Tu dois être connecté pour marquer les épisodes vus. Connexion ou inscription.
Saison 1
Date de diffusion
Mar 03, 2016
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for
.. show full overview
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of political speech and the privacy of personal searches and communication. Take a look at two tools people use in pursuit of Internet anonymity: TOR networks and Bitcoin currency.
Date de diffusion
Mar 04, 2016
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions
.. show full overview
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security-as illustrated by a dramatic face-off over John Ashcroft's hospital bed.
Date de diffusion
Mar 04, 2016
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this
.. show full overview
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance-physical, electronic and data-and see how each type works. Case studies of the Osama Bin Laden raid and U.S. airport screening show the tension between security and transparency.
Date de diffusion
Mar 04, 2016
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans
.. show full overview
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy-keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and think about the lessons it can teach us today.
Date de diffusion
Mar 04, 2016
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance
.. show full overview
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful measures in the 1970s.
Date de diffusion
Mar 04, 2016
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going
.. show full overview
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a wall" between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after 9/11."
Date de diffusion
Mar 04, 2016
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and
.. show full overview
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key challenges in the process.
Date de diffusion
Mar 04, 2016
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts
.. show full overview
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data-as well as the threat it poses to privacy and anonymity.
Date de diffusion
Mar 04, 2016
Because our privacy laws are so far behind today's technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against
.. show full overview
Because our privacy laws are so far behind today's technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Date de diffusion
Mar 04, 2016
What happens when we know we are under observation? Or when we know we are anonymous? The observer effect" has a significant psychological impact on someone being watched, whether it is
.. show full overview
What happens when we know we are under observation? Or when we know we are anonymous? The observer effect" has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on social media. Consider the psychological implications of observation-on both the observed and the observer. "
Date de diffusion
Mar 04, 2016
Drones-unmanned aerial vehicles-are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and
.. show full overview
Drones-unmanned aerial vehicles-are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?
Date de diffusion
Mar 04, 2016
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of
.. show full overview
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this technology, you'll also see the darker side of this data unleashed in the world.
Date de diffusion
Mar 04, 2016
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate
.. show full overview
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses.
Date de diffusion
Mar 04, 2016
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve
.. show full overview
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together.
Date de diffusion
Mar 04, 2016
You are where you go-at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given
.. show full overview
You are where you go-at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given (such as a social media check-in) to the improperly acquired (such as cell phone spying). Then see what investigators can do with such data.
Date de diffusion
Mar 04, 2016
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad.
.. show full overview
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue.
Date de diffusion
Mar 04, 2016
Dig deeper into the government's electronic surveillance programs. Here, you'll learn about metadata"-or data about data. After reviewing what metadata is and how it works, you'll
.. show full overview
Dig deeper into the government's electronic surveillance programs. Here, you'll learn about metadata"-or data about data. After reviewing what metadata is and how it works, you'll examine the thorny legal issues surrounding metadata gathering in the years after 9/11, and whether collecting it violates the 4th Amendment protection against search and seizure."
Date de diffusion
Mar 04, 2016
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you'll turn to the
.. show full overview
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you'll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our smart phones.
Date de diffusion
Mar 04, 2016
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers,
.. show full overview
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?
Date de diffusion
Mar 04, 2016
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption-including biometric finger scans to unlock phones and access data.
.. show full overview
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption-including biometric finger scans to unlock phones and access data. But without a back door" for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective."
Date de diffusion
Mar 04, 2016
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a right to be forgotten" principle. Although Europe and
.. show full overview
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a right to be forgotten" principle. Although Europe and America's approach toward privacy is generally similar, here you'll compare the legal state of data collection in both the public and private realms to find out where the differences lie."
Date de diffusion
Mar 04, 2016
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the
.. show full overview
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Date de diffusion
Mar 04, 2016
Look toward the future and examine the possibilities of quantum computing, human-computer interface, and artificial intelligence. These technological changes are going to require each of
.. show full overview
Look toward the future and examine the possibilities of quantum computing, human-computer interface, and artificial intelligence. These technological changes are going to require each of us to make decisions about privacy and security-for ourselves and for future generations. Recap what you've learned to determine your vision of the best way forward from here.
Date de diffusion
Avr 03, 2016
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of
.. show full overview
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data.
S'il manque des épisodes ou des bannières (et qu'ils existent sur TheTVDB), vous pouvez demander une mise à jour automatique complète de l'émission :
Demander une mise à jour de la série
Mise à jour demadée