Computers and Surveillance

Download Report

Transcript Computers and Surveillance

I am Very Most Definitely
Blacklisted Due to this Project
Anyway......
Computers and Surveillance
NSA leaks
different types of surveillance
surveillance programs
controversy
questions
some books and movies

NSA Leaks
On June 5 2013 classified documents are
leaked that reveal the NSA is collecting
phone records.
The PRISM program allowing the NSA
access to the systems of tech giants is
exposed the next day along with the
Boundless Informant used for tracking how
much data is obtained for each country.
June 9th Edward Snowden identifies himself
as the one who leaked documents.
On July 31st the Xkeyscore tool allowing NSA
analysts to search databases of most online
activity.
September 5th The Guardian reports that NSA
and GCHQ have defeated most internet
encryption standards, mostly through
cooperation with internet and tech
companies. The project name is Bullrun.
October 4th it is reported NSA and GCHQ
have identified a small number of TOR users.
Types of Surveillance
computer
identification
telephone
satellite
camera
RFID
social network
GPS
biometric
aerial
bugs
data mining
postal
corporate
manual
Surveillance programs

Echelon
Carnivore

Data Retention Directive
Comprehensive National Cybersecurity Initiative

INDECT
DCSNet

Schengen Information System
Fairview

Golden Shield Project
Financial Crimes Enforcement Network

Frenchelon
Magic Lantern

Centralized Monitoring System
Main Core

DRDO NETRA
Nationwide Suspicious Activity Reporting Initiative

NATGRID
NSA Call Database

SORM
PRISM

Titan Traffic Database
Room 641A

Onyx
Special Collection Service

Impact Nominal Index
Stellar Wind

Interception Modernisation Programme
Tailored Access Operations

Mastering the Internet
Terrorist Finance Tracking Program

UK National DNA Database
Intelligence Comunnity

Tempora
Utah Data Center

Boundless Informant
X-Keyscore

Stuxnet
GhostNet
Surveillance Can be Good

Batman used surveillance to find the Joker

prevent terrorism

prevent crime
Controversy

political espionage

industrial espionage

privacy

trust

surveillance shouldn't be secret

increases risk of blackmail and coercion

psychological effects
Questions to Ask
is mass surveillance worth losing privacy?
does mass surveillance work?
can people defend their information?
Books and Movies

1984

Minority Report

The Lives of Others

Digital Fortress

Echelon Conspiracy

Demolition Man
Sources

Wikipedia

IMDB

Harvard Law Review.org

ACLU.org

EFF.org

WIRED.com

GIZMODO

The Guardian

NSA.gov