health Libraries  11 th September 2015 WorldCat Discovery Services Simon Day Product Manager.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
Freedom of Speech Computers in the World.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Privacy and Data Mining What Do “They” Know About You?
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
The Detecter Project. Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Aleksander Wiatrowski Doctorand, University of Lapland Less Privacy, More Security?
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Edward Snowden An Introduction.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
EDWARD SNOWDEN IS HE A WORTHLESS HUMAN BEING OR AMERICAS HERO?
Judicial Training on Data Protection and Privacy Rights
By Brooklyn Lancaster & Christa Layton
India's Surveillance State
Shirin Nilizadeh Indiana University Bloomington
PRISM & The Dark Side of the Net
Wiretapping Christopher Simpson.
A Gift of Fire Third edition Sara Baase
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Intercepting Communications
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Brendan Foody, Sharon O’Malley, Ryan McGrane
Define the Problem Constant surveillance of citizens in our country
Computers in Law Enforcement
The Main Ethical Considerations of Big Data
(Information) Privacy
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Presentation transcript:

I am Very Most Definitely Blacklisted Due to this Project Anyway......

Computers and Surveillance NSA leaks different types of surveillance surveillance programs controversy questions some books and movies

NSA Leaks On June classified documents are leaked that reveal the NSA is collecting phone records. The PRISM program allowing the NSA access to the systems of tech giants is exposed the next day along with the Boundless Informant used for tracking how much data is obtained for each country. June 9 th Edward Snowden identifies himself as the one who leaked documents.

On July 31 st the Xkeyscore tool allowing NSA analysts to search databases of most online activity. September 5 th The Guardian reports that NSA and GCHQ have defeated most internet encryption standards, mostly through cooperation with internet and tech companies. The project name is Bullrun. October 4 th it is reported NSA and GCHQ have identified a small number of TOR users.

Types of Surveillance computer telephone camera social network biometric aerial data mining corporate identification satellite RFID GPS bugs postal manual

Surveillance programs Echelon Data Retention Directive INDECT Schengen Information System Golden Shield Project Frenchelon Centralized Monitoring System DRDO NETRA NATGRID SORM Titan Traffic Database Onyx Impact Nominal Index Interception Modernisation Programme Mastering the Internet UK National DNA Database Tempora Boundless Informant Stuxnet Carnivore Comprehensive National Cybersecurity Initiative DCSNet Fairview Financial Crimes Enforcement Network Magic Lantern Main Core Nationwide Suspicious Activity Reporting Initiative NSA Call Database PRISM Room 641A Special Collection Service Stellar Wind Tailored Access Operations Terrorist Finance Tracking Program Intelligence Comunnity Utah Data Center X-Keyscore GhostNet

Surveillance Can be Good Batman used surveillance to find the Joker prevent terrorism prevent crime

Controversy political espionage industrial espionage privacy trust surveillance shouldn't be secret increases risk of blackmail and coercion psychological effects

Questions to Ask is mass surveillance worth losing privacy? does mass surveillance work? can people defend their information?

Books and Movies 1984 Minority Report The Lives of Others Digital Fortress Echelon Conspiracy Demolition Man

Sources Wikipedia IMDB Harvard Law Review.org ACLU.org EFF.org WIRED.com GIZMODO The Guardian NSA.gov