SlideShare a Scribd company logo
1 of 24
March 21, 2012
Surveillance
 “…routine ways in which focused attention is paid to
 personal details by organizations that want to
 influence, manage, or control certain persons or
 population groups. It occurs for all kinds of reasons,
 which can be located on a continuum from care to
 control. Some element of care and some element of
 control are nearly always present, making the process
 inherently ambiguous.”
  David Lyon as quoted in Chadwick, p. 258.
Surveillance Theory                       Bentham


 Jeremy Bentham’s panopticon
 Michel Foucault (study of prisons)
 Giles Deleuze (rhizomic surveillance)




  Foucault                                    Deleuze
Total/Terrorism Information
Awareness Program, 2002
 Program headed by Adm. John Poindexter
   National Security Advisor to President Reagan
   Tried and convicted on felony charges for his
   involvement in the Iran-Contra scandal
       Conviction was later reversed on appeal
Functions of TIA
 Use data gained from component technologies to
  create a large-scale national counterterrorism
  database
 Populate the database, and look for methods for
  mining, combining and refining new sources to
  include in the database
 Analyze and correlate information in the database
  to derive actionable intelligence
TIA Programs
 Trans-lingual Information Detection, Extraction and
  Summarization (TIDES)
    Translation program (documents, chat rooms, video)
 War gaming the Asymmetric Environment (WAE)
    “Market betting” on the likelihood of a terror attack
     based on socio-economic and political events
 Human ID at a Distance
    Improved facial recognition technology, gait
     recognition, physique recognition (height, estimated
     weight, etc.)
 BIO Surveillance
    Early warning of a biological attack (anthrax, smallpox,
     etc.)
Human ID at a Distance
More TIA Programs
  Genysis
    Large database of public and private data
  Genoa I/II
    Collaboration tools to enable analysts from different
     agencies to share information and ideas
      A classified Wikipedia
  Evidence Extraction and Link Discovery (EELD)
    Search tool to help the analyst determine “who knows
     whom” and which organization is involved with what
     people and activities
        “Six degrees of Kevin Bacon”
An Example
Civil Libertarian Objections
 Based on the COINTELPRO
  (COunterINTELligencePROgram) of the 1960’s
    FBI abuse of the privacy rights of anti-war and civil
     rights activists in the 1960s under the blanket
     justification of national security
 Main objection is violation of individual right to privacy
    TIA essentially a data-mining program
        Would sift through massive amounts of private data in
         order to “sniff” out terrorist activity
        No guarantees of citizens’ protection from abuse of this
         data
Evolutionary Step    Enabling Technologies       Product Providers Characteristics

Data Collection      Computers, tapes, disks     IBM, CDC             Retrospective, static
(1960s)                                                               data delivery

Data Access          Relational databases        Oracle, Sybase,      Retrospective,
(1980s)              (RDBMS), Structured         Informix, IBM,       dynamic data delivery
                     Query Language (SQL),       Microsoft            at record level
                     ODBC
Data Warehousing &   On-line analytic processing Pilot, Comshare,     Retrospective,
Decision Support     (OLAP), multidimensional Arbor, Cognos,          dynamic data delivery
(1990s)              databases, data warehouses Microstrategy         at multiple levels


Data Mining          Advanced algorithms,        Pilot, Lockheed,     Prospective, proactive
(2000s)              multiprocessor computers,   IBM, SGI,            information delivery
                     massive databases           numerous startups
                                                 (nascent industry)
Datamining: False Positives
  An analyst runs a search for recent foreign travel and purchase of
  chemicals used in explosives and gets a result in which a single
  credit card number purchased a ticket from Tel Aviv, Israel to St.
  Louis, Missouri, and the purchase of a large amount of fertilizer a
  short time afterwards. Does this result indicate:
    A.) A terrorist infiltrating the U.S. to place a truck bomb at the
     Golden Arch?
    B.) An American farmer returning from a trip to the Holy Land?
ACLU: Raised These Questions about TIA
   Would TIA be limited to a arbitrary number of
    databases, or is the number of databases unlimited?
   What kinds of analysis would TIA be capable of?
      Would it be limited strictly to terrorism or could any
       type of search be possible? (ex. Anti-war groups, drug
       use, jaywalking) – MISSION CREEP
   What difference does a distributed database make?
      DARPA officials state that TIA would not be a
       centralized database, the ACLU stated that this did
       not matter
   How will TIA affect the American legal tradition of the
    presumption of innocence (innocent until proven
    guilty)?
DARPA’s Views on Legal Issues Surrounding
TIA
 Insisted that TIA was not a domestic surveillance program
   Intended focus on foreign activity

 TIA would have had a built-in audit control system to
  identify abusers of the system
 While DARPA acknowledged the TIA could outpace
  existing privacy protections, TIA was very early in
  development and was using only data legally usable or
  synthetically generated
   Privacy protections had time to “catch up” to TIA
What Killed TIA?
  No guarantees that TIA would not be used for
  domestic surveillance
    FBI collaboration on the project indicated a domestic
     aspect of TIA
  Privacy protections were not originally
  conceptualized with the program
    Added after controversy over the program erupted
  No defined limits to databases TIA would access
  Choice of Poindexter to head program
List of Federal Government Counterterrorist Data
       Collection and Mining Programs, 1999-2006
Name              Administered      Period of          Scope of Operation               Types of Data
                  by                Operation

Able Danger       Defense,          1999-2000          Al Qaeda and Bosnia              Classified and commercial
                  SOCOM
TIA               Defense,          2002-2004          Research on new                  Classified and commercial
                  DARPA                                counterterrorism data mining
                                                       techniques
CAPPS II          Homeland          2001-2004          Preventing hijacking and         Airline passenger personal
                  Security                             airline-based terrorism          information
MATRIX            Consortium of     2001-2005          Targeting of potential criminals State public records and law
                  States                               and terrorists                   enforcement data
SEVIS             Homeland          2001-present       Detecting terrorists in colleges, Data on exchange students
                  Security                             universities, and schools         and foreign visitors

ATS               Homeland          Late 1990s to      Preventing terrorists and       Passenger and cargo data,
                  Security          present,           terrorist weapons from entering especially, but also other
                                    Expanded in 2001   the                             data

US-VISIT           Homeland         2004-present       Tracking entrants to US          Photograph and finger-print
                   Security                                                             data
Project Strikeback FBI, Education   2001-2006          Tracking college aid money to    Financial aid records of
                                                       potential terrorists             individuals
Reason for Cancellation of Data Mining
                  Programs
 Inability of the programs to meet their technical goals
    because of poor data, faulty algorithms, interoperability
    problems, and the generation of too many “false positives”
   Inability of the programs to adequately address privacy
    concerns
   The non-transparent combination of classified and open-
    source data in some programs
   The general lack of transparency in most of the programs
   The potential for other forms of abuse besides privacy
    violations, or “mission creep” (the use of data for purposes
    other than those originally stated).
Legal Environment for Warrantless Wiretaps
  1978
   Foreign Intelligence Surveillance Act
   (FISA)
  1994
   Communications Assistance for Law Enforcement Ac
    (CALEA)
  2003
   Domestic Security Enhancement Act
   (Patriot Act)
  March 2004 – Cheney, Gonzalez,
   and Card visit Attorney General
   John Ashcroft in the hospital to
   authorize warrantless wiretaps
  2006 story in USA Today about
Protect America Act of 2007
 Amended FISA to remove requirement for warrants
 Made the Attorney General and the Director of
  National Intelligence responsible for authorizing
  warrantless searches
 Reauthorized aspects of the Patriot Act that were
  expiring


               President Bush on this issue
FISA Amendments Act of 2008
  Reauthorizes FISA, expands Presidential powers to
   authorize warrantless searches
  Gives telecommunications firms immunity for past
   cooperation with federal intelligence and law
   enforcement agencies
  Russ Feingold on FISA legislation
Warrantless Wiretaps in the Obama
Administration
 During the 2008 campaign, Barack Obama opposed
  the continuation of warrantless wiretaps under the
  Patriot Act and the Protect America Act
 On May 26, 2011, President Obama signed a bill that
  reauthorized key elements of the Patriot Act that
  excluded proposals for Congressional oversight of
  those elements (especially FISA approval for wiretaps
  without warrants)

          Reactions to this decision on barackobama.com

More Related Content

What's hot

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET Journal
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...AltheimPrivacy
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 

What's hot (15)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 

Viewers also liked (7)

16 linden
16 linden16 linden
16 linden
 
Polf06
Polf06Polf06
Polf06
 
Polf04
Polf04Polf04
Polf04
 
Polf17
Polf17Polf17
Polf17
 
Polinter08
Polinter08Polinter08
Polinter08
 
Polinter04
Polinter04Polinter04
Polinter04
 
Polf17
Polf17Polf17
Polf17
 

Similar to Polinter09

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysisAlexander Decker
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.pptgealehegn
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Robert Bromwich
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Elizabeth Mixson
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 

Similar to Polinter09 (20)

Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 

More from Jeffrey Hart

More from Jeffrey Hart (20)

Berkeley Internet.pptx
Berkeley Internet.pptxBerkeley Internet.pptx
Berkeley Internet.pptx
 
Essays on the History and Politics of the.pptx
Essays on the History and  Politics of the.pptxEssays on the History and  Politics of the.pptx
Essays on the History and Politics of the.pptx
 
Right-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United StatesRight-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United States
 
The European Union: Challenges and Opportunities
The European Union: Challenges and OpportunitiesThe European Union: Challenges and Opportunities
The European Union: Challenges and Opportunities
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Politics of competitiveness
Politics of competitivenessPolitics of competitiveness
Politics of competitiveness
 
Isa12a
Isa12aIsa12a
Isa12a
 
Ipe21
Ipe21Ipe21
Ipe21
 
Polinter12
Polinter12Polinter12
Polinter12
 
Polinter11
Polinter11Polinter11
Polinter11
 
Ipe19
Ipe19Ipe19
Ipe19
 
Ipe20
Ipe20Ipe20
Ipe20
 
Ipe18
Ipe18Ipe18
Ipe18
 
Isa12b
Isa12bIsa12b
Isa12b
 
Ipe17
Ipe17Ipe17
Ipe17
 
Polinter10
Polinter10Polinter10
Polinter10
 
Ipe16
Ipe16Ipe16
Ipe16
 
Ipe15
Ipe15Ipe15
Ipe15
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Polinter09

  • 2. Surveillance  “…routine ways in which focused attention is paid to personal details by organizations that want to influence, manage, or control certain persons or population groups. It occurs for all kinds of reasons, which can be located on a continuum from care to control. Some element of care and some element of control are nearly always present, making the process inherently ambiguous.” David Lyon as quoted in Chadwick, p. 258.
  • 3. Surveillance Theory Bentham  Jeremy Bentham’s panopticon  Michel Foucault (study of prisons)  Giles Deleuze (rhizomic surveillance) Foucault Deleuze
  • 4. Total/Terrorism Information Awareness Program, 2002  Program headed by Adm. John Poindexter  National Security Advisor to President Reagan  Tried and convicted on felony charges for his involvement in the Iran-Contra scandal  Conviction was later reversed on appeal
  • 5. Functions of TIA  Use data gained from component technologies to create a large-scale national counterterrorism database  Populate the database, and look for methods for mining, combining and refining new sources to include in the database  Analyze and correlate information in the database to derive actionable intelligence
  • 6.
  • 7.
  • 8. TIA Programs  Trans-lingual Information Detection, Extraction and Summarization (TIDES)  Translation program (documents, chat rooms, video)  War gaming the Asymmetric Environment (WAE)  “Market betting” on the likelihood of a terror attack based on socio-economic and political events  Human ID at a Distance  Improved facial recognition technology, gait recognition, physique recognition (height, estimated weight, etc.)  BIO Surveillance  Early warning of a biological attack (anthrax, smallpox, etc.)
  • 9. Human ID at a Distance
  • 10. More TIA Programs  Genysis  Large database of public and private data  Genoa I/II  Collaboration tools to enable analysts from different agencies to share information and ideas  A classified Wikipedia  Evidence Extraction and Link Discovery (EELD)  Search tool to help the analyst determine “who knows whom” and which organization is involved with what people and activities  “Six degrees of Kevin Bacon”
  • 12.
  • 13. Civil Libertarian Objections  Based on the COINTELPRO (COunterINTELligencePROgram) of the 1960’s  FBI abuse of the privacy rights of anti-war and civil rights activists in the 1960s under the blanket justification of national security  Main objection is violation of individual right to privacy  TIA essentially a data-mining program  Would sift through massive amounts of private data in order to “sniff” out terrorist activity  No guarantees of citizens’ protection from abuse of this data
  • 14. Evolutionary Step Enabling Technologies Product Providers Characteristics Data Collection Computers, tapes, disks IBM, CDC Retrospective, static (1960s) data delivery Data Access Relational databases Oracle, Sybase, Retrospective, (1980s) (RDBMS), Structured Informix, IBM, dynamic data delivery Query Language (SQL), Microsoft at record level ODBC Data Warehousing & On-line analytic processing Pilot, Comshare, Retrospective, Decision Support (OLAP), multidimensional Arbor, Cognos, dynamic data delivery (1990s) databases, data warehouses Microstrategy at multiple levels Data Mining Advanced algorithms, Pilot, Lockheed, Prospective, proactive (2000s) multiprocessor computers, IBM, SGI, information delivery massive databases numerous startups (nascent industry)
  • 15. Datamining: False Positives An analyst runs a search for recent foreign travel and purchase of chemicals used in explosives and gets a result in which a single credit card number purchased a ticket from Tel Aviv, Israel to St. Louis, Missouri, and the purchase of a large amount of fertilizer a short time afterwards. Does this result indicate:  A.) A terrorist infiltrating the U.S. to place a truck bomb at the Golden Arch?  B.) An American farmer returning from a trip to the Holy Land?
  • 16. ACLU: Raised These Questions about TIA  Would TIA be limited to a arbitrary number of databases, or is the number of databases unlimited?  What kinds of analysis would TIA be capable of?  Would it be limited strictly to terrorism or could any type of search be possible? (ex. Anti-war groups, drug use, jaywalking) – MISSION CREEP  What difference does a distributed database make?  DARPA officials state that TIA would not be a centralized database, the ACLU stated that this did not matter  How will TIA affect the American legal tradition of the presumption of innocence (innocent until proven guilty)?
  • 17. DARPA’s Views on Legal Issues Surrounding TIA  Insisted that TIA was not a domestic surveillance program  Intended focus on foreign activity  TIA would have had a built-in audit control system to identify abusers of the system  While DARPA acknowledged the TIA could outpace existing privacy protections, TIA was very early in development and was using only data legally usable or synthetically generated  Privacy protections had time to “catch up” to TIA
  • 18. What Killed TIA?  No guarantees that TIA would not be used for domestic surveillance  FBI collaboration on the project indicated a domestic aspect of TIA  Privacy protections were not originally conceptualized with the program  Added after controversy over the program erupted  No defined limits to databases TIA would access  Choice of Poindexter to head program
  • 19. List of Federal Government Counterterrorist Data Collection and Mining Programs, 1999-2006 Name Administered Period of Scope of Operation Types of Data by Operation Able Danger Defense, 1999-2000 Al Qaeda and Bosnia Classified and commercial SOCOM TIA Defense, 2002-2004 Research on new Classified and commercial DARPA counterterrorism data mining techniques CAPPS II Homeland 2001-2004 Preventing hijacking and Airline passenger personal Security airline-based terrorism information MATRIX Consortium of 2001-2005 Targeting of potential criminals State public records and law States and terrorists enforcement data SEVIS Homeland 2001-present Detecting terrorists in colleges, Data on exchange students Security universities, and schools and foreign visitors ATS Homeland Late 1990s to Preventing terrorists and Passenger and cargo data, Security present, terrorist weapons from entering especially, but also other Expanded in 2001 the data US-VISIT Homeland 2004-present Tracking entrants to US Photograph and finger-print Security data Project Strikeback FBI, Education 2001-2006 Tracking college aid money to Financial aid records of potential terrorists individuals
  • 20. Reason for Cancellation of Data Mining Programs  Inability of the programs to meet their technical goals because of poor data, faulty algorithms, interoperability problems, and the generation of too many “false positives”  Inability of the programs to adequately address privacy concerns  The non-transparent combination of classified and open- source data in some programs  The general lack of transparency in most of the programs  The potential for other forms of abuse besides privacy violations, or “mission creep” (the use of data for purposes other than those originally stated).
  • 21. Legal Environment for Warrantless Wiretaps  1978 Foreign Intelligence Surveillance Act (FISA)  1994 Communications Assistance for Law Enforcement Ac (CALEA)  2003 Domestic Security Enhancement Act (Patriot Act)  March 2004 – Cheney, Gonzalez, and Card visit Attorney General John Ashcroft in the hospital to authorize warrantless wiretaps  2006 story in USA Today about
  • 22. Protect America Act of 2007  Amended FISA to remove requirement for warrants  Made the Attorney General and the Director of National Intelligence responsible for authorizing warrantless searches  Reauthorized aspects of the Patriot Act that were expiring President Bush on this issue
  • 23. FISA Amendments Act of 2008  Reauthorizes FISA, expands Presidential powers to authorize warrantless searches  Gives telecommunications firms immunity for past cooperation with federal intelligence and law enforcement agencies  Russ Feingold on FISA legislation
  • 24. Warrantless Wiretaps in the Obama Administration  During the 2008 campaign, Barack Obama opposed the continuation of warrantless wiretaps under the Patriot Act and the Protect America Act  On May 26, 2011, President Obama signed a bill that reauthorized key elements of the Patriot Act that excluded proposals for Congressional oversight of those elements (especially FISA approval for wiretaps without warrants) Reactions to this decision on barackobama.com