slides.org (Stationary) [Surveillance Cameras]: Break out notes

master
Mike Gerwitz 2017-03-05 15:06:48 -05:00
parent 22732b0e8e
commit 35ff64870e
1 changed files with 38 additions and 13 deletions

View File

@ -37,11 +37,11 @@
| *** Modem | | DRAFT | |
|------------------------------------+----------+---------+---------------|
| * Stationary [0/5] | 0:08 | RAW | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00:30 | RAW | fullframe |
| ** Surveillance Cameras [0/2] | 0:00 | RAW | |
| *** Unavoidable | | RAW | |
| *** Access to Data | 00:00:30 | RAW | |
| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading |
| *** Introduction | 00:00:30 | DRAFT | fullframe |
| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | |
| *** Unavoidable Surveillance | | DRAFT | |
| *** Access to Data | 00:00:30 | DRAFT | |
| ** Internet of Things [0/4] | 0:04 | RAW | |
| *** Wide Open | 00:00:30 | RAW | |
| *** Lack of Security | 00:01:30 | RAW | |
@ -107,7 +107,7 @@
| *** Status Quo | 00:02 | RAW | |
| *** Push Back | 00:01 | RAW | |
|------------------------------------+----------+---------+---------------|
| * Local Variabes | | | |
| * Local Variables | | | |
#+END
@ -372,23 +372,39 @@ So even with Replicant,
* RAW Stationary [0/5]
** RAW Introduction [0/1] :B_ignoreheading:
** DRAFT Introduction [0/1] :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** RAW Introduction :B_fullframe:
*** DRAFT Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
:END:
#+BEGIN_CENTER
Certain types of tracking are unavoidable.
#+END_CENTER
#+BEGIN_COMMENT
So let's say you have evaded that type of tracking.
Maybe you don't carry a phone.
Or maybe you've mitigated those threats in some way.
There's certain things that are nearly impossible to avoid.
#+END_COMMENT
** RAW Surveillance Cameras [0/2]
*** RAW Unavoidable
** DRAFT Surveillance Cameras [0/2]
*** DRAFT Unavoidable Surveillance
- Security cameras are everywhere
- Homes
- Private businesses
- Traffic cameras
- Streets
- ...
#+BEGIN_COMMENT
On the way here,
you likely walked by numerous security cameras.
They could be security cameras for private businesses.
@ -399,18 +415,27 @@ Let's set aside local, state, and federal-owned cameras for a moment
and focus on businesses.
So a bunch of separate businesses have you on camera.
So what?
#+END_COMMENT
*** RAW Access to Data
*** DRAFT Access to Data
:PROPERTIES:
:DURATION: 00:00:30
:END:
- <1> Data can be subpoenaed or obtained with a warrant
- <1> If law enforcement wants to track you, they can
- <2> If you own a surveillance system, be responsible and considerate
- <2> Best way to restrict data is to avoid collecting it to begin with
#+BEGIN_COMMENT
Well one of the most obvious threats, should it pertain to you, is a
subpoena.
The best form of privacy is to avoid having the data be collected to begin
with.
If law enforcement wanted to track you for whatever reason---crime or
not!---they could simply subpoena the surrounding area.
The best form of privacy is to avoid having the data be collected to begin
with.
#+END_COMMENT
** RAW Internet of Things [0/4]
*** RAW Wide Open