User Tools

Site Tools


international_programs

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
international_programs [2015/04/06 00:46]
ajones69_mail.roosevelt.edu
international_programs [2015/04/29 15:12] (current)
ajones69_mail.roosevelt.edu
Line 2: Line 2:
  
  
-ECHELON: A signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement. This company is purpose is to allow surveillance for companies across the world at a moments notice . Echelon'​s technology platform is embedded in more than 100 million devices , 35 million homes, and 300,000 buildings worldwide . Echelon serves as on of the first company'​s to serve as a surveillance company. The program Echelon started around 1947, it was initially used for the surveillance during the cold war. A program so vast that it could reach all over the world . Information is being collected and shared globally . Although the cold war has long ended the program still exist on the strength that it is to serve as a protector from terrorism. However, the method of "​spying"​ on the nation'​s citizens does not go over well with its occupants. ​ [(http://​www.globalresearch.ca/​echelon-today-the-evolution-of-an-nsa-black-program/​5342646)]+ECHELON: A signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement. This company is purpose is to allow surveillance for companies across the world at a moments notice . Echelon'​s technology platform is embedded in more than 100 million devices , 35 million homes, and 300,000 buildings worldwide . Echelon serves as on of the first company'​s to serve as a surveillance company. The program Echelon started around 1947, it was initially used for the surveillance during the cold war. A program so vast that it could reach all over the world . Information is being collected and shared globally . Although the cold war has long ended the program still exist on the strength that it is to serve as a protector from terrorism. However, the method of "​spying"​ on the nation'​s citizens does not go over well with its occupants. ​Programs such as Echelon allow security in all types of devices and now even after the war this advance in technology is still used and valued because of the accuracy that is brought out of such an invention. ​  [(http://​www.globalresearch.ca/​echelon-today-the-evolution-of-an-nsa-black-program/​5342646)]
  
-Data Retention Directive: A directive requiring EU member states to store citizens'​ telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received. This program in particular helps not only with terrorism but also with organized crime. Data retention has served as a valuable tool in previous investigations and will continue to serve as a tool to have successful convictions. Data retention helps with proving suspects that were wrongly accused of a crime innocent which without this tool would not be possible. Data Retention ​ holds all the information so even if it is missed at first it can be retrieved quickly and from anywhere , documentation is necessary in order to back up claims and actions. [(http://​ec.europa.eu/​dgs/​home-affairs/​what-we-do/​policies/​police-cooperation/​data-retention/​index_en.htm)]+Data Retention Directive: A directive requiring EU member states to store citizens'​ telecommunications data for six to 24 months and allowing police and security agencies to request access from a court to details such as IP address and time of use of every email, phone call, and text message sent or received. This program in particular helps not only with terrorism but also with organized crime. Data retention has served as a valuable tool in previous investigations and will continue to serve as a tool to have successful convictions. Data retention helps with proving suspects that were wrongly accused of a crime innocent which without this tool would not be possible. Data Retention ​ holds all the information so even if it is missed at first it can be retrieved quickly and from anywhere , documentation is necessary in order to back up claims and actions. ​Data retention basically allows the back tracking of everything traceable. This program will suffice in proving innocence in a trial and the accuracy of collecting data because what is found that was done can not be alternated.  ​[(http://​ec.europa.eu/​dgs/​home-affairs/​what-we-do/​policies/​police-cooperation/​data-retention/​index_en.htm)]
  
-INDECT: Research project funded by the European Union to develop surveillance methods for the monitoring of abnormal behaviors in an urban environment. The purpose of the INDECT project have scientist and researchers use tools for more efficient and better detections of threats. This program also has a part that is highly dedicated to preserving privacy. INDECT has three main key things: intelligent monitoring for threat detection, threat detection in computer networks, and data protection and the privacy protection. INDECT uses the method of "​back/​dark screen monitoring"​. INDECT helps with the monitoring of videos without being detected easily. The program has strong privacy features because of the cryptographic development of digital watermarking and cryptographic algorithms. ​ [(http://​www.indect-project.eu/​)]+INDECT: Research project funded by the European Union to develop surveillance methods for the monitoring of abnormal behaviors in an urban environment. The purpose of the INDECT project have scientist and researchers use tools for more efficient and better detections of threats. This program also has a part that is highly dedicated to preserving privacy. INDECT has three main key things: intelligent monitoring for threat detection, threat detection in computer networks, and data protection and the privacy protection. INDECT uses the method of "​back/​dark screen monitoring"​. INDECT helps with the monitoring of videos without being detected easily. The program has strong privacy features because of the cryptographic development of digital watermarking and cryptographic algorithms. This program which detects threats from the source of which it starts : a human by monitoring the moods of people who could trigger national security alerts. The individuals are a virus within themselves.  [(http://​www.indect-project.eu/​)]
  
-Schengen Information System: A database kept for national security and law enforcement purposes. The Schengen is external border control and law enforcement cooperation in the Schengen States. This system enable authorities of missing persons reports and but it also gives instructions on what to do when the person or object in search is found. SIS main focus is to act help with internal security in the Schengen states when the internal boarder checks do not cut it. This program is to catch things that are normally slipped in the act of invasion or breach of security that would normally go unnoticed. Programs put into play in order to have a sufficient way of sensing a threat and attacking it head on. [(http://​ec.europa.eu/​dgs/​home-affairs/​what-we-do/​policies/​borders-and-visas/​schengen-information-system/​index_en.htm)]+Schengen Information System: A database kept for national security and law enforcement purposes. The Schengen is external border control and law enforcement cooperation in the Schengen States. This system enable authorities of missing persons reports and but it also gives instructions on what to do when the person or object in search is found. SIS main focus is to act help with internal security in the Schengen states when the internal boarder checks do not cut it. This program is to catch things that are normally slipped in the act of invasion or breach of security that would normally go unnoticed. Programs put into play in order to have a sufficient way of sensing a threat and attacking it head on. This program helps law enforcement find people who are missing it also tells individuals what to do when they find the missing. The program catches things that are normally unnoticed.  ​[(http://​ec.europa.eu/​dgs/​home-affairs/​what-we-do/​policies/​borders-and-visas/​schengen-information-system/​index_en.htm)]
  
 {{:​internet_suvelience_picure.jpg?​200|}} {{:​internet_suvelience_picure.jpg?​200|}}
  
-"The Electronic Communications Privacy Act (ECPA) was a forward-looking statute when enacted in 1986. It specified standards for law enforcement access to electronic communications and associated data, affording important privacy protections to subscribers of emerging wireless and Internet technologies."​ Although laws have been put into effect to protect people from the surveillance of their private lives, there are still loop holes that are being taken advantage of in the name of "​national security"​. These laws are available to the public to withstand the violation of their privacy however in a sense they are also very vague . Many charges brought upon criminals was illegally obtained and are fought no matter the truth in them however the government sees fit to retain information will be acted upon their discretion .The laws that are supposed to protect citizens from these acts are the same laws that are used to apprehend them in the event of wrongful doing. [(http://​digitaldueprocess.org/​index.cfm?​objectid=37940370-2551-11DF-8E02000C296BA163)]+"The Electronic Communications Privacy Act (ECPA) was a forward-looking statute when enacted in 1986. It specified standards for law enforcement access to electronic communications and associated data, affording important privacy protections to subscribers of emerging wireless and Internet technologies."​ Although laws have been put into effect to protect people from the surveillance of their private lives, there are still loop holes that are being taken advantage of in the name of "​national security"​. These laws are available to the public to withstand the violation of their privacy however in a sense they are also very vague . Many charges brought upon criminals was illegally obtained and are fought no matter the truth in them however the government sees fit to retain information will be acted upon their discretion .The laws that are supposed to protect citizens from these acts are the same laws that are used to apprehend them in the event of wrongful doing. ​Privacy protection was put into play to allow some discrepancy for users so they feel their rights are somewhat protected.  ​[(http://​digitaldueprocess.org/​index.cfm?​objectid=37940370-2551-11DF-8E02000C296BA163)]
  
-Prism: PRISM a tool that is used by the NSA to collect data that is seemingly private from sites that are used as social and business interactions regarding Facebook, Gmail and other sites that are used. PRISM is a tool that's main focus is to allow the NSA to have access at any given time to specific data on people from the major companies like google, yahoo, Microsoft and other mainstream companies. The surveillance of persons accounts that are for social reasons are prominent in today'​s society because everything is now virtual. All interactions are accessible and traceable. ​ [(www.pbs.org/​wgbh/​pages/​frontline/​united-states-ofsecrets/​)]+Prism: PRISM a tool that is used by the NSA to collect data that is seemingly private from sites that are used as social and business interactions regarding Facebook, Gmail and other sites that are used. PRISM is a tool that's main focus is to allow the NSA to have access at any given time to specific data on people from the major companies like google, yahoo, Microsoft and other mainstream companies. The surveillance of persons accounts that are for social reasons are prominent in today'​s society because everything is now virtual. All interactions are accessible and traceable. Prism allows social media information to be available to employers , so basically information accessible anywhere in the world.  [(www.pbs.org/​wgbh/​pages/​frontline/​united-states-ofsecrets/​)]
  
-Also, not only is this data accessible to government officials this data can be compromised by anyone, given the proper tools and ingredients this puts the public in a vulnerable state , even the officials are at risk because these programs can be hacked. Leaving all this information in the open to anyone who wants it. Tools put forth in efforts to stop terrorism and organized crimes and protecting the world can be used against the world. If the international surveillance is compromised then the world is seemingly compromised despite its efforts to protect itself from harms that it built itself up against now has the power to attack it with a strong approach. This cannot be ignored. [(http://​ir.lawnet.fordham.edu/​cgi/​viewcontent.cgi?​article=4980&​context=flr)]+Also, not only is this data accessible to government officials this data can be compromised by anyone, given the proper tools and ingredients this puts the public in a vulnerable state , even the officials are at risk because these programs can be hacked. Leaving all this information in the open to anyone who wants it. Tools put forth in efforts to stop terrorism and organized crimes and protecting the world can be used against the world. If the international surveillance is compromised then the world is seemingly compromised despite its efforts to protect itself from harms that it built itself up against now has the power to attack it with a strong approach. This cannot be ignored. ​ [(http://​ir.lawnet.fordham.edu/​cgi/​viewcontent.cgi?​article=4980&​context=flr)]
  
  
international_programs.txt ยท Last modified: 2015/04/29 15:12 by ajones69_mail.roosevelt.edu