Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

ORGANIZING Using Windows Live Mail Barbara Alwin.
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Part I: Making Good Online Choices
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos,
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Writing the Rogerian Argument 1984 and Now: Orwell’s Future.
Consumer Issues Chapter 28.
INTERNET SAFETY FOR STUDENTS
Cyber bullying and internet safety Parents meeting: staying safe online.
Going Places Safely Essential Question:
What you don’t know CAN hurt you!
This week is anti-bullying week.
Using internet and cell phones safely
Bellwork  What is a dystopia? If you can, define dystopia in your own words and give any examples you can think of (movies, books, plays, ect).
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
25 Need-to-Know Facts. Fact 1 Every 2 days we create as much information as we did from the beginning of time until 2003 [Source]Source © 2014 Bernard.
Privacy  Constant surveillance  Google, Facebook, Government (cameras, information..)  Option to agree with data collection is not enough  anonnymizing.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
George Orwell's 1984 Background Information and Context JC Clapp: English 102.
1984 – Notes George Orwell’s classic tale of a future world gone horribly wrong.
BIG BROTHER Is Watching You
 Create a chart of three columns  In column one, list the freedoms you enjoy both at home and in the community.  In column two, list the freedoms you.
1984 – Pre-Reading guide George Orwell’s classic tale of a future world gone horribly wrong.
On Saturday 5 th May 2012 Luton will be in the national spotlight as a large scale protest will be taking place in the town centre.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
E-safety for Parents Why? Schools have a major role to play in developing pupils’ understanding of how to use new technologies safely. However, pupils.
Stamford Green Primary School E-safety Seminar Part Two.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Internet Safety Mrs. Oliver Technology
1984 a future world gone horribly wrong. Meet the Author – George Orwell Born 1903 in India, grew up in England After school, joined civil service Was.
INTERNET RULES Mr. Evans. Never give out personal information on the Internet. Such as their address, telephone number, the name or location of their.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
Regulation of Personal Information Sally Brierley & Emma Harvey.
By Zachery Banboukjian Novel By George Orwell Film Published 1949 NU Image Millennium Films Critical Reading Produced in 2010 London Evening Standard.
 Dystopian is opposite word of utopian. It describes the society which is developed negatively. The dystopian society has dictatorial government and.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Megan Meier Story ABC with Diane Sawyer CNN with Anderson Cooper.
Mobile PHONES :-) created by AU MINT SIAN m.6/12.
Step Forward Step Back 1.Those who would exchange freedom for security deserve neither. 2.To assure our country’s freedom, the government should be able.
George Orwell’s. George Orwell  Born Eric Blair in 1903, in India, into an upper middle-class English  Went to Eton, one of the most expensive and prestigious.
1984 – Pre-reading guide George Orwell’s classic tale of a future world gone horribly wrong.
In Oceania the people have no rights and are subject to surveillance, “thought control,” and torture. The term “Orwellian” is still used today to describe.
Introduction to 1984 George Orwell’s classic tale of a future world gone horribly wrong.
George Orwell English Writer/Journalist Eric Arthur Blair (1903 –1950) His work is marked by sharp wit and keen insight about social justice and.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
Best Practices 21st Century Communication Ideas. Social Media Use is Growing.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
E-Safety Parent Talk Helping to keep your children safe online.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
MAXIMIZE YOUR INTERNET PRESENCE ENGAGE THE PUBLIC ATTRACT VOLUNTEERS BOOST DONATIONS Courtesy of the Internet Society RTP Chapter Presented by Lynden Price.
Welcome to our E – Safety Open Evening.
BIG Data 25 Need-to-Know Facts.
KEANU’S GUIDE TO INTERNET SAFETY
How many of these apps do you really know?
Background Information and Context
George Orwell’s classic tale of a future world gone horribly wrong
Define the Problem Constant surveillance of citizens in our country
George Orwell’s classic tale of a future world gone horribly wrong
Background Information and Context
Presentation transcript:

Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso

Relevance Of Surveillance in 1984 Example #1  Big Brother is always watching all of the citizens, for any sign of their rebellion or thought crime against him. “Big Brother is watching you” (Orwell 3)  The party keeps it’s citizens under constant surveillance through the usage of telescreens. Furthermore with helicopters that fly around and spy to see if there is any act of rebellion being performed against big brother, “In the far distance a helicopter skimmed down between the roofs, hovered for an instant like a bluebottle, and darted away again with a curving flight. It was the police patrol, snooping into people's windows.” (Orwell 4). Example #2

Example #3  The Party oversees all marriages, to avoid sexual desire between Party members. The committee has to authorize marriage, they refuse permission if the couple give the impression that they attracted to one another. Example #4  All the letters that are sent via mail are opened and analyzed by the mail service. There is no such thing as private mail in George Orwell’s Example #5  The party uses children to keep an eye on their parents. Through the spies children are brainwashed to be obedient to the party. The children are encouraged to spy and most weeks there is a story printed in the “Times” about how a child has blamed his family.

Surveillance in the 21 Century.  Government agencies, websites and corporations are allowed to track one’s internet history to acquire any information.  Also owners of Facebook, Twitter etc.. Have the full access to one’s account password and all the personal information shared between two members.  s sent through work, can be accessed.  Government agencies, websites and corporations are allowed to track one’s internet history to acquire any information.  Also owners of Facebook, Twitter etc.. Have the full access to one’s account password and all the personal information shared between two members.  s sent through work, can be accessed.  All messages can be accessed by the phone company (Rogers, Wind etc..)  The phone company can also track, one’s call history and details such as the duration on the call.  All messages can be accessed by the phone company (Rogers, Wind etc..)  The phone company can also track, one’s call history and details such as the duration on the call.  CCTV cameras are all of over places such as malls, hospital and pubs.  Other Examples- Banks Movie Theatres, stop signs.  CCTV cameras are all of over places such as malls, hospital and pubs.  Other Examples- Banks Movie Theatres, stop signs.

Similarities of Surveillance tactics between 1984 and the 21 st Century. In 1984 The telescreens were all over Oceania, constantly watching over every single person to ensure that no one is rebelling against the party and big brother. In 1984 The telescreens were all over Oceania, constantly watching over every single person to ensure that no one is rebelling against the party and big brother.  In 21 Century The CCTV cameras are in almost every single social institution. They are placed there to ensure no crime or injustice is being committed. This rule is beneficial to the police, government and the owners of the stores in which the cameras are being placed.  In 21 Century The CCTV cameras are in almost every single social institution. They are placed there to ensure no crime or injustice is being committed. This rule is beneficial to the police, government and the owners of the stores in which the cameras are being placed. In both of these situations the citizens have no say over the surveillance cameras, also both of the situations don’t benefit the citizens. In 1984 the constant surveillance benefits big brother and in the 21 st century it benefits the people who want the cameras to be put up. Such as shop owners.

Similarity Continued…… Similarity Continued…

Similarity Continued…… NSA (National Security Agency) Spying. The government funded 2 billion dollar center, has the access of all the databases including the complete contents of private s, cell phones and Google searches, parking receipts, and travel itineraries. How are the tactics are similar? The government will go to any lengths to find out personal information about it’s citizens for their own benefit, at any cost. Such as displayed in the novel 1984 where big brother uses expensive tactics, to benefit himself. Such as helicopters to spy on the citizens. The NSA does the same, the agency had created an uproar in society and received negative feedback, however they still decided to keep the agency running. This act clearly exemplifies how the agency just cares about their own benefit and will disregard anyone's opinions. How are the tactics are similar? The government will go to any lengths to find out personal information about it’s citizens for their own benefit, at any cost. Such as displayed in the novel 1984 where big brother uses expensive tactics, to benefit himself. Such as helicopters to spy on the citizens. The NSA does the same, the agency had created an uproar in society and received negative feedback, however they still decided to keep the agency running. This act clearly exemplifies how the agency just cares about their own benefit and will disregard anyone's opinions.

NSA Spying continued.. George Orwell’s 1984 seemed to have a huge increase in sales when the there was an rise in surveillance and people realized that they country was getting close to the “Orwellian” state represented in 1984.

There are many similarities of surveillance tactics presented in George Orwell’s 1984 that resemble the tactics used in 21 st Century. Many of the authors have predicted an even greater amount of surveillance in the future that will surpass the novel, There are many similarities of surveillance tactics presented in George Orwell’s 1984 that resemble the tactics used in 21 st Century. Many of the authors have predicted an even greater amount of surveillance in the future that will surpass the novel, 1984.

Works Cited (Pictures Only)  big-brother-is-watching-you-actually/ big-brother-is-watching-you-actually/     spying-on-your-skype-chat-messages/ spying-on-your-skype-chat-messages/  spying-merkel-hollande-cameron-reaction-obama/ / spying-merkel-hollande-cameron-reaction-obama/ /  nsa-spying-on.html nsa-spying-on.html  tables-on-big-brother-now-internet-users-can-watch-who-is- spying-on-them-in-blow-against-googles-new-snooping-policy-/ tables-on-big-brother-now-internet-users-can-watch-who-is- spying-on-them-in-blow-against-googles-new-snooping-policy-/