Fundamental Rights and Computing Flashcards

1
Q

What are the Four Broad Categories of Censorship

A

Speaker by a State, Listener by a State, Speaker by Private Actor, Listener by Private Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Speaker by a State

A

The Government doesn’t let its citizens say something (achieved through criminalization or technical means like filtering messages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Listener by a State

A

The Government doesn’t let its citizens hear something (achieved through legal or technical means)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Speaker by Private Actor

A

A person or company doesn’t let you say something (achieved through legal means)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Listener by Private Actor

A

A company doesn’t let you hear something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is Censorship justified

A

National Security
Territorial integrity or public safety
Prevention of disorder or crime
Protection of health or morals
Protection of the reputation of rights of others
Preventing the disclosure of information received in confidence
Maintaining the authority and impartiality of the judiciary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Broadcast media censored

A

Films have Age rating systems TV has watershed, Architectural approach is V-Chip to make you unlock adult TV shows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Communication channels and surveillance

A

Direct Speech
Intercepted by being within hearing or using a microphone

Written
Stolen by protected by features like cryptography

Telegraph
Had very low secrecy since human operated

Telephone
Intercepted through line tapping or operators

Mobile Phones (cell towers)
Difficult to do quickly

Internet
Vulnerable at the Internet Service Provider level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of interception of communication

A

Wire taps and reding post

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of interception of communication

A

Wire taps and reading post

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of use of communication data

A

Information about a communication, but not the content of that communication (phone number, subscriber details)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of Directed Surveillance

A

Following people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of covert human intelligence sources

A

Informers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is authorized for interception of communication of data

A

The charities commission
Environment agency
The council
Gambling commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is authorized for Directed Surveillance

A

Home office
Postal Services Commission
The council
Royal Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who is authorized for covert human intelligence sources

A

The armed forces
Ofcom
Office of fair trading
The council

17
Q

Define Metadata

A

“Data about data” e.g. about who you contact, how often, from where,

18
Q

What is Network Theory

A

A set of techniques for analysing graphs, applying network theory to a system means using a graph-theoretic representation which can make a problem much simpler