Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.

Slides:



Advertisements
Similar presentations
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Advertisements

USA PATRIOT ACT USA PATRIOT ACT
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Chapter 10 Privacy and Security McGraw-Hill
Privacy 2. Additional references
Much of the technology in this movie is already here.
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
The Role of Computers in Surveillance ~ Katie Hatland.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Satellite Receiver HD Start Animation.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
TC2-Computer Literacy Mr. Sencer February 19, 2010.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Privacy and Security (additional readings) McGraw-Hill© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Intelligence Counterintelligence. CSCE Farkas2 What is Intelligence? Information Activities Organization.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
Law, IT and personal data protection - legislative framework lags behind the IT development Nataša Pirc Musar Information Commissioner, Republic of Slovenia.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Desktop Computer Start Animation.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
SURVEILLANCE BY: BRADY, EVAN, GUNNAR, MATTHEW, ZACH.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
The Detecter Project. Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Bell Ringer At last year’s Super Bowl, the government secretly used face recognition software on people attending the event by using surveillance cameras.
Aleksander Wiatrowski Doctorand, University of Lapland Less Privacy, More Security?
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Judicial Training on Data Protection and Privacy Rights
By Brooklyn Lancaster & Christa Layton
India's Surveillance State
PRISM & The Dark Side of the Net
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Intercepting Communications
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Session 25 INST 301 Introduction to Information Science
Computers in Law Enforcement
Computer Security Social Legal and Ethical issues
Presentation transcript:

Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy

Types of Surveillance computer telephone camera social network biometric aerial data mining corporate manual identification satellite RFID GPS bugs postal

Surveillance programs Echelon Data Retention Directive INDECT Schengen Information System Golden Shield Project Frenchelon Centralized Monitoring System DRDO NETRA NATGRID SORM Titan Traffic Database Onyx Impact Nominal Index Interception Modernisation Programme Mastering the Internet UK National DNA Database Tempora Boundless Informant Stuxnet Carnivore Comprehensive National Cybersecurity Initiative DCSNet Fairview Financial Crimes Enforcement Network Magic Lantern Main Core Nationwide Suspicious Activity Reporting Initiative NSA Call Database PRISM Room 641A Special Collection Service Stellar Wind Tailored Access Operations Terrorist Finance Tracking Program Intelligence Comunnity Utah Data Center X-Keyscore GhostNet

Books and Movies 1984 Minority Report The Lives of Others Digital Fortress Echelon Conspiracy Demolition Man

Controversy political espionage industrial espionage privacy trust surveillance shouldn't be secret increases risk of blackmail and coercion psychological effects

Surveillance Can be Good Batman used surveillance to find the Joker prevent terrorism prevent crime

Sources Wikipedia IMDB Harvard Law Review.org ACLU.org EFF.org