POS 353453: 04212005 - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

POS 353453: 04212005

Description:

Minority Report etc. 5. Surveillance Society. Components of the Monster. ... National ID Card. Face Recognition. Border Control. Expansion of Government Secrecy. ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 18
Provided by: bbar9
Category:
Tags: pos | card | cnn | com | report

less

Transcript and Presenter's Notes

Title: POS 353453: 04212005


1
POS 353/453 04/21/2005
  • Website.
  • http//faculty.roosevelt.edu/erickson/courses/pos3
    53-453/
  • Course agenda (overview).
  • Outline annotated bibliography assignment due.
  • Web project Locate paper to divide up and post.
  • Example.
  • Updated graduate reading for next week
    (04/28/05).
  • Topics/Concepts introduced by readings.
  • Surveillance.
  • Presentations.
  • Video Cases.
  • Senate Hearings re Identity Theft.
  • No Place to Hide Continued.
  • Media Jihad - Webveillance of Extremists.

2
Geocities Colonization Experimental Project -
Final Assignment.
  • Example(s) of final web project assignment
  • Final Web Project Requirement.
  • Post web version of final paper between paper due
    date and final exam.
  • http//www.geocities.com/cerickson_ru/pos353
  • Paper as one file.
  • Paper as multiple interlinked files.
  • Counter Terror Culture as example.
  • Save Word doc as .html file.
  • Divide into sections.
  • Post sections.
  • Link sections to project main page, or separate
    paper page.
  • Either is acceptable.

3
Surveillance Society Video Cases.
  • Surveillance Society Video Cases.
  • US Public Opinion.
  • CBS Poll April 2002.
  • Identity Theft (CNN 04/16/05).
  • Current Status.
  • Identity Theft Insurance.
  • Hearings.
  • FinancialPrivacyNow.org.
  • CIR Archived ABC video No Place to Hide.
  • NORA.
  • Border Control.
  • Webveillance and Cyber Wars of Terror.
  • Clip from Media Jihad (NHK television fall 2004).
  • Aaron Weisburd.
  • Internet Haganah.

4
Surveillance Society
  • Surveillance Society.
  • Setting the stage.
  • Long range trends, US and UK compared.
  • Examples.
  • City of Chicago Unified Camera Network.
  • Open Loop Chicago.
  • Surveillance Camera Players.
  • MATRIX.
  • Stanley and Steinhardt.
  • Growing Surveillance Monster.
  • Cultural representation of fears of surveillance
    society.
  • Minority Report etc.

5
Surveillance Society
  • Components of the Monster.
  • Video surveillance proliferates.
  • Dataveillance.
  • Private data gathering industry.
  • Cell phone location data.
  • Genetics and privacy.
  • Biometrics.
  • Black boxes.
  • RFID chips.
  • GPS implants.
  • Synergies of surveillance.
  • Data profiling.

6
Surveillance Society
  • ACLU recommendations.
  • Changing terms of the debate.
  • Not inexorable.
  • Comprehensive privacy law commission.
  • Rapid update of laws to catch up with
    technologies.
  • Strengthening and updating 4th amendment.

7
Surveillance Society - FBI.
  • New Slide3.

8
Surveillance Society - Democratic ISA Activity.
  • New Slide4.

9
Surveillance Society - US Federal Wiretaps.
10
Surveillance Society - UK Wiretaps.
11
Surveillance Society - US Federal and State
Wiretaps.
12
Surveillance Society - US CIA Mail Intercepts.
13
Theory of Border Control - Libcki1
  • Securing borders.
  • Ideally.
  • Know who the bad people are before they arrive.
  • Detect them crossing border.
  • Distinguish, apprehend them.
  • Reality.
  • Dont detect before entry.
  • Large scale surreptitious flows (likely in the
    millions).
  • Identity falsification pervasive and easy.

14
Theory of Border Control - Libcki2
  • Basic tenets of border control.
  • Contest between attackers and defender.
  • Information, especially distinguishing threats.
  • Internal and External wide are surveillance
    (focus on internal).
  • Political/Psychopolitical.
  • Borders.
  • Immune System.
  • National borders and terrorism.
  • Cyberspace.
  • Frontlines.
  • Disease surveillance.

15
Transformation of Global Surveillance - Landau
  • Technologies and Strategies of Surveillance.
  • HUMINT.
  • SIGINT.
  • COMINT.
  • Global surveillance.
  • Cold war construction of global spanning
    surveillance networks.
  • United States.
  • National Security Agency.
  • National Geospatial Intelligence Agency.
  • ECHELON. FAS
  • US and allied states.
  • EU Report.
  • Echelonwatch.
  • Statewatch.

16
Privacy and Secrecy Post 9/11 - Rotenberg.
  • Rotenberg, Marc.
  • EPIC.
  • Observing Surveillance Project.
  • Diminishment of Privacy by legal means.
  • CALEA, USA PATRIOT Act.
  • Loss of Privacy via technical means.
  • National ID Card.
  • Face Recognition.
  • Border Control.
  • Expansion of Government Secrecy.
  • Diminished access.
  • Closed hearings.
  • Consequences of government secrecy.

17
Privacy and Secrecy Post 9/11 - Rotenberg.
  • Privacy and Power.
  • Recognizing and governing information and power
    asymmetries.
  • What are we to do?
  • Build on existing constitutional traditions.
  • Assess new systems of public surveillance.
  • Balance of authority to surveil and the
    surveillance of authority.
  • Descriptive vs. Normative evaluations of
    surveillance.
  • Oppose fatalism regarding loss of privacy.
Write a Comment
User Comments (0)
About PowerShow.com