National Security Agency (NSA) Email Surveillance Christopher Boyd.

Slides:



Advertisements
Similar presentations
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Advertisements

Controlling. Copyright © 2005 Prentice Hall, Inc. All rights reserved. 18–2 L E A R N I N G O U T L I N E Follow this Learning Outline as you read and.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
Cyber-SecurityCyber-Security Your Privacy and the NSA.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Privacy & Personal Information -- Why do we care or do we?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Introduction to Computers and the Internet. What is a computer? An "intelligent" machine  You tell a person to do a job and the person follows your “instruction”
Duties and Responsibilities of U.S. Citizens Legal Duties These are actions a citizen MUST do to stay within the law.
 An electronic device that processes data and converts it into information that people can use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Chapter 18 - The Fourth Amendment and National Security.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name)
United States Department of Defense
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Chapter 15, Stephen P. Robbins, Mary Coulter, and Nancy Langton, Management, Ninth Canadian Edition Copyright © 2009 Pearson Education Canada Contemporary.
George Barna American Culture & Faith Institute November 7, 2013.
Civil Liberties Challenges
Representing the People Section 3. Key Terms Franking Privilege: The right of senators and representatives to send job-related mail without paying postage.
Jeopardy: Digital Citizenship Please use presentation mode!
What is Civics Chapter 1, Section 1. It is the study of the rights and duties of citizens This idea dates back more than 2500 years to ancient Greece.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Chapter 19 - Congressional Authority for National Security Surveillance Part II.
1 Surveillance and privacy in the Snowden era Nicky Hager 30 January 2014.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley.
PATRIOT Act Timeline of Key Recent Federal Actions on the PATRIOT Act
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Domestic Surveillance By: Joshua Hedden. What is Domestic Surveillance? A legal investigative process entailing a close observing or listening to a person.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Teachers must identify the site in order to let the students use it.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
OPSEC for Families. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know.
ABUSE OF POWER BY OUR GOVERNMENT By Vinay Mathur.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
The Ethical Use of Data by Government Agencies By Sean Pugh.
NSA Data Collection BY KEVIN WATSON. NSA Data Collection  Most of the concern involves the data collection program PRISM  Started in 2007  Is the.
Moral Responsibility and Protecting the Nation: Security vs. Individual Rights Ingrida Barker, Sonja Cantrell, Lee Ann Porter, and Sherri Stepp.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Edward Snowden An Introduction.
Employability Laws Matt Haller. Americans with Disabilities Act – 1990 (ADA) Nation's first comprehensive civil rights law addressing the needs of people.
EMPLOYABILITY LAWS Owen weaver. AMERICANS WITH DISABILITIES ACT – 1990 (ADA) Nation's first comprehensive civil rights law addressing the needs of people.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
Electronic counter surveillance.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
“Domestic policy can only defeat us. Foreign policy can kill us.”
Is privacy research objective?
Define the Problem Constant surveillance of citizens in our country
Unit 9: The United States and the World
“Congress lets the NSA run Amok”
The Surveillance State
NPHS 1510 Federal and International
Presentation transcript:

National Security Agency (NSA) Surveillance Christopher Boyd

Who is involved? NSA ◦ US organization coordinates and directs highly specialized activities to protect United States information systems and to produce foreign intelligence information US Congress ◦ Actively debating the legality of the NSA’s actions. American Citizens ◦ Privacy may be invaded

What’s going on? NSA runs a domestic surveillance program that involves monitoring phone conversations and s. s are gathered in mass amounts but over collection is a problem invading the privacy of Americans

NSA’s Defense Congress Says Agency advocates say the process of collecting millions of electronic messages by computer inevitably leads to the examination of innocent s. Such messages are supposed to be filtered out, but critics say the NSA is not doing a good enough job in this area.

My Analysis Surveillance is very important for national security. Must employ any information gathering tactics we can to have a “one up” on the enemy. There should be an effort to minimize the by products of gathering innocent s but inevitably there will have to be some sacrifice of privacy.