Paul Rosenzweig

Paul Rosenzweig >

25
Videos
Loading...
Security, Liberty, or Neither?
Episode 1 of The Surveillance State
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the…
East Germany’s Stasi State
Episode 3 of The Surveillance State
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy--keeping tabs on neighbors, friends and…
Internet Surveillance
Episode 15 of The Surveillance State
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the…
Surveillance in America
Episode 4 of The Surveillance State
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court…
Failing to Connect the Dots on 9/11
Episode 5 of The Surveillance State
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall"…
The U.S. Spy Network in Action
Episode 6 of The Surveillance State
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key…
Big Data’s Shadow
Episode 7 of The Surveillance State
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new…
The Charlie Hebdo Tragedy
Episode 2 of The Surveillance State
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance--physical, electronic and…
Europe’s Right to Be Forgotten
Episode 22 of The Surveillance State
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten" principle. Although Europe and America's approach toward privacy is generally similar, here you'll compare…
The Internet of Things
Episode 19 of The Surveillance State
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they…
National Security and the First Amendment
Episode 23 of The Surveillance State
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about…
Under Observation - The Panopticon Effect
Episode 9 of The Surveillance State
What happens when we know we are under observation? Or when we know we are anonymous? The "observer effect" has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on…
Hacking, Espionage, and Surveillance
Episode 12 of The Surveillance State
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of…
Drones, Drones Everywhere
Episode 10 of The Surveillance State
Drones--unmanned aerial vehicles--are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of…
Your Personal Data Is the Product
Episode 18 of The Surveillance State
Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and…
Some Problems with Privacy
Episode 8 of The Surveillance State
Because our privacy laws are so far behind today's technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the…
Anonymity - Going off the Grid
Episode 20 of The Surveillance State
With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of…
Geolocation - Tracking You and Your Data
Episode 14 of The Surveillance State
You are where you go--at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given (such as a social media check-in) to the improperly acquired (such as…
Biometrics - Eyes, Fingers, Everything
Episode 11 of The Surveillance State
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this…
Code Breaking versus Code Making
Episode 21 of The Surveillance State
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption--including biometric finger scans to unlock phones and access data. But without a "back door" for government access, the intelligence community argues, national…