SlideShare une entreprise Scribd logo
1  sur  15
Internet Surveillance
Connor Feutlinske & Grant Lindsay
A Lively Overview
Discussion Topics:
 Internet Surveillance
 National Security Agency (NSA)
 Federal Law
 Lack of Warrants
 Surveillance Equipment
 Terrorist Activity
Risks & Benefits of Internet
Surveillance
Everything We Do Is
Monitored
Be Careful What You Do
Online
Opinions on Internet
Surveillance
By: Grant and Connor
Internet Surveillance As A
Global Issue
 Global Debate: Internet surveillance
 Surveillance and National Security supporters hurt their
own chances of public trust when the keep their real
motives for internet surveillance from them in the first
place.
What Are Americans Doing?
 Americans are “ talking steps to remove or mask their digital footprints on
the Internet.”
 The pew research center reported, “86 percent of the US internet users
have taken some steps to avoid online surveillance.”
 “ 21 percent of online adults in the survey have had an email or social
media account hijacked.
 11 percent have had information like social security numbers or financial
data stolen.”
 “ 50 percent of internet users say they are worried about the amount of
personal information about them that is online, a figure that has jumped
from 33 percent in 2009.”
Insightful Quote From
Obama
 “ you can‟t have 100 percent security and also then have
100 percent privacy and zero inconvenience. We are going
to have to make some choices as a society.” Various
surveillance programs have helped the government “
anticipate and prevent possible terrorist activity.” – Barack
Obama
Video
 Link To The Video (Only Watch First 0:55):
http://www.youtube.com/watch?v=vN1ebDgSg74&feature=
youtu.be
Discussion & Question
Period
① What types of crime are prevented by increased
surveillance?
② How effective is surveillance in solving crimes, and
how does this effectiveness change as levels of
surveillance increase?
③ Why worry, if you’ve got nothing to hide?
④ Who’s protecting you from Internet predators,
pedophiles, cyber stalkers, and online sex offenders?
Bibliography
1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013.
Web.
23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>.
2.) Declan, Declan. "FBI pressures Internet providers to install surveillance
software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013.
<http://news.cnet.com/8301-13578_3-57596791-38/
fbi-pressures-internet-providers-to-install-surveillance-software/>.
Bibliography
3.) Knox, Olivier. "Obama: Spying programs only „modest‟
invasion of privacy."
Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept.
2013. <http://news.yahoo.com/blogs/ticket/ obama-
spying-programs-only-modest-invasion-privacy-
170140961.html>.
4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web.
23 Sept. 2013. <https://www.eff.org/nsa-spying>.
Bibliography
5.) "Privacy fears cause more to cover online tracks: study."
Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013.
<http://news.yahoo.com/ privacy-fears-cause-more-cover-
online-tracks-study-
110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>.
6.) Schneier, Bruce. "The Internet is a surveillance state."
CNN Opinion. CNN, 16
Mar. 2013. Web. 23 Sept. 2013.
Bibliography
7.) Wright, Joss. "Necessary and inherent limits to internet
surveillance.”
Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013.
<http://policyreview.info/articles/analysis necessary-
and-inherent-limits-internet-surveillance>.

Contenu connexe

Tendances

Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 

Tendances (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

En vedette

Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceGeorge Moulton
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetNakedLime
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INClaire Cross
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillancerooneys27
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationShakeb Nabi
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...GNWP
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...Jacqueline Vickery
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network societyNeil Ballantyne
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyGry Tina Tinde
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in Warcarla
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance Cristina Costa
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflictRanjani K.Murthy
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance SystemsUltraman Taro
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems LeolaHuffman
 

En vedette (20)

Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance Systems
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 

Similaire à Internet Surveillance

The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 

Similaire à Internet Surveillance (11)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 

Dernier

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Internet Surveillance

  • 2. A Lively Overview Discussion Topics:  Internet Surveillance  National Security Agency (NSA)  Federal Law  Lack of Warrants  Surveillance Equipment  Terrorist Activity
  • 3. Risks & Benefits of Internet Surveillance
  • 4. Everything We Do Is Monitored
  • 5. Be Careful What You Do Online
  • 7. Internet Surveillance As A Global Issue  Global Debate: Internet surveillance  Surveillance and National Security supporters hurt their own chances of public trust when the keep their real motives for internet surveillance from them in the first place.
  • 8. What Are Americans Doing?  Americans are “ talking steps to remove or mask their digital footprints on the Internet.”  The pew research center reported, “86 percent of the US internet users have taken some steps to avoid online surveillance.”  “ 21 percent of online adults in the survey have had an email or social media account hijacked.  11 percent have had information like social security numbers or financial data stolen.”  “ 50 percent of internet users say they are worried about the amount of personal information about them that is online, a figure that has jumped from 33 percent in 2009.”
  • 9. Insightful Quote From Obama  “ you can‟t have 100 percent security and also then have 100 percent privacy and zero inconvenience. We are going to have to make some choices as a society.” Various surveillance programs have helped the government “ anticipate and prevent possible terrorist activity.” – Barack Obama
  • 10. Video  Link To The Video (Only Watch First 0:55): http://www.youtube.com/watch?v=vN1ebDgSg74&feature= youtu.be
  • 11. Discussion & Question Period ① What types of crime are prevented by increased surveillance? ② How effective is surveillance in solving crimes, and how does this effectiveness change as levels of surveillance increase? ③ Why worry, if you’ve got nothing to hide? ④ Who’s protecting you from Internet predators, pedophiles, cyber stalkers, and online sex offenders?
  • 12. Bibliography 1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013. Web. 23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>. 2.) Declan, Declan. "FBI pressures Internet providers to install surveillance software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013. <http://news.cnet.com/8301-13578_3-57596791-38/ fbi-pressures-internet-providers-to-install-surveillance-software/>.
  • 13. Bibliography 3.) Knox, Olivier. "Obama: Spying programs only „modest‟ invasion of privacy." Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/blogs/ticket/ obama- spying-programs-only-modest-invasion-privacy- 170140961.html>. 4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web. 23 Sept. 2013. <https://www.eff.org/nsa-spying>.
  • 14. Bibliography 5.) "Privacy fears cause more to cover online tracks: study." Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/ privacy-fears-cause-more-cover- online-tracks-study- 110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>. 6.) Schneier, Bruce. "The Internet is a surveillance state." CNN Opinion. CNN, 16 Mar. 2013. Web. 23 Sept. 2013.
  • 15. Bibliography 7.) Wright, Joss. "Necessary and inherent limits to internet surveillance.” Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013. <http://policyreview.info/articles/analysis necessary- and-inherent-limits-internet-surveillance>.