SlideShare a Scribd company logo
1 of 8
https://transparencytoolkit.org/
https://re-publica.de/session/watching-watchers-building-sousveillance-state
re:publica 2015 - M. C. McGrath: Watching the Watchers:
Building a Sousveillance State
https://www.youtube.com/watch?v=xipI-0HU010
Find out more at: https://re-publica.de/session/watching-watchers-building-sousveillance-state
Secret surveillance programs have metadata too. The same people and companies that operate secret surveillance
programs also publish details about their work on the open internet. We can use this data to watch the watchers.
M. C. McGrath
https://transparencytoolkit.org
Creative Commons Attribution-ShareAlike 3.0 Germany
(CC BY-SA 3.0 DE)
ICWATCH TransparencyToolkitusesfree software andopendatatoanalyze surveillance andhumanrightsabuses
https://transparencytoolkit.org/

More Related Content

Viewers also liked

Illuminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureIlluminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureAnonDownload
 
Переменные: тип, имя, значение
Переменные: тип, имя, значениеПеременные: тип, имя, значение
Переменные: тип, имя, значениеЕлена Никонова
 
PLBR employee survey 2012
PLBR employee survey 2012PLBR employee survey 2012
PLBR employee survey 2012stibbs010
 
Jtac attack methodology
Jtac attack methodologyJtac attack methodology
Jtac attack methodologyAnonDownload
 
Nativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesNativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesulisesivp
 
Guccifer ariana rockefeller brand promotion
Guccifer  ariana rockefeller brand promotionGuccifer  ariana rockefeller brand promotion
Guccifer ariana rockefeller brand promotionAnonDownload
 
Henry makow---illuminati----(2008)
Henry makow---illuminati----(2008)Henry makow---illuminati----(2008)
Henry makow---illuminati----(2008)AnonDownload
 

Viewers also liked (7)

Illuminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying pictureIlluminati sex slaves paint horrifying picture
Illuminati sex slaves paint horrifying picture
 
Переменные: тип, имя, значение
Переменные: тип, имя, значениеПеременные: тип, имя, значение
Переменные: тип, имя, значение
 
PLBR employee survey 2012
PLBR employee survey 2012PLBR employee survey 2012
PLBR employee survey 2012
 
Jtac attack methodology
Jtac attack methodologyJtac attack methodology
Jtac attack methodology
 
Nativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitalesNativos digitales vs inmigrantes digitales
Nativos digitales vs inmigrantes digitales
 
Guccifer ariana rockefeller brand promotion
Guccifer  ariana rockefeller brand promotionGuccifer  ariana rockefeller brand promotion
Guccifer ariana rockefeller brand promotion
 
Henry makow---illuminati----(2008)
Henry makow---illuminati----(2008)Henry makow---illuminati----(2008)
Henry makow---illuminati----(2008)
 

Similar to Icwatch transparency toolkit uses free software and open data to analyze surveillance and human rights abuses

#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...Casey Ellis
 
Social Media, what is in it for anti corruption agencies
Social Media, what is in it for anti corruption agenciesSocial Media, what is in it for anti corruption agencies
Social Media, what is in it for anti corruption agenciesUNDP Eurasia
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHWatchful Software
 
Free Social Media Resources
Free Social Media ResourcesFree Social Media Resources
Free Social Media ResourcesWill Byrne
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resourcesVivastream
 
Privacy Presentation
Privacy PresentationPrivacy Presentation
Privacy PresentationKenie Moses
 
Intro Social Media for Cooperative Extension Directors
Intro Social Media for Cooperative Extension DirectorsIntro Social Media for Cooperative Extension Directors
Intro Social Media for Cooperative Extension DirectorsAnne Adrian
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET Journal
 
Twitter unveils Project Lightning to bring live events to life.docx
Twitter unveils Project Lightning to bring live events to life.docxTwitter unveils Project Lightning to bring live events to life.docx
Twitter unveils Project Lightning to bring live events to life.docxwillcoxjanay
 
The future risks of banking
The future risks of bankingThe future risks of banking
The future risks of bankingAnupam Saraph
 
New social media tools to check out
New social media tools to check out New social media tools to check out
New social media tools to check out Brian Pichman
 
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLE
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLEBLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLE
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLESteven Rhyner
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKIRJET Journal
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Sandra Bermúdez
 
Safety training and communication using web 2.0 slideshare
Safety training and communication using web 2.0 slideshareSafety training and communication using web 2.0 slideshare
Safety training and communication using web 2.0 slideshareLinda Tapp
 
Making the invisible visible. Managing the digital footprint of development p...
Making the invisible visible. Managing the digital footprint of development p...Making the invisible visible. Managing the digital footprint of development p...
Making the invisible visible. Managing the digital footprint of development p...UNDP Eurasia
 
xAPI Security Timeline
xAPI Security TimelinexAPI Security Timeline
xAPI Security TimelineMegan Bowe
 

Similar to Icwatch transparency toolkit uses free software and open data to analyze surveillance and human rights abuses (20)

#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
Full fact the-state_of_automated_factchecking_aug_2016
Full fact the-state_of_automated_factchecking_aug_2016Full fact the-state_of_automated_factchecking_aug_2016
Full fact the-state_of_automated_factchecking_aug_2016
 
Social Media, what is in it for anti corruption agencies
Social Media, what is in it for anti corruption agenciesSocial Media, what is in it for anti corruption agencies
Social Media, what is in it for anti corruption agencies
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
Free Social Media Resources
Free Social Media ResourcesFree Social Media Resources
Free Social Media Resources
 
Free social media resources
Free social media resourcesFree social media resources
Free social media resources
 
IJET-V3I2P6
IJET-V3I2P6IJET-V3I2P6
IJET-V3I2P6
 
Privacy Presentation
Privacy PresentationPrivacy Presentation
Privacy Presentation
 
Intro Social Media for Cooperative Extension Directors
Intro Social Media for Cooperative Extension DirectorsIntro Social Media for Cooperative Extension Directors
Intro Social Media for Cooperative Extension Directors
 
Web2.0 tools for e-learning and KM
Web2.0 tools for e-learning and KMWeb2.0 tools for e-learning and KM
Web2.0 tools for e-learning and KM
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
 
Twitter unveils Project Lightning to bring live events to life.docx
Twitter unveils Project Lightning to bring live events to life.docxTwitter unveils Project Lightning to bring live events to life.docx
Twitter unveils Project Lightning to bring live events to life.docx
 
The future risks of banking
The future risks of bankingThe future risks of banking
The future risks of banking
 
New social media tools to check out
New social media tools to check out New social media tools to check out
New social media tools to check out
 
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLE
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLEBLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLE
BLOCKCHAIN MAKING PRIVATE, CENSORSHIP-FREE SOCIAL MEDIA PLATFORMS POSSIBLE
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
 
Safety training and communication using web 2.0 slideshare
Safety training and communication using web 2.0 slideshareSafety training and communication using web 2.0 slideshare
Safety training and communication using web 2.0 slideshare
 
Making the invisible visible. Managing the digital footprint of development p...
Making the invisible visible. Managing the digital footprint of development p...Making the invisible visible. Managing the digital footprint of development p...
Making the invisible visible. Managing the digital footprint of development p...
 
xAPI Security Timeline
xAPI Security TimelinexAPI Security Timeline
xAPI Security Timeline
 

Icwatch transparency toolkit uses free software and open data to analyze surveillance and human rights abuses

  • 1.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. https://re-publica.de/session/watching-watchers-building-sousveillance-state re:publica 2015 - M. C. McGrath: Watching the Watchers: Building a Sousveillance State https://www.youtube.com/watch?v=xipI-0HU010 Find out more at: https://re-publica.de/session/watching-watchers-building-sousveillance-state Secret surveillance programs have metadata too. The same people and companies that operate secret surveillance programs also publish details about their work on the open internet. We can use this data to watch the watchers. M. C. McGrath https://transparencytoolkit.org Creative Commons Attribution-ShareAlike 3.0 Germany (CC BY-SA 3.0 DE) ICWATCH TransparencyToolkitusesfree software andopendatatoanalyze surveillance andhumanrightsabuses https://transparencytoolkit.org/