cyber surveillance - honors english 1 presentation

24
CYBER SURVEILLANCE THE TRACKING AND GATHERING OF INTERNET ACTIVITY & USAGE, INCLUDING CONFIDENTIAL INFORMATION. (Tremblay)

Upload: axnv

Post on 14-Apr-2017

348 views

Category:

Technology


0 download

TRANSCRIPT

CYBERSURVEILLANCE

THE TRACKING ANDGATHERING OF INTERNET

ACTIVITY & USAGE,INCLUDING CONFIDENTIAL

INFORMATION.

KELSEY NGUYEN travis ponce ann truong

(Tremblay)

Government Surveillance

Safer worldCombat (preventand investigate)criminal activityand terrorism.Maintain socialorder. (Podesta)

Corporate Surveillance

Marketing purposesData provides information and feedbackon their products and services.

APPROVEI

(Podesta)

Hacker Surveillance

Financial GainEmpowerment

("Why Do People Hack?")

SO MANY OF OURPRIVATE INFORMATIONGETS LEAKED ANDEXPOSED TO THEWORLD... BUT HOW?

KeyloggerA surveillance software that captures andlogs users' keystrokes on a keyboard.

Malicious Softwares

These softwares enable the hacker to haveremote control over a user's device.

(Siciliano)

(Shimonski)

PRISMA highly secretive program managed by the United

States National Security Agency (NSA).

(http://img.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-4.jpg)

(Barrett)

THE CASE WITHMOBILE CELL

PHONES...

Towers

Mobile towers capture signals transmitted from a cellphone. People can observe this signal to determine where the

phone must be located in order to account for theseobservations.

Many law enforcement agencies tend to use this devicesurreptitiously. ("The Problem with Mobile Phones")

Information Taken From Apps

Calendar

2%

Messages

4%

Microphone

5%

Call Log

7%

Contacts

9%

Camera

Other Users Accounts

10% 15%

Device ID

16% 32%

Location1211 apps were sampled.

75% requested at least oneof these information:

(Richter)

Wire-tappingThe act of

eavesdropping onphone

conversations byinstalling a

listening device toa phone

line covertly.

("Fact Sheet 9...")

Pros Cons

safer world & holds morecriminals accountable

could protect againstISIS & terrorists

protects against leaks inmajor organizations

no/loss of personalprivacy

causes feelings ofcreepiness or

unhappiness in citizens

lack of freedom anddemocracy

(Bilton)

(Parkinson)

("The Reference Frame.")

(Bilton)

("The Reference Frame.")

(Gallington)

Fears of Cyber Surveillance

Phones, computers, and cameras being turnedon without us even knowing.Leaked personal informationCitizens feeling/being constantly on guard. ("Americans' Attitudes...")

(Pagliery)

Specific WorriesPersonal information/pictures leaking out to the public.

("Americans' Attitudes...")

The government gathering more and more info about usthrough various surveillance programs such as Project

Carnivore; "an online 'surveillance data tool designed to mimictraditional wiretaps, but for email'".

("Why The NSA’s...")

The 4th Amendment states how we are protected against any"unreasonable searches and seizures" and Cyber Surveillance

basically violates that right we have.("Government Surveillance: Cons.")

THERE ARE MANY FEARS ABOUT CYBERSURVEILLANCE, BUT ARETHEY ALL REALLY VALID?

WE SAY

YES.

Cyber surveillance exposes citizens andtakes away their personal privacy:

FBI and NSA

monitoring all telephone callsand media files through 9 major

internet providers("The Reference Frame.")

People are changing their everyday livesbecause of this fear:

(Nield)

*both photos from Google Images

it doesn’t really protect againstany terrorists/hackers at all.

In fact,

1-2%

(Kuchler)

Cyber security law of December 2015

Omnibus Appropriations Actencourages and further expandsgovernmental cyber surveillance

actions

EVEN MORE.(Kerr)

constant spyingby government

=communist countries,

like China (Gallington)

SO WHAT WILL YOUBE DOING NOWKNOWING THAT

SOMEONE COULD BETRACKING YOUR

EVERY MOVEONLINE?

Works Cited"Americans' Attitudes About Privacy, Security and Surveillance." Pew Research Center Internet                     Science Tech RSS. N.p., 20 May 2015. Web. 12 Jan. 2016.Barrett, Brian. "What Is PRISM?" Gizmodo. N.p., 7 June 2013. Web. 12 Jan. 2016.Bennett, Colin J., Clement, Andrew, and Milberry, Kate. 2012. Editorial: Introduction to Cyber­                       Surveillance. Surveillance & Society 9(4): 339­347.Bilton, Nick. "The Pros and Cons of a Surveillance Society." NYTimes Blog. The New York Times, 16             July 2013. Web. 12 Jan. 2016."Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls." Wiretapping and Eavesdropping           on Telephone Calls. Privacy Rights Clearinghouse, Mar. 1993. Web. 10 Jan. 2016.Gallington, Daniel J. "The Case for Internet Surveillance." World Report. US News, 18 Sept. 2013.                 Web. 12 Jan. 2016."Government Surveillance: Cons." Carson Moreys RCL Blog. N.p., n.d. Web. 12 Jan. 2016. Kerr, Orin. "How Does the Cybersecurity Act of 2015 Change the Internet Surveillance Laws?"                     Washington Post. The Washington Post, 24 Dec. 2015. Web. 12 Jan. 2016.Kuchler, Hannah. "Cyber Security Groups Use Fake Computers to Trap Hackers ­ FT.com." Financial           Times. N.p., 1 Jan. 2015. Web. 12 Jan. 2016.Nield, David. "DuckDuckGo Enjoys Steep Rise in Searches Thanks to Snowden, IOS." Digital Trends.           Digital Trends, 20 June 2015. Web. 12 Jan. 2016.Pagliery, Jose. "How the NSA Can 'turn On' Your Cell Phone Remotely." CNNMoney. Cable News                 Network, 6 June 2014. Web. 12 Jan. 2016.Parkinson, John R. "NSA: 'Over 50' Terror Plots Foiled by Data Dragnets." ABC News. ABC News                 Network, 18 June 2013. Web. 12 Jan. 2016.

Works Cited (cont'd)Perdikaris, John. Physical Security and Environmental Protection. N.p.: CRC, 2014. Print.Podesta, Don. Watchdogs Under Watch: Media in the Age of Cyber Surveillance. N.p.: Center for                 International Media Assistance, Apr. 2015. PDF.Relia, Sanjeev. Cyber Warfare: Its Implications on National Security. N.p.: Vij  India Pvt, 2015. Print.Richter, Felix. "Infographic: 75% Of Mobile Apps Want Access To User Data." Statista Infographics.              Statista, 12 Sept. 2014. Web. 10 Jan. 2016.Shimonski, Robert. Cyber Reconnaissance, Surveillance, and Defense. N.p.: Syngress, 2014. Print.Siciliano, Robert. "What Is a Keylogger?" McAfee What Is a Keylogger Comments. McAfee, 23 July              2013. Web. 10 Jan. 2016."Six Reasons to Be Afraid of the Private Sector/Government Security State." Truthout. N.p., n.d. Web.         12 Jan. 2016."The Problem with Mobile Phones." Surveillance Self­Defense. Electronic Frontier Foundation, 29               Sept. 2014. Web. 10 Jan. 2016."The Reference Frame." The Reference Frame. N.p., 7 June 2013. Web. 12 Jan. 2016.Tremblay, Monica. Cyber­Surveillance. N.p.: Encyclopedic Dictionary of Public Administration,, 2012.           PDF."Why Do People Hack?" Regis Information Assurance Programs. Regis University, n.d. Web. 10 Jan.         2016."Why The NSA’s Secret Online Surveillance Should Scare You." Think Process. N.p., n.d. Web.