Catalog Search Results
Pub. Date
2015.
Language
English
Description
The construction of Mount Rushmore was looked upon unfavorably by Native Americans who were promised the Black Hills in a treaty later broken by the United States. In order to honor the legacy of the Native Americans who lived in western South Dakota, an even larger monument of Crazy Horse is currently under construction..
Pub. Date
2015.
Language
English
Description
"Let us place there, carved high, as close to heaven as we can, the words of our leaders, their faces, to show posterity what manner of men they were. Then breathe a prayer that these records will endure until the wind and the rain alone shall wear them away." - Gutzon Borglum, Sculptor of Mount Rushmore. Towering above the Black Hills of South Dakota stands America's most treasured monument...a crowning testament to the great leaders who symbolize...
9) Metadata
Pub. Date
2016.
Language
English
Description
Dig deeper into the government’s electronic surveillance programs. Here, you’ll learn about "metadata”—or data about data. After reviewing what metadata is and how it works, you’ll examine the thorny legal issues surrounding metadata gathering in the years after 9/11, and whether collecting it violates the 4th Amendment protection against search and seizure.
10) Anonymity
Pub. Date
2016.
Language
English
Description
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of political speech and the privacy of personal searches and communication. Take a look at two tools people use in pursuit of Internet anonymity: TOR networks and Bitcoin currency.
Pub. Date
2016.
Language
English
Description
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data—as well as the threat it poses to privacy and anonymity.
12) Biometrics
Pub. Date
2016.
Language
English
Description
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this technology, you’ll also see the darker side of this data unleashed in the world.
Pub. Date
2016.
Language
English
Description
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption—including biometric finger scans to unlock phones and access data. But without a "back door"for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective.
Pub. Date
2016.
Language
English
Description
A man shoots down a drone that is flying over his private property. A retail store uses predictive data analytics to send pregnancy-related advertising to a teenager who has not told her parents about her condition. A police officer places a GPS device on a suspected criminal's car to follow him and build a case against him..The news is full of such stories, in which new technologies lead to dilemmas that could not have been imagined just a few decades...
Pub. Date
2016.
Language
English
Description
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key challenges in the process.
Pub. Date
2016.
Language
English
Description
What happens when we know we are under observation? Or when we know we are anonymous? The "observer effect"has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on social media. Consider the psychological implications of observation—on both the observed and the observer.
Pub. Date
2016.
Language
English
Description
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data.
Pub. Date
2016.
Language
English
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Pub. Date
2016.
Language
English
Description
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security—as illustrated by a dramatic face-off over John Ashcroft’s hospital bed.
Pub. Date
2016.
Language
English
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request