SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Privacy in the age of anti-terrorism Dr Ian Brown FRSA FBCS CITP Department of Computer Science, UCL
Human rights in 21 st  century ,[object Object],[object Object]
European Convention for the protection of human rights and fundamental freedoms ,[object Object],[object Object],[object Object]
Privacy ever-more fundamental in the information age ,[object Object],[object Object],[object Object]
Is the Internet a super-private haven for criminals and terrorists? ,[object Object],[object Object],[object Object],[object Object],“ We steal secrets with espionage, with communications, with reconnaissance satellites”  – James Woolsey Duncan Campbell
Narus ST-6400 Installed by AT&T in San Francisco, Seattle, San Jose, Los Angeles and San Diego trunk facilities: can monitor OC-192 link in real-time
Privacy vs. security ,[object Object],[object Object],[object Object]
Efficacy of domestic surveillance ,[object Object],[object Object]
Schengen, Hague, Prum and privacy ,[object Object],[object Object]
Data retention ,[object Object],[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
mmicka
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News Saga
Sharala Axryd
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
andreteh3214474
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 

Was ist angesagt? (14)

An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Initiative (ISI) by Mr. Ljubomir Trajkovski, Trajkovski ...
Information Security Initiative (ISI) by Mr. Ljubomir Trajkovski, Trajkovski ...Information Security Initiative (ISI) by Mr. Ljubomir Trajkovski, Trajkovski ...
Information Security Initiative (ISI) by Mr. Ljubomir Trajkovski, Trajkovski ...
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News Saga
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Cyber Security Laws
Cyber Security LawsCyber Security Laws
Cyber Security Laws
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 

Andere mochten auch

Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012
Joshua McKenty
 
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
theafro
 
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
TEK & LAW, LLP
 

Andere mochten auch (20)

Web brother is watching you
Web brother is watching youWeb brother is watching you
Web brother is watching you
 
Privacy On Media: Social Media
Privacy On Media: Social Media Privacy On Media: Social Media
Privacy On Media: Social Media
 
Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012
 
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
ê°œìžì •ëłŽ 위탁ìȘ늏 ì€€ìˆ˜ì‚Źí•­ ê”ìœĄìžëŁŒ (Web)
 
La Puce.
La Puce.La Puce.
La Puce.
 
The other world of it
The other world of itThe other world of it
The other world of it
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
[Tek] ciso cpo우 ᄀᅔᄋᅄᆞᄂᅹ 엾할ᄀá…Ș ᄎᅹᆚᄋᅔᆷ을 위헌 ᄌᅊᄋᅄᆫ tek
 
Future Success: TedX Beausoleil Gerd Leonhard Futurist Speaker
Future Success: TedX Beausoleil Gerd Leonhard Futurist SpeakerFuture Success: TedX Beausoleil Gerd Leonhard Futurist Speaker
Future Success: TedX Beausoleil Gerd Leonhard Futurist Speaker
 
BMF2012: Rebooting Media: From Ego to Eco (Futurist Keynote Speaker Gerd Leon...
BMF2012: Rebooting Media: From Ego to Eco (Futurist Keynote Speaker Gerd Leon...BMF2012: Rebooting Media: From Ego to Eco (Futurist Keynote Speaker Gerd Leon...
BMF2012: Rebooting Media: From Ego to Eco (Futurist Keynote Speaker Gerd Leon...
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
Work learning living in future Gerd Leonhard Futurist Speaker at LSG13 London
Work learning living in future Gerd Leonhard Futurist Speaker at LSG13 LondonWork learning living in future Gerd Leonhard Futurist Speaker at LSG13 London
Work learning living in future Gerd Leonhard Futurist Speaker at LSG13 London
 
The future of media: summary by Futurist Gerd Leonhard
The future of media: summary by Futurist Gerd LeonhardThe future of media: summary by Futurist Gerd Leonhard
The future of media: summary by Futurist Gerd Leonhard
 
The Psychology Of Security Bruce Schneier
The Psychology Of Security   Bruce SchneierThe Psychology Of Security   Bruce Schneier
The Psychology Of Security Bruce Schneier
 
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
 
The future of media and news monitoring (Futurist Speaker Gerd Leonhard at FI...
The future of media and news monitoring (Futurist Speaker Gerd Leonhard at FI...The future of media and news monitoring (Futurist Speaker Gerd Leonhard at FI...
The future of media and news monitoring (Futurist Speaker Gerd Leonhard at FI...
 
The future of marketing, advertising and the Internet: Futurist Speaker Gerd ...
The future of marketing, advertising and the Internet: Futurist Speaker Gerd ...The future of marketing, advertising and the Internet: Futurist Speaker Gerd ...
The future of marketing, advertising and the Internet: Futurist Speaker Gerd ...
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
The Future of Mobile (i.e. everything) Futurist Speaker Gerd Leonhard
The Future of Mobile (i.e. everything) Futurist Speaker Gerd LeonhardThe Future of Mobile (i.e. everything) Futurist Speaker Gerd Leonhard
The Future of Mobile (i.e. everything) Futurist Speaker Gerd Leonhard
 
Futurist Speaker Gerd Leonhard: Bottom Line Future Trends (summary)
Futurist Speaker Gerd Leonhard: Bottom Line Future Trends (summary)Futurist Speaker Gerd Leonhard: Bottom Line Future Trends (summary)
Futurist Speaker Gerd Leonhard: Bottom Line Future Trends (summary)
 

Ähnlich wie Privacy in the age of anti-terrorism

Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
guest62b6b81
 
Presentation democracy ethics vs. intelligencΔ security.
Presentation democracy ethics vs. intelligencΔ security.Presentation democracy ethics vs. intelligencΔ security.
Presentation democracy ethics vs. intelligencΔ security.
Nikolaos Georgitsopoulos
 

Ähnlich wie Privacy in the age of anti-terrorism (20)

Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr..."Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & others
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Human Rights And Internet Regulation
Human Rights And Internet RegulationHuman Rights And Internet Regulation
Human Rights And Internet Regulation
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometrics
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Presentation democracy ethics vs. intelligencΔ security.
Presentation democracy ethics vs. intelligencΔ security.Presentation democracy ethics vs. intelligencΔ security.
Presentation democracy ethics vs. intelligencΔ security.
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 

Mehr von blogzilla

Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 

Mehr von blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Regulating code
Regulating codeRegulating code
Regulating code
 

KĂŒrzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

KĂŒrzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Privacy in the age of anti-terrorism

  • 1. Privacy in the age of anti-terrorism Dr Ian Brown FRSA FBCS CITP Department of Computer Science, UCL
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Narus ST-6400 Installed by AT&T in San Francisco, Seattle, San Jose, Los Angeles and San Diego trunk facilities: can monitor OC-192 link in real-time
  • 7.
  • 8.
  • 9.
  • 10.