Sc po some-05

1,470 views
1,384 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,470
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Sc po some-05

  1. 1. Social Media: Behind the Scenes 2013 week 05
  2. 2. Networks’ geopolitics
  3. 3. the internets: “a series of tubes” Senator Ted Stevens
  4. 4. Françafrique 2.0
  5. 5. «Surveillance As A Service»
  6. 6. facial recognition for States
  7. 7. bit.ly/UsyCJZ
  8. 8. Social technologies for States
  9. 9. Technologies crunching privacy (data)
  10. 10. Facial recognition for marketers
  11. 11. Human + Machine approach
  12. 12. may 11th 1997
  13. 13. «computer-assisted» Chess
  14. 14. duo
  15. 15. duo
  16. 16. Visualizing a hierarchy
  17. 17. understanding London’s riots
  18. 18. Financial investigations
  19. 19. Tracking political opposition
  20. 20. understanding social relationship
  21. 21. «automated» approach
  22. 22. predictive technologies
  23. 23. INDECT Intelligent information system supporting observation, searching and detection for security of citizens in urban environment http://bit.ly/RQ1FlL
  24. 24. anticipate criminal activity and crisis events
  25. 25. anticipate criminal activity and crisis events aggregating surveillance data,
  26. 26. INDECT is an EU-funded research project which aims to develop ways to anticipate criminal activity and crisis events through the monitoring of “suspicious” or “abnormal” behaviour, by aggregating surveillance data, both online and offline.
  27. 27. INDECT includes a number of surveillance technologies and techniques, from face-recognition software, to search algorithms, data mining techniques, and even drones
  28. 28. INDECT includes a number of surveillance technologies and techniques, from face-recognition software, to search algorithms, data mining techniques, and even drones
  29. 29. TrapWire http://gaw.kr/X29GbL
  30. 30. TrapWire is a unique, predictive software system designed to detect patterns indicative of terrorist attacks or criminal operations.
  31. 31. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations.
  32. 32. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations. Secret
  33. 33. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations. Regulatory compliance
  34. 34. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations. Real time
  35. 35. TrapWire supports the online reporting of suspicious behavior by community members... Crowdsourced
  36. 36. ...such as the iWatch programs in Los Angeles and Washington DC, and See Something Say Something in LasVegas and NewYork
  37. 37. Privacy?
  38. 38. Code is Law becomes Law is Code
  39. 39. privacy as seen by http://bit.ly/RWL8Q7 Coding privacy
  40. 40. -
  41. 41. Privacy?

×