cyber surveillance - honors english 1 presentation
TRANSCRIPT
CYBERSURVEILLANCE
THE TRACKING ANDGATHERING OF INTERNET
ACTIVITY & USAGE,INCLUDING CONFIDENTIAL
INFORMATION.
KELSEY NGUYEN travis ponce ann truong
(Tremblay)
Government Surveillance
Safer worldCombat (preventand investigate)criminal activityand terrorism.Maintain socialorder. (Podesta)
Corporate Surveillance
Marketing purposesData provides information and feedbackon their products and services.
APPROVEI
(Podesta)
KeyloggerA surveillance software that captures andlogs users' keystrokes on a keyboard.
Malicious Softwares
These softwares enable the hacker to haveremote control over a user's device.
(Siciliano)
(Shimonski)
PRISMA highly secretive program managed by the United
States National Security Agency (NSA).
(http://img.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/images/prism-slide-4.jpg)
(Barrett)
Towers
Mobile towers capture signals transmitted from a cellphone. People can observe this signal to determine where the
phone must be located in order to account for theseobservations.
Many law enforcement agencies tend to use this devicesurreptitiously. ("The Problem with Mobile Phones")
Information Taken From Apps
Calendar
2%
Messages
4%
Microphone
5%
Call Log
7%
Contacts
9%
Camera
Other Users Accounts
10% 15%
Device ID
16% 32%
Location1211 apps were sampled.
75% requested at least oneof these information:
(Richter)
Wire-tappingThe act of
eavesdropping onphone
conversations byinstalling a
listening device toa phone
line covertly.
("Fact Sheet 9...")
Pros Cons
safer world & holds morecriminals accountable
could protect againstISIS & terrorists
protects against leaks inmajor organizations
no/loss of personalprivacy
causes feelings ofcreepiness or
unhappiness in citizens
lack of freedom anddemocracy
(Bilton)
(Parkinson)
("The Reference Frame.")
(Bilton)
("The Reference Frame.")
(Gallington)
Fears of Cyber Surveillance
Phones, computers, and cameras being turnedon without us even knowing.Leaked personal informationCitizens feeling/being constantly on guard. ("Americans' Attitudes...")
(Pagliery)
Specific WorriesPersonal information/pictures leaking out to the public.
("Americans' Attitudes...")
The government gathering more and more info about usthrough various surveillance programs such as Project
Carnivore; "an online 'surveillance data tool designed to mimictraditional wiretaps, but for email'".
("Why The NSA’s...")
The 4th Amendment states how we are protected against any"unreasonable searches and seizures" and Cyber Surveillance
basically violates that right we have.("Government Surveillance: Cons.")
Cyber surveillance exposes citizens andtakes away their personal privacy:
FBI and NSA
monitoring all telephone callsand media files through 9 major
internet providers("The Reference Frame.")
People are changing their everyday livesbecause of this fear:
(Nield)
*both photos from Google Images
Cyber security law of December 2015
Omnibus Appropriations Actencourages and further expandsgovernmental cyber surveillance
actions
EVEN MORE.(Kerr)
Works Cited"Americans' Attitudes About Privacy, Security and Surveillance." Pew Research Center Internet Science Tech RSS. N.p., 20 May 2015. Web. 12 Jan. 2016.Barrett, Brian. "What Is PRISM?" Gizmodo. N.p., 7 June 2013. Web. 12 Jan. 2016.Bennett, Colin J., Clement, Andrew, and Milberry, Kate. 2012. Editorial: Introduction to Cyber Surveillance. Surveillance & Society 9(4): 339347.Bilton, Nick. "The Pros and Cons of a Surveillance Society." NYTimes Blog. The New York Times, 16 July 2013. Web. 12 Jan. 2016."Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls." Wiretapping and Eavesdropping on Telephone Calls. Privacy Rights Clearinghouse, Mar. 1993. Web. 10 Jan. 2016.Gallington, Daniel J. "The Case for Internet Surveillance." World Report. US News, 18 Sept. 2013. Web. 12 Jan. 2016."Government Surveillance: Cons." Carson Moreys RCL Blog. N.p., n.d. Web. 12 Jan. 2016. Kerr, Orin. "How Does the Cybersecurity Act of 2015 Change the Internet Surveillance Laws?" Washington Post. The Washington Post, 24 Dec. 2015. Web. 12 Jan. 2016.Kuchler, Hannah. "Cyber Security Groups Use Fake Computers to Trap Hackers FT.com." Financial Times. N.p., 1 Jan. 2015. Web. 12 Jan. 2016.Nield, David. "DuckDuckGo Enjoys Steep Rise in Searches Thanks to Snowden, IOS." Digital Trends. Digital Trends, 20 June 2015. Web. 12 Jan. 2016.Pagliery, Jose. "How the NSA Can 'turn On' Your Cell Phone Remotely." CNNMoney. Cable News Network, 6 June 2014. Web. 12 Jan. 2016.Parkinson, John R. "NSA: 'Over 50' Terror Plots Foiled by Data Dragnets." ABC News. ABC News Network, 18 June 2013. Web. 12 Jan. 2016.
Works Cited (cont'd)Perdikaris, John. Physical Security and Environmental Protection. N.p.: CRC, 2014. Print.Podesta, Don. Watchdogs Under Watch: Media in the Age of Cyber Surveillance. N.p.: Center for International Media Assistance, Apr. 2015. PDF.Relia, Sanjeev. Cyber Warfare: Its Implications on National Security. N.p.: Vij India Pvt, 2015. Print.Richter, Felix. "Infographic: 75% Of Mobile Apps Want Access To User Data." Statista Infographics. Statista, 12 Sept. 2014. Web. 10 Jan. 2016.Shimonski, Robert. Cyber Reconnaissance, Surveillance, and Defense. N.p.: Syngress, 2014. Print.Siciliano, Robert. "What Is a Keylogger?" McAfee What Is a Keylogger Comments. McAfee, 23 July 2013. Web. 10 Jan. 2016."Six Reasons to Be Afraid of the Private Sector/Government Security State." Truthout. N.p., n.d. Web. 12 Jan. 2016."The Problem with Mobile Phones." Surveillance SelfDefense. Electronic Frontier Foundation, 29 Sept. 2014. Web. 10 Jan. 2016."The Reference Frame." The Reference Frame. N.p., 7 June 2013. Web. 12 Jan. 2016.Tremblay, Monica. CyberSurveillance. N.p.: Encyclopedic Dictionary of Public Administration,, 2012. PDF."Why Do People Hack?" Regis Information Assurance Programs. Regis University, n.d. Web. 10 Jan. 2016."Why The NSA’s Secret Online Surveillance Should Scare You." Think Process. N.p., n.d. Web.