Edward Snowden An Introduction.

Slides:



Advertisements
Similar presentations
Criticisms of US “Democracy”
Advertisements

Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Cyber Security and the Global Business Environment Jeremy Schaar:)
INTERNET SAFETY.
Cyber bullying and internet safety Parents meeting: staying safe online.
What you don’t know CAN hurt you!
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Using internet and cell phones safely
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
OPSEC Countermeasures Michael Chesbro DES OPSEC Officer OPSEC Countermeasures Michael Chesbro DES OPSEC Officer.
Security+ Guide to Network Security Fundamentals
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
What Google Privacy issues?. Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Yahoo! For Teachers By Teachers, For Teachers. In July 2006 Yahoo! invited a group of educators to partner with them to build technology that addressed.
Anonymous Speech & Reading
Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Staying Safe Online Keep your Information Secure.
TODAY  Whistle Blowers  Espionage Act of 1917 (Schenk v. US)  The Pentagon Papers  WikiLeaks  Review for tomorrow’s exam  HOMEWORK:  Submit interview.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Elements of an Argument. What exactly is an argument? An argument involves the process of establishing a claim and then proving it with the use of logical.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Miriam’s Vision: A Response to the 2005 London Bombings Citizenship Different Needs, Common Ground Human Rights & Surveillance.
A PowerPoint Presentation by Helen Chelan Johnson.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
By Demi Gardiner 8P Who’s been on your computer??
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
The government has a right to spy on its citizens in order to better protect its citizens. This image is courtesy of healthinforwars.blogspot.com.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Computer Security By Duncan Hall.
Writing 1 and Writing 2—January 13, 2016 Journal #7: What do you think about ghosts or aliens or other supernatural occurrences? Do you believe in them?
INTRODUCTION & QUESTIONS.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
National Security Agency (NSA) Surveillance Christopher Boyd.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
EDWARD SNOWDEN IS HE A WORTHLESS HUMAN BEING OR AMERICAS HERO?
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Freedom Independence Transition
How Democratic is the USA?
Social Media as Instruments of Control and Consensus Making
Brendan Foody, Sharon O’Malley, Ryan McGrane
Quick notes on how to write an intro Write your intro!
Define the Problem Constant surveillance of citizens in our country
Quick notes on how to write an intro Write your intro!
Criticisms of US “Democracy”
Pre AP – 08/20/2018 Pick up a laptop
Presentation transcript:

Edward Snowden An Introduction

Quick Bio -American Computer Professional -Former System Administrator for CIA -Counterintelligence Trainer at DIA -Came to international attention after: -Leaking documents regarding programs of Government Surveillance on the public -Many of them run by NSA (National Security Agency) -Huge subject of controversy -Two Court Rulings split on the constitutionality of the NSA’s bulk collection of telephone recordings -Fled Country, now resides in an undisclosed location in Russia -Seen as a hero, traitor, dissident patriot

What did He Leak? -Exact size of Snowden’s disclosures is unknown. -Upwards of: -15,000+ Australian Intelligence Files -58,000 British Intelligence Files -Anywhere from 50,000-200,000 NSA intelligence files In July 2014, The Washington Post reported on a cache previously provided by Snowden from domestic NSA operations consisting of "roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts."

What He Found -First Program reveal: PRISM -Database Collection Effort Program -Collects stored Internet Communications from several Internet Companies -Google -Verizon Telecommunications -#1 Source of NSA’s raw intelligence used for analytic reports -Program founded in 2008 under “Protect America Act” -Allegations of hacking into “Civilian Infrastructures” -Universities, Hospitals, Private Businesses -Accesses to Skype, Facebook, Hotmail, Gmail, Telephone Calls

What He Found 2 -XKeyScore - ”Formerly” secret computer system -Several hundred databases, backend programs, used for surveillance of any kind of internet use. -XKeyScore “watches” and “listens” but leaves no trace of its workings on any user interface. Snowden on XKeyScore: "You could read anyone’s email in the world, anybody you’ve got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. I can track your real name, I can track associations with your friends and I can build what’s called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”

Other Discoveries By Snowden -NSA “harvest” of millions of email messages, text messages and contact lists compiled from millions of civilian Yahoo and Google Users -NSA “Black Budget” revealing over 16 spy agency programs that failed. -NSA giving over 52 billion dollars in grants to U.S. Private technology companies for use of their surveillance software. An NSA mission statement titled "SIGINT Strategy 2012-2016" affirmed that the NSA plans for continued expansion of surveillance activities. Their stated goal was to "dramatically increase mastery of the global network" and "acquire the capabilities to gather intelligence on anyone, anytime, anywhere.“ Leaked slides revealed in Greenwald's book No Place to Hide, released in May 2014, showed that the NSA's stated objective was to "Collect it All," "Process it All," "Exploit it All," "Partner it All," "Sniff it All" and "Know it All."[176]

So Why did He do It? Snowden gave up a very good job, even his asylum in the United States because of his information leaks. Here a couple quotes explaining why: -”I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building.” -"Even if you're not doing anything wrong, you're being watched and recorded. ...it's getting to the point where you don't have to have done anything wrong, you simply have to eventually fall under suspicion from somebody, even by a wrong call, and then they can use this system to go back in time and scrutinize every decision you've ever made, every friend you've ever discussed something with, and attack you on that basis, to sort of derive suspicion from an innocent life."

Some More Reasons… -”I don't see myself as a hero because what I'm doing is self-interested: I don't want to live in a world where there's no privacy and therefore no room for intellectual exploration and creativity.” - “To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.”

So What? It’s Not a Big Deal! His first answer called for a reform of government policies. Some people take the position that they “don’t have anything to hide,” but he argued that when you say that, “You’re inverting the model of responsibility for how rights work”: When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights”

The threat of snowden’s actions "What Snowden has stolen and exposed has gone way, way beyond his professed concerns with so-called domestic surveillance programs. As a result, we've lost critical foreign intelligence collection sources, including some shared with us by valued partners.“ –Clapper Snowden has caused "profound damage," Director of National Intelligence James Clapper said at a Senate committee hearing dedicated to the gravest threats facing the U.S. Snowden was said to put at risk the lives of countless U.S. spies, intelligence assets and troops in harm's way by the assembled U.S. officials. As a consequence, the nation is less safe and its people less secure al Qaeda terrorists "are going to school" with each classified document provided to journalists by Snowden. “But I think that potentially the greatest cost is unknown today, but we will likely face, is the cost in human lives in tomorrow's battlefield in someplace where we put our military forces in harm's way.” DIA Director Army Lt. Gen. Michael Flynn

Citizen Four Watch this… Pivotal moments of the documentary: https://www.youtube.com /watch?v=6yYYuBCfzh4

Some Questions: What do you think about these leaks? Do you believe Snowden? Do you consider Snowden a traitor or a hero? Should we be concerned about the covert surveillance of the government? Or is it there to protect us? How can we connect this to 1984?