Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

English Project: Surveillance in 1984 Compared to the Present Day

Surveillance: Comparing the types and uses of surveillance in the novel 1984 with the types and uses of surveillance in modern society.
by

James Oliver

on 13 January 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of English Project: Surveillance in 1984 Compared to the Present Day

What is 1 constant held in all our lives? Surveillance... well, besides death and taxes of course. We live in an age where it
is laughable to say you're alone and where privacy cannot be purchased with a set of curtains.We are constantly being watched, tracked, listened to, investigated and scrutinized. Virtually our whole identities are public
information. Sure this open concept brings us
closer together, but how close is too close?
Where do we draw the line? Sadly, these
questions are too late in coming. For the
world of George Orwell's 1984 has become a
representation of ours.The line we
should have drawn has been
long since crossed.
BIG BROTHER IS WATCHING YOU
Our Modern 21st Century Society
Surveillance
We've all read 1984, well most of us... Whether you've read it or not we can all agree surveillance plays a key role in the novel. However, did you manage to discover all the surveillance mechanisms used by the party? The citizens of Oceania are constantly under a microscope; their lives being dissected to see if it agrees with the Party's 'ideal' society. Every aspect of their lives are under control and scrutiny. Big Brother even has the power to change your beliefs and your love, as we learned in the final pages of 1984. Winston transformed from a miserable party member to a novice member of the Brotherhood and finally to another brainwashed Big Brother lover and the surveillance devices at work documented every second.
Quotes From The Novel
“The telescreen received and transmitted simultaneously. Any sound Winston made, above the level of a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug into your wire whenever they wanted to.” – Pages 4-5, Nineteen Eighty-Four
“Thoughtcrime does not entail death: thoughtcrime IS death.” – Page 30, Nineteen Eighty-Four
“Privacy, he said, was a very valuable thing. Everyone wanted a place where they could be alone occasionally.” – Pages 144, Nineteen Eighty-Four
“The children, on the other hand, were systematically turned against their parents and taught to spy on them and report their deviations. The family had become in effect an extension of the Thought Police.” – Page 140, Nineteen Eighty-Four
Security Cameras and Audio Recording
Camera's play an integral role in keeping our society under surveillance. They're used to prevent criminal activity, cultivating piece of mind, apprehend criminals and notify police about suspicious behavior.
However, owners must post a notice and have them visible before entering the premises.Unused footage is to be destroyed between 24 hours-30 days.
Spydialer.com is a website which associates a number and a name with any missed call or voice mail, without the number holder knowing.
There are also many different audio and video recording devices that document time/ date/ location stamp the recordings
Advancements in technology have revolutionized the way we as a society communicate and function. The twentieth century gave rise to the internet, dozens of satellites, radio communications, GPS technology and countless other ways of capturing, documenting and recording our lives. All these technologies often are run, regulated, funded by the government. They're in possession of a vast network of surveillance, always knowing what you know, seeing what you see, hearing what you hear, and never leaving you completely alone. Comforting is it? Having a Big Brother to watch over you, protect you, and guide you. Big Brother? More like creepy uncle... We lay defenseless, helpless and paralyzed by the government's hand. Though still driven with a false sense of security, privacy and power. We are completely distracted by the very devices that stalk us, often ignorant we are the fuel to our own demise.
The Wonderful Internet
All information accessed through the internet is stored on countless hard drives in large information centers and distributed via broadband, satellite, and cellular connections. The first use was to exchange data between researchers.
Anything done on the internet can never be permanently deleted. Internet activity is stored as ‘cookie’ information on your computer. Your ‘cookies’ are also merged with a profile associated with your computer’s IP & MAC address, meaning your computer has an online identity which all the information you save – whether it be an address, password, website or name – is stored within.
Government agencies, as well as websites and corporations, are legally allowed to access this activity and analyze it to seek out key info. The Government searches for terrorism, crime and other potential threats. Websites and corporations search to ‘optimize your browsing experience’ and to improve their products using trends in the info they find.
Every time you “Accept to these terms and conditions,” you are allowing that source to any of the information it specified. It only requires a gender or age combined with an IP and MAC address to acquire your name and then all information about you that you have ever saved on the internet. You’re branded with a code, just as in 1984.
Privacy Settings and App Permissions
Internet Privacy Settings:
Site’s which you supply personal, private information for often have privacy settings. Facebook, twitter and other social networking sites have privacy settings. These limit who can view the information you publish on the site.
Privacy setting protects you from other users from acquiring your personal information. However, as said before, all your information can still be accessed with the given skill set. Again nothing you put online is private.
App and Website Permissions:
Apps, websites and programs often have terms of use and permissions agreement. To use the software you must accept the terms conditions and permissions. When you accept, the software is then allowed to use any of the information specified in permissions clause. The Facebook app is allowed to use the devices’ camera or microphone at any time and gather pictures and sounds off the device.
Google as well as other applications/search engines often automatically enable ‘location’ which gives the site or app where you are exactly in the world do give you better results, this can be disabled. If left enabled, your location will be broad casted with all the information you send and
receive, therefore being easily tracked.
Satellites and GPS
Global Positioning System:
The Global Positioning System relies on satellites emitting
signals, and a receiver (cellphones and other GPS ready devices) receiving signals. The receiver takes the signal from at least 3 of
the 27 satellites (more connections improve accuracy). The receiver calculates how long it takes the signal from each satellite to reach it and can therefore calculate the distance. Using trilateration it pinpoints the location of the receiver and cross-references it with a map of the earth, giving a set of coordinates.
GPS can be activated any time and can be used to track someone’s movements, as well as altitude and location.
Satellites:
Satellites are mounted with a variety of sensors. They have the ability to take high definition photos of the Earth’s surface and map the geography of the earth. This in combination with GPS technology can track you and take photos of you, where you are and what you’re doing.
Often referred to as ‘the eyes in the sky’ simply because they
can be watching you at any moment.
More Quotes

“In a place like this, the danger that there would be a hidden microphone was very small, and even if there was a microphone it would only pick up sounds.” – Page 141, Nineteen Eight-Four

“He took a twenty-five cent piece out of his pocket. There, too, in tiny lettering, the same slogans were inscribed, and on the other face of the coin the head of Big Brother. Even from the coin the eyes pursued you. On coins, on stamps, on the covers of books, on banners, on posters and on the wrapping of a cigarette packet – everywhere. Always the eyes watching you and the voice enveloping you. Asleep or awake, working or eating, indoors or out of doors, in the bath or in bed – no escape. Nothing was your own except the few cubic centimetres inside your skull.” – Page 29, Nineteen Eighty-Four
The Unpredictable Path to the Future of Surveillance
What’s to come of this already uncontrollable lack of privacy? Will society reach a point where not only everyone’s actions, but everyone's thoughts are watched, listened to and controlled? Already surveillance systems are practically able to think for themselves, not yet in the same way that a human can but technology is getting close. Who’s to say that in a few years surveillance systems won't be capable of such things? There will be no more need for body guards, or security guards, only microphones and cameras. The majority of time that you’re being watched, you may not even know it. Technology has come to a point in which small insect-like 'cyborgs' are the very near future of surveillance. Hard to spot and control, they will watch your every move. If you believe that your life is already on enough of a display, just wait, who knows what the future might hold.
War is Peace
Freedom is Slavery
Ignorance is Strength

Work Cited
http://www.activistpost.com/2013/02/biometrics-is-future-of-surveillance.html
http://www.technologyspectator.com.au/sneak-peek-future-surveillance
http://www.networkworld.com/community/blog/future-drone-surveillance-swarms-cyborg-insect-drones
http://www.bookrags.com/notes/1984/TOP4.html
http://pactlab-dev.spcomm.uiuc.edu/drupal/2009cmn280s/node/3922
http://en.wikipedia.org/wiki/Internet_privacy
http://en.wikipedia.org/wiki/Computer_surveillance
http://www.sciencedaily.com/releases/2000/09/000904125555.htm
http://electronics.howstuffworks.com/gadgets/travel/gps.htm/printable
http://www.theweathernetwork.com/traffic_cameras/
http://blog.trapster.com/2011/02/18/the-difference-between-red-light-cameras-traffic-cameras/
http://www.popularmechanics.com/cars/news/industry/2420766
en.wikipedia.org/wiki/Ankle_monitor
http://www.popularmechanics.com/technology/how-to/computer-security/future-of-surveillance-cameras http://www.activistpost.com/2013/02/biometrics-is-future-of-surveillance.html http://www.technologyspectator.com.au/sneak-peek-future-surveillance
Types of Surveillance in 1984
Telescreens – At work, at home, in public buildings or areas. They see and hear everything, and are the main source of surveillance.
Microphones – Hidden in trees or other places in the country, voices can then be traced back.
Thought Crimes – Thought Police catch anyone suspected of thought crime. They watch through telescreens, and use children as spies, to listen in and eventually betray their parents or others.
Community Involvement – Every member of Oceania is expected to attend community events and gatherings, and attendance is closely monitored. If you are absent for quite a few, it becomes very suspicious.
Party Members in Prole Areas – If other party members see you in the prole area, you are yet again under suspicion.
George Orwell's 1984
Anklets, Highway Traffic Cameras, Double Sided Mirrors.
Double Sided Mirrors:
Most of us know them from shows like CSI and Criminals Minds, window on the investigator’s side, and mirror on the suspect’s side.
They are used in public places such as stores, showrooms, warehouses, offices, daycares, and banks.
Can also be used in public washrooms, change rooms or other ‘private’ public locations.It is light that makes the ‘mirror’ appear to be a real mirror – it is darkness that makes it see through.
The only way to see through the mirror is if the viewing side is darker than the other side, ideally there should be no light on the viewing side.
Highway Cameras:
Located next to highways or intersections in specific locations across a province or city.
Can be accessed by anyone via internet, in either video or still-photo form.
Meant to allow drivers to check road and weather conditions before heading out, and for monitoring centers to report collisions.
There are also Red Light Cameras, which take pictures of license plates (and often the drivers), in order to issue tickets for speeding, running red lights or other infractions.
They are meant to encourage safer driving, but in many places rear-end collisions have increased. This is because river’s are afraid of getting a ticket, and slam on their brakes.
Both are controversial, as many question their breach of privacy.
Ankle Monitors:
People on house arrest or parole are usually required to wear these, as a tracking device.
They are tamper-resistant, meaning they cannot be removed, and they can withstand every day activity including showering.
They send radio frequency signals at timed intervals to a receiver.
If the individual moves outside of their allowed range or location, police are notified.
By: Brooke Giles, Cassidy Knights,
Kristy Karsch, James Oliver
What Does Technology Have in Store?
Insect drones:
Tiny insect-like surveillance systems, able to watch and listen in to conversations much more discreetly than the cameras of today.
Some of the ones built today have a wingspan of 3 millimeters.
Currently used for military purposes
AWARE (The Automated Warning and Response Engine):
Already there are systems in which cameras can think for themselves.
Surveillance systems are able to detect any sort of trouble and report it.
With illegally parked cars, AWARE is capable of zooming in on license plates without human involvement.
Improvements on this system, and systems similar to it are soon to come.
Cellphones:
Every text sent and received can be tracked.
Your current location can be pinpointed.
Police can hack into your phone's microphone to listen in on conversations.
Sooner or later your every move may be watched through the little camera on your phone.
Full transcript