We Live in Public
The Changing Role of Privacy and Technology in Daily Life

We Live in Public - The Changing Role of Privacy and Technology in Daily Life
Show More

Comments (3)

Anonymous picture
Kate

One of my all time favorite docs. So interesting to see where he got his tech predictions right and wrong.

Anonymous picture
Alyssa

What a narcissist.

Anonymous picture
Jessica

Didn't enjoy this at all

Related videos

Frontline: The Facebook Dilemma
PBS
The promise of Facebook was to create a more open and connected world. But from the company's failure to protect millions of users' data, to the proliferation of "fake news" and disinformation, mounting crises have raised the question: Is Facebook more harmful than helpful? This documentary investigates a series of…
Technology Outruns the Law
Episode 17 of The Surveillance State
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you'll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our…
Internet Surveillance
Episode 15 of The Surveillance State
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of…
The Internet of Things
Episode 19 of The Surveillance State
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used?…
Pre-Crime - Investigating Predictive Crime Algorithms
Science fiction turns into disturbing fact as forecasting softwares, algorithms and databases quickly become the new fortune-tellers for future crimes, driving us to ask: how much are we willing to abandon for the sake of security? Official Selection at the Hot Docs Canadian International Documentary Festival.
Security, Liberty, or Neither?
Episode 1 of The Surveillance State
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security--as illustrated by a dramatic face-off…
The Charlie Hebdo Tragedy
Episode 2 of The Surveillance State
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance--physical, electronic and data--and see how each type works. Case studies of the…
East Germany’s Stasi State
Episode 3 of The Surveillance State
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy--keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and…
Surveillance in America
Episode 4 of The Surveillance State
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful…
Failing to Connect the Dots on 9/11
Episode 5 of The Surveillance State
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall" between intelligence gathering and criminal investigations. Review the reasons for…
The U.S. Spy Network in Action
Episode 6 of The Surveillance State
Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key challenges in the process.
Big Data’s Shadow
Episode 7 of The Surveillance State
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent…