This OPAC will be unavailable for a few hours beginning 6PM on Saturday, April 20, 2024 for planned upgrades. The OPAC should be back up to regular operation Sunday, April 21, 2024.
Physical Description:12 audio discs (approximately 12 hr.) : digital ; 4 3/4 in. + 1 volume (vi, 180 pages) : illustrations ; 19 cm + 1 transcript book sound disc
Publisher:Chantilly, VA : The Teaching Company, [2016]
Copyright:℗2016
Content descriptions
General Note:
"The Teaching Company."
Bibliography, etc. Note:
Accompanying guidebook with the same title Includes bibliographical references (pages 173-178).
Formatted Contents Note:
Vol. 1, Disc 1. Security, liberty, or neither? -- The Charlie Hebdo tragedy -- Disc 2. East Germany's Stasi state -- Surveillance in America -- Disc 3. Failing to connect the dots on 9/11 -- The U.S. spy network in action. -- Disc 4. Big data's shadow -- Some problems with privacy -- Disc 5. Under observation: the Panopticon effect -- Drones, drones everywhere -- Disc 6. Biometrics: eyes, fingers, everything -- Hacking, espionage, and surveillance. Vol. 2, Disc 7. Local police on the cyber beat -- Geolocation: tracking you and your data -- Disc 8. Internet surveillance -- Metadata: legal or not -- Disc 9. Technology outruns the law -- Your personal data is the product -- Disc 10. The internet of things -- Anonymity: going off the grid -- Disc 11. Code breaking versus code making -- Europe's right to be forgotten -- Disc 12. National security and the first amendment -- The privacy debate needs you.
Participant or Performer Note:
[Lectures delivered by] Professor Paul Rosenzweig, The George Washington University Law School.
Summary, etc.:
Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Investigate the techniques by which foreign governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses. Dive into privacy issues and security issues using the Fifth Amendment perspective. Trace the history of the news media from the Pentagon Papers to Wikileaks. Explore legal issues surrounding metadata gathering in the years after 9/11, and whether it violates the 4th Amendment protection.