You updated your password.

Reset Password

Enter the email address you used to create your account. We will email you instructions on how to reset your password.

Forgot Your Email Address? Contact Us

Reset Your Password

SHOW
SHOW

The Surveillance State: Big Data, Freedom, and You

Confront the tough questions about who's out there watching us online-and how we can start watching our own backs.
The Surveillance State: Big Data, Freedom, and You is rated 4.6 out of 5 by 40.
  • y_2024, m_12, d_3, h_7
  • bvseo_bulk, prod_bvrr, vn_bulk_3.0.42
  • cp_1, bvpage1
  • co_hasreviews, tv_5, tr_35
  • loc_en_CA, sid_9363, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING)]
  • clientName_teachco
  • bvseo_sdk, p_sdk, 3.2.1
  • CLOUD, getAggregateRating, 16.37ms
  • REVIEWS, PRODUCT
Rated 5 out of 5 by from Interesting! I find the course interesting due to its exploration of different disciplines such as computing, policy, national security, media and many other. It is well thought series for that fact as not easy to connect all the dots in one course. On the other hand, course is big lengthier than I want it to be. But I think pluses trumped. I do recommend the course for enthusiasts of national security and related mattters
Date published: 2023-08-08
Rated 5 out of 5 by from Truth stranger than fiction Fascinating & scary facts about total loss of privacy
Date published: 2022-06-09
Rated 4 out of 5 by from interesting Professor clearly knowledgeable, engaging, mostly unbiased.
Date published: 2021-12-29
Rated 4 out of 5 by from An informed lecture on privacy and security This is a series of lectures on a very topic and relevant subject concerning the internet and how vulnerable we all are when we use it. The professor presents well-rounded lectures that cover many sides of the debate though sometimes he leaves the conclusions hanging. Despite that, I enjoyed these lectures and found myself informed after viewing them. I particularly admired how the professor incorporated many diverse references to back his points. Philosophers from history, the founding fathers as well as internet big shots all get equal air time and that added weight to his lectures. he also has a profound understanding of various laws and Supreme Court rulings and using them liberally to strengthen his points. I am a novice on this subject and found his professional and informed lectures easy to follow and relate to my own experiences.
Date published: 2021-09-20
Rated 5 out of 5 by from Excellent balance between big picture and details I work in the information economy but am always trying to learn more about digital surveillance and data management. This course was accessible to be as a novice but also included examples that information professionals may have missed in the news. I liked how he introduced theory and gave real world examples to cement the ideas.
Date published: 2021-06-30
Rated 5 out of 5 by from Eye-openinig I'm nearly finished with all the lectures in this course and have been enjoying them. The professor is very knowledgeable and presents the information clearly and concisely. Although I was already aware of some parts of the information presented, it was very enlightening to see it all tied together. I found the course to be informative, enlightening, and is making me much more aware of how our data is being tracked, stored, used. Well worth the time to watch these lectures and very thought-provoking.
Date published: 2020-06-10
Rated 5 out of 5 by from DETAILED WITHOUT BEING OVERLY TECHNICAL Even before the last election many Americans, like myself, suspected that the Surveillance State had gone rogue. This is the reason I purchased The Surveillance State: Big Data, Freedom, and You. There's certainly enough information in this course to get an idea of the power of the technology used by corporations and government to monitor us. Bill Binney, formerly of the NSA, has been warning us for years about the extent of the Agency's reach. It routinely monitors all our phone conversations, purchasing records, e-mails, travel habits, web searches, etc., The NSA, Binney estimate, has stored 20 TRILLION e-mail and phone transactions.. This metadata has given the government the ability to go back in time and archive the details of our lives and compile it all into personal profiles. Moreover, it can link us with all those with whom we've had contact and build a map of each our social networks.It is estimated there is 35 petabytes of data on us. Every MONTH there is as much data produced as was produced from the beginning of mankind on earth until the year 2000! Prof. Rosenzweig does an excellent job of laying out the surveillance landscape as it existed in 2016. He uses interesting legal cases sparingly. For instance, there was the case of Yates vs United States, revolving around Yates destruction of tangible objects--live fish he caught without a permit. I found it curious though that he describes the incident in Ferguson, MO "where police were reported to have killed unarmed African-Americans." He describes Noam Chomsky as "the well-known social justice advocate and libertarian." He describes the State Department hack into the passport file of Barrack Obama (aka Barry Hussein Soetoro) as "leaked for prurient, political reasons." I understand that as a distinguished professor at Georgetown, in Washington DC he must be cautious in expressing his political views. That is why I would be very curious to see an updated version of this course. Would Prof Rosenzweig be open-minded enough to confront the Deep State's egregious misuse of the surveillance technology entrusted to it? What would he say about the Mueller Report or the Flynn trial?
Date published: 2020-05-16
Rated 5 out of 5 by from ww1 it was still available on cd when i got it cds are the way to go
Date published: 2019-12-23
  • y_2024, m_12, d_3, h_7
  • bvseo_bulk, prod_bvrr, vn_bulk_3.0.42
  • cp_1, bvpage1
  • co_hasreviews, tv_5, tr_35
  • loc_en_CA, sid_9363, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING)]
  • clientName_teachco
  • bvseo_sdk, p_sdk, 3.2.1
  • CLOUD, getReviews, 3.75ms
  • REVIEWS, PRODUCT

Overview

Tackle the tough questions about surveillance and data in the 21st century with an esteemed legal expert and professorial lecturer, focusing on the crucial events that are happening around us right now.

About

Paul Rosenzweig

If you've learned anything in this course, I hope it is that cyberspace is remarkable and useful precisely because it is open and unstructured.

INSTITUTION

The George Washington University Law School

Paul Rosenzweig is a Professorial Lecturer in Law at The George Washington University Law School. He earned his JD from the University of Chicago Law School and then served as a law clerk to the Honorable R. Lanier Anderson III of the United States Court of Appeals for the Eleventh Circuit. He was chosen as the 15th annual Sommerfeld Lecturer at The Judge Advocate General’s Legal Center and School and was awarded a Carnegie Fellowship at Northwestern University’s Medill School of Journalism. In his nonacademic endeavors, Mr. Rosenzweig is a senior fellow at the R Street Institute, a public policy think tank in Washington DC. He is also the founder of Red Branch Consulting PLLC, a homeland security consulting company, as well as a senior advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the US Department of Homeland Security, and he is currently a distinguished visiting fellow at the Homeland Security Studies and Analysis Institute. He is also an advisor to the American Bar Association’s Standing Committee on Law and National Security and a contributing editor of the Lawfare blog. Mr. Rosenzweig is the author of Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World, coauthor of Winning the Long War: Lessons from the Cold War for Defeating Terrorism and Preserving Freedom, and coeditor of both National Security Law in the News: A Guide for Journalists, Scholars, and Policymakers and Whistleblowers, Leaks, and the Media: The First Amendment and National Security. Mr. Rosenzweig’s other Great Courses are Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare and The Surveillance State: Big Data, Freedom, and You.

By This Professor

Investigating American Presidents
854
The Surveillance State: Big Data, Freedom, and You
854
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
854
The Surveillance State: Big Data, Freedom, and You

Trailer

Security, Liberty, or Neither?

01: Security, Liberty, or Neither?

Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security-as illustrated by a dramatic face-off over John Ashcroft's hospital bed....

33 min
The Charlie Hebdo Tragedy

02: The Charlie Hebdo Tragedy

In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance-physical, electronic and data-and see how each type works. Case studies of the Osama Bin Laden raid and U.S. airport screening show the tension between security and tran...

29 min
East Germany's Stasi State

03: East Germany's Stasi State

Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy-keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and think about the lessons it can teach us today....

28 min
Surveillance in America

04: Surveillance in America

See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful measures in the 1970s....

31 min
Failing to Connect the Dots on 9/11

05: Failing to Connect the Dots on 9/11

After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall" between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after ...

33 min
The U.S. Spy Network in Action

06: The U.S. Spy Network in Action

Survey the U.S. intelligence community as a whole. Find out how it is structured, how it functions, and how it relates to the rest of the government. Review its methods of gathering and analyzing intelligence, including some of the key challenges in the process....

31 min
Big Data's Shadow

07: Big Data's Shadow

The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data-as well as the threat it poses to privacy an...

30 min
Some Problems with Privacy

08: Some Problems with Privacy

Because our privacy laws are so far behind today's technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other....

29 min
Under Observation: The Panopticon Effect

09: Under Observation: The Panopticon Effect

What happens when we know we are under observation? Or when we know we are anonymous? The "observer effect" has a significant psychological impact on someone being watched, whether it is a corporation under public scrutiny or someone chastised on social media. Consider the psychological implications of observation-on both the observed and the observer....

30 min
Drones, Drones Everywhere

10: Drones, Drones Everywhere

Drones-unmanned aerial vehicles-are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?...

29 min
Biometrics: Eyes, Fingers, Everything

11: Biometrics: Eyes, Fingers, Everything

Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this technology, you'll also see the darker side of this data unleashed in the world....

30 min
Hacking, Espionage, and Surveillance

12: Hacking, Espionage, and Surveillance

Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses....

29 min
Local Police on the Cyber Beat

13: Local Police on the Cyber Beat

For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together....

30 min
Geolocation: Tracking You and Your Data

14: Geolocation: Tracking You and Your Data

You are where you go-at least according to advertisers, divorce attorneys, and criminal investigators. Take a look at how geolocation data is gathered, ranging from the voluntarily given (such as a social media check-in) to the improperly acquired (such as cell phone spying). Then see what investigators can do with such data....

31 min
Internet Surveillance

15: Internet Surveillance

Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue....

30 min
Metadata: Legal or Not

16: Metadata: Legal or Not

Dig deeper into the government's electronic surveillance programs. Here, you'll learn about "metadata"-or data about data. After reviewing what metadata is and how it works, you'll examine the thorny legal issues surrounding metadata gathering in the years after 9/11, and whether collecting it violates the 4th Amendment protection against search and seizure....

30 min
Technology Outruns the Law

17: Technology Outruns the Law

Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you'll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our smart phones....

31 min
Your Personal Data Is the Product

18: Your Personal Data Is the Product

Surveillance dilemmas also play a significant role in the commercial world, where private companies have amassed incredible amounts of data about us. Step into the intriguing world of commercial data aggregation and predictive analytics, and explore the complicated legal and ethical questions surrounding the commercial collection and use of data....

30 min
The Internet of Things

19: The Internet of Things

Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?...

29 min
Anonymity: Going off the Grid

20: Anonymity: Going off the Grid

With the pervasiveness of government and corporate surveillance, some people feel the urge to go off the grid. This lecture explores the benefits and challenges of anonymity for individuals and for society, delving into issues such as the freedom of political speech and the privacy of personal searches and communication. Take a look at two tools people use in pursuit of Internet anonymity: TOR net...

31 min
Code Breaking versus Code Making

21: Code Breaking versus Code Making

As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption-including biometric finger scans to unlock phones and access data. But without a "back door" for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective....

31 min
Europe's Right to Be Forgotten

22: Europe's Right to Be Forgotten

Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten" principle. Although Europe and America's approach toward privacy is generally similar, here you'll compare the legal state of data collection in both the public and private realms to find out where the differences lie....

31 min
National Security and the First Amendment

23: National Security and the First Amendment

The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it....

32 min
The Privacy Debate Needs You

24: The Privacy Debate Needs You

Look toward the future and examine the possibilities of quantum computing, human-computer interface, and artificial intelligence. These technological changes are going to require each of us to make decisions about privacy and security-for ourselves and for future generations. Recap what you've learned to determine your vision of the best way forward from here....

35 min