POS 353453: 05052005 - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

POS 353453: 05052005

Description:

Clip from Media Jihad (NHK television fall 2004). Aaron Weisburd. Internet Haganah. ... Black boxes. RFID chips. GPS implants. 8. Surveillance Society ... – PowerPoint PPT presentation

Number of Views:31
Avg rating:3.0/5.0
Slides: 33
Provided by: bbar9
Category:
Tags: pos

less

Transcript and Presenter's Notes

Title: POS 353453: 05052005


1
POS 353/453 05/05/2005
  • Website.
  • http//faculty.roosevelt.edu/erickson/courses/pos3
    53-453/
  • Course agenda (overview).
  • Presentations.
  • Biometrics.
  • Fictional C-Spaces.
  • Topics/Concepts introduced by readings.
  • Future of C-Space.
  • Surveillance.
  • Cyberwarfare.
  • Final exam review (800 - 815pm).
  • Course evaluations (815 - 830pm).
  • Narrative evaluation most important.

2
POS 353/453 05/05/2005
  • Paper due today.
  • If turning in just hardcopy tonight, you have 24
    hours to turn in electronic copy.
  • Final exam next Thursday.
  • Run drafts of exam answers by me.
  • Final Web Project Requirement.
  • Make sure Prof. Erickson has correct link.
  • Check Web Projects index page.
  • Send Prof. Erickson updated url.
  • Post web version of final paper between paper due
    date and final exam (by 05/12/2005 545pm).
  • Video Cases (as time allows).
  • The Matrix.
  • Media Jihad.
  • Unanticipated near future.

3
Surveillance Society/Cyberwarfare Video Cases.
  • Surveillance Society/Cyberwarfare Video Cases.
  • CIR Archived ABC video No Place to Hide.
  • Border Control.
  • Webveillance and Cyberwars of Terror.
  • Clip from Media Jihad (NHK television fall 2004).
  • Aaron Weisburd.
  • Internet Haganah.
  • Ties together surveillance and cyberwarfare
    readings.
  • Complexity and difficulties of Grays postmodern
    war.

4
Surveillance Society
  • Surveillance Society.
  • Resistance/Research CFP2005.
  • CFP goes back to 1991.
  • Setting the stage.
  • Long range trends
  • US.
  • US and UK compared.

5
Surveillance Society
  • Surveillance Society - Examples.
  • City of Chicago Unified Camera Network.
  • Spycam Force (posted May 9th, 2005).
  • Wired Magazine profile of CPD/OEM Citizen Law
    Enforcement Analysis and Reporting (CLEAR)
    system.
  • Scrutinize - 30 cameras (Operation Disruption
    ramp up to 2250 cameras.
  • Analyze - Patrol cars laptop and database
    integration real-time updates.
  • Mobilize - Databases used to link crime data to
    geographic locales - Targeted Response Units.
  • Legacy - CPD red squad 200,000 Chicagoans in
    files - disbanded 1981.
  • DHS - 34mil., 5mil. Chicago.

6
Surveillance Society
  • Surveillance Society.
  • Open Loop Chicago.
  • Surveillance Camera Players.
  • Surveillance Federal.
  • MATRIX.
  • US Federal FY 2006 Surveillance Budget.
  • EPIC.
  • DHS 41.1 billion, 847 mil. Office of Screening
    Coordination and Operations (digital biometrics
    coordination).
  • Breakdown by program.
  • Patriot Act provisions sunset 12/31/2005.
  • Bush II lobbying to extend.

7
Surveillance Society
  • Stanley and Steinhardt.
  • Growing Surveillance Monster.
  • Cultural representation of fears of surveillance
    society.
  • Minority Report etc.
  • Components of the Monster.
  • Video surveillance proliferates.
  • Dataveillance.
  • Private data gathering industry.
  • Cell phone location data.
  • Genetics and privacy.
  • Biometrics.
  • Black boxes.
  • RFID chips.
  • GPS implants.

8
Surveillance Society
  • Synergies of surveillance.
  • Data profiling.
  • ACLU recommendations.
  • Changing terms of the debate.
  • Not inexorable.
  • Comprehensive privacy law commission.
  • Rapid update of laws to catch up with
    technologies.
  • Strengthening and updating 4th amendment.

9
Surveillance Society - FBI.
  • New Slide3.

10
Surveillance Society - Democratic ISA Activity.
  • New Slide4.

11
Surveillance Society - US Federal Wiretaps.
12
Surveillance Society - US Federal Wiretaps.
13
Surveillance Society - UK Wiretaps.
14
Surveillance Society - UK Wiretaps.
15
Surveillance Society - US Federal and State
Wiretaps.
16
Surveillance Society - US CIA Mail Intercepts.
17
Surveillance Societies/Cybernetic Evolutionary
Dominance - Fictional
  • Matrix Trilogy.
  • Back story similar to Terminator Trilogy
    (Skynet), Forbin Project (Colosus).
  • Some similarities with 2001 (Hal).
  • Cybernetic organisms become self aware.
  • Competition with humans.
  • War - humans dominated.
  • Resistance - human succeed?
  • Clip Segments.
  • Surveillance - Neo Interrogated.
  • Resistance - Hackers, Revolutionaries,
    Terrorists?
  • C-Space as terrain of struggle.
  • Revelation - Out of the Virtual and into the
    Desert of the Real.

18
Unexpected Futures.
  • Media Jihad.
  • Resistance in the developing world highly
    adaptable.
  • Apocalyptic ideologies of confrontation.
  • Cell phone suicide.
  • Jihadi Rap.

19
Theory of Border Control - Libcki1
  • Securing borders.
  • Ideally.
  • Know who the bad people are before they arrive.
  • Detect them crossing border.
  • Distinguish, apprehend them.
  • Reality.
  • Dont detect before entry.
  • Large scale surreptitious flows (likely in the
    millions).
  • Identity falsification pervasive and easy.

20
Theory of Border Control - Libcki2
  • Basic tenets of border control.
  • Contest between attackers and defender.
  • Information, especially distinguishing threats.
  • Internal and External wide are surveillance
    (focus on internal).
  • Political/Psychopolitical.
  • Borders.
  • Immune System.
  • National borders and terrorism.
  • Cyberspace.
  • Frontlines.
  • Disease surveillance.

21
Transformation of Global Surveillance - Landau
  • Technologies and Strategies of Surveillance.
  • HUMINT.
  • SIGINT.
  • COMINT.
  • Global surveillance.
  • Cold war construction of global spanning
    surveillance networks.
  • United States.
  • National Security Agency.
  • National Geospatial Intelligence Agency.
  • ECHELON. FAS
  • US and allied states.
  • EU Report.
  • Echelonwatch.
  • Statewatch.

22
Privacy and Secrecy Post 9/11 - Rotenberg.
  • Rotenberg, Marc.
  • EPIC.
  • Observing Surveillance Project.
  • Diminishment of Privacy by legal means.
  • CALEA, USA PATRIOT Act.
  • Loss of Privacy via technical means.
  • National ID Card.
  • Face Recognition.
  • Border Control.
  • Expansion of Government Secrecy.
  • Diminished access.
  • Closed hearings.
  • Consequences of government secrecy.

23
Privacy and Secrecy Post 9/11 - Rotenberg.
  • Privacy and Power.
  • Recognizing and governing information and power
    asymmetries.
  • What are we to do?
  • Build on existing constitutional traditions.
  • Assess new systems of public surveillance.
  • Balance of authority to surveil and the
    surveillance of authority.
  • Descriptive vs. Normative evaluations of
    surveillance.
  • Oppose fatalism regarding loss of privacy.

24
Cyberwarfare - Deibert and Stein.
  • Network as organization form and useful analytic
    concept.
  • Network as useful analogies for understanding
    cyberwarfare.
  • Social networks and cyber-networks.
  • Network on network warfare.
  • Disruption of networks.
  • Decay and debilitation.
  • Traffic (overflow, congestion).
  • Elimination of hosts.
  • Protection
  • Denial of targets.
  • Goal.
  • Hacking networks of terror w/o resentment and
    blowback.

25
Cyberwarfare - Lenoir.
  • Military-Entertainment Complex.
  • DARPA.
  • Americas Army.
  • Institute for Creative Technologies.
  • Mods and gaming.
  • Consequences of gaming conflict.
  • Inevitable.
  • Naturalizes assumptions.
  • Enemy construction.
  • Battlespace construction.
  • Mistaking the map for the territory.
  • Enemy gathers intelligence on tactics.

26
Cyberwarfare - Gray.
  • Revolution in Military Affairs.
  • Permanent Revolution in Military Affairs.
  • Postmodern War?
  • Fog of War and IT.
  • Interaction of combatants and terrain/battlespace.
  • Perfect information is impossible (Gödel/Church
    and Turing).
  • Bleeding Reality versus dreams of tek
    perfection.
  • Asymmetric globalization and conflict.
  • Globalization and PM War.
  • IT Central.
  • Velocity.
  • Bricolage of forms of war.
  • Cyborgization.

27
Cyberwarfare - Gray.
  • Globalization and PM War (continued).
  • No dominant narrative for RMA.
  • Complexification of gender.
  • Peace as justification of war.
  • Precision.
  • Unmanned Vehicles.
  • Non-lethal technologies.
  • Shock and Awe versus Bleeding reality of Iraq
    occupation.

28
Cyberwarfare - Yurick and Doss.
  • Information cycle and IW attack.
  • Cyberwar video illustrates many of the key.
  • States and Non-States developing significant IW
    capabilities.
  • Rules of engagement.
  • IW must fit w/n Geneva, Hague, UN and US law and
    doctrine.
  • Ex ITU prevents signal interference but .
  • Current US rules (fig 1, p. 15).
  • Hostile intent.
  • Declaration of forces as hostile.
  • Future US rules
  • Counter-offensive IW.
  • Preemptive.
  • Second strike.

29
Cyberwarfare - Yurick and Doss.
  • Defensive Options available.
  • IW attacks may be legal.
  • Response may be counterproductive.
  • US requires international cooperation.
  • International Law ambiguous, should be exploited.
  • Enemies will exploit ambiguities.
  • IW dynamic but should be addressed now.

30
Cyberfutures 1
  • Internet2.
  • Research consortium next generation I-net.
  • 206 universities as of Jan. 2005.
  • Corporations.
  • Associations.
  • Boosting Velocity of Transmission.
  • Terrabit networking (trillion bit).
  • NGI (Next Generation Internet).
  • Transferred to NITRD Large Scale Networking
    Initiative.
  • Web3D Consortium.
  • X3D replaces VRML (vitual reality markup
    language).
  • Goals.

31
Cyberfutures 2
  • Artificial Intelligence.
  • American Association for Artificial Intelligence.
  • Robotics.
  • Unexpected fusions of tek. Remote control car
    bombs.
  • JPL Robotics.
  • Carnegie Mellon.
  • Robot Hall of Fame.
  • War Robots.(SPAWAR US Navy).
  • Human Machine Interface.
  • Mind Control.
  • Wired Magazine profile of state of the art
    research.
  • Brain Gate Technology.
  • BrainGate demo.

32
Course Evaluation.
  • Instructor Name Christian Erickson
  • Course POS 353-10 (ugrad) POS 453-10 (grad).
  • Please spend time on narrative evaluation.
  • Good luck on finals and final papers!!!
  • Have a great summer!!!
  • Office hours same next week.
Write a Comment
User Comments (0)
About PowerShow.com