Shirin Nilizadeh Indiana University Bloomington

Slides:



Advertisements
Similar presentations
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Advertisements

WikiLeaks, Snowden and Civil Liberties vs. Public Security By Jeff South | Fulbright Scholar | U.S.A. Teaching at Northeast Normal University, Changchun.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Whistleblowers in an Era of Big Data Historical Background: - Daniel Ellsberg, Vietnam, and “The Pentagon Papers” - COINTELPRO and Intelligence Reform.
… and why you should care. Sarah Harvey {CrySP, Information Retrieval} group University of Waterloo
Edward Snowden vs The U.S. Government By Nicholas Pace.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Anonymous Speech & Reading
Social and New Media and Persuasion. Social media is pervasive Facebook has over 1.15 billion users Twitter has over 550 million registered users Google+
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
“Security is a process, not a product” -- Bruce Schneier.
Where in the world is Edward Snowden? Alex / Aron / Karin / Sam.
National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Workshop Positions Data Collection /Assessment Thursday, June 2 nd How Can We Make “International Strategy for Cyberspace” Acceptable?
1 Announcing … Global broadband subscribers to 30 June 2005 Total: 176 million 115 million * 65% * choose DSL.
George Barna American Culture & Faith Institute November 7, 2013.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley.
PATRIOT Act Timeline of Key Recent Federal Actions on the PATRIOT Act
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
The government has a right to spy on its citizens in order to better protect its citizens. This image is courtesy of healthinforwars.blogspot.com.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
The American Press and the Government during War.
Real Name Verification Law on the Internet: A Poison or Cure for Privacy? Daegon Cho Heinz College, Carnegie Mellon University June 15th WEIS 2011 at George.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
ABUSE OF POWER BY OUR GOVERNMENT By Vinay Mathur.
June May 2015 PATRIOT Act Timeline of Key Recent Federal Actions on PATRIOT Act Potential Actions in 114 th Congress Following the passage of.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Talks! Learn How TechSoup Can Help Your Organization Audio is only available by calling this number: Conference Call: Access Code:
NSA AFF – Background Information. Plan The U.S. Supreme Court should hold in American Civil Liberties Union (ACLU) v. Clapper that the collection of metadata.
The Ethical Use of Data by Government Agencies By Sean Pugh.
Edward Snowden By Peter Van Genderen. Work O He worked as a Army Reserve Special Forces recruit but didn’t receive any training. O He then employed as.
Edward Snowden An Introduction.
National Security Agency (NSA) Surveillance Christopher Boyd.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
Internet Call Termination Rates How is the price of call termination influenced by national internet calling legislation?
1© GfK 2016 | Concerns about safety and security Concerns about safety and security Global GfK survey July 2016.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Talks! Learn How TechSoup Can Help Your Organization Audio is only available by calling this number: Conference Call: Access Code:
6 Kiss privacy goodbye What is privacy? They know where we are
James O'Keefe Boston Security Meetup Feb. 11, 2016
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
The Internet Industry Week Two.
Is privacy research objective?
PART III Ethical Issues in Business
E-Commerce: Regulatory, Ethical, and Social Environments
Ukrainian Crisis: Views in NATO, Russia and Ukraine
1984 – The Modern Context of Reception
Define the Problem Constant surveillance of citizens in our country
“Congress lets the NSA run Amok”
U.S. Intelligence Oversight Reforms & the Cloud Act
The Main Ethical Considerations of Big Data
(Information) Privacy
Modern Warfare, Security & Surveillance
John Manning, Samantha Strockbine, Alex Burns
Whistleblowers in an Era of Big Data
Major causes of stress Global GfK survey November 2015.
Presentation transcript:

Shirin Nilizadeh Indiana University Bloomington Twitter's Reaction on Revelations about Government's Internet Surveillance Program Shirin Nilizadeh Indiana University Bloomington SAT 2015

Worldwide debate over surveillance and privacy http://www.pri.org/stories/2013-07-17/after-snowden-global-debate-over-privacy-vs-national-security-gaining-momentum

Goals What is the public’s opinion about these revelations? Are people worried about their online privacy? In response, how do people change their online behavior?

Survey 772 writers in 50 countries Writers have concern about government surveillance 
 They have started self-censoring U.S. government reputation has been damaged as a protector of freedom of expression

Twitter is a public sphere where people express about their opinions

Data Collection Daily tweets with hashtags: #nsa, #snowden, #edwardsnowden, #prism, #xkeyscore, #tempora and #ghcq 6 months: June 2013– November 2013 No data for 11/21/2013 – 11/24/2013 and 06/15/2013 Number of tweets: 338,285

People on Twitter express their opinion more on Snowden, privacy revelations and NSA spying on other countries’ citizens June 5– 7: start of revelations on NSA collecting telephone records and Prism June 9th-10th: Snowden goes public Jun 17-21: Collaboration between GCPQ and NSA, June 23rd : Snowden goes to Moscow Oct. 21 – 30: NSA spied on and monitored the phone calls of several world leaders, foreign citizens, and companies Sept. 3- 6: Efforts for weaken data encryption, and, ability to access user data for most major smartphones July 1- 3: Snowden applied for asylum Aug. 1: NSA’s secret funding for GCHQ

How people feel about these revelations? LabMT happiness score (Dodds et al.) Each word gets a score between [1- 9] Sentiment of tweets with related hashtags Sentiment of random sample of tweets The net sentiment score = Avg. score of the tweets with related hashtags – Avg. score of random sample of tweets

The Twitter net sentiment score is decreasing over time July 3: Snowden applied asylum to 20 foreign countries And He left Hong Kong due to potential threats on his safety and freedom Nov. 22- 25: NSA's desire for greater legal power and technological dominance And NSA infected 50,000 computer networks Sep. 1-3: NSA spied on Brazilian and Mexican presidents And NSA spies on Google and Petrobras Oct. 4-9: TOR network attacked by NSA And Canada spied on Brazil's Ministry of Mines and Energy

The Twitter net sentiment score is decreasing over time Oct. 17- 28: Lavabit and Silent Circle close down And NSA spies on world leaders June 23: Snowden flies from Hong Kong to Moscow July 12 : Snowden meets with Russian rights groups Aug. 8- 10: Lavabit and Silent Circle close down

Content Analysis Divide data weekly: 24 sets for 6 months Log-odds-ratio (Monroe et al.) Compare each weekly dataset with a random sample from the same week Find statistically overrepresented words in each set of tweets

Weekly topic and sentiment shift June 8– 14 June 15– 21 June 22– 30 July 1- 7 July 8- 14 July 15- 21 July 22- 30 0.34 0.22 0.21 0.02 0.14 0.04 0.08 Prism Spy Surveil. Whistleblo. tcot Protect Obama Encrypt Data Internet Privacy Traitor Ecuador Russia Asylum Hong Kong Wikileaks Putin Venezuela Amend Moscow Presid Moral Microsoft Benghazi Carter Assang Impeach nixon democracy Amash congress

Weekly topic and sentiment shift Aug. 1– 7 Aug. 8-14 Aug. 15– 21 Aug. 22– 31 Sep. 1-7 Sep. 8 -14 Sep. 15-21 0.06 0.1 -0.01 -0.02 -0.1 -0.06 -0.13 Spy Russia Asylum Surveil. Wikileaks Assang Obama Traitor Benghazi xkeyscor Prism Clapper Lavabit Privacy Reform Encrypt Guardian ggreenwald wikileaks Violat Detain Whistleblo. Document leak GCHQ Surprise Sabotage Vendor Security Fingerprint Data Fisa iphone5 sensor israel Darkhors creditcard Backdoor Tor

Weekly topic and sentiment shift Sep. 22-30 Oct. 1-7 Oct. 8-14 Oct. 15– 21 Oct. 22– 31 -0.03 -0.05 -0.07 0.18 0.09 Spy Privacy Never Fisa Data Southpark Wikileaks Whistleblo. ACLU Benghazi Prism Tor Anonymity Government_shutdown ioerror Guardian FBI Moscow GCHG DOJ Clan Assang Poland Taiwan Hungary Portugal Denmark Belgium France Greece Surveil. Merkel Obama OI Xfactoray yahoo

Weekly topic and sentiment shift Nov. 1-7 Nov. 8-14 Nov. 15– 21 Nov. 22– 30 -0.03 -0.11 -0.2 -0.18 Spy Surveil. Wikileaks Privacy Germany Benghazi Youranonnews Asylum Anonymity Guardian Prism Whistleblow Tcot IR unblock Redact Security Brad Heath G20 Discredit Doomsday Keiser Top secret

People talk about different topics when addressing “Snowden” vs. “NSA” Applied topic modeling by Amaral lab Topic 1: Snowden, asylum, Russia, Whistleblower, Wikileaks, Assang, Ecuador, Putin, Venezuela, Hero, Leaker, breaking, Hong Kong, Russian, …. Topic 2: NSA, Spy, Surveillance, Data, Leak, Call, Secret, Report, Phone, Program, Google, GCHQ, Collect, Congress, Reveal, Citizen, Facebook, FBI, Court, Access, fisa, Document, Microsoft, Companies, German, Share, Monitor, Million, File, Target, Private, Domestic, ….

Snowden vs. NSA Two exclusive sets: Tweets with hashtags #snowden/ #edwardsnowden (98,721 tweets) Tweets with hashtag #nsa (153,386 tweets)

Summary People vocally reacted very fast to the revelations. Overtime people are getting more upset and angry about the issue People expressed opinions about their online privacy

Future work Demographics Location Language How this change in the perceived level of privacy affect people’s online behavior? Do Revelations about Internet Security have a Chilling Effect?

Questions?