Computers and Surveillance
Download
Report
Transcript Computers and Surveillance
I am Very Most Definitely
Blacklisted Due to this Project
Anyway......
Computers and Surveillance
NSA leaks
different types of surveillance
surveillance programs
controversy
questions
some books and movies
NSA Leaks
On June 5 2013 classified documents are
leaked that reveal the NSA is collecting
phone records.
The PRISM program allowing the NSA
access to the systems of tech giants is
exposed the next day along with the
Boundless Informant used for tracking how
much data is obtained for each country.
June 9th Edward Snowden identifies himself
as the one who leaked documents.
On July 31st the Xkeyscore tool allowing NSA
analysts to search databases of most online
activity.
September 5th The Guardian reports that NSA
and GCHQ have defeated most internet
encryption standards, mostly through
cooperation with internet and tech
companies. The project name is Bullrun.
October 4th it is reported NSA and GCHQ
have identified a small number of TOR users.
Types of Surveillance
computer
identification
telephone
satellite
camera
RFID
social network
GPS
biometric
aerial
bugs
data mining
postal
corporate
manual
Surveillance programs
Echelon
Carnivore
Data Retention Directive
Comprehensive National Cybersecurity Initiative
INDECT
DCSNet
Schengen Information System
Fairview
Golden Shield Project
Financial Crimes Enforcement Network
Frenchelon
Magic Lantern
Centralized Monitoring System
Main Core
DRDO NETRA
Nationwide Suspicious Activity Reporting Initiative
NATGRID
NSA Call Database
SORM
PRISM
Titan Traffic Database
Room 641A
Onyx
Special Collection Service
Impact Nominal Index
Stellar Wind
Interception Modernisation Programme
Tailored Access Operations
Mastering the Internet
Terrorist Finance Tracking Program
UK National DNA Database
Intelligence Comunnity
Tempora
Utah Data Center
Boundless Informant
X-Keyscore
Stuxnet
GhostNet
Surveillance Can be Good
Batman used surveillance to find the Joker
prevent terrorism
prevent crime
Controversy
political espionage
industrial espionage
privacy
trust
surveillance shouldn't be secret
increases risk of blackmail and coercion
psychological effects
Questions to Ask
is mass surveillance worth losing privacy?
does mass surveillance work?
can people defend their information?
Books and Movies
1984
Minority Report
The Lives of Others
Digital Fortress
Echelon Conspiracy
Demolition Man
Sources
Wikipedia
IMDB
Harvard Law Review.org
ACLU.org
EFF.org
WIRED.com
GIZMODO
The Guardian
NSA.gov