Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,

Slides:



Advertisements
Similar presentations
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Advertisements

Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Chapter Extension 1 Information Systems for Collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Methods of communication
Social Network Analysis
Market Analysis Decision Group.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Traffic Enforcement And Management System Malam-Team is Israel's largest systems integration organization, One of the most exciting solutions offered by.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Online Communities. Topics Social Networking Online Work Spaces Virtual Learning Environments User-Generated Reference Sites.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Communication Technology Mr. Butler Department of Technology John Jay High School Wappingers Central School District.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
Social Networking Presentation to Department Heads January 21, 2010.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Privacy and Data Mining What Do “They” Know About You?
SURVEILLANCE BY: BRADY, EVAN, GUNNAR, MATTHEW, ZACH.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Video Biometrics: Surveillance 2/2/2016VIDEO BIOMETRICS:SURVEILLANCE1.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
The Acceptable Use of Technology
Coding the law January 2016.
2.7 Communication Methods
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Wiretapping Christopher Simpson.
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Targeted surveillance
A Gift of Fire Third edition Sara Baase
Biometric technology.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Surveillance For IB-1 ITGS By Indrani

 Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track, record and assess employees’ performance. It can be used to support claims for promotion or to ensure that employees follow the organization’s internet policy appropriately.

 The word surveillance may be applied to observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls). It may also refer to simple, relatively no- or low-technology methods such as human intelligence agents and postal interference.

Computer Surveillance  The vast majority of computer surveillance involves the monitoring of data and traffic on the internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic ( s, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.Communications Assistance For Law Enforcement Act

Telephones and mobile phones  The official and unofficial tapping of telephone lines is widespread. In the US for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Communications Assistance For Law Enforcement Act (CALEA)VoIP

Surveillance Cameras  Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device, IP network, and/or watched by a security guard/law enforcement officer.

Social Network Analysis One common form of surveillance is to create maps of social network based on data from social network sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database__,__ and others. These social network"maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.FacebookMySpaceTwitterNSA call database__,__

Biometric Surveillance  Biometric surveillance refers to technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purpose. Examples of physical characteristics include fingerprints, DNA, and facial patterns.

Aerial Surveillance Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as a unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Surveillance devices  "Bugs" - Surveillance devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

Extra read  e-surveillance-policy-of-india p=157  ture=player_embedded&v=QtVApT hODL0#t=0s