Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,

Slides:



Advertisements
Similar presentations
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
2 Language of Computer Crime Investigation
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Police 3.6 Politics and Government. DNA Data Collection.
Face Recognition and implications on society By Zubin Singh ICS 131.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Vice President – Marketing
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Internet.
The Social Effect of Information System
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Communication Technology Mr. Butler Department of Technology John Jay High School Wappingers Central School District.
The Impact Of Information Technology Presented by: Kayla Allen Julie Carter Cristi Strickland.
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
Privacy and Data Mining What Do “They” Know About You?
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
Video Biometrics: Surveillance 2/2/2016VIDEO BIOMETRICS:SURVEILLANCE1.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
GCSE ICT Social effects of information systems. Is ICT a good thing? Many of the old boring jobs can now be done by a computer, which leaves workers to.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Computers and Data Collection
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Privacy and Information
Targeted surveillance
Biometric technology.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Privacy and Data Mining
Privacy and Data Mining
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Surveillance Society

Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing, directing, or protecting. Most usually involves observation of individuals or groups by government organizations.

Positive? Negative? Surveillance is useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. Civil rights groups are concerned that mass surveillance will result in limited or non- existent political and/or personal freedoms.

Types of Surveillance Computer surveillance Telephones Surveillance cameras Social network analysis Biometric surveillance Aerial surveillance Corporate surveillance

Types of Surveillance Human operatives Satellite imagery Identification and credentials RFID and geolocation devices RFID tagging Global positioning system Mobile phones Surveillance devices Postal services

Computer Surveillance

Vast majority of computer surveillance involves monitoring of data and traffic on the Internet. Real-time monitoring by Federal law enforcement agencies. “Trigger” words or phrases Visiting certain types of web sites Communicating with suspicious individuals or groups

FBI software - Magic Lantern and CIPAV can be used to gain unauthorized access to data; can be installed physically or remotely vanEck phreaking – reads electromagnetic emanations remotely from computing devices to extract data Pinwale – stores and indexes large numbers of s of American citizens and foreigners

Telephones Widespread official and unofficial wiretapping AT&T and Verizon are paid by the FBI to keep records easily searchable and accessible Speech-to-text software creates machine- readable text from intercepted audio Technology available to US, UK governments to remotely activate microphones in cell phones “Multilateration” of cell phone towers used to collect location data from cell phone use

Surveillance Cameras

Video cameras used to observe an area Connected to a recording device or IP network Automated software organizes digital video footage into a searchable database Homeland Security grants in US enable cities to install cameras and to connect them to central monitoring center “Golden Shield Project” – US companies install cameras, facial recognition software in China to track individuals. Goal is to have a picture of every person in China in central database.

Defense Advanced Research Projects Agency (DARPA) funding research to link cameras to a central monitoring station in a city Identix’s facial recognition software used at Super Bowl 2001 Traffic cameras in DC used for day-to-day monitoring by DC police Trapwire - Closed Circuit TeleVision (CCTV) cameras track people’s movements across city

Social Network Analysis Maps of social networks based on data from Facebook, MySpace, Twitter, traffic analysis information from phone call records These maps are “data mined” to extract personal interests, friendships, affiliations, beliefs, thoughts, activities. DARPA, National Security Agency (NSA), Department of Homeland Security (DHS) invest in social network analysis.

AT&T’s programming language “Hancock” sifts through databases of phone call and Internet traffic records. Employers report using social networking sites to collect personal data on prospective or current employees.

Biometric Surveillance

Biometric surveillance measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Fingerprints, DNA, facial patterns, voice recognition, iris scanning, etc. Some technology can identify a person up to 500 ft. by facial features.

Affective computing – computers recognize a person’s emotional state based on analysis of facial expressions, speed of talking, tone and pitch of voice, posture, etc. DNA fingerprinting – analyzes major markers in DNA to produce a match FBI spending $1 billion to build database for people in US. Computers are in underground facility as large as two football fields. Facial thermographs – identify fear, stress

Aerial Surveillance

Aerial surveillance gathers visual imagery or video from an airborne vehicle. Unmanned aerial vehicle (UAV), helicopter, spy plane, micro-aerial vehicles (MAV), forward-looking infrared devices. DHS testing UAVs to patrol US skies UK building up fleet of UAVs for its police MAVs can carry Tasers for crowd control or as weapons

DARPA programs automate much of the aerial surveillance process. Self-piloting UAVs decide who is “suspicious,” monitor them, coordinate with other UAVs, notify human operators in centralized monitoring station AI drones increase area that can be continuously monitored, reducing number of human operators

Data Mining and Profiling Data mining – application of statistical techniques to discover relationships within data Assemble data to create a profile, i.e., a picture of patterns and behavior Economic and social transactions create data Web traffic and online purchases also used for profiling

Data analysis used by programs such as ADVISE and TALON to determine whether the person is a military, criminal, or political threat ADVISE – Analysis, Dissemination, Visualization, Insight, Semantic Enhancement R&D program authorized by DHS. TALON – Threat and Local Observation Notice, activated after 9/11 by Dept. of Defense; contains info on antiwar groups

US is planning 43 “fusion centers”, a national network of surveillance centers in over 30 states Fusion centers will collect, analyze data from drivers’ licensing centers, hospital records, criminal records, school records, credit bureaus, banks, etc. Info will be placed in a centralized database that can be accessed by all centers as well as federal law enforcement and intelligence agencies

Corporate Surveillance Monitoring of a person or group’s behavior by a corporation Data usually used for marketing purposes Can be shared with government agencies Google stores identifying information for each web search, scans content of Gmail webmail service to tailor advertising

Many US companies monitor traffic or workers and/or Internet connections Companies use software to block non-work related websites such as offensive sites, game sites, social networking sites, entertainment sites, shopping sites, and sports sites Some companies track keystrokes and time spent at keyboards Infragard – FBI, DHS, corporations have information-sharing partnership

Human Operatives Organizations that have enemies who wish to gather information about the groups’ members or activities face the issue of infiltration HUMINT – intelligence gathered by humans rather than by electronic monitoring and data mining

Satellite Imagery Local, state, and domestic Federal agencies can access imagery from military intelligence satellites and aircraft sensors These devices can penetrate cloud cover, detect chemical traces, and identify objects in buildings and underground bunkers Real-time video better than still images from Google Earth

Identification and Credentials A card containing an identification number Some countries have national ID numbers IDs can be verified by passports, drivers’ licenses, library cards, banking or credit cards Machine-readable data can create an electronic trail

RFID and Geolocation Devices

a. RFID Tagging Use of very small electronic devices applied or incorporated into a product, animal, or person for identification and tracking using radio waves Some companies tag employees, who are monitored while on job VeriChip (Applied Digital Solutions), injected under skin, stores personal information in “Global VeriChip Subscriber Registry”

b. Global Positioning System In US, police have planted hidden GPS tracking devices in people’s vehicles to monitor their movements Some cities require parolees to wear GPS devices to track their movements when they get out of prison

c. Mobile Phones Commonly used to collect geolocation data Multilateration – calculates the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone

d. Surveillance Devices “Bugs” are hidden electronic devices used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency COINTELPRO – US domestic intelligence program bugged homes, office, vehicles of political activists, subversives, criminals

e. Postal Services Significance of surveillance of postal system decreasing in favor of Internet and telephone surveillance Interception of mail is still option for law enforcement

Controversy over Surveillance

Support These tools protect society from terrorists and criminals People must become accustomed to having no privacy “If you aren’t doing anything wrong, then you don’t have anything to worry about.”

Opposition “As long as we do what we’re told, we have nothing to fear.” Political activists do not want the government to know their names Mass surveillance may make future opposition impossible Most people do have things to hide, e.g., job hunter may not want present employer to know this

Opposition: Totalitarianism Fear that society is moving toward a state of mass surveillance “Laying the bricks one at a time for a police state.” Blurring of lines between public and private places Surveillance techniques are not equal, e.g., facial recognition requires no cooperation

Opposition: Psychological/Social Effects Creates in people a feeling of always being watched, so they become self-policing The State can control the populace without having to resort to physical force

Opposition: Privacy Civil rights groups include Electronic Privacy Information Center, Electronic Frontier Foundation, American Civil Liberties Union Lawsuits include Hepting v. AT&T, EPIC v. Department of Justice The Church Committee investigated domestic intelligence programs such as COINTELPRO

Counter-surveillance, Inverse Surveillance, Sousveillance Counter-surveillance – avoiding surveillance or making surveillance difficult Inverse surveillance – reversal of surveillance on other individuals or groups, e.g., citizens photographing police Sousveillance – inverse surveillance, involving the recording by private individuals, rather than government or corporate entities