Surveillance After September 11, 2001 -DAVID LYON Surveillance Online Journalism Jeong Goeun Seo Yeonjeong Lee Younhong.

Slides:



Advertisements
Similar presentations
Offender Databases and Familial Searches: Social, Ethical, and Legal Issues Mary Terrell White, PhD Department of Community Health Boonshoft School of.
Advertisements

From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The evolution of European security research and innovation programmes: changing purposes and rationales Jean-Marc Suchier ETTIS R&I strategies and policy.
Vision: A strong and capable civil society, cooperating and responsive to Cambodia’s development challenges Host of the 2nd Global Assembly for CSO Development.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
UFCE : Information Systems in Society Lecture 8: Theorizing surveillance Reading: –Lyon, 2002, Everyday Surveillance: Personal data and social classifications.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Ethics What is it, why is it relevant to HCI, why is it important?
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Chapter 17 Law and Terrorism.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Economic Systems.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Security By: Brad Martin and Nick Mcdowell. History After September 11 th the united states took extreme measures to make sure an event like that would.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
ISO Richard Welford CSR Asia © CSR Asia 2011.
African Declaration on Internet Rights and Freedoms Presentation by: Edetaen Ojo Media Rights Agenda, Nigeria.
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Surveillance After September 11, 2001 David Lyon Lee Jungrye English Language and Literature
September 18, 2015S. Mathews1 Human Geography By James Rubenstein Chapter 4 Key Issue 4 Why Does Globalization of Popular Culture Cause Problems?
SANDLER AND TRAVIS TRADE ADVISORY SERVICES, INC. © Sandler & Travis Trade Advisory Services, Inc. All Rights Reserved Trade Facilitation.
The Impact of Communication Technology Part 2. Economic Impact Today, businesses rely on computers, high tech telephones, fax machines and local area.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
United Nations Convention on the Rights of Persons with Disabilities
Tromso Telemedicine and eHealth ConferenceJune 2007 Care in the Home: What the Elderly Expect David Garwood, Secretary Patient and Citizen Task Force.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Essentials of Contemporary Management, 1Ce. Copyright (c) 2005 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 The Environment of Management 2.
Ch. 26, "The Declining Authority of States"
Designing Smart Cities: Opportunities and Regulatory Challenges CREATe Conference University of Strathclyde, Glasgow, 31 March – 1 April 2015 The Emergence.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
 CULTURE: is the knowledge, language, values, customs, and material objects that are passed from person to person and from one generation to the next.
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Responsibility Centers. Responsibility centres Responsibility centres are a feature of responsibility accounting Responsibility centres are a feature.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Globalization It’s a Small World. Globalization It has become a buzzword that some use to describe much of what is happening in the world today. Global.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
GRADE 7 SOCIAL STUDIES: Course Outline
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
Describe how emerging technologies are having an impact on everyday life (e.g. artificial intelligence, biometrics, vision enhancement, robotics, quantum.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
The Detecter Project. Detecter - Objectives To identify human rights and other legal and moral standards that detection technologies in counter-terrorism.
BBB4M CHAPTER Canada’s government seeks to promote Canadian business in other countries and to lessen the risk for foreign companies. They Establish.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Globalization. What is Globalization? Globalization: The increased movement of people, knowledge and ideas, and goods and money across national borders.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Supranational Organizations and the EU Specifically in More Detail.
Task Two – Suggested Structure By Catherine McSherry.
Middle East Relations And Terrorism
Seminar Synopsis Ryan Schlimmer October 6, 2005
War on Terror.
Information about CCTV Systems Surveillance. For people who don’t realize, CCTV surveillance cameras and systems had been very a success within the tracking.
LIB 323 Enthusiastic Studysnaptutorial.com
TERRORISM The use of indiscriminate violence to spread fear in a bid to achieve political, religious, ideological or financial aims.
Overseas Funds Transfers (1)
TERRORISM The use of indiscriminate violence to spread fear in a bid to achieve political, religious, ideological or financial aims.
Thinking About Issues and Themes
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Presentation transcript:

Surveillance After September 11, DAVID LYON Surveillance Online Journalism Jeong Goeun Seo Yeonjeong Lee Younhong

Surveillance after September 11 (2003) : emphasized the geo-political frame in which a major event : it was used as a pretext for expanding surveillance and the diminution of human rights for exceptional circumstances. : exposes some deeper issues raised by surveillance today, that capitalize on fear, suspicion and secrecy. Surveillance Online Journalism

After September 'terrorist' -enhance surveillance operations -public money is being used into security systems -high-tech companies are falling over themselves to offer technical fixes Surveillance Online Journalism

the Aftermath( 후유증 ) of September 11 -a worthwhile reminder -a portentous outcome -a transformation device between past and future -it has eventuated from the past and signifies for the future Surveillance Online Journalism

Surveillance is not inherently harmful, but that we call surveillance is never innocent. The events of September 11 acted as a 'wake-up' call. Heightened surveillance is not in itself questionable in terms of justice or freedom. But, under some circumstances, intensified surveillance may have socially negative effects. Surveillance Online Journalism

-The visible signs of putative changed in surveillance have both legal and technical aspects. -many countries have passed legislation intended ① to tighten security ② to give police and intelligence services greater power ③ to permit faster political responses to 'terrorist' attacks. Surveillance Online Journalism

Several countries have proposed new national identification card systems, some involving biometric devices or programmable chips. -the new Canadian immigration card -the 'smart ID' for asylum seekers in the UK Surveillance Online Journalism

The technical responses to September 11 have diffused. High tech companies saw September 11 providing just the platform They needed. Not surprisingly, almost all the ‘experts’ on whom the Media call for comment are representatives of companies. Other technical surveillance-related responses to September 11 include iris-scans at airports. CCTV cameras in public places, enhanced if possible with facial recognition capacities such as the Mandrake system DNA databanks to store genetic information capable of identifying known ‘terrorists’. Surveillance Online Journalism

Iris scanner Human Iris Surveillance Online Journalism Closed-circuit television (CCTV) cameras

In the assemblage, surveillance works by abstracting bodies from places, splitting them into flows to be reassembled as virtual data- doubles, calling in question once again hierarchies and centralised power. One important aspect of this is that the flows of personal and group data percolate through systems that once were much less porous; much more discrete and watertight. Thus, following September 11, surveillance data from a myriad of sources - supermarkets, motels, traffic control points, credit card transaction records and so on - were used to trace the activities of the ‘terrorists’ in the days and hours before their attacks. Surveillance Online Journalism

Surveillance Online Journalism - Draconian measures are appearing worldwide as country instates laws and practices purportedly to counter ‘terrorism’. - American senators permit extraordinary measures, which include appropriating data on everyday communications and transactions. - Surveillance is often viewed in individualistic terms as a potential threat to privacy, an intrusion on an intimate life, an invasion of the sacrosanct home and so on.

Surveillance Online Journalism - However, the increasingly automated discriminatory mechanisms for risk-profiling and social categorizing represent a key means of reproducing and reinforcing social, economic, and cultural divisions in informational societies. - New anti-terror measures enacted after September 11. It is already clear in several countries that ‘Arab’ and ‘Muslim’ minorities are disproportionately and unfairly targeted by these measures. - Surveillance is not merely a matter of the gaze of the powerful, any more than it is technologically determined. - Data-subjects interact with surveillance systems.

Surveillance Online Journalism - Over the past few years an important debate has centred on the apparent switch in time from past-oriented to future- oriented surveillance. - Gary T. Marx predicted in the late 1980s that surveillance would become more pre-emptive and in many respects he has been vindicated. - This idea has been picked up in a more Baudrillardian vein by William Bogard who argues that surveillance is increasingly simulated, such that seeing-in-advance is its goal. Undercover: Police Surveillance in America by Gary T. Marx

Surveillance Online Journalism - The attraction of new technologies that will be able to prevent future ‘terrorist’ acts is strong in policy circles. Internal surveillance of citizens by the state will increase. - Surveillance responses to September 11 are indeed a prism through which aspects of social structure and process may be observed. - The prism helps to make visible the already existing vast range of surveillance practices and processes that touch everyday life in so-called informational societies.

Surveillance Online Journalism - For all its apparent weaknesses in a globalizing world, the nation- state is capable of quickly tightening its grip on internal control, using means that include the very items of commercial surveillance that appear ‘soft’ and scarcely worthy of inclusion as ‘surveillance’. - Democratic accountability starts with a willingness to listen to the voice of the other. And ethical scrutiny begins with care for the other, to relieve and to prevent suffering. - The sociology of surveillance discussed above sees neglect of these as a serious mistake, with ramifications we may all live to regret.

Surveillance Online Journalism Thank you for listening