110 likes | 214 Views
I am Very Most Definitely Blacklisted Due to this Project. Anyway. Computers and Surveillance. NSA leaks different types of surveillance surveillance programs controversy questions some books and movies. NSA Leaks.
E N D
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Computers and Surveillance NSA leaks different types of surveillance surveillance programs controversy questions some books and movies
NSA Leaks On June 5 2013 classified documents are leaked that reveal the NSA is collecting phone records. The PRISM program allowing the NSA access to the systems of tech giants is exposed the next day along with the Boundless Informant used for tracking how much data is obtained for each country. June 9th Edward Snowden identifies himself as the one who leaked documents.
On July 31st the Xkeyscore tool allowing NSA analysts to search databases of most online activity. September 5th The Guardian reports that NSA and GCHQ have defeated most internet encryption standards, mostly through cooperation with internet and tech companies. The project name is Bullrun. October 4th it is reported NSA and GCHQ have identified a small number of TOR users.
Types of Surveillance computer telephone camera social network biometric aerial data mining corporate identification satellite RFID GPS bugs postal manual
Surveillance programs Echelon Data Retention Directive INDECT Schengen Information System Golden Shield Project Frenchelon Centralized Monitoring System DRDO NETRA NATGRID SORM Titan Traffic Database Onyx Impact Nominal Index Interception Modernisation Programme Mastering the Internet UK National DNA Database Tempora Boundless Informant Stuxnet Carnivore Comprehensive National Cybersecurity Initiative DCSNet Fairview Financial Crimes Enforcement Network Magic Lantern Main Core Nationwide Suspicious Activity Reporting Initiative NSA Call Database PRISM Room 641A Special Collection Service Stellar Wind Tailored Access Operations Terrorist Finance Tracking Program Intelligence Comunnity Utah Data Center X-Keyscore GhostNet
Surveillance Can be Good Batman used surveillance to find the Joker prevent terrorism prevent crime
Controversy political espionage industrial espionage privacy trust surveillance shouldn't be secret increases risk of blackmail and coercion psychological effects
Questions to Ask is mass surveillance worth losing privacy? does mass surveillance work? can people defend their information?
Books and Movies 1984 Minority Report The Lives of Others Digital Fortress Echelon Conspiracy Demolition Man
Sources Wikipedia IMDB Harvard Law Review.org ACLU.org EFF.org WIRED.com GIZMODO The Guardian NSA.gov