1 / 11

I am Very Most Definitely Blacklisted Due to this Project

I am Very Most Definitely Blacklisted Due to this Project. Anyway. Computers and Surveillance. NSA leaks different types of surveillance surveillance programs controversy questions some books and movies. NSA Leaks.

dalit
Download Presentation

I am Very Most Definitely Blacklisted Due to this Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. I am Very Most Definitely Blacklisted Due to this Project Anyway......

  2. Computers and Surveillance NSA leaks different types of surveillance surveillance programs controversy questions some books and movies

  3. NSA Leaks On June 5 2013 classified documents are leaked that reveal the NSA is collecting phone records. The PRISM program allowing the NSA access to the systems of tech giants is exposed the next day along with the Boundless Informant used for tracking how much data is obtained for each country. June 9th Edward Snowden identifies himself as the one who leaked documents.

  4. On July 31st the Xkeyscore tool allowing NSA analysts to search databases of most online activity. September 5th The Guardian reports that NSA and GCHQ have defeated most internet encryption standards, mostly through cooperation with internet and tech companies. The project name is Bullrun. October 4th it is reported NSA and GCHQ have identified a small number of TOR users.

  5. Types of Surveillance computer telephone camera social network biometric aerial data mining corporate identification satellite RFID GPS bugs postal manual

  6. Surveillance programs Echelon Data Retention Directive INDECT Schengen Information System Golden Shield Project Frenchelon Centralized Monitoring System DRDO NETRA NATGRID SORM Titan Traffic Database Onyx Impact Nominal Index Interception Modernisation Programme Mastering the Internet UK National DNA Database Tempora Boundless Informant Stuxnet Carnivore Comprehensive National Cybersecurity Initiative DCSNet Fairview Financial Crimes Enforcement Network Magic Lantern Main Core Nationwide Suspicious Activity Reporting Initiative NSA Call Database PRISM Room 641A Special Collection Service Stellar Wind Tailored Access Operations Terrorist Finance Tracking Program Intelligence Comunnity Utah Data Center X-Keyscore GhostNet

  7. Surveillance Can be Good Batman used surveillance to find the Joker prevent terrorism prevent crime

  8. Controversy political espionage industrial espionage privacy trust surveillance shouldn't be secret increases risk of blackmail and coercion psychological effects

  9. Questions to Ask is mass surveillance worth losing privacy? does mass surveillance work? can people defend their information?

  10. Books and Movies 1984 Minority Report The Lives of Others Digital Fortress Echelon Conspiracy Demolition Man

  11. Sources Wikipedia IMDB Harvard Law Review.org ACLU.org EFF.org WIRED.com GIZMODO The Guardian NSA.gov

More Related