Christian Fuchs, Daniel Trottier,
... surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are ...
Tópico(s): Crime, Deviance, and Social Control
2017 - Emerald Publishing Limited | Journal of Information Communication and Ethics in Society
... program, and the Internet surveillance programs PRISM and XKeyscore are only the latest iterations of the “big ...
Tópico(s): European Criminal Justice and Data Protection
2013 - RELX Group (Netherlands) | SSRN Electronic Journal
Tópico(s): Biosimilars and Bioanalytical Methods
2013 - Carl Heymanns Verlag | Monatsschrift für Kriminologie und Strafrechtsreform
... form of the National Security Agency's (NSA) XKeyscore will be explained. Various applications of the metadata generated by XKeyscore, and similar programs will be discussed using leaked ... the National Security Agency's (NSA) so called XKeyscore. This program is essentially a metadata generator that ... slides that showcases the type of information that XKeyscore extracts and indexes. It is apparent from the ... are among the items extracted and indexed by XKeyscore (Greenwald, 2013). Web files such as word documents ...
Tópico(s): Literature, Language, and Rhetoric Studies
2014 - University of Idaho Library | Library philosophy and practice