SlideShare a Scribd company logo
1 of 24
March 21, 2012
Surveillance
 “…routine ways in which focused attention is paid to
 personal details by organizations that want to
 influence, manage, or control certain persons or
 population groups. It occurs for all kinds of reasons,
 which can be located on a continuum from care to
 control. Some element of care and some element of
 control are nearly always present, making the process
 inherently ambiguous.”
  David Lyon as quoted in Chadwick, p. 258.
Surveillance Theory                       Bentham


 Jeremy Bentham’s panopticon
 Michel Foucault (study of prisons)
 Giles Deleuze (rhizomic surveillance)




  Foucault                                    Deleuze
Total/Terrorism Information
Awareness Program, 2002
 Program headed by Adm. John Poindexter
   National Security Advisor to President Reagan
   Tried and convicted on felony charges for his
   involvement in the Iran-Contra scandal
       Conviction was later reversed on appeal
Functions of TIA
 Use data gained from component technologies to
  create a large-scale national counterterrorism
  database
 Populate the database, and look for methods for
  mining, combining and refining new sources to
  include in the database
 Analyze and correlate information in the database
  to derive actionable intelligence
TIA Programs
 Trans-lingual Information Detection, Extraction and
  Summarization (TIDES)
    Translation program (documents, chat rooms, video)
 War gaming the Asymmetric Environment (WAE)
    “Market betting” on the likelihood of a terror attack
     based on socio-economic and political events
 Human ID at a Distance
    Improved facial recognition technology, gait
     recognition, physique recognition (height, estimated
     weight, etc.)
 BIO Surveillance
    Early warning of a biological attack (anthrax, smallpox,
     etc.)
Human ID at a Distance
More TIA Programs
  Genysis
    Large database of public and private data
  Genoa I/II
    Collaboration tools to enable analysts from different
     agencies to share information and ideas
      A classified Wikipedia
  Evidence Extraction and Link Discovery (EELD)
    Search tool to help the analyst determine “who knows
     whom” and which organization is involved with what
     people and activities
        “Six degrees of Kevin Bacon”
An Example
Civil Libertarian Objections
 Based on the COINTELPRO
  (COunterINTELligencePROgram) of the 1960’s
    FBI abuse of the privacy rights of anti-war and civil
     rights activists in the 1960s under the blanket
     justification of national security
 Main objection is violation of individual right to privacy
    TIA essentially a data-mining program
        Would sift through massive amounts of private data in
         order to “sniff” out terrorist activity
        No guarantees of citizens’ protection from abuse of this
         data
Evolutionary Step    Enabling Technologies       Product Providers Characteristics

Data Collection      Computers, tapes, disks     IBM, CDC             Retrospective, static
(1960s)                                                               data delivery

Data Access          Relational databases        Oracle, Sybase,      Retrospective,
(1980s)              (RDBMS), Structured         Informix, IBM,       dynamic data delivery
                     Query Language (SQL),       Microsoft            at record level
                     ODBC
Data Warehousing &   On-line analytic processing Pilot, Comshare,     Retrospective,
Decision Support     (OLAP), multidimensional Arbor, Cognos,          dynamic data delivery
(1990s)              databases, data warehouses Microstrategy         at multiple levels


Data Mining          Advanced algorithms,        Pilot, Lockheed,     Prospective, proactive
(2000s)              multiprocessor computers,   IBM, SGI,            information delivery
                     massive databases           numerous startups
                                                 (nascent industry)
Datamining: False Positives
  An analyst runs a search for recent foreign travel and purchase of
  chemicals used in explosives and gets a result in which a single
  credit card number purchased a ticket from Tel Aviv, Israel to St.
  Louis, Missouri, and the purchase of a large amount of fertilizer a
  short time afterwards. Does this result indicate:
    A.) A terrorist infiltrating the U.S. to place a truck bomb at the
     Golden Arch?
    B.) An American farmer returning from a trip to the Holy Land?
ACLU: Raised These Questions about TIA
   Would TIA be limited to a arbitrary number of
    databases, or is the number of databases unlimited?
   What kinds of analysis would TIA be capable of?
      Would it be limited strictly to terrorism or could any
       type of search be possible? (ex. Anti-war groups, drug
       use, jaywalking) – MISSION CREEP
   What difference does a distributed database make?
      DARPA officials state that TIA would not be a
       centralized database, the ACLU stated that this did
       not matter
   How will TIA affect the American legal tradition of the
    presumption of innocence (innocent until proven
    guilty)?
DARPA’s Views on Legal Issues Surrounding
TIA
 Insisted that TIA was not a domestic surveillance program
   Intended focus on foreign activity

 TIA would have had a built-in audit control system to
  identify abusers of the system
 While DARPA acknowledged the TIA could outpace
  existing privacy protections, TIA was very early in
  development and was using only data legally usable or
  synthetically generated
   Privacy protections had time to “catch up” to TIA
What Killed TIA?
  No guarantees that TIA would not be used for
  domestic surveillance
    FBI collaboration on the project indicated a domestic
     aspect of TIA
  Privacy protections were not originally
  conceptualized with the program
    Added after controversy over the program erupted
  No defined limits to databases TIA would access
  Choice of Poindexter to head program
List of Federal Government Counterterrorist Data
       Collection and Mining Programs, 1999-2006
Name              Administered      Period of          Scope of Operation               Types of Data
                  by                Operation

Able Danger       Defense,          1999-2000          Al Qaeda and Bosnia              Classified and commercial
                  SOCOM
TIA               Defense,          2002-2004          Research on new                  Classified and commercial
                  DARPA                                counterterrorism data mining
                                                       techniques
CAPPS II          Homeland          2001-2004          Preventing hijacking and         Airline passenger personal
                  Security                             airline-based terrorism          information
MATRIX            Consortium of     2001-2005          Targeting of potential criminals State public records and law
                  States                               and terrorists                   enforcement data
SEVIS             Homeland          2001-present       Detecting terrorists in colleges, Data on exchange students
                  Security                             universities, and schools         and foreign visitors

ATS               Homeland          Late 1990s to      Preventing terrorists and       Passenger and cargo data,
                  Security          present,           terrorist weapons from entering especially, but also other
                                    Expanded in 2001   the                             data

US-VISIT           Homeland         2004-present       Tracking entrants to US          Photograph and finger-print
                   Security                                                             data
Project Strikeback FBI, Education   2001-2006          Tracking college aid money to    Financial aid records of
                                                       potential terrorists             individuals
Reason for Cancellation of Data Mining
                  Programs
 Inability of the programs to meet their technical goals
    because of poor data, faulty algorithms, interoperability
    problems, and the generation of too many “false positives”
   Inability of the programs to adequately address privacy
    concerns
   The non-transparent combination of classified and open-
    source data in some programs
   The general lack of transparency in most of the programs
   The potential for other forms of abuse besides privacy
    violations, or “mission creep” (the use of data for purposes
    other than those originally stated).
Legal Environment for Warrantless Wiretaps
  1978
   Foreign Intelligence Surveillance Act
   (FISA)
  1994
   Communications Assistance for Law Enforcement Ac
    (CALEA)
  2003
   Domestic Security Enhancement Act
   (Patriot Act)
  March 2004 – Cheney, Gonzalez,
   and Card visit Attorney General
   John Ashcroft in the hospital to
   authorize warrantless wiretaps
  2006 story in USA Today about
Protect America Act of 2007
 Amended FISA to remove requirement for warrants
 Made the Attorney General and the Director of
  National Intelligence responsible for authorizing
  warrantless searches
 Reauthorized aspects of the Patriot Act that were
  expiring


               President Bush on this issue
FISA Amendments Act of 2008
  Reauthorizes FISA, expands Presidential powers to
   authorize warrantless searches
  Gives telecommunications firms immunity for past
   cooperation with federal intelligence and law
   enforcement agencies
  Russ Feingold on FISA legislation
Warrantless Wiretaps in the Obama
Administration
 During the 2008 campaign, Barack Obama opposed
  the continuation of warrantless wiretaps under the
  Patriot Act and the Protect America Act
 On May 26, 2011, President Obama signed a bill that
  reauthorized key elements of the Patriot Act that
  excluded proposals for Congressional oversight of
  those elements (especially FISA approval for wiretaps
  without warrants)

          Reactions to this decision on barackobama.com

More Related Content

What's hot

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET Journal
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...AltheimPrivacy
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 

What's hot (15)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 

Viewers also liked (7)

16 linden
16 linden16 linden
16 linden
 
Polf06
Polf06Polf06
Polf06
 
Polf04
Polf04Polf04
Polf04
 
Polf17
Polf17Polf17
Polf17
 
Polinter08
Polinter08Polinter08
Polinter08
 
Polinter04
Polinter04Polinter04
Polinter04
 
Polf17
Polf17Polf17
Polf17
 

Similar to Polinter09

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysisAlexander Decker
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.pptgealehegn
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Robert Bromwich
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Elizabeth Mixson
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 

Similar to Polinter09 (20)

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 

More from Jeffrey Hart

More from Jeffrey Hart (20)

Berkeley Internet.pptx
Berkeley Internet.pptxBerkeley Internet.pptx
Berkeley Internet.pptx
 
Essays on the History and Politics of the.pptx
Essays on the History and  Politics of the.pptxEssays on the History and  Politics of the.pptx
Essays on the History and Politics of the.pptx
 
Right-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United StatesRight-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United States
 
The European Union: Challenges and Opportunities
The European Union: Challenges and OpportunitiesThe European Union: Challenges and Opportunities
The European Union: Challenges and Opportunities
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Politics of competitiveness
Politics of competitivenessPolitics of competitiveness
Politics of competitiveness
 
Isa12a
Isa12aIsa12a
Isa12a
 
Ipe21
Ipe21Ipe21
Ipe21
 
Polinter12
Polinter12Polinter12
Polinter12
 
Polinter11
Polinter11Polinter11
Polinter11
 
Ipe19
Ipe19Ipe19
Ipe19
 
Ipe20
Ipe20Ipe20
Ipe20
 
Ipe18
Ipe18Ipe18
Ipe18
 
Isa12b
Isa12bIsa12b
Isa12b
 
Ipe17
Ipe17Ipe17
Ipe17
 
Polinter10
Polinter10Polinter10
Polinter10
 
Ipe16
Ipe16Ipe16
Ipe16
 
Ipe15
Ipe15Ipe15
Ipe15
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Polinter09

  • 2. Surveillance  “…routine ways in which focused attention is paid to personal details by organizations that want to influence, manage, or control certain persons or population groups. It occurs for all kinds of reasons, which can be located on a continuum from care to control. Some element of care and some element of control are nearly always present, making the process inherently ambiguous.” David Lyon as quoted in Chadwick, p. 258.
  • 3. Surveillance Theory Bentham  Jeremy Bentham’s panopticon  Michel Foucault (study of prisons)  Giles Deleuze (rhizomic surveillance) Foucault Deleuze
  • 4. Total/Terrorism Information Awareness Program, 2002  Program headed by Adm. John Poindexter  National Security Advisor to President Reagan  Tried and convicted on felony charges for his involvement in the Iran-Contra scandal  Conviction was later reversed on appeal
  • 5. Functions of TIA  Use data gained from component technologies to create a large-scale national counterterrorism database  Populate the database, and look for methods for mining, combining and refining new sources to include in the database  Analyze and correlate information in the database to derive actionable intelligence
  • 6.
  • 7.
  • 8. TIA Programs  Trans-lingual Information Detection, Extraction and Summarization (TIDES)  Translation program (documents, chat rooms, video)  War gaming the Asymmetric Environment (WAE)  “Market betting” on the likelihood of a terror attack based on socio-economic and political events  Human ID at a Distance  Improved facial recognition technology, gait recognition, physique recognition (height, estimated weight, etc.)  BIO Surveillance  Early warning of a biological attack (anthrax, smallpox, etc.)
  • 9. Human ID at a Distance
  • 10. More TIA Programs  Genysis  Large database of public and private data  Genoa I/II  Collaboration tools to enable analysts from different agencies to share information and ideas  A classified Wikipedia  Evidence Extraction and Link Discovery (EELD)  Search tool to help the analyst determine “who knows whom” and which organization is involved with what people and activities  “Six degrees of Kevin Bacon”
  • 12.
  • 13. Civil Libertarian Objections  Based on the COINTELPRO (COunterINTELligencePROgram) of the 1960’s  FBI abuse of the privacy rights of anti-war and civil rights activists in the 1960s under the blanket justification of national security  Main objection is violation of individual right to privacy  TIA essentially a data-mining program  Would sift through massive amounts of private data in order to “sniff” out terrorist activity  No guarantees of citizens’ protection from abuse of this data
  • 14. Evolutionary Step Enabling Technologies Product Providers Characteristics Data Collection Computers, tapes, disks IBM, CDC Retrospective, static (1960s) data delivery Data Access Relational databases Oracle, Sybase, Retrospective, (1980s) (RDBMS), Structured Informix, IBM, dynamic data delivery Query Language (SQL), Microsoft at record level ODBC Data Warehousing & On-line analytic processing Pilot, Comshare, Retrospective, Decision Support (OLAP), multidimensional Arbor, Cognos, dynamic data delivery (1990s) databases, data warehouses Microstrategy at multiple levels Data Mining Advanced algorithms, Pilot, Lockheed, Prospective, proactive (2000s) multiprocessor computers, IBM, SGI, information delivery massive databases numerous startups (nascent industry)
  • 15. Datamining: False Positives An analyst runs a search for recent foreign travel and purchase of chemicals used in explosives and gets a result in which a single credit card number purchased a ticket from Tel Aviv, Israel to St. Louis, Missouri, and the purchase of a large amount of fertilizer a short time afterwards. Does this result indicate:  A.) A terrorist infiltrating the U.S. to place a truck bomb at the Golden Arch?  B.) An American farmer returning from a trip to the Holy Land?
  • 16. ACLU: Raised These Questions about TIA  Would TIA be limited to a arbitrary number of databases, or is the number of databases unlimited?  What kinds of analysis would TIA be capable of?  Would it be limited strictly to terrorism or could any type of search be possible? (ex. Anti-war groups, drug use, jaywalking) – MISSION CREEP  What difference does a distributed database make?  DARPA officials state that TIA would not be a centralized database, the ACLU stated that this did not matter  How will TIA affect the American legal tradition of the presumption of innocence (innocent until proven guilty)?
  • 17. DARPA’s Views on Legal Issues Surrounding TIA  Insisted that TIA was not a domestic surveillance program  Intended focus on foreign activity  TIA would have had a built-in audit control system to identify abusers of the system  While DARPA acknowledged the TIA could outpace existing privacy protections, TIA was very early in development and was using only data legally usable or synthetically generated  Privacy protections had time to “catch up” to TIA
  • 18. What Killed TIA?  No guarantees that TIA would not be used for domestic surveillance  FBI collaboration on the project indicated a domestic aspect of TIA  Privacy protections were not originally conceptualized with the program  Added after controversy over the program erupted  No defined limits to databases TIA would access  Choice of Poindexter to head program
  • 19. List of Federal Government Counterterrorist Data Collection and Mining Programs, 1999-2006 Name Administered Period of Scope of Operation Types of Data by Operation Able Danger Defense, 1999-2000 Al Qaeda and Bosnia Classified and commercial SOCOM TIA Defense, 2002-2004 Research on new Classified and commercial DARPA counterterrorism data mining techniques CAPPS II Homeland 2001-2004 Preventing hijacking and Airline passenger personal Security airline-based terrorism information MATRIX Consortium of 2001-2005 Targeting of potential criminals State public records and law States and terrorists enforcement data SEVIS Homeland 2001-present Detecting terrorists in colleges, Data on exchange students Security universities, and schools and foreign visitors ATS Homeland Late 1990s to Preventing terrorists and Passenger and cargo data, Security present, terrorist weapons from entering especially, but also other Expanded in 2001 the data US-VISIT Homeland 2004-present Tracking entrants to US Photograph and finger-print Security data Project Strikeback FBI, Education 2001-2006 Tracking college aid money to Financial aid records of potential terrorists individuals
  • 20. Reason for Cancellation of Data Mining Programs  Inability of the programs to meet their technical goals because of poor data, faulty algorithms, interoperability problems, and the generation of too many “false positives”  Inability of the programs to adequately address privacy concerns  The non-transparent combination of classified and open- source data in some programs  The general lack of transparency in most of the programs  The potential for other forms of abuse besides privacy violations, or “mission creep” (the use of data for purposes other than those originally stated).
  • 21. Legal Environment for Warrantless Wiretaps  1978 Foreign Intelligence Surveillance Act (FISA)  1994 Communications Assistance for Law Enforcement Ac (CALEA)  2003 Domestic Security Enhancement Act (Patriot Act)  March 2004 – Cheney, Gonzalez, and Card visit Attorney General John Ashcroft in the hospital to authorize warrantless wiretaps  2006 story in USA Today about
  • 22. Protect America Act of 2007  Amended FISA to remove requirement for warrants  Made the Attorney General and the Director of National Intelligence responsible for authorizing warrantless searches  Reauthorized aspects of the Patriot Act that were expiring President Bush on this issue
  • 23. FISA Amendments Act of 2008  Reauthorizes FISA, expands Presidential powers to authorize warrantless searches  Gives telecommunications firms immunity for past cooperation with federal intelligence and law enforcement agencies  Russ Feingold on FISA legislation
  • 24. Warrantless Wiretaps in the Obama Administration  During the 2008 campaign, Barack Obama opposed the continuation of warrantless wiretaps under the Patriot Act and the Protect America Act  On May 26, 2011, President Obama signed a bill that reauthorized key elements of the Patriot Act that excluded proposals for Congressional oversight of those elements (especially FISA approval for wiretaps without warrants) Reactions to this decision on barackobama.com