Title: POS 353453: 05052005
1POS 353/453 05/05/2005
- Website.
- http//faculty.roosevelt.edu/erickson/courses/pos3
53-453/ - Course agenda (overview).
- Presentations.
- Biometrics.
- Fictional C-Spaces.
- Topics/Concepts introduced by readings.
- Future of C-Space.
- Surveillance.
- Cyberwarfare.
- Final exam review (800 - 815pm).
- Course evaluations (815 - 830pm).
- Narrative evaluation most important.
2POS 353/453 05/05/2005
- Paper due today.
- If turning in just hardcopy tonight, you have 24
hours to turn in electronic copy. - Final exam next Thursday.
- Run drafts of exam answers by me.
- Final Web Project Requirement.
- Make sure Prof. Erickson has correct link.
- Check Web Projects index page.
- Send Prof. Erickson updated url.
- Post web version of final paper between paper due
date and final exam (by 05/12/2005 545pm). - Video Cases (as time allows).
- The Matrix.
- Media Jihad.
- Unanticipated near future.
3Surveillance Society/Cyberwarfare Video Cases.
- Surveillance Society/Cyberwarfare Video Cases.
- CIR Archived ABC video No Place to Hide.
- Border Control.
- Webveillance and Cyberwars of Terror.
- Clip from Media Jihad (NHK television fall 2004).
- Aaron Weisburd.
- Internet Haganah.
- Ties together surveillance and cyberwarfare
readings. - Complexity and difficulties of Grays postmodern
war.
4Surveillance Society
- Surveillance Society.
- Resistance/Research CFP2005.
- CFP goes back to 1991.
- Setting the stage.
- Long range trends
- US.
- US and UK compared.
5Surveillance Society
- Surveillance Society - Examples.
- City of Chicago Unified Camera Network.
- Spycam Force (posted May 9th, 2005).
- Wired Magazine profile of CPD/OEM Citizen Law
Enforcement Analysis and Reporting (CLEAR)
system. - Scrutinize - 30 cameras (Operation Disruption
ramp up to 2250 cameras. - Analyze - Patrol cars laptop and database
integration real-time updates. - Mobilize - Databases used to link crime data to
geographic locales - Targeted Response Units. - Legacy - CPD red squad 200,000 Chicagoans in
files - disbanded 1981. - DHS - 34mil., 5mil. Chicago.
6Surveillance Society
- Surveillance Society.
- Open Loop Chicago.
- Surveillance Camera Players.
- Surveillance Federal.
- MATRIX.
- US Federal FY 2006 Surveillance Budget.
- EPIC.
- DHS 41.1 billion, 847 mil. Office of Screening
Coordination and Operations (digital biometrics
coordination). - Breakdown by program.
- Patriot Act provisions sunset 12/31/2005.
- Bush II lobbying to extend.
7Surveillance Society
- Stanley and Steinhardt.
- Growing Surveillance Monster.
- Cultural representation of fears of surveillance
society. - Minority Report etc.
- Components of the Monster.
- Video surveillance proliferates.
- Dataveillance.
- Private data gathering industry.
- Cell phone location data.
- Genetics and privacy.
- Biometrics.
- Black boxes.
- RFID chips.
- GPS implants.
8Surveillance Society
- Synergies of surveillance.
- Data profiling.
- ACLU recommendations.
- Changing terms of the debate.
- Not inexorable.
- Comprehensive privacy law commission.
- Rapid update of laws to catch up with
technologies. - Strengthening and updating 4th amendment.
9Surveillance Society - FBI.
10Surveillance Society - Democratic ISA Activity.
11Surveillance Society - US Federal Wiretaps.
12Surveillance Society - US Federal Wiretaps.
13Surveillance Society - UK Wiretaps.
14Surveillance Society - UK Wiretaps.
15Surveillance Society - US Federal and State
Wiretaps.
16Surveillance Society - US CIA Mail Intercepts.
17Surveillance Societies/Cybernetic Evolutionary
Dominance - Fictional
- Matrix Trilogy.
- Back story similar to Terminator Trilogy
(Skynet), Forbin Project (Colosus). - Some similarities with 2001 (Hal).
- Cybernetic organisms become self aware.
- Competition with humans.
- War - humans dominated.
- Resistance - human succeed?
- Clip Segments.
- Surveillance - Neo Interrogated.
- Resistance - Hackers, Revolutionaries,
Terrorists? - C-Space as terrain of struggle.
- Revelation - Out of the Virtual and into the
Desert of the Real.
18Unexpected Futures.
- Media Jihad.
- Resistance in the developing world highly
adaptable. - Apocalyptic ideologies of confrontation.
- Cell phone suicide.
- Jihadi Rap.
19Theory of Border Control - Libcki1
- Securing borders.
- Ideally.
- Know who the bad people are before they arrive.
- Detect them crossing border.
- Distinguish, apprehend them.
- Reality.
- Dont detect before entry.
- Large scale surreptitious flows (likely in the
millions). - Identity falsification pervasive and easy.
20Theory of Border Control - Libcki2
- Basic tenets of border control.
- Contest between attackers and defender.
- Information, especially distinguishing threats.
- Internal and External wide are surveillance
(focus on internal). - Political/Psychopolitical.
- Borders.
- Immune System.
- National borders and terrorism.
- Cyberspace.
- Frontlines.
- Disease surveillance.
21Transformation of Global Surveillance - Landau
- Technologies and Strategies of Surveillance.
- HUMINT.
- SIGINT.
- COMINT.
- Global surveillance.
- Cold war construction of global spanning
surveillance networks. - United States.
- National Security Agency.
- National Geospatial Intelligence Agency.
- ECHELON. FAS
- US and allied states.
- EU Report.
- Echelonwatch.
- Statewatch.
22Privacy and Secrecy Post 9/11 - Rotenberg.
- Rotenberg, Marc.
- EPIC.
- Observing Surveillance Project.
- Diminishment of Privacy by legal means.
- CALEA, USA PATRIOT Act.
- Loss of Privacy via technical means.
- National ID Card.
- Face Recognition.
- Border Control.
- Expansion of Government Secrecy.
- Diminished access.
- Closed hearings.
- Consequences of government secrecy.
23Privacy and Secrecy Post 9/11 - Rotenberg.
- Privacy and Power.
- Recognizing and governing information and power
asymmetries. - What are we to do?
- Build on existing constitutional traditions.
- Assess new systems of public surveillance.
- Balance of authority to surveil and the
surveillance of authority. - Descriptive vs. Normative evaluations of
surveillance. - Oppose fatalism regarding loss of privacy.
24Cyberwarfare - Deibert and Stein.
- Network as organization form and useful analytic
concept. - Network as useful analogies for understanding
cyberwarfare. - Social networks and cyber-networks.
- Network on network warfare.
- Disruption of networks.
- Decay and debilitation.
- Traffic (overflow, congestion).
- Elimination of hosts.
- Protection
- Denial of targets.
- Goal.
- Hacking networks of terror w/o resentment and
blowback.
25Cyberwarfare - Lenoir.
- Military-Entertainment Complex.
- DARPA.
- Americas Army.
- Institute for Creative Technologies.
- Mods and gaming.
- Consequences of gaming conflict.
- Inevitable.
- Naturalizes assumptions.
- Enemy construction.
- Battlespace construction.
- Mistaking the map for the territory.
- Enemy gathers intelligence on tactics.
26Cyberwarfare - Gray.
- Revolution in Military Affairs.
- Permanent Revolution in Military Affairs.
- Postmodern War?
- Fog of War and IT.
- Interaction of combatants and terrain/battlespace.
- Perfect information is impossible (Gödel/Church
and Turing). - Bleeding Reality versus dreams of tek
perfection. - Asymmetric globalization and conflict.
- Globalization and PM War.
- IT Central.
- Velocity.
- Bricolage of forms of war.
- Cyborgization.
27Cyberwarfare - Gray.
- Globalization and PM War (continued).
- No dominant narrative for RMA.
- Complexification of gender.
- Peace as justification of war.
- Precision.
- Unmanned Vehicles.
- Non-lethal technologies.
- Shock and Awe versus Bleeding reality of Iraq
occupation.
28Cyberwarfare - Yurick and Doss.
- Information cycle and IW attack.
- Cyberwar video illustrates many of the key.
- States and Non-States developing significant IW
capabilities. - Rules of engagement.
- IW must fit w/n Geneva, Hague, UN and US law and
doctrine. - Ex ITU prevents signal interference but .
- Current US rules (fig 1, p. 15).
- Hostile intent.
- Declaration of forces as hostile.
- Future US rules
- Counter-offensive IW.
- Preemptive.
- Second strike.
29Cyberwarfare - Yurick and Doss.
- Defensive Options available.
- IW attacks may be legal.
- Response may be counterproductive.
- US requires international cooperation.
- International Law ambiguous, should be exploited.
- Enemies will exploit ambiguities.
- IW dynamic but should be addressed now.
30Cyberfutures 1
- Internet2.
- Research consortium next generation I-net.
- 206 universities as of Jan. 2005.
- Corporations.
- Associations.
- Boosting Velocity of Transmission.
- Terrabit networking (trillion bit).
- NGI (Next Generation Internet).
- Transferred to NITRD Large Scale Networking
Initiative. - Web3D Consortium.
- X3D replaces VRML (vitual reality markup
language). - Goals.
31Cyberfutures 2
- Artificial Intelligence.
- American Association for Artificial Intelligence.
- Robotics.
- Unexpected fusions of tek. Remote control car
bombs. - JPL Robotics.
- Carnegie Mellon.
- Robot Hall of Fame.
- War Robots.(SPAWAR US Navy).
- Human Machine Interface.
- Mind Control.
- Wired Magazine profile of state of the art
research. - Brain Gate Technology.
- BrainGate demo.
32Course Evaluation.
- Instructor Name Christian Erickson
- Course POS 353-10 (ugrad) POS 453-10 (grad).
- Please spend time on narrative evaluation.
- Good luck on finals and final papers!!!
- Have a great summer!!!
- Office hours same next week.