Surveillance : Good? Or Bad?

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

The Three Rs of Copyright Law Your Name. Copyright on the Internet Know the rules. Use ethical judgments. Practice the three Rs.
The Three Rs of Copyright Law Your Name. Copyright on the Internet Know the rules. Use ethical judgments. Practice the three Rs.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Are they exceeding their powers and threatening people’s privacy rights?
Privacy Forum: Think Big? Privacy in the Age of Big Data Wellington, New Zealand, 2 May 2012 Smart CCTV and the Evolution of Public Space CCTV Systems.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Surveillance After September 11, 2001 David Lyon Lee Jungrye English Language and Literature
Criminal Justice Today Twelfth Edition CHAPTER Criminal Justice Today: An Introductory Text for the 21st Century, 12e Frank Schmalleger Copyright © 2014.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Copyright © Ed2Net Learning, Inc.1 What is science? Grade 7 Unit 1 : Lesson #1.
Ethics of Camera Phone Thomas H. Mak CS 301. What is Camera Phone? Most cellular phones these days are now equipped with camera or camcorder. Cellular.
Lesson 7: Privacy1 Citizenship Lesson 7 Privacy Aim: To understand the law relating to privacy Privacy.
In-Car Video Management: Technology and Trends. Agenda Things to Consider –Analog vs. Digital What Makes a good Video Solution It’s All about Protection.
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
The DIGITAL MEDIA IN new records were set Several records broken and new records were set second largest country India became the second largest.
Are We Safer? PBS Frontline Video.

Report Writing Intro to Law Enforcement ROP Instructor: G Uppal.
Gun Control & Criminal Justice Asata Conde, Tatyana Goolsby Sheridan Simmons, Marivic Yrish.
AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Bell Ringer At last year’s Super Bowl, the government secretly used face recognition software on people attending the event by using surveillance cameras.
CS 6v Privacy Nothing to Hide? Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Warm-Up Why do you think it is important to be a responsible citizen to your country, community, & school??? Why do you think it is important to be a responsible.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
In-Car Video Management: Technology and Trends. Agenda Things to Consider –Analog vs. Digital What Makes a good Video Solution It’s All about Protection.
Group Members : Geh Cha LongA Fathin Khamamah bt Ahmad MughniA Koh Whee Ann A Hafizah bt AbdullahA
Telecommunications Law. Gail A. Karish Best Best & Krieger, LLP The Internet of Things ©2016 Best Best & Krieger LLP.
DRONES IN AERIAL SURVEILLANCE WHAT IS A DRONE ?  A drone, in a technological context, is an unmanned aircraft.  Drones are formally known as unmanned.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Law and Terrorism Chapter 17.
Bellwork Think about this…. Historical Event
Globalization and Information Technology
Hacking: public policy
What Is Criminal Justice?
Introduction ◄ America at war ►
The texts are too long and people don’t want to take the time.
Surveillance Topic Baxter July 26th, 2015
Are They Truly Beneficial.
Regulation of Investigatory Powers Act 2000
Media Industries Maddy Curtis.
Google company intro information assurance
Public Recording of Police
Intercepting Communications
Do Now: Complete the War, Civil Liberties, and Security Opinion Poll.
By Bob Dyer Lifelogging.
Targeted surveillance
Spy game Imagine you’re a spy and you want to track someone. You have smart computer hackers helping you. What would you tell them to do if you really.
Define the Problem Constant surveillance of citizens in our country
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Warm up # 39 What rights do you think that a government is obligated to provide for their citizens, why are these important?
Management Information Systems
What Is Criminal Justice?
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Overview of Private Investigation Industry
Resolved: The United States federal government should substantially curtail its domestic surveillance.
Management Information Systems
ENewsletters How-To.
The Cold War: At Home.
Presentation transcript:

Surveillance : Good? Or Bad? By: Ashar Asghar & Neha Pawar

What is surveillance Definition: close observation, especially of a suspected spy or criminal. 1913 was the first known event of surveillance Got more popular as technology got less expensive World wide phenomenon

Techniques of surveillance?? Cameras Audio recordings Drones (civilian / military) Military aircrafts PRISM Phone records Social media Internet

Surveillance in our daily lives Nothing on the internet can be deleted Affects everyone sitting in this room Social media is a large aspect of our lives Facebook scandal School system

pros of surveillance Less terrorist activity Criminals can be caught with evidence to convict them law abiding citizens should not be scared Internet can be more personalized Can be used in businesses and schools to boost efficiency

Cons of surveillance Did you know that the United States Of America alone spends upwards of 75 billion on surveillance agencies? People with malicious intent can misuse this information Not guaranteed to help in an investigation No control of where the information goes Invasion of privacy