Query Result Set
Skip Navigation Links
   ActiveUsers:1924Hits:18204135Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
PRISM (7) answer(s).
 
SrlItem
1
ID:   132383


After Snowden: rethinking the impact of surveillance / Bauman, Zygmunt; Bigo, Didier; Esteves, Paulo; Guild, Elspeth   Journal Article
Guild, Elspeth Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Current revelations about the secret US-NSA program, PRISM, have confirmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the United States' closest allies in Europe and Latin America. The transnational ramifications of surveillance call for a re-evaluation of contemporary world politics' practices. The debate cannot be limited to the United States versus the rest of the world or to surveillance versus privacy; much more is at stake. This collective article briefly describes the specificities of cyber mass surveillance, including its mix of the practices of intelligence services and those of private companies providing services around the world. It then investigates the impact of these practices on national security, diplomacy, human rights, democracy, subjectivity, and obedience.
        Export Export
2
ID:   126441


Domain safety: India seeks international cooperation in tackling cyber security / Makela, Dilip Kumar   Journal Article
Makela, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The stage for the cyber war has already been set, albeit secretly. In the last two months, the revelations made by the US' ex-Central Intelligence Agency employee, Edward Snowden, in various interviews to The Guardian newspaper, revealed that the US' intelligence organisation, National Security Agency (which had launched the top-secret PRISM programme) was snooping on personal data of individuals and governments in the US and across the world through the internet. He also revealed that the National Security Agency (NSA) intercepted a big chunk of sensitive information that belongs to India by spying on the embassies and their diplomatic missions. And perhaps the most daunting revelation was that the information sharing between the intelligence agencies of various countries, such as the US and the UK, is already underway.
        Export Export
3
ID:   101050


Idea of nationalism in the prism of Tagore / Dutta, Pratyay   Journal Article
Dutta, Pratyay Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Nationalism  Rabindranath Tagore  Tagore  Prism 
        Export Export
4
ID:   130989


Politics of privacy in the age of preemptive security: introduction / Goede, Marieke De   Journal Article
Goede, Marieke De Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In August 2013, a report was leaked to the Washington Post in which it was revealed that the US National Security Agency (NSA) violated its own privacy rules 2,776 times over a one-year period (Gellman 2013). The privacy violations documented in the report range from technical errors to serious violations such as operations without consent from the Foreign Intelligence and Surveillance (FISA) court and breach of the five-year data retention period. Other breaches are described as "broad syntax" errors, which are related to imprecise queries. This type of fault is presumed reducible "if analysts had more complete and consistent information available about … targets."1 Following the recent disclosures concerning the NSA's PRISM program, which has the capacity to search and connect numerous social network databases in the name of security, the importance of the publication of this privacy report cannot be overestimated. While much of the public discussion concerning PRISM has so far focused on the person of Edward Snowden and his unlikely journeys to Hong Kong and Russia, relatively few questions have been raised about the value and legitimacy of the PRISM program itself. The Washington Post revelations concerning the NSA privacy breaches have grabbed the headlines and may lead to Congressional Hearings (Blake 2013). As with other security and surveillance programs, privacy is a key anchor for critical questioning and public debate
        Export Export
5
ID:   097286


SAARC in the prism of the Himalayan states / Baneerjee, Amrita   Journal Article
Baneerjee, Amrita Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words SAARC  Bhutan  Nepal  Himalayan States  Prism 
        Export Export
6
ID:   130991


Security and the claim to privacy / Amoore, Louise   Journal Article
Amoore, Louise Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract When US President Barack Obama publicly addressed the data mining and analysis activities of the National Security Agency (NSA), he appealed to a familiar sense of the weighing of the countervailing forces of security and privacy. "The people at the NSA don't have an interest in doing anything other than making sure that where we can prevent a terrorist attack, where we can get information ahead of time, we can carry out that critical task," he stated. "Others may have different ideas," he suggested, about the balance between "the information we can get" and the "encroachments on privacy" that might be incurred (Obama 2013). In many ways, conventional calculations of security weigh the probability and likelihood of a future threat on the basis of information gathered on a distribution of events in the past. Obama's sense of a trading-off of security and privacy shares this sense of a calculation of the tolerance for the gathering of data on past events in order to prevent threats in the future. In fact, though, the very NSA programs he is addressing precisely confound the weighing of probable threat, and the conventions of security and privacy that adhere to strict probabilistic reasoning. The contemporary mining and analysis of data for security purposes invites novel forms of inferential reasoning such that even the least probable elements can be incorporated and acted upon. I have elsewhere described these elements of possible associations, links, and threats as "data derivatives" (Amoore 2011) that are decoupled from underlying values and do not meaningfully belong to an identifiable subject. The analysis of data derivatives for security poses significant difficulties for the idea of a data subject with a recognizable body of rights to privacy, to liberty, and to justice. Consider, for example, two years before the controversies surrounding NSA and the PRISM program, when the US Director of National Intelligence, James Clapper, testified before the joint hearing of committees on the virtues of the algorithmic piecing together of fragments of data:
        Export Export
7
ID:   106207


Terrorism: a view from the prism of international experience / Visal, UM   Journal Article
Visal, UM Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Terrorism  Israel  International terrorism  India  Sri Lanka  Human right 
Prism 
        Export Export