Beruflich Dokumente
Kultur Dokumente
Group Website.
Data Collection
Pearce Reinsch
NSA Data Collection
How Internet data is collected - PRISM
How Internet data is collected cont.
How targeted Internet data is collected -
SECONDDATE
How encrypted traffic is cracked - BULLRUN
How data is stored - Data center
How much data is stored
How the data is accessed
Government Surveillance:
Phone Tracking
Alexandra Jimenez
Government Surveillance: Phone Tracking
http://ht3.cdn.turner.com/money/big/
news/2014/11/14/federal-spy-planes.c
nnmoney_1024x576.mp4
Ways to Track a Phones Location
Stingrays are physical antennas that pretend
to be cellphone towers & intercept phones
signals & record locations & whos contacted
Cell-Site Location Information (CSLI) is created
when a cell phones pings a tower, what towers
that the cellphone pings, the direction it came
from and what time it happened, without a
warrant
Tower Dump is CSLI info gathered from a
tower for a period of time to find a common
numbers (ex. Which cellphone numbers were
near this bank an hour before it was robbed?)
Government Surveillance:
Cameras
Jose Sanchez
Cameras
of US adults are recorded in police facial
recognition databases
The FBI has Next Generation Identification
(NGI) system which is interested in using it to
identify a random person in a crowd and track
them.
Government is looking towards using social
media platforms to get more images. (ex.
Facebook, Twitter, Google)
Government Surveillance: Drones
Privacy
Trespassing
Stalking
Spying
Privacy Laws for Drones
Federal Aviation Administration (FAA) - is a national authority with powers to
regulate all aspects of civil aviation
31 states passed laws that limits drone use in private spaces, crowds, and
individual/s
Inventory Targeting
User Targeting
Strategies
Demographic
Behavioral
Dayparting
Targeting Technologies
Cookies
First Party cookies
Third Party cookies
Web beacons
Persistent IDs
Advantages Drawbacks
Products purchased
Combinations of products purchased
together
Prices paid
Coupon or other discount offer used
Pages/products viewed
Time on site
Timing of site visits
Product reviews and information sharing
Offers or ads that the customer viewed
Privacy in Loyalty Programs
Consumers say actions by companies can push them to the breaking point.
Some of the weirdest requests that consumers say they have seen from companies include:
Asking for credit card info from retailers in return for savings.
Allowing loyalty programs that consumers follow to offer rewards based on profile content.
Requesting personal information that can be used to target consumers based on demographics.
Anonymity
Joshua Coon
What is Anonymity?
Encrypts files on OS
Has pre-configured
security settings
It can be a simple:
as a watch, or wearable clothing
It can be as complex:
as a heart monitor, or Google glasses
The data that these devices collect can be either transmitted with a mobile device to the
internet, or the device can simply store the data to be connected later to a computer for
processing.
Collect Data
The information that these devices collect and share is being transmitted to both private companies as
well as government agencies. The ability for individuals to maintain privacy and security of this data is
very important, it can be hacked, or the information can be sold or shared without the person knowing it.
The collection of health data is proving to be very helpful. As you can see, this is one company that is
making great advances in medical devices
Scanadu:
https://www.scanadu.com/globalbodymap/
Gattaca Genetic Testing
Martin Almaraz
Gattaca Genetic Testing
Carrier Screening
Tests parents for recessive disorders
Done before conception
Job Specific Screening
Astronauts
Chemically Hazardous Jobs
Social Issues Post Testing
Disproportionates in Race
Exaggerated outcomes
Q&A
Thank you!