SlideShare a Scribd company logo
1 of 8
PROJECT EAGLE EYE
THE FILM
• GIVES VIEWERS FALSE EXAMPLES
ON GOVERNMENT MONITORING
• FAILS TO ADDRESS WHY THEY
HAVE THE POWER TO MONITOR US
Adonis Castro
Cast
Summary
 Jerry gets a phone call from a mysterious voice who
turns out to be the governments project (Eagle Eye)
 The voice uses different kinds of technologies to
follow him and guide him to the pentagon.
Unreal Examples of Technology
Shown in Eagle Eye
 Use of electric towers to eliminate targets
 “Eagle Eye” project that stores our personality,
emails and calls
 Hack and take control of your vehicle
What allows
the
government
access to such
invasion of
privacy?
NSA
 Stands for: National Security Agency
 Implemented by G.W.B after September 11th
 Originally to monitor people connected with Al
Qaeda without a warrant
What technology/ways does
the NSA allow the government to monitor us ?
 Access to cellphone companies call-detail records
including:
1. Names
2. Addresses
3. Who call was made to
 Surveillance equipment that sends duplicates of every email
directly to the government
Works Cited
 Eagle Eye. Dir. D. J. Caruso. Prod. Alex Kurtzman, Roberto Orci,
and Patrick Timothy Crowley. By John Glenn, Travis Adam Wright,
Hillary Seitz, and Daniel McDermott. Perf. Shia LaBeouf, Michelle
Monaghan, and Rosario Dawson. DreamWorks SKG, 2008. DVD.
 EFF. "How the NSA's Domestic Spying Program Works | Electronic
Frontier Foundation."Electronic Frontier Foundation. Electronic
Frontier Foundation, n.d. Web.10 July 2013.
 Hamilton, Colby. "FBI: NSA Surveillance Helped Stop 2 NYC Terror
Plots." WNYC News. WNYC News, 18 June 2013. Web. 10 July
2013.
 Schwarzbaum, Lisa. "Eagle Eye (2008)." EW.com. The Washington
Post, 03 Oct. 2008. Web. 10 July 2013.

More Related Content

What's hot

Who's watching you
Who's watching youWho's watching you
Who's watching youTrent Morrow
 
Speakout UpperIntermediate Unit 2 day 1
Speakout UpperIntermediate Unit 2 day 1Speakout UpperIntermediate Unit 2 day 1
Speakout UpperIntermediate Unit 2 day 1sasknic
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityArturo Filastò
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyFrances Coronel
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011Andris Soroka
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of PrivacyFrederick Lane
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsAnwar Mohamed
 
Android Insights
Android InsightsAndroid Insights
Android InsightsFeroz Khan
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony HackZayed Iqbal Abir
 
Smart phones joshua
Smart phones joshuaSmart phones joshua
Smart phones joshuaruppel123
 
Introduction To Android - PPT
Introduction To Android - PPTIntroduction To Android - PPT
Introduction To Android - PPTVamsiNareshIT
 
Presentation telephone, waired and wireless communication
Presentation telephone, waired and wireless communicationPresentation telephone, waired and wireless communication
Presentation telephone, waired and wireless communicationabhishek rane
 

What's hot (18)

Who's watching you
Who's watching youWho's watching you
Who's watching you
 
Speakout UpperIntermediate Unit 2 day 1
Speakout UpperIntermediate Unit 2 day 1Speakout UpperIntermediate Unit 2 day 1
Speakout UpperIntermediate Unit 2 day 1
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
Smart phones
Smart phonesSmart phones
Smart phones
 
Polinter11
Polinter11Polinter11
Polinter11
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
 
Web security
Web securityWeb security
Web security
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of Privacy
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTs
 
Android Insights
Android InsightsAndroid Insights
Android Insights
 
Polinter11
Polinter11Polinter11
Polinter11
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
Smart phones joshua
Smart phones joshuaSmart phones joshua
Smart phones joshua
 
Introduction To Android - PPT
Introduction To Android - PPTIntroduction To Android - PPT
Introduction To Android - PPT
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Presentation telephone, waired and wireless communication
Presentation telephone, waired and wireless communicationPresentation telephone, waired and wireless communication
Presentation telephone, waired and wireless communication
 

Viewers also liked

The White Legacy--Generation 3, Chapter 5
The White Legacy--Generation 3, Chapter 5The White Legacy--Generation 3, Chapter 5
The White Legacy--Generation 3, Chapter 5Keika20
 
The White Legacy--Epilogue
The White Legacy--EpilogueThe White Legacy--Epilogue
The White Legacy--EpilogueKeika20
 
The White Legacy--Generation 8, Chapter 4
The White Legacy--Generation 8, Chapter 4The White Legacy--Generation 8, Chapter 4
The White Legacy--Generation 8, Chapter 4Keika20
 
The White Legacy--Generation 7, Chapter 1
The White Legacy--Generation 7, Chapter 1The White Legacy--Generation 7, Chapter 1
The White Legacy--Generation 7, Chapter 1Keika20
 
Fungsi kelompok 4 (xi mia 4)
Fungsi kelompok 4 (xi mia 4)Fungsi kelompok 4 (xi mia 4)
Fungsi kelompok 4 (xi mia 4)Dinna
 
The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)Keika20
 
The White Legacy--Generation 2, Chapter 1
The White Legacy--Generation 2, Chapter 1The White Legacy--Generation 2, Chapter 1
The White Legacy--Generation 2, Chapter 1Keika20
 
India60 1208234136299477-9
India60 1208234136299477-9India60 1208234136299477-9
India60 1208234136299477-9Anand Reddy
 
The White Legacy--Generation 2, Chapter 4
The White Legacy--Generation 2, Chapter 4The White Legacy--Generation 2, Chapter 4
The White Legacy--Generation 2, Chapter 4Keika20
 
The White Legacy--The Great Recap
The White Legacy--The Great RecapThe White Legacy--The Great Recap
The White Legacy--The Great RecapKeika20
 
A Halloween Special
A Halloween SpecialA Halloween Special
A Halloween SpecialKeika20
 
The White Legacy: Vis's Bachelor Challenge, Day 5
The White Legacy: Vis's Bachelor Challenge, Day 5The White Legacy: Vis's Bachelor Challenge, Day 5
The White Legacy: Vis's Bachelor Challenge, Day 5Keika20
 
The White Legacy--Generation 6, Chapter 4
The White Legacy--Generation 6, Chapter 4The White Legacy--Generation 6, Chapter 4
The White Legacy--Generation 6, Chapter 4Keika20
 
The White Legacy--Generation 3, College (Part 2)
The White Legacy--Generation 3, College (Part 2)The White Legacy--Generation 3, College (Part 2)
The White Legacy--Generation 3, College (Part 2)Keika20
 
The White Legacy--Generation 3, Chapter 4
The White Legacy--Generation 3, Chapter 4The White Legacy--Generation 3, Chapter 4
The White Legacy--Generation 3, Chapter 4Keika20
 
The White Legacy--Generation 8, College (Part 1)
The White Legacy--Generation 8, College (Part 1)The White Legacy--Generation 8, College (Part 1)
The White Legacy--Generation 8, College (Part 1)Keika20
 
Wynter Wonderland: Chapter 7
Wynter Wonderland: Chapter 7Wynter Wonderland: Chapter 7
Wynter Wonderland: Chapter 7Keika20
 
The White Legacy--Generation 3, Chapter 3
The White Legacy--Generation 3, Chapter 3The White Legacy--Generation 3, Chapter 3
The White Legacy--Generation 3, Chapter 3Keika20
 
The White Legacy--Generation 3, Chapter 1
The White Legacy--Generation 3, Chapter 1The White Legacy--Generation 3, Chapter 1
The White Legacy--Generation 3, Chapter 1Keika20
 

Viewers also liked (20)

The White Legacy--Generation 3, Chapter 5
The White Legacy--Generation 3, Chapter 5The White Legacy--Generation 3, Chapter 5
The White Legacy--Generation 3, Chapter 5
 
The White Legacy--Epilogue
The White Legacy--EpilogueThe White Legacy--Epilogue
The White Legacy--Epilogue
 
The White Legacy--Generation 8, Chapter 4
The White Legacy--Generation 8, Chapter 4The White Legacy--Generation 8, Chapter 4
The White Legacy--Generation 8, Chapter 4
 
The White Legacy--Generation 7, Chapter 1
The White Legacy--Generation 7, Chapter 1The White Legacy--Generation 7, Chapter 1
The White Legacy--Generation 7, Chapter 1
 
Ravikumar birthday ppt
Ravikumar birthday pptRavikumar birthday ppt
Ravikumar birthday ppt
 
Fungsi kelompok 4 (xi mia 4)
Fungsi kelompok 4 (xi mia 4)Fungsi kelompok 4 (xi mia 4)
Fungsi kelompok 4 (xi mia 4)
 
The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)
 
The White Legacy--Generation 2, Chapter 1
The White Legacy--Generation 2, Chapter 1The White Legacy--Generation 2, Chapter 1
The White Legacy--Generation 2, Chapter 1
 
India60 1208234136299477-9
India60 1208234136299477-9India60 1208234136299477-9
India60 1208234136299477-9
 
The White Legacy--Generation 2, Chapter 4
The White Legacy--Generation 2, Chapter 4The White Legacy--Generation 2, Chapter 4
The White Legacy--Generation 2, Chapter 4
 
The White Legacy--The Great Recap
The White Legacy--The Great RecapThe White Legacy--The Great Recap
The White Legacy--The Great Recap
 
A Halloween Special
A Halloween SpecialA Halloween Special
A Halloween Special
 
The White Legacy: Vis's Bachelor Challenge, Day 5
The White Legacy: Vis's Bachelor Challenge, Day 5The White Legacy: Vis's Bachelor Challenge, Day 5
The White Legacy: Vis's Bachelor Challenge, Day 5
 
The White Legacy--Generation 6, Chapter 4
The White Legacy--Generation 6, Chapter 4The White Legacy--Generation 6, Chapter 4
The White Legacy--Generation 6, Chapter 4
 
The White Legacy--Generation 3, College (Part 2)
The White Legacy--Generation 3, College (Part 2)The White Legacy--Generation 3, College (Part 2)
The White Legacy--Generation 3, College (Part 2)
 
The White Legacy--Generation 3, Chapter 4
The White Legacy--Generation 3, Chapter 4The White Legacy--Generation 3, Chapter 4
The White Legacy--Generation 3, Chapter 4
 
The White Legacy--Generation 8, College (Part 1)
The White Legacy--Generation 8, College (Part 1)The White Legacy--Generation 8, College (Part 1)
The White Legacy--Generation 8, College (Part 1)
 
Wynter Wonderland: Chapter 7
Wynter Wonderland: Chapter 7Wynter Wonderland: Chapter 7
Wynter Wonderland: Chapter 7
 
The White Legacy--Generation 3, Chapter 3
The White Legacy--Generation 3, Chapter 3The White Legacy--Generation 3, Chapter 3
The White Legacy--Generation 3, Chapter 3
 
The White Legacy--Generation 3, Chapter 1
The White Legacy--Generation 3, Chapter 1The White Legacy--Generation 3, Chapter 1
The White Legacy--Generation 3, Chapter 1
 

Similar to Adonis castro seek r.p power point

Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisMichael Holt
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesMichael Holt
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 

Similar to Adonis castro seek r.p power point (7)

Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysis
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Recently uploaded

VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 

Recently uploaded (20)

VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 

Adonis castro seek r.p power point

  • 1. PROJECT EAGLE EYE THE FILM • GIVES VIEWERS FALSE EXAMPLES ON GOVERNMENT MONITORING • FAILS TO ADDRESS WHY THEY HAVE THE POWER TO MONITOR US Adonis Castro
  • 3. Summary  Jerry gets a phone call from a mysterious voice who turns out to be the governments project (Eagle Eye)  The voice uses different kinds of technologies to follow him and guide him to the pentagon.
  • 4. Unreal Examples of Technology Shown in Eagle Eye  Use of electric towers to eliminate targets  “Eagle Eye” project that stores our personality, emails and calls  Hack and take control of your vehicle
  • 5. What allows the government access to such invasion of privacy?
  • 6. NSA  Stands for: National Security Agency  Implemented by G.W.B after September 11th  Originally to monitor people connected with Al Qaeda without a warrant
  • 7. What technology/ways does the NSA allow the government to monitor us ?  Access to cellphone companies call-detail records including: 1. Names 2. Addresses 3. Who call was made to  Surveillance equipment that sends duplicates of every email directly to the government
  • 8. Works Cited  Eagle Eye. Dir. D. J. Caruso. Prod. Alex Kurtzman, Roberto Orci, and Patrick Timothy Crowley. By John Glenn, Travis Adam Wright, Hillary Seitz, and Daniel McDermott. Perf. Shia LaBeouf, Michelle Monaghan, and Rosario Dawson. DreamWorks SKG, 2008. DVD.  EFF. "How the NSA's Domestic Spying Program Works | Electronic Frontier Foundation."Electronic Frontier Foundation. Electronic Frontier Foundation, n.d. Web.10 July 2013.  Hamilton, Colby. "FBI: NSA Surveillance Helped Stop 2 NYC Terror Plots." WNYC News. WNYC News, 18 June 2013. Web. 10 July 2013.  Schwarzbaum, Lisa. "Eagle Eye (2008)." EW.com. The Washington Post, 03 Oct. 2008. Web. 10 July 2013.