SlideShare une entreprise Scribd logo
1  sur  15
Internet Surveillance
Connor Feutlinske & Grant Lindsay
A Lively Overview
Discussion Topics:
 Internet Surveillance
 National Security Agency (NSA)
 Federal Law
 Lack of Warrants
 Surveillance Equipment
 Terrorist Activity
Risks & Benefits of Internet
Surveillance
Everything We Do Is
Monitored
Be Careful What You Do
Online
Opinions on Internet
Surveillance
By: Grant and Connor
Internet Surveillance As A
Global Issue
 Global Debate: Internet surveillance
 Surveillance and National Security supporters hurt their
own chances of public trust when the keep their real
motives for internet surveillance from them in the first
place.
What Are Americans Doing?
 Americans are “ talking steps to remove or mask their digital footprints on
the Internet.”
 The pew research center reported, “86 percent of the US internet users
have taken some steps to avoid online surveillance.”
 “ 21 percent of online adults in the survey have had an email or social
media account hijacked.
 11 percent have had information like social security numbers or financial
data stolen.”
 “ 50 percent of internet users say they are worried about the amount of
personal information about them that is online, a figure that has jumped
from 33 percent in 2009.”
Insightful Quote From
Obama
 “ you can‟t have 100 percent security and also then have
100 percent privacy and zero inconvenience. We are going
to have to make some choices as a society.” Various
surveillance programs have helped the government “
anticipate and prevent possible terrorist activity.” – Barack
Obama
Video
 Link To The Video (Only Watch First 0:55):
http://www.youtube.com/watch?v=vN1ebDgSg74&feature=
youtu.be
Discussion & Question
Period
① What types of crime are prevented by increased
surveillance?
② How effective is surveillance in solving crimes, and
how does this effectiveness change as levels of
surveillance increase?
③ Why worry, if you’ve got nothing to hide?
④ Who’s protecting you from Internet predators,
pedophiles, cyber stalkers, and online sex offenders?
Bibliography
1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013.
Web.
23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>.
2.) Declan, Declan. "FBI pressures Internet providers to install surveillance
software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013.
<http://news.cnet.com/8301-13578_3-57596791-38/
fbi-pressures-internet-providers-to-install-surveillance-software/>.
Bibliography
3.) Knox, Olivier. "Obama: Spying programs only „modest‟
invasion of privacy."
Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept.
2013. <http://news.yahoo.com/blogs/ticket/ obama-
spying-programs-only-modest-invasion-privacy-
170140961.html>.
4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web.
23 Sept. 2013. <https://www.eff.org/nsa-spying>.
Bibliography
5.) "Privacy fears cause more to cover online tracks: study."
Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013.
<http://news.yahoo.com/ privacy-fears-cause-more-cover-
online-tracks-study-
110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>.
6.) Schneier, Bruce. "The Internet is a surveillance state."
CNN Opinion. CNN, 16
Mar. 2013. Web. 23 Sept. 2013.
Bibliography
7.) Wright, Joss. "Necessary and inherent limits to internet
surveillance.”
Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013.
<http://policyreview.info/articles/analysis necessary-
and-inherent-limits-internet-surveillance>.

Contenu connexe

Tendances

Tendances (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

En vedette

Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
Zied Jebali
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
Claire Cross
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
Shakeb Nabi
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
Neil Ballantyne
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
carla
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance Systems
Ultraman Taro
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
LeolaHuffman
 

En vedette (20)

Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
The Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and ForgetThe Internet Doesn't Forgive and Forget
The Internet Doesn't Forgive and Forget
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Social surveillance
Social surveillanceSocial surveillance
Social surveillance
 
Gender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency SituationGender Based Violence in a Post Emergency Situation
Gender Based Violence in a Post Emergency Situation
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
Supervision in the network society
Supervision in the network societySupervision in the network society
Supervision in the network society
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
Surveillance Systems
Surveillance SystemsSurveillance Systems
Surveillance Systems
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 

Similaire à Internet Surveillance

The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
Kim Flintoff
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
yadith_
 

Similaire à Internet Surveillance (11)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Internet Surveillance

  • 2. A Lively Overview Discussion Topics:  Internet Surveillance  National Security Agency (NSA)  Federal Law  Lack of Warrants  Surveillance Equipment  Terrorist Activity
  • 3. Risks & Benefits of Internet Surveillance
  • 4. Everything We Do Is Monitored
  • 5. Be Careful What You Do Online
  • 7. Internet Surveillance As A Global Issue  Global Debate: Internet surveillance  Surveillance and National Security supporters hurt their own chances of public trust when the keep their real motives for internet surveillance from them in the first place.
  • 8. What Are Americans Doing?  Americans are “ talking steps to remove or mask their digital footprints on the Internet.”  The pew research center reported, “86 percent of the US internet users have taken some steps to avoid online surveillance.”  “ 21 percent of online adults in the survey have had an email or social media account hijacked.  11 percent have had information like social security numbers or financial data stolen.”  “ 50 percent of internet users say they are worried about the amount of personal information about them that is online, a figure that has jumped from 33 percent in 2009.”
  • 9. Insightful Quote From Obama  “ you can‟t have 100 percent security and also then have 100 percent privacy and zero inconvenience. We are going to have to make some choices as a society.” Various surveillance programs have helped the government “ anticipate and prevent possible terrorist activity.” – Barack Obama
  • 10. Video  Link To The Video (Only Watch First 0:55): http://www.youtube.com/watch?v=vN1ebDgSg74&feature= youtu.be
  • 11. Discussion & Question Period ① What types of crime are prevented by increased surveillance? ② How effective is surveillance in solving crimes, and how does this effectiveness change as levels of surveillance increase? ③ Why worry, if you’ve got nothing to hide? ④ Who’s protecting you from Internet predators, pedophiles, cyber stalkers, and online sex offenders?
  • 12. Bibliography 1.) "Computer and network surveillance." Wikepedia. Wikipedia, 14 Sept. 2013. Web. 23 Sept. 2013. <http://en.wikipedia.org/wiki/Internet_surveillance>. 2.) Declan, Declan. "FBI pressures Internet providers to install surveillance software." CNET. CNET, 2 Aug. 2013. Web. 23 Sept. 2013. <http://news.cnet.com/8301-13578_3-57596791-38/ fbi-pressures-internet-providers-to-install-surveillance-software/>.
  • 13. Bibliography 3.) Knox, Olivier. "Obama: Spying programs only „modest‟ invasion of privacy." Yahoo News. Yahoo, 7 June 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/blogs/ticket/ obama- spying-programs-only-modest-invasion-privacy- 170140961.html>. 4.) "NSA Spying." Electronic Frontier Foundation. EFF, n.d. Web. 23 Sept. 2013. <https://www.eff.org/nsa-spying>.
  • 14. Bibliography 5.) "Privacy fears cause more to cover online tracks: study." Yahoo News. Yahoo, 5 Sept. 2013. Web. 23 Sept. 2013. <http://news.yahoo.com/ privacy-fears-cause-more-cover- online-tracks-study- 110630349.html;_ylt=A2KLOzETyUBS_HsA9nDQtDMD>. 6.) Schneier, Bruce. "The Internet is a surveillance state." CNN Opinion. CNN, 16 Mar. 2013. Web. 23 Sept. 2013.
  • 15. Bibliography 7.) Wright, Joss. "Necessary and inherent limits to internet surveillance.” Internet Policy Review. N.p., 5 Aug. 2013. Web. 23 Sept. 2013. <http://policyreview.info/articles/analysis necessary- and-inherent-limits-internet-surveillance>.