SlideShare a Scribd company logo
Internet Surveillance
Connor Feutlinske & Grant Lindsay
A Lively Overview
Discussion Topics:
 Internet Surveillance
 National Security Agency (NSA)
 Federal Law
 Lack of Warrants
 Surveillance Equipment
 Terrorist Activity
Risks & Benefits of Internet
Surveillance
Everything We Do Is
Monitored
Be Careful What You Do
Online
Opinions on Internet
Surveillance
By: Grant and Connor
Internet Surveillance As A
Global Issue
 Global Debate: Internet surveillance
 Surveillance and National Security supporters hurt their
own chances of public trust when the keep their real
motives for internet surveillance from them in the first
place.
What Are Americans Doing?
 Americans are “ talking steps to remove or mask their digital footprints on
the Internet.”
 The pew research center reported, “86 percent of the US internet users
have taken some steps to avoid online surveillance.”
 “ 21 percent of online adults in the survey have had an email or social
media account hijacked.
 11 percent have had information like social security numbers or financial
data stolen.”
 “ 50 percent of internet users say they are worried about the amount of
personal information about them that is online, a figure that has jumped
from 33 percent in 2009.”
Insightful Quote From
Obama
 “ you can‟t have 100 percent security and also then have
100 percent privacy and zero inconvenience. We are going
to have to make some choices as a society.” Various
surveillance programs have helped the government “
anticipate and prevent possible terrorist activity.” – Barack
Obama
Video
 Link To The Video (Only Watch First 0:55):
http://www.youtube.com/watch?v=vN1ebDgSg74&feature=
youtu.be
Discussion & Question
Period
① What types of crime are prevented by increased
surveillance?
② How effective is surveillance in solving crimes, and
how does this effectiveness change as levels of
surveillance increase?
③ Why worry, if you’ve got nothing to hide?
④ Who’s protecting you from Internet predators,
pedophiles, cyber stalkers, and online sex offenders?
Bibliography
1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013.
Web.
23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>.
2.) Declan, Declan. "FBI pressures Internet providers to install surveillance
software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013.
<http://news.cnet.com/8301-13578_3-57596791-38/
fbi-pressures-internet-providers-to-install-surveillance-software/>.
Bibliography
3.) Knox, Olivier. "Obama: Spying programs only „modest‟
invasion of privacy."
Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept.
2013. <http://news.yahoo.com/blogs/ticket/ obama-
spying-programs-only-modest-invasion-privacy-
170140961.html>.
4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web.
23 Sept. 2013. <https://www.eff.org/nsa-spying>.
Bibliography
5.) "Privacy fears cause more to cover online tracks: study."
Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013.
<http://news.yahoo.com/ privacy-fears-cause-more-cover-
online-tracks-study-
110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>.
6.) Schneier, Bruce. "The Internet is a surveillance state."
CNN Opinion. CNN, 16
Mar. 2013. Web. 23 Sept. 2013.
Bibliography
7.) Wright, Joss. "Necessary and inherent limits to internet
surveillance.”
Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013.
<http://policyreview.info/articles/analysis necessary-
and-inherent-limits-internet-surveillance>.

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Maria Parra
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
Dr. Ajith Sundaram
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
yahooteacher
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
mar timawa
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
Anchalanshri Dixit
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
Frederick Lane
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
MIT Startup Exchange
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
Murray Security Services
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
Jordan Peacock
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

Surveillance
SurveillanceSurveillance
Surveillance
Akhilesh Bhargava
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
blogzilla
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
George Moulton
 
Surveillance
SurveillanceSurveillance
Surveillance
Janvi Chaubey
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
Zied Jebali
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
NakedLime
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
Claire Cross
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
rooneys27
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
Shakeb Nabi
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Bodyspacesociety Blog
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
GNWP
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Jacqueline Vickery
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
Neil Ballantyne
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
Gry Tina Tinde
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
carla
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
Cristina Costa
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
Public Health Update
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
Ranjani K.Murthy
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance SystemsUltraman Taro
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
LeolaHuffman
 

Viewers also liked (20)

Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance Systems
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 

Similar to Internet Surveillance

Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
Christy Davis
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
Kim Flintoff
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
yadith_
 

Similar to Internet Surveillance (11)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Internet Surveillance

  • 2. A Lively Overview Discussion Topics:  Internet Surveillance  National Security Agency (NSA)  Federal Law  Lack of Warrants  Surveillance Equipment  Terrorist Activity
  • 3. Risks & Benefits of Internet Surveillance
  • 4. Everything We Do Is Monitored
  • 5. Be Careful What You Do Online
  • 7. Internet Surveillance As A Global Issue  Global Debate: Internet surveillance  Surveillance and National Security supporters hurt their own chances of public trust when the keep their real motives for internet surveillance from them in the first place.
  • 8. What Are Americans Doing?  Americans are “ talking steps to remove or mask their digital footprints on the Internet.”  The pew research center reported, “86 percent of the US internet users have taken some steps to avoid online surveillance.”  “ 21 percent of online adults in the survey have had an email or social media account hijacked.  11 percent have had information like social security numbers or financial data stolen.”  “ 50 percent of internet users say they are worried about the amount of personal information about them that is online, a figure that has jumped from 33 percent in 2009.”
  • 9. Insightful Quote From Obama  “ you can‟t have 100 percent security and also then have 100 percent privacy and zero inconvenience. We are going to have to make some choices as a society.” Various surveillance programs have helped the government “ anticipate and prevent possible terrorist activity.” – Barack Obama
  • 10. Video  Link To The Video (Only Watch First 0:55): http://www.youtube.com/watch?v=vN1ebDgSg74&feature= youtu.be
  • 11. Discussion & Question Period ① What types of crime are prevented by increased surveillance? ② How effective is surveillance in solving crimes, and how does this effectiveness change as levels of surveillance increase? ③ Why worry, if you’ve got nothing to hide? ④ Who’s protecting you from Internet predators, pedophiles, cyber stalkers, and online sex offenders?
  • 12. Bibliography 1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013. Web. 23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>. 2.) Declan, Declan. "FBI pressures Internet providers to install surveillance software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013. <http://news.cnet.com/8301-13578_3-57596791-38/ fbi-pressures-internet-providers-to-install-surveillance-software/>.
  • 13. Bibliography 3.) Knox, Olivier. "Obama: Spying programs only „modest‟ invasion of privacy." Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/blogs/ticket/ obama- spying-programs-only-modest-invasion-privacy- 170140961.html>. 4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web. 23 Sept. 2013. <https://www.eff.org/nsa-spying>.
  • 14. Bibliography 5.) "Privacy fears cause more to cover online tracks: study." Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/ privacy-fears-cause-more-cover- online-tracks-study- 110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>. 6.) Schneier, Bruce. "The Internet is a surveillance state." CNN Opinion. CNN, 16 Mar. 2013. Web. 23 Sept. 2013.
  • 15. Bibliography 7.) Wright, Joss. "Necessary and inherent limits to internet surveillance.” Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013. <http://policyreview.info/articles/analysis necessary- and-inherent-limits-internet-surveillance>.