Download presentation
Presentation is loading. Please wait.
Published byAugusta Pearson Modified over 8 years ago
1
The Ethical Use of Data by Government Agencies By Sean Pugh
2
Introduction How do government agencies collect data? When does it become unethical? Can the government keep this information secure? How does data retention affect efficiency?
3
Data Collection Methods Computers and the Internet Backdoors: already existing or implemented by request. More than 200 undersea cables siphoning gigabytes of data everyday (Zetter, 2015). Telecommunications Secret court order to gather telephone records and metadata (Greenwald, MacAskill & Ackerman, 2013).
4
Ethics Privacy Wiretapping Almost 200 million text messages a day from across the globe (Ball, 2014). Location, contact networks and credit card details (Ball, 2014) Targeting Non-target Civilians Intimate pictures, messages, mental-health information (Gellman, Tate & Soltani, 2014).
5
Information Security Security Breaches Office of Personal Management: 5.6 million. Names, address, social security numbers and even fingerprints (Nalor, 2015). Current Improvements The Wyvern programming language: multiple computer languages on the same platform (Geer, 2014).
6
Data Oversaturation and its Effects Data Oversaturation Nine of the ten listed targets were non intended targets (Gellman, Tate & Soltani, 2014). The Effect of Oversaturation Mass surveillance programs are no longer effective (Whittacker, 2015). Important information can be overlooked or missed (Whittacker, 2015). Less Hay in the Haystack?
7
Conclusion Methods Ethics Security Oversaturation
8
References Ball, J. (2014, January 16). NSA collects millions of text messages daily in 'untargeted' global sweep. The Guardian. Geer, D. (2014, September 16). New NSA-funded programming language could close long-standing security holes. Retrieved October 11, 2015, from http://www.csoonline.com/article/2684236/data-protection/new-nsa-funded- programming-language-could-close-long-standing-security-holes.html Gellman, B., Tate, J., & Soltani, A. (2014, July 5). In NSA-intercepted data, those not targeted far outnumber the foreigners who are. The Washington Post. Retrieved October 9, 2015, from https://www.washingtonpost.com/world/national-security/in-nsa-intercepted- data-those-not-targeted-far-outnumber-the-foreigners-who- are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html Greenwald, G., MacAskill, E., & Ackerman, S. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian.
9
References (cont.) Nalor, B. (2015, September 23). OPM Now Says Fingerprints Of More Than 5 Million People Stolen. Retrieved October 10, 2015, from http://www.npr.org/sections/thetwo-way/2015/09/23/442861282/opm-now- says-more-than-5-million-fingerprints-were-stolen-in-cyberattack Whittacker, Z. (2015, April 30). NSA is so overwhelmed with data, it's no longer effective, says whistleblower | ZDNet. Retrieved October 10, 2015, from http://www.zdnet.com/article/nsa-whistleblower-overwhelmed-with- data-ineffective/ Zetter, K. (2015, September 25). New Reports Describe More Mass Surveillance And Schemes to Undermine Encryption. Wired.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.