SlideShare uma empresa Scribd logo
1 de 19
AFTER 9/11:
A SURVEILLANCE STATE
HOW 9/11 DIFFERS FROM PAST CRISES
• Caused potential long-term damage to the fabric of civil liberties
  that may persist long after the emergency passes
• Constitutional protection of rights is being dismissed
• Present crisis bears even more dangerous potential then earlier
  wartime emergencies
• Emphasis on new information technologies and more intrusive
  and extensive surveillance was inevitable
• Security failure
AL QAEDA
• A contemporary product of globalization
   • The “dark side”
• Utilize the most up-to-date technologies of communication
   • Instant transfer of ideas, capital, and financial resources
DISAPPEARING BOUNDARIES BETWEEN PUBLIC
              AND PRIVATE
• US government has tried to dissolve certain boundaries in
  response to 9/11
• Want to break down firewalls that were put up to protect the
  private sector from government control
   • Proved useful in the investigation of terrorist trails
• Government sought access to web of info on everyone
• Right to privacy viewed as a fundamental element of a free
  society
   • Increasingly in question
DISAPPEARING BOUNDARIES BETWEEN PUBLIC
              AND PRIVATE
• Daily lives of people are being tracked and recorded
   • Closed circuit cameras on the ground
   • Satellites
   • Electronic listening posts
   • Sophisticated search engines
   • Daily economic transactions
   • Detailed medical records
DISAPPEARING BOUNDARIES BETWEEN PUBLIC
              AND PRIVATE
• New info technologies allow transfer and matching of info
• Problem: how to constrain control to protect personal privacy
  while retaining the benefits of new technologies
• Without effective barriers, data matching and linkage threatens
  personal privacy
SURVEILLANCE BEFORE 9/11
• National Security Agency (NSA) maintained electronic
  eavesdropping partnership, UKUSA alliance
   • ECHELON links all the computers in the UKUSA agencies
   • Flagged messages routed to countries that entered the key
     word flag
• CARNIVORE
   • Super search engine deployed by FBI
SURVEILLANCE BEFORE 9/11
• Financial Crimes Enforcement Network (FinCEN)
   • Relies on worldwide monitoring of large financial
     transactions
   • Software capable of detecting suspicious patterns of
     transactions
   • Flags transactions that might require closer attention or
     criminal investigation
ELECTRONIC SURVEILLANCE POWER IN THE
             USA PATRIOT ACT
• Signed into law on October 26, 2001
• Significantly expand the electronic surveillance powers of
  federal law enforcement authorities
• Communication surveillance
   • Relaxes restrictions around required warrants and court
     orders
   • Section 216 extends court orders to cover email and internet
     use, and extends them to cover the entire US
ELECTRONIC SURVEILLANCE POWER IN THE
             USA PATRIOT ACT
• Service providers immunized from legal liability for surrendering
  customers’ privacy
    • Cooperate in “good faith” with government
    • Promised reasonable compensation
• Same agencies gain access to communications records
• Requirements for notification of the subjects have been reduced
ELECTRONIC SURVEILLANCE POWER IN THE
             USA PATRIOT ACT
• Foreign intelligence investigations
    • Lowers barriers between criminal investigations and foreign
      intelligence information
    • FISA (Foreign Intelligence Surveillance Act)
        • Government operates under lower threshold for gaining
          authorization for intrusive surveillance against targets
          suspected of espionage and foreign intelligence
          operations in the US
ELECTRONIC SURVEILLANCE POWER IN THE
              USA PATRIOT ACT
• Expanded authority of the treasury to regulate and probe the
  activities of financial institutions in pursuit of money laundering
• Extend US jurisdiction to prosecute money laundering offenses
  abroad
• Extend the cooperation of financial institutions to report cash
  transactions over $10,000, file “suspicious activity reports,” and
  follow more rigorous “due diligence” requirements
SURVEILLANCE IN PRACTICE
• New investigative guidelines
   • FBI allowed to conduct online research for counterterrorism
     purposes
   • Prohibit the FBI from using this authority to keep files on
     citizens based on their constitutionally protected activities
       • Protection is waived if activities suspected of being
         associated with terrorist activities
SURVEILLANCE IN PRACTICE
• Libraries and bookstores
   • FISA court orders requiring pen register and trace-and-trap
     disclosure is now extended to email on online
     communication
   • Section 215 of the PATRIOT ACT requires any person or
     business to produce any books records, documents, or
     tangible items
       • Provide records of books borrowed/purchased by
         persons under suspicion
SURVEILLANCE IN PRACTICE
• Homeland Security Act
   • Department of Homeland Security will be permitted to
     exempt from the FOIA information about critical
     infrastructures received from the private sector
   • This would remove large amounts of information that is now
     potentially open to public access
TOWARD “TOTAL INFORMATION AWARENESS”?
• NSA is barred by law from snooping on Americans
• Defense Advance Research Projects Agency (DARPA)
   • Set up pioneer computer network among defense scientists
     called ARPANET
       • Eventually evolved into the Internet
TOWARD “TOTAL INFORMATION AWARENESS”?
• Total Information Awareness (TIA)
   • “knowledge is power”
   • System for detecting, classifying, identifying, and tracking
     terrorists
       • Mine data from all possible sources, public and
         private, American and foreign
       • Might not be necessary
TOWARD “TOTAL INFORMATION AWARENESS”?
• US had bits and pieces of info concerning the threat from Al
  Qaeda and their attack on American soil
   • Didn’t put the pieces together
• TIA may swamp analysts with too much information, most
  irrelevant
   • Cause more harm than good
A SECURITY-INDUSTRIAL COMPLEX
• Homeland Security is quickly shaping up
• Corporations in the banking, retail sales, chemical
  manufacturing, and nuclear power industries are balking at
  government efforts to impose tougher and more expensive
  security standards
• The people of the US want security, but tend to be suspicious of
  government regulation and intrusion

Mais conteúdo relacionado

Mais procurados

Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoTech and Law Center
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEBPoch Montilla
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Charles Mok
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
4th Amendment, 3rd Party Doctrine, and Cryptocurrencies
4th Amendment, 3rd Party Doctrine, and Cryptocurrencies4th Amendment, 3rd Party Doctrine, and Cryptocurrencies
4th Amendment, 3rd Party Doctrine, and CryptocurrenciesDrew Hinkes
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singaporeBenjamin Ang
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of Chinaguest00df536
 

Mais procurados (20)

Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Presentación3
Presentación3Presentación3
Presentación3
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
It legislation
It legislationIt legislation
It legislation
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
4th Amendment, 3rd Party Doctrine, and Cryptocurrencies
4th Amendment, 3rd Party Doctrine, and Cryptocurrencies4th Amendment, 3rd Party Doctrine, and Cryptocurrencies
4th Amendment, 3rd Party Doctrine, and Cryptocurrencies
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
 

Semelhante a After 9 11

The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counselamprivacy
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Ethisphere
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingNeal Axton
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 

Semelhante a After 9 11 (20)

The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
Cyber Threats to Human Rights
Cyber Threats to Human RightsCyber Threats to Human Rights
Cyber Threats to Human Rights
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Internet
InternetInternet
Internet
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 

Último

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Último (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

After 9 11

  • 2. HOW 9/11 DIFFERS FROM PAST CRISES • Caused potential long-term damage to the fabric of civil liberties that may persist long after the emergency passes • Constitutional protection of rights is being dismissed • Present crisis bears even more dangerous potential then earlier wartime emergencies • Emphasis on new information technologies and more intrusive and extensive surveillance was inevitable • Security failure
  • 3. AL QAEDA • A contemporary product of globalization • The “dark side” • Utilize the most up-to-date technologies of communication • Instant transfer of ideas, capital, and financial resources
  • 4. DISAPPEARING BOUNDARIES BETWEEN PUBLIC AND PRIVATE • US government has tried to dissolve certain boundaries in response to 9/11 • Want to break down firewalls that were put up to protect the private sector from government control • Proved useful in the investigation of terrorist trails • Government sought access to web of info on everyone • Right to privacy viewed as a fundamental element of a free society • Increasingly in question
  • 5. DISAPPEARING BOUNDARIES BETWEEN PUBLIC AND PRIVATE • Daily lives of people are being tracked and recorded • Closed circuit cameras on the ground • Satellites • Electronic listening posts • Sophisticated search engines • Daily economic transactions • Detailed medical records
  • 6. DISAPPEARING BOUNDARIES BETWEEN PUBLIC AND PRIVATE • New info technologies allow transfer and matching of info • Problem: how to constrain control to protect personal privacy while retaining the benefits of new technologies • Without effective barriers, data matching and linkage threatens personal privacy
  • 7. SURVEILLANCE BEFORE 9/11 • National Security Agency (NSA) maintained electronic eavesdropping partnership, UKUSA alliance • ECHELON links all the computers in the UKUSA agencies • Flagged messages routed to countries that entered the key word flag • CARNIVORE • Super search engine deployed by FBI
  • 8. SURVEILLANCE BEFORE 9/11 • Financial Crimes Enforcement Network (FinCEN) • Relies on worldwide monitoring of large financial transactions • Software capable of detecting suspicious patterns of transactions • Flags transactions that might require closer attention or criminal investigation
  • 9. ELECTRONIC SURVEILLANCE POWER IN THE USA PATRIOT ACT • Signed into law on October 26, 2001 • Significantly expand the electronic surveillance powers of federal law enforcement authorities • Communication surveillance • Relaxes restrictions around required warrants and court orders • Section 216 extends court orders to cover email and internet use, and extends them to cover the entire US
  • 10. ELECTRONIC SURVEILLANCE POWER IN THE USA PATRIOT ACT • Service providers immunized from legal liability for surrendering customers’ privacy • Cooperate in “good faith” with government • Promised reasonable compensation • Same agencies gain access to communications records • Requirements for notification of the subjects have been reduced
  • 11. ELECTRONIC SURVEILLANCE POWER IN THE USA PATRIOT ACT • Foreign intelligence investigations • Lowers barriers between criminal investigations and foreign intelligence information • FISA (Foreign Intelligence Surveillance Act) • Government operates under lower threshold for gaining authorization for intrusive surveillance against targets suspected of espionage and foreign intelligence operations in the US
  • 12. ELECTRONIC SURVEILLANCE POWER IN THE USA PATRIOT ACT • Expanded authority of the treasury to regulate and probe the activities of financial institutions in pursuit of money laundering • Extend US jurisdiction to prosecute money laundering offenses abroad • Extend the cooperation of financial institutions to report cash transactions over $10,000, file “suspicious activity reports,” and follow more rigorous “due diligence” requirements
  • 13. SURVEILLANCE IN PRACTICE • New investigative guidelines • FBI allowed to conduct online research for counterterrorism purposes • Prohibit the FBI from using this authority to keep files on citizens based on their constitutionally protected activities • Protection is waived if activities suspected of being associated with terrorist activities
  • 14. SURVEILLANCE IN PRACTICE • Libraries and bookstores • FISA court orders requiring pen register and trace-and-trap disclosure is now extended to email on online communication • Section 215 of the PATRIOT ACT requires any person or business to produce any books records, documents, or tangible items • Provide records of books borrowed/purchased by persons under suspicion
  • 15. SURVEILLANCE IN PRACTICE • Homeland Security Act • Department of Homeland Security will be permitted to exempt from the FOIA information about critical infrastructures received from the private sector • This would remove large amounts of information that is now potentially open to public access
  • 16. TOWARD “TOTAL INFORMATION AWARENESS”? • NSA is barred by law from snooping on Americans • Defense Advance Research Projects Agency (DARPA) • Set up pioneer computer network among defense scientists called ARPANET • Eventually evolved into the Internet
  • 17. TOWARD “TOTAL INFORMATION AWARENESS”? • Total Information Awareness (TIA) • “knowledge is power” • System for detecting, classifying, identifying, and tracking terrorists • Mine data from all possible sources, public and private, American and foreign • Might not be necessary
  • 18. TOWARD “TOTAL INFORMATION AWARENESS”? • US had bits and pieces of info concerning the threat from Al Qaeda and their attack on American soil • Didn’t put the pieces together • TIA may swamp analysts with too much information, most irrelevant • Cause more harm than good
  • 19. A SECURITY-INDUSTRIAL COMPLEX • Homeland Security is quickly shaping up • Corporations in the banking, retail sales, chemical manufacturing, and nuclear power industries are balking at government efforts to impose tougher and more expensive security standards • The people of the US want security, but tend to be suspicious of government regulation and intrusion