Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Ethical Use of Data by Government Agencies By Sean Pugh.

Similar presentations


Presentation on theme: "The Ethical Use of Data by Government Agencies By Sean Pugh."— Presentation transcript:

1 The Ethical Use of Data by Government Agencies By Sean Pugh

2 Introduction  How do government agencies collect data?  When does it become unethical?  Can the government keep this information secure?  How does data retention affect efficiency?

3 Data Collection Methods  Computers and the Internet  Backdoors: already existing or implemented by request.  More than 200 undersea cables siphoning gigabytes of data everyday (Zetter, 2015).  Telecommunications  Secret court order to gather telephone records and metadata (Greenwald, MacAskill & Ackerman, 2013).

4 Ethics  Privacy  Wiretapping  Almost 200 million text messages a day from across the globe (Ball, 2014).  Location, contact networks and credit card details (Ball, 2014)  Targeting Non-target Civilians  Intimate pictures, messages, mental-health information (Gellman, Tate & Soltani, 2014).

5 Information Security  Security Breaches  Office of Personal Management: 5.6 million. Names, address, social security numbers and even fingerprints (Nalor, 2015).  Current Improvements  The Wyvern programming language: multiple computer languages on the same platform (Geer, 2014).

6 Data Oversaturation and its Effects  Data Oversaturation  Nine of the ten listed targets were non intended targets (Gellman, Tate & Soltani, 2014).  The Effect of Oversaturation  Mass surveillance programs are no longer effective (Whittacker, 2015).  Important information can be overlooked or missed (Whittacker, 2015).  Less Hay in the Haystack?

7 Conclusion  Methods  Ethics  Security  Oversaturation

8 References  Ball, J. (2014, January 16). NSA collects millions of text messages daily in 'untargeted' global sweep. The Guardian.  Geer, D. (2014, September 16). New NSA-funded programming language could close long-standing security holes. Retrieved October 11, 2015, from http://www.csoonline.com/article/2684236/data-protection/new-nsa-funded- programming-language-could-close-long-standing-security-holes.html  Gellman, B., Tate, J., & Soltani, A. (2014, July 5). In NSA-intercepted data, those not targeted far outnumber the foreigners who are. The Washington Post. Retrieved October 9, 2015, from https://www.washingtonpost.com/world/national-security/in-nsa-intercepted- data-those-not-targeted-far-outnumber-the-foreigners-who- are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html  Greenwald, G., MacAskill, E., & Ackerman, S. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian.

9 References (cont.)  Nalor, B. (2015, September 23). OPM Now Says Fingerprints Of More Than 5 Million People Stolen. Retrieved October 10, 2015, from http://www.npr.org/sections/thetwo-way/2015/09/23/442861282/opm-now- says-more-than-5-million-fingerprints-were-stolen-in-cyberattack  Whittacker, Z. (2015, April 30). NSA is so overwhelmed with data, it's no longer effective, says whistleblower | ZDNet. Retrieved October 10, 2015, from http://www.zdnet.com/article/nsa-whistleblower-overwhelmed-with- data-ineffective/  Zetter, K. (2015, September 25). New Reports Describe More Mass Surveillance And Schemes to Undermine Encryption. Wired.


Download ppt "The Ethical Use of Data by Government Agencies By Sean Pugh."

Similar presentations


Ads by Google