SlideShare a Scribd company logo
1 of 42
Surveillance Society
Definition
• The monitoring of the behavior, activities, or
other changing information, usually for the
purpose of influencing, managing, directing,
or protecting.
• Most usually involves observation of
individuals or groups by government
organizations.
Positive? Negative?
• Surveillance is useful to governments and law
enforcement to maintain social control,
recognize and monitor threats, and
prevent/investigate criminal activity.
• Civil rights groups are concerned that mass
surveillance will result in limited or nonexistent political and/or personal freedoms.
Types of Surveillance
•
•
•
•
•
•
•

Computer surveillance
Telephones
Surveillance cameras
Social network analysis
Biometric surveillance
Aerial surveillance
Corporate surveillance
Types of Surveillance
•
•
•
•
•
•
•
•
•

Human operatives
Satellite imagery
Identification and credentials
RFID and geolocation devices
RFID tagging
Global positioning system
Mobile phones
Surveillance devices
Postal services
Computer Surveillance
• Vast majority of computer surveillance
involves monitoring of data and traffic on the
Internet.
• Real-time monitoring by Federal law
enforcement agencies.
• “Trigger” words or phrases
• Visiting certain types of web sites
• Communicating with suspicious individuals or
groups
• FBI software - Magic Lantern and CIPAV can
be used to gain unauthorized access to data;
can be installed physically or remotely
• vanEck phreaking – reads electromagnetic
emanations remotely from computing devices
to extract data
• Pinwale – stores and indexes large numbers of
emails of American citizens and foreigners
Telephones
• Widespread official and unofficial wiretapping
• AT&T and Verizon are paid by the FBI to keep
records easily searchable and accessible
• Speech-to-text software creates machinereadable text from intercepted audio
• Technology available to US, UK governments to
remotely activate microphones in cell phones
• “Multilateration” of cell phone towers used to
collect location data from cell phone use
Surveillance Cameras
• Video cameras used to observe an area
• Connected to a recording device or IP network
• Automated software organizes digital video
footage into a searchable database
• Homeland Security grants in US enable cities
to install cameras and to connect them to
central monitoring center
• “Golden Shield Project” – US companies install
cameras, facial recognition software in China
to track individuals. Goal is to have a picture
of every person in China in central database.
• Defense Advanced Research Projects Agency
(DARPA) funding research to link cameras to a
central monitoring station in a city
• Identix’s facial recognition software used at
Super Bowl 2001
• Traffic cameras in DC used for day-to-day
monitoring by DC police
• Trapwire - Closed Circuit TeleVision (CCTV)
cameras track people’s movements across city
Social Network Analysis
• Maps of social networks based on data from
Facebook, MySpace, Twitter, traffic analysis
information from phone call records
• These maps are “data mined” to extract
personal interests, friendships, affiliations,
beliefs, thoughts, activities.
• DARPA, National Security Agency (NSA),
Department of Homeland Security (DHS)
invest in social network analysis.
• AT&T’s programming language “Hancock” sifts
through databases of phone call and Internet
traffic records.
• Employers report using social networking sites
to collect personal data on prospective or
current employees.
Biometric Surveillance
• Biometric surveillance measures and analyzes
human physical and/or behavioral
characteristics for authentication,
identification, or screening purposes.
• Fingerprints, DNA, facial patterns, voice
recognition, iris scanning, etc.
• Some technology can identify a person up to
500 ft. by facial features.
• Affective computing – computers recognize a
person’s emotional state based on analysis of
facial expressions, speed of talking, tone and
pitch of voice, posture, etc.
• DNA fingerprinting – analyzes major markers
in DNA to produce a match
• FBI spending $1 billion to build database for
people in US. Computers are in underground
facility as large as two football fields.
• Facial thermographs – identify fear, stress
Aerial Surveillance
• Aerial surveillance gathers visual imagery or
video from an airborne vehicle.
• Unmanned aerial vehicle (UAV), helicopter,
spy plane, micro-aerial vehicles (MAV),
forward-looking infrared devices.
• DHS testing UAVs to patrol US skies
• UK building up fleet of UAVs for its police
• MAVs can carry Tasers for crowd control or as
weapons
• DARPA programs automate much of the aerial
surveillance process.
• Self-piloting UAVs decide who is “suspicious,”
monitor them, coordinate with other UAVs,
notify human operators in centralized
monitoring station
• AI drones increase area that can be
continuously monitored, reducing number of
human operators
Data Mining and Profiling
• Data mining – application of statistical
techniques to discover relationships within
data
• Assemble data to create a profile, i.e., a
picture of patterns and behavior
• Economic and social transactions create data
• Web traffic and online purchases also used for
profiling
• Data analysis used by programs such as
ADVISE and TALON to determine whether the
person is a military, criminal, or political threat
• ADVISE – Analysis, Dissemination,
Visualization, Insight, Semantic Enhancement
R&D program authorized by DHS.
• TALON – Threat and Local Observation Notice,
activated after 9/11 by Dept. of Defense;
contains info on antiwar groups
• US is planning 43 “fusion centers”, a national
network of surveillance centers in over 30
states
• Fusion centers will collect, analyze data from
drivers’ licensing centers, hospital records,
criminal records, school records, credit
bureaus, banks, etc.
• Info will be placed in a centralized database
that can be accessed by all centers as well as
federal law enforcement and intelligence
agencies
Corporate Surveillance
• Monitoring of a person or group’s behavior by
a corporation
• Data usually used for marketing purposes
• Can be shared with government agencies
• Google stores identifying information for each
web search, scans content of Gmail webmail
service to tailor advertising
• Many US companies monitor e-mail traffic or
workers and/or Internet connections
• Companies use software to block non-work
related websites such as offensive sites, game
sites, social networking sites, entertainment
sites, shopping sites, and sports sites
• Some companies track keystrokes and time
spent at keyboards
• Infragard – FBI, DHS, corporations have
information-sharing partnership
Human Operatives
• Organizations that have enemies who wish to
gather information about the groups’
members or activities face the issue of
infiltration
• HUMINT – intelligence gathered by humans
rather than by electronic monitoring and data
mining
Satellite Imagery
• Local, state, and domestic Federal agencies
can access imagery from military intelligence
satellites and aircraft sensors
• These devices can penetrate cloud cover,
detect chemical traces, and identify objects in
buildings and underground bunkers
• Real-time video better than still images from
Google Earth
Identification and Credentials
• A card containing an identification number
• Some countries have national ID numbers
• IDs can be verified by passports, drivers’
licenses, library cards, banking or credit cards
• Machine-readable data can create an
electronic trail
RFID and Geolocation Devices
a. RFID Tagging
• Use of very small electronic devices applied or
incorporated into a product, animal, or person
for identification and tracking using radio
waves
• Some companies tag employees, who are
monitored while on job
• VeriChip (Applied Digital Solutions), injected
under skin, stores personal information in
“Global VeriChip Subscriber Registry”
b. Global Positioning System
• In US, police have planted hidden GPS tracking
devices in people’s vehicles to monitor their
movements
• Some cities require parolees to wear GPS
devices to track their movements when they
get out of prison
c. Mobile Phones
• Commonly used to collect geolocation data
• Multilateration – calculates the differences in
time for a signal to travel from the cell phone
to each of several cell towers near the owner
of the phone
d. Surveillance Devices
• “Bugs” are hidden electronic devices used to
capture, record, and/or transmit data to a
receiving party such as a law enforcement
agency
• COINTELPRO – US domestic intelligence
program bugged homes, office, vehicles of
political activists, subversives, criminals
e. Postal Services
• Significance of surveillance of postal system
decreasing in favor of Internet and telephone
surveillance
• Interception of mail is still option for law
enforcement
Controversy over Surveillance
Support
• These tools protect society from terrorists and
criminals
• People must become accustomed to having no
privacy
• “If you aren’t doing anything wrong, then you
don’t have anything to worry about.”
Opposition
• “As long as we do what we’re told, we have
nothing to fear.”
• Political activists do not want the government
to know their names
• Mass surveillance may make future opposition
impossible
• Most people do have things to hide, e.g., job
hunter may not want present employer to
know this
Opposition: Totalitarianism
• Fear that society is moving toward a state of
mass surveillance
• “Laying the bricks one at a time for a police
state.”
• Blurring of lines between public and private
places
• Surveillance techniques are not equal, e.g.,
facial recognition requires no cooperation
Opposition:
Psychological/Social Effects
• Creates in people a feeling of always being
watched, so they become self-policing
• The State can control the populace without
having to resort to physical force
Opposition: Privacy
• Civil rights groups include Electronic Privacy
Information Center, Electronic Frontier
Foundation, American Civil Liberties Union
• Lawsuits include Hepting v. AT&T, EPIC v.
Department of Justice
• The Church Committee investigated domestic
intelligence programs such as COINTELPRO
Counter-surveillance,
Inverse Surveillance, Sousveillance
• Counter-surveillance – avoiding surveillance or
making surveillance difficult
• Inverse surveillance – reversal of surveillance
on other individuals or groups, e.g., citizens
photographing police
• Sousveillance – inverse surveillance, involving
the recording by private individuals, rather
than government or corporate entities
Assignment
• Look for the assignment on this PowerPoint in
the Activities section of the Surveillance
Society Project.
• As you go through the PowerPoint
presentation, complete the assignment and
submit it to your teacher/coach.

More Related Content

What's hot

Sociology of the mass media: Media forms, ownership and control
Sociology of the mass media: Media forms, ownership and controlSociology of the mass media: Media forms, ownership and control
Sociology of the mass media: Media forms, ownership and controlbrunogiegerich
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theoryNihaarikaSaini
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniDr Raghu Khimani
 
Unit 12 Sociological Theories Of Crime
Unit 12 Sociological Theories Of CrimeUnit 12 Sociological Theories Of Crime
Unit 12 Sociological Theories Of CrimeMike Harris
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentationMaria Donohue
 
Crime Scene Diagramming and Reconstruction by Det. Mike Anderson
Crime Scene Diagramming and Reconstruction by Det. Mike AndersonCrime Scene Diagramming and Reconstruction by Det. Mike Anderson
Crime Scene Diagramming and Reconstruction by Det. Mike AndersonPPI_Group
 
Maintenance of law & Order II
Maintenance of law & Order IIMaintenance of law & Order II
Maintenance of law & Order IIbansi default
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Crime and Punishment revision
Crime and Punishment revisionCrime and Punishment revision
Crime and Punishment revisionmrstanning
 
Presentation on crime
Presentation on crimePresentation on crime
Presentation on crimeRizwan Khan
 
Fake news
Fake newsFake news
Fake newsLibrary
 
Crime, Deviance and Criminals| by Imran Ahmad Sajid
Crime, Deviance and Criminals| by Imran Ahmad SajidCrime, Deviance and Criminals| by Imran Ahmad Sajid
Crime, Deviance and Criminals| by Imran Ahmad SajidDr. Imran A. Sajid
 
Concept of crime
Concept of crimeConcept of crime
Concept of crimeSonuVashist
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 

What's hot (20)

Crime PREVENTION
Crime PREVENTIONCrime PREVENTION
Crime PREVENTION
 
Sociology of the mass media: Media forms, ownership and control
Sociology of the mass media: Media forms, ownership and controlSociology of the mass media: Media forms, ownership and control
Sociology of the mass media: Media forms, ownership and control
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theory
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Unit 12 Sociological Theories Of Crime
Unit 12 Sociological Theories Of CrimeUnit 12 Sociological Theories Of Crime
Unit 12 Sociological Theories Of Crime
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentation
 
Crime Scene Diagramming and Reconstruction by Det. Mike Anderson
Crime Scene Diagramming and Reconstruction by Det. Mike AndersonCrime Scene Diagramming and Reconstruction by Det. Mike Anderson
Crime Scene Diagramming and Reconstruction by Det. Mike Anderson
 
Maintenance of law & Order II
Maintenance of law & Order IIMaintenance of law & Order II
Maintenance of law & Order II
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Crime and Punishment revision
Crime and Punishment revisionCrime and Punishment revision
Crime and Punishment revision
 
Presentation on crime
Presentation on crimePresentation on crime
Presentation on crime
 
Fake news
Fake newsFake news
Fake news
 
Crime, Deviance and Criminals| by Imran Ahmad Sajid
Crime, Deviance and Criminals| by Imran Ahmad SajidCrime, Deviance and Criminals| by Imran Ahmad Sajid
Crime, Deviance and Criminals| by Imran Ahmad Sajid
 
Crime statistics uses
Crime statistics  usesCrime statistics  uses
Crime statistics uses
 
Concept of crime
Concept of crimeConcept of crime
Concept of crime
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 

Similar to Surveillance Society

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.pptBalwinderKaur626266
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 

Similar to Surveillance Society (20)

How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Digital investigations
Digital investigationsDigital investigations
Digital investigations
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Ethics pres
Ethics presEthics pres
Ethics pres
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 

More from Karen Moxley

2013-14 Cowboys Culture & Curiosity
2013-14 Cowboys Culture & Curiosity2013-14 Cowboys Culture & Curiosity
2013-14 Cowboys Culture & CuriosityKaren Moxley
 
Coral reef entry document
Coral reef entry documentCoral reef entry document
Coral reef entry documentKaren Moxley
 
1 19-2013 stepping into global issues
1 19-2013 stepping into global issues1 19-2013 stepping into global issues
1 19-2013 stepping into global issuesKaren Moxley
 

More from Karen Moxley (6)

2013-14 Cowboys Culture & Curiosity
2013-14 Cowboys Culture & Curiosity2013-14 Cowboys Culture & Curiosity
2013-14 Cowboys Culture & Curiosity
 
Project FAIR
Project FAIRProject FAIR
Project FAIR
 
Coral reef rubric
Coral reef rubricCoral reef rubric
Coral reef rubric
 
Coral reef plan
Coral reef planCoral reef plan
Coral reef plan
 
Coral reef entry document
Coral reef entry documentCoral reef entry document
Coral reef entry document
 
1 19-2013 stepping into global issues
1 19-2013 stepping into global issues1 19-2013 stepping into global issues
1 19-2013 stepping into global issues
 

Recently uploaded

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

Surveillance Society

  • 2. Definition • The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing, directing, or protecting. • Most usually involves observation of individuals or groups by government organizations.
  • 3. Positive? Negative? • Surveillance is useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. • Civil rights groups are concerned that mass surveillance will result in limited or nonexistent political and/or personal freedoms.
  • 4. Types of Surveillance • • • • • • • Computer surveillance Telephones Surveillance cameras Social network analysis Biometric surveillance Aerial surveillance Corporate surveillance
  • 5. Types of Surveillance • • • • • • • • • Human operatives Satellite imagery Identification and credentials RFID and geolocation devices RFID tagging Global positioning system Mobile phones Surveillance devices Postal services
  • 7. • Vast majority of computer surveillance involves monitoring of data and traffic on the Internet. • Real-time monitoring by Federal law enforcement agencies. • “Trigger” words or phrases • Visiting certain types of web sites • Communicating with suspicious individuals or groups
  • 8. • FBI software - Magic Lantern and CIPAV can be used to gain unauthorized access to data; can be installed physically or remotely • vanEck phreaking – reads electromagnetic emanations remotely from computing devices to extract data • Pinwale – stores and indexes large numbers of emails of American citizens and foreigners
  • 9. Telephones • Widespread official and unofficial wiretapping • AT&T and Verizon are paid by the FBI to keep records easily searchable and accessible • Speech-to-text software creates machinereadable text from intercepted audio • Technology available to US, UK governments to remotely activate microphones in cell phones • “Multilateration” of cell phone towers used to collect location data from cell phone use
  • 11. • Video cameras used to observe an area • Connected to a recording device or IP network • Automated software organizes digital video footage into a searchable database • Homeland Security grants in US enable cities to install cameras and to connect them to central monitoring center • “Golden Shield Project” – US companies install cameras, facial recognition software in China to track individuals. Goal is to have a picture of every person in China in central database.
  • 12. • Defense Advanced Research Projects Agency (DARPA) funding research to link cameras to a central monitoring station in a city • Identix’s facial recognition software used at Super Bowl 2001 • Traffic cameras in DC used for day-to-day monitoring by DC police • Trapwire - Closed Circuit TeleVision (CCTV) cameras track people’s movements across city
  • 13. Social Network Analysis • Maps of social networks based on data from Facebook, MySpace, Twitter, traffic analysis information from phone call records • These maps are “data mined” to extract personal interests, friendships, affiliations, beliefs, thoughts, activities. • DARPA, National Security Agency (NSA), Department of Homeland Security (DHS) invest in social network analysis.
  • 14. • AT&T’s programming language “Hancock” sifts through databases of phone call and Internet traffic records. • Employers report using social networking sites to collect personal data on prospective or current employees.
  • 16. • Biometric surveillance measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. • Fingerprints, DNA, facial patterns, voice recognition, iris scanning, etc. • Some technology can identify a person up to 500 ft. by facial features.
  • 17. • Affective computing – computers recognize a person’s emotional state based on analysis of facial expressions, speed of talking, tone and pitch of voice, posture, etc. • DNA fingerprinting – analyzes major markers in DNA to produce a match • FBI spending $1 billion to build database for people in US. Computers are in underground facility as large as two football fields. • Facial thermographs – identify fear, stress
  • 19. • Aerial surveillance gathers visual imagery or video from an airborne vehicle. • Unmanned aerial vehicle (UAV), helicopter, spy plane, micro-aerial vehicles (MAV), forward-looking infrared devices. • DHS testing UAVs to patrol US skies • UK building up fleet of UAVs for its police • MAVs can carry Tasers for crowd control or as weapons
  • 20. • DARPA programs automate much of the aerial surveillance process. • Self-piloting UAVs decide who is “suspicious,” monitor them, coordinate with other UAVs, notify human operators in centralized monitoring station • AI drones increase area that can be continuously monitored, reducing number of human operators
  • 21. Data Mining and Profiling • Data mining – application of statistical techniques to discover relationships within data • Assemble data to create a profile, i.e., a picture of patterns and behavior • Economic and social transactions create data • Web traffic and online purchases also used for profiling
  • 22. • Data analysis used by programs such as ADVISE and TALON to determine whether the person is a military, criminal, or political threat • ADVISE – Analysis, Dissemination, Visualization, Insight, Semantic Enhancement R&D program authorized by DHS. • TALON – Threat and Local Observation Notice, activated after 9/11 by Dept. of Defense; contains info on antiwar groups
  • 23. • US is planning 43 “fusion centers”, a national network of surveillance centers in over 30 states • Fusion centers will collect, analyze data from drivers’ licensing centers, hospital records, criminal records, school records, credit bureaus, banks, etc. • Info will be placed in a centralized database that can be accessed by all centers as well as federal law enforcement and intelligence agencies
  • 24. Corporate Surveillance • Monitoring of a person or group’s behavior by a corporation • Data usually used for marketing purposes • Can be shared with government agencies • Google stores identifying information for each web search, scans content of Gmail webmail service to tailor advertising
  • 25. • Many US companies monitor e-mail traffic or workers and/or Internet connections • Companies use software to block non-work related websites such as offensive sites, game sites, social networking sites, entertainment sites, shopping sites, and sports sites • Some companies track keystrokes and time spent at keyboards • Infragard – FBI, DHS, corporations have information-sharing partnership
  • 26. Human Operatives • Organizations that have enemies who wish to gather information about the groups’ members or activities face the issue of infiltration • HUMINT – intelligence gathered by humans rather than by electronic monitoring and data mining
  • 27. Satellite Imagery • Local, state, and domestic Federal agencies can access imagery from military intelligence satellites and aircraft sensors • These devices can penetrate cloud cover, detect chemical traces, and identify objects in buildings and underground bunkers • Real-time video better than still images from Google Earth
  • 28. Identification and Credentials • A card containing an identification number • Some countries have national ID numbers • IDs can be verified by passports, drivers’ licenses, library cards, banking or credit cards • Machine-readable data can create an electronic trail
  • 30. a. RFID Tagging • Use of very small electronic devices applied or incorporated into a product, animal, or person for identification and tracking using radio waves • Some companies tag employees, who are monitored while on job • VeriChip (Applied Digital Solutions), injected under skin, stores personal information in “Global VeriChip Subscriber Registry”
  • 31. b. Global Positioning System • In US, police have planted hidden GPS tracking devices in people’s vehicles to monitor their movements • Some cities require parolees to wear GPS devices to track their movements when they get out of prison
  • 32. c. Mobile Phones • Commonly used to collect geolocation data • Multilateration – calculates the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone
  • 33. d. Surveillance Devices • “Bugs” are hidden electronic devices used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency • COINTELPRO – US domestic intelligence program bugged homes, office, vehicles of political activists, subversives, criminals
  • 34. e. Postal Services • Significance of surveillance of postal system decreasing in favor of Internet and telephone surveillance • Interception of mail is still option for law enforcement
  • 36. Support • These tools protect society from terrorists and criminals • People must become accustomed to having no privacy • “If you aren’t doing anything wrong, then you don’t have anything to worry about.”
  • 37. Opposition • “As long as we do what we’re told, we have nothing to fear.” • Political activists do not want the government to know their names • Mass surveillance may make future opposition impossible • Most people do have things to hide, e.g., job hunter may not want present employer to know this
  • 38. Opposition: Totalitarianism • Fear that society is moving toward a state of mass surveillance • “Laying the bricks one at a time for a police state.” • Blurring of lines between public and private places • Surveillance techniques are not equal, e.g., facial recognition requires no cooperation
  • 39. Opposition: Psychological/Social Effects • Creates in people a feeling of always being watched, so they become self-policing • The State can control the populace without having to resort to physical force
  • 40. Opposition: Privacy • Civil rights groups include Electronic Privacy Information Center, Electronic Frontier Foundation, American Civil Liberties Union • Lawsuits include Hepting v. AT&T, EPIC v. Department of Justice • The Church Committee investigated domestic intelligence programs such as COINTELPRO
  • 41. Counter-surveillance, Inverse Surveillance, Sousveillance • Counter-surveillance – avoiding surveillance or making surveillance difficult • Inverse surveillance – reversal of surveillance on other individuals or groups, e.g., citizens photographing police • Sousveillance – inverse surveillance, involving the recording by private individuals, rather than government or corporate entities
  • 42. Assignment • Look for the assignment on this PowerPoint in the Activities section of the Surveillance Society Project. • As you go through the PowerPoint presentation, complete the assignment and submit it to your teacher/coach.