2. Surveillance Background Intended vs. Unintended use of tech Examples Assumptions Utilitarian Analysis Kantian Analysis Conclusions Questions
3. Technology We Use Everyday! PC / Internet Consumer Card Programs Electronic Toll Collection (iPass) DVRs GPS /E911/Onstar Public Surveillance Cameras
5. What is REALLY being collected? PC / Internet Data is stored at ISP and other servers Consumer Card Programs Transactions and Products are stored Electronic Toll Collection (iPass) Date and Time of going through are stored on Government Servers DVRs Often no restrictions on data storage and access from marketers and advertisers GPS /E911/Onstar Ability to track people and send data to servers.. Some GPS is latent and can be turned on remotely Public Surveillance Cameras These devices are now being programmed to recognize “suspicious behavior “and alert proper authorities These include police and potentially government. Not sure about facial recognition
7. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
8. A system that knows it all! Total Information Awareness (TIA)
9. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
10.
11.
Notas do Editor
But this leaves the question, Where does the data go??? Currently there are 2 organizations“Commercial” and “Government”We all know that companies store everything that they can find about you. But how about the government. What about the 1 organization that REALLY knows pretty much all of your sensitive data. So, what happens when all of this information is combined? . Lets look at a program that was canceled a few years back. However parts of this program are still in development in other countries.