SURVEILLANCE TECHNOLOGIES: ETHICAL?

Project Milestone 1: Research

Date: September 28, 2019


See our "about" project description here.

Academic Articles

  1. The NSA and Edward Snowden: surveillance in the 21st century. Research article in ACM SIGGAS Computers and Society, 2014. Link to article. Keywords: security, technology policy, privacy.
  2. The NSA and Snowden: securing the all-seeing eye. Magazine article in Communications of the ACM, 2014. Link to article. Keywords: security, NSA, Constitution.
  3. In the Name of Terror?: Information and Policy in the Decade Post 9/11. Researh article in "ASIST '13: Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries," 2013. Link to article. Keywords: legislation, public information, rapid development.
  4. Privacy and ethical concerns in internet security. Research article in "SIGITE '10: Proceedings of the 2010 ACM conference on information technology education," 2010. Link to article. Keywords: security, privacy, ethics, laws.
  5. USA PATRIOT Act. Justice Department explanation of the USA PATRIOT Act, 2001. Link to website. Keywords: law, terrorism, government.
  6. Communications Surveillance: Privacy and Security at Risk. Magazine article in "Queue - Privacy and Rights," 2009. Link to article. Keywords: wiretapping, phone calls, law, privacy.
  7. Law and technology: Keeping track of telecommunications surveillance. Magazine article in "Communications of the ACM - The Status of the P versus NP Problem," 2009. Link to article. Keywords: law enforcement, privacy, criminal investigations, records.
  8. Privacy and security: International communications surveillance. Magzine article in "Communications of the ACM - Inspiring Women in Computing," 2009. Link to article. Keywords: international relations, privacy, Internet traffic, FISA.
  9. Everyday Surveillance. Research article in "CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems," 2016. Link to article. Keywords: history of surveillance, power structures, ownership, data.
  10. Towards a unified conceptual model for surveillance theories: "we shall meet in the place where there is no darkness" - 1984, george orwell. Research article in "ICSE-SEIS '18: Proceedings of the 40th International conference on Software Engineering: Software Engineering in Society," 2018. Link to article. Keywords: privacy, criminal justice system, surveillance.
  11. PATRIOT Propaganda: Justice Department's PATRIOT Act Website Creates New Myths About Controversial Law. Publication from the American Civil Liberties Union, 2003. Link to document. Keywords: USA PATRIOT Act, Justice Department, ACLU.
  12. Cooperation or Resistance? The Role of Tech Companies in Government Surveillance. Publication in the Harvard Law Review, 2018. Link to article. Keywords: corporations, surveillance, discretion, government.
  • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001. The Justice Information Sharing (JIS) Initiative, 2013. Link to article. Keywords: USA Patriot Act, Justice Department, reauthorization, government.
  • General News Sources

    1. "Why Edward Snowden leaked the secret NSA information." Published by The Atlantic, 2013. Link to article. Keywords: Edward Snowden, NSA, whistleblowing, surveillance.
    2. "Edward Snowden's other motive for leaking." Published by The Atlantic, 2013. Link to article. Keywords: encryption, Edward Snowden, Constitution.
    3. "NSA spying appears to stem from 550-word section of PATRIOT Act." Published by The Atlantic, 2013. Link to article. Keywords: USA PATRIOT Act, telephone data, spying.
    4. "Secrecy has already corroded our democracy in real ways." Published by The Atlantic, 2013. Link to article. Keywords: USA PATRIOT Act, overreach, FISA, democracy.
    5. "Trump administration asks Congress to Reauthorize NSA's Deactivated Call Records Program." Published by The New York Times, 2019. Link to article. Keywords: Trump administration, NSA, surveillance, overreach.
    6. "Secret FBI Subpoenas Scoop Up Personal Data From Scores of Companies." Published by The New York Times, 2019. Link to article. Keywords: FBI, counterterrorism, privacy, national security.
    7. "How Private Contractors Are Profiting from Government Surveillance." Published by Vice, 2014. Link to article. Keywords: corporations, profit, surveillance, spying.
    8. "Mass Surveillance Is Coming to a City Near You." Published by The Atlantic, 2019. Link to article. Keywords: monitoring, crime, tracking, video.
    9. "With Great Computing Power Comes Great Surveillance." Published by The Atlantic, 2014. Link to article. Keywords: Moore's Law, government, surveillance, algorithms.

    Technology-Focused Services

    1. Cellular telephony and the question of privacy. Magazine article in "Communications of the ACM," 2011. Link to article. Keywords: cellular networks, surveillance, wiretapping, law.
    2. Online Privacy in Public Places: How do Location, Terms and Conditions and VPN Influence Disclosure? Research article from "Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing," 2019. Link to article. Keywords: terms and conditions, Internet connection, security.
    3. USA PATRIOT Act and Privacy: Impact on internet service providers. Research article in "Proceedings of the 12th annual conference on Computers, freedom and privacy," 2002. Link to article. Keywords: USA PATRIOT Act, wiretapping, routing.
    4. Mining and modeling large scale cell phone data: invited talk. Research article from "Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing," 2011. Link to article. Keywords: cellular networks, privacy, location data.
    5. Privacy in the cloud: going beyond the contractarian paradigm. Research article from "Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies," 2011. Link to article. Keywords: cloud computing, terms of service, Constitution.
    6. Vicarious infringement creates a privacy ceiling. Research article from "Proceedings of the ACM workshop on Digital rights management," 2006. Link to article. Keywords: privacy, laws, copyright, companies.
    7. "5G is Here--and Still Vulnerable to Stingray Surveillance." Published by Wired, 2019. Link to article. Keywords: 5G network, data exposure, cellular networks.
    8. "Internal Docs Show How ICE Gets Surveillance Help From Local Cops." Published by Wired, 2019. Link to article. Keywords: law enforcement, cameras, surveillance, civil rights.
    9. "In the Face of Danger, We're Turning to Surveillance." Published by Wired, 2019. Link to article. Keywords: surveillance, gun violence, protection.
    10. More encryption means less privacy. Research article published in "Communications of the ACM," 2016. Link to article. Keywords: privacy, encryption, networks, politics.

    Image Credits

    1. "Gray IP Camera on Black Wall." This image was posted by Florian Olivo to Unsplash, a website with images that are free to use. Link to camera image.
    2. "USA!" This image was posted by Andrew Ruiz to Unsplash, a website with images that are free to use. Link to "USA!" image.
    3. "Capitol Hill." This image was posted by Jorge Alcala to Unsplash, a website with images that are free to use. Link to Capitol Hill image.
    4. All of the graphics of information were created by Jacqueline Galison for the purposes of this project.