SlideShare a Scribd company logo
1 of 29
No Place to Hide Robert O’Harrow, Jr.
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT Act)
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object],[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
USA PATRIOT Act ,[object Object],[object Object]
Acxiom
Acxiom ,[object Object],[object Object]
Acxiom What kind of information? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acxiom Where does the information come from? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acxiom ,[object Object],[object Object]
Acxiom ,[object Object],[object Object]
Acxiom ,[object Object],[object Object]
Seisint and the Matrix
Seisint ,[object Object],[object Object],[object Object]
Matrix ,[object Object],[object Object]
Matrix ,[object Object],[object Object],[object Object],[object Object]
Matrix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ChoicePoint
ChoicePoint ,[object Object],[object Object],[object Object]
ChoicePoint ,[object Object],[object Object],[object Object],[object Object],[object Object]
ChoicePoint ,[object Object],[object Object],[object Object]
ChoicePoint ,[object Object],[object Object],[object Object],[object Object],[object Object]
ChoicePoint ,[object Object]
Identity Theft

More Related Content

What's hot

THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Omkar Walavalkar
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Algorithmic Accountability Reporting | Journalism Interactive 2014
Algorithmic Accountability Reporting | Journalism Interactive 2014Algorithmic Accountability Reporting | Journalism Interactive 2014
Algorithmic Accountability Reporting | Journalism Interactive 2014Journalism Interactive
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Kristen_T
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.George Briggs
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 

What's hot (20)

THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Algorithmic Accountability Reporting | Journalism Interactive 2014
Algorithmic Accountability Reporting | Journalism Interactive 2014Algorithmic Accountability Reporting | Journalism Interactive 2014
Algorithmic Accountability Reporting | Journalism Interactive 2014
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Regulating code
Regulating codeRegulating code
Regulating code
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 

Viewers also liked

CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach BarberZachary Barber
 
White7e ppt ch16
White7e ppt ch16White7e ppt ch16
White7e ppt ch16difordham
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study Dr Paul Norman
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorismspclife
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Viewers also liked (13)

CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
 
White7e ppt ch16
White7e ppt ch16White7e ppt ch16
White7e ppt ch16
 
Teaching intelligence
Teaching intelligenceTeaching intelligence
Teaching intelligence
 
Espionage
EspionageEspionage
Espionage
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorism
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

661 lead discussion