SlideShare uma empresa Scribd logo
1 de 11
Government Surveillance Larry Jennings • Robert Schwien Stacy Drake • Eric Crump
Surveillance Background Intended vs. Unintended use of tech Examples Assumptions Utilitarian Analysis Kantian Analysis Conclusions Questions
Technology We Use Everyday! PC / Internet  Consumer Card Programs Electronic Toll Collection (iPass) DVRs GPS /E911/Onstar Public Surveillance Cameras
What do these have in common? They All Collect Data!
What is REALLY being collected? PC / Internet  Data is stored at ISP and other servers Consumer Card Programs Transactions and Products are stored Electronic Toll Collection (iPass) Date and Time of going through are stored on Government Servers DVRs Often no restrictions on data storage and access from marketers and advertisers GPS /E911/Onstar Ability to track people and send data to servers.. Some GPS is latent and can be turned on remotely Public Surveillance Cameras  These devices are now being programmed to recognize “suspicious behavior “and alert proper authorities These include police and potentially government. Not sure about facial recognition
Who gets this information? Corporations Government
Who gets this information? Corporations 	Great for Marketing Opportunities Government 	Great for trying to identify Terrorists!!! BUT!
A system that knows it all! Total Information Awareness (TIA)
Who gets this information? Corporations 	Great for Marketing Opportunities Government 	Great for trying to identify Terrorists!!! BUT!
[object Object]

Mais conteúdo relacionado

Destaque

Leakage detection
Leakage detectionLeakage detection
Leakage detectionlanuz
 
Novetats setmana 22 al 29 de juny
Novetats setmana 22 al 29 de junyNovetats setmana 22 al 29 de juny
Novetats setmana 22 al 29 de junyPurabiblioteca
 
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing Webinars
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing WebinarsGlobal Classroom 2013-14: 'Looking Forwards, Looking Back' Closing Webinars
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing WebinarsMichael Graffin
 
Explo Group Peru Exploration 2012
Explo Group Peru Exploration 2012Explo Group Peru Exploration 2012
Explo Group Peru Exploration 2012Ricardo Reaño
 
Seandecolonisingslids
SeandecolonisingslidsSeandecolonisingslids
SeandecolonisingslidsSean Cubitt
 
Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green WhitepaperUdayRavi
 
Novetatssetmana22al29dejuny 100624071207-phpapp01
Novetatssetmana22al29dejuny 100624071207-phpapp01Novetatssetmana22al29dejuny 100624071207-phpapp01
Novetatssetmana22al29dejuny 100624071207-phpapp01Purabiblioteca
 
Cubitt uc apresent
Cubitt uc apresentCubitt uc apresent
Cubitt uc apresentSean Cubitt
 
RBA NYS Economic Survival Guide
RBA NYS Economic Survival GuideRBA NYS Economic Survival Guide
RBA NYS Economic Survival GuideUnshackle Upstate
 
Dragisa-Zunic automated-reasoning-finance
Dragisa-Zunic automated-reasoning-financeDragisa-Zunic automated-reasoning-finance
Dragisa-Zunic automated-reasoning-financeDragisa Zunic
 
Poetics of the Body: The Body at Work
Poetics of the Body: The Body at WorkPoetics of the Body: The Body at Work
Poetics of the Body: The Body at WorkSean Cubitt
 
Sixth Form Success Feedback
Sixth Form Success FeedbackSixth Form Success Feedback
Sixth Form Success Feedbackguest6d3c71
 
Syncrosome: Respiratory disease models for efficacy characterization
Syncrosome: Respiratory disease models for efficacy characterizationSyncrosome: Respiratory disease models for efficacy characterization
Syncrosome: Respiratory disease models for efficacy characterizationSyncrosome
 

Destaque (17)

Heisya rb vol3
Heisya rb vol3Heisya rb vol3
Heisya rb vol3
 
Leakage detection
Leakage detectionLeakage detection
Leakage detection
 
Hpm4research
Hpm4researchHpm4research
Hpm4research
 
Novetats setmana 22 al 29 de juny
Novetats setmana 22 al 29 de junyNovetats setmana 22 al 29 de juny
Novetats setmana 22 al 29 de juny
 
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing Webinars
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing WebinarsGlobal Classroom 2013-14: 'Looking Forwards, Looking Back' Closing Webinars
Global Classroom 2013-14: 'Looking Forwards, Looking Back' Closing Webinars
 
Explo Group Peru Exploration 2012
Explo Group Peru Exploration 2012Explo Group Peru Exploration 2012
Explo Group Peru Exploration 2012
 
Seandecolonisingslids
SeandecolonisingslidsSeandecolonisingslids
Seandecolonisingslids
 
Gov Prop Tax
Gov Prop TaxGov Prop Tax
Gov Prop Tax
 
Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green Whitepaper
 
Novetatssetmana22al29dejuny 100624071207-phpapp01
Novetatssetmana22al29dejuny 100624071207-phpapp01Novetatssetmana22al29dejuny 100624071207-phpapp01
Novetatssetmana22al29dejuny 100624071207-phpapp01
 
Cubitt uc apresent
Cubitt uc apresentCubitt uc apresent
Cubitt uc apresent
 
RBA NYS Economic Survival Guide
RBA NYS Economic Survival GuideRBA NYS Economic Survival Guide
RBA NYS Economic Survival Guide
 
Dragisa-Zunic automated-reasoning-finance
Dragisa-Zunic automated-reasoning-financeDragisa-Zunic automated-reasoning-finance
Dragisa-Zunic automated-reasoning-finance
 
Rick Lynch
Rick Lynch Rick Lynch
Rick Lynch
 
Poetics of the Body: The Body at Work
Poetics of the Body: The Body at WorkPoetics of the Body: The Body at Work
Poetics of the Body: The Body at Work
 
Sixth Form Success Feedback
Sixth Form Success FeedbackSixth Form Success Feedback
Sixth Form Success Feedback
 
Syncrosome: Respiratory disease models for efficacy characterization
Syncrosome: Respiratory disease models for efficacy characterizationSyncrosome: Respiratory disease models for efficacy characterization
Syncrosome: Respiratory disease models for efficacy characterization
 

Semelhante a Ethics pres

Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision TreeMarc St-Pierre
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 

Semelhante a Ethics pres (20)

Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 

Mais de Larry Jennings

Mais de Larry Jennings (20)

A Reflection on my time as a grad
A Reflection on my time as a gradA Reflection on my time as a grad
A Reflection on my time as a grad
 
Macs e portfolios
Macs e portfoliosMacs e portfolios
Macs e portfolios
 
Wire frame full
Wire frame fullWire frame full
Wire frame full
 
Gradebook Database
Gradebook DatabaseGradebook Database
Gradebook Database
 
Carpool db diagram
Carpool db diagramCarpool db diagram
Carpool db diagram
 
Carpool acct home_stripesbg
Carpool acct home_stripesbgCarpool acct home_stripesbg
Carpool acct home_stripesbg
 
Sxu carpool spec sheet
Sxu carpool spec sheetSxu carpool spec sheet
Sxu carpool spec sheet
 
Car pool site map
Car pool site mapCar pool site map
Car pool site map
 
Ch5andch6
Ch5andch6Ch5andch6
Ch5andch6
 
Byte Me Report
Byte Me ReportByte Me Report
Byte Me Report
 
Cost Managment
Cost ManagmentCost Managment
Cost Managment
 
Systems Proposal
Systems ProposalSystems Proposal
Systems Proposal
 
Ethics of Google in China
Ethics of Google in ChinaEthics of Google in China
Ethics of Google in China
 
Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
Ethical Consideration of Open Source Software
Ethical Consideration of Open Source SoftwareEthical Consideration of Open Source Software
Ethical Consideration of Open Source Software
 
Midterm gantt
Midterm ganttMidterm gantt
Midterm gantt
 
Work Breakdown Slides
Work Breakdown SlidesWork Breakdown Slides
Work Breakdown Slides
 
Develop A Personal Brand
Develop A Personal BrandDevelop A Personal Brand
Develop A Personal Brand
 
Crowdsourcing
CrowdsourcingCrowdsourcing
Crowdsourcing
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketing
 

Ethics pres

  • 1. Government Surveillance Larry Jennings • Robert Schwien Stacy Drake • Eric Crump
  • 2. Surveillance Background Intended vs. Unintended use of tech Examples Assumptions Utilitarian Analysis Kantian Analysis Conclusions Questions
  • 3. Technology We Use Everyday! PC / Internet Consumer Card Programs Electronic Toll Collection (iPass) DVRs GPS /E911/Onstar Public Surveillance Cameras
  • 4. What do these have in common? They All Collect Data!
  • 5. What is REALLY being collected? PC / Internet Data is stored at ISP and other servers Consumer Card Programs Transactions and Products are stored Electronic Toll Collection (iPass) Date and Time of going through are stored on Government Servers DVRs Often no restrictions on data storage and access from marketers and advertisers GPS /E911/Onstar Ability to track people and send data to servers.. Some GPS is latent and can be turned on remotely Public Surveillance Cameras These devices are now being programmed to recognize “suspicious behavior “and alert proper authorities These include police and potentially government. Not sure about facial recognition
  • 6. Who gets this information? Corporations Government
  • 7. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
  • 8. A system that knows it all! Total Information Awareness (TIA)
  • 9. Who gets this information? Corporations Great for Marketing Opportunities Government Great for trying to identify Terrorists!!! BUT!
  • 10.
  • 11.

Notas do Editor

  1. But this leaves the question, Where does the data go??? Currently there are 2 organizations“Commercial” and “Government”We all know that companies store everything that they can find about you. But how about the government. What about the 1 organization that REALLY knows pretty much all of your sensitive data. So, what happens when all of this information is combined? . Lets look at a program that was canceled a few years back. However parts of this program are still in development in other countries.