Define the Problem Constant surveillance of citizens in our country

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

1 Is there privacy in the cloud? The Snowden Effect KP Chow Dept of Computer Science University of Hong Kong July 2013.
Criticisms of US “Democracy”
Historical Documents and how they relate to you
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
WikiLeaks, Snowden and Civil Liberties vs. Public Security By Jeff South | Fulbright Scholar | U.S.A. Teaching at Northeast Normal University, Changchun.
Chapter 17 Law and Terrorism.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Edward Snowden vs The U.S. Government By Nicholas Pace.
By Monique & Mati. My partner and I want to find out who owns and who controls the Internet. We will look at, what the internet is made of, (hardware,
Anonymous Speech & Reading
Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
Chapter 18 - The Fourth Amendment and National Security.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Elements of an Argument. What exactly is an argument? An argument involves the process of establishing a claim and then proving it with the use of logical.
National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Where will I collect this information from?  Is Social Networking Safe?  Do you use a social networking site like Facebook or MySpace? Have you ever.
+ LTG Lesson Ms. J. Callaghan/ Mrs. M. Megaris, Co-Teachers ELA/ESL IS126Q
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What is it? Do you have it?. Answer these questions  Why is privacy important to you?  What are some things that you keep private?
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
The government has a right to spy on its citizens in order to better protect its citizens. This image is courtesy of healthinforwars.blogspot.com.
Writing 1 and Writing 2—January 13, 2016 Journal #7: What do you think about ghosts or aliens or other supernatural occurrences? Do you believe in them?
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
NSA AFF – Background Information. Plan The U.S. Supreme Court should hold in American Civil Liberties Union (ACLU) v. Clapper that the collection of metadata.
The Ethical Use of Data by Government Agencies By Sean Pugh.
 Over the next 4 ½ weeks you will be completing an assignment which is designed to introduce you to the Human Rights Act  The various rights created.
Edward Snowden By Peter Van Genderen. Work O He worked as a Army Reserve Special Forces recruit but didn’t receive any training. O He then employed as.
Edward Snowden An Introduction.
IT’S RELEVANCE TODAY BILL OF RIGHTS (AND CONSTITUTION)
National Security Agency (NSA) Surveillance Christopher Boyd.
FBI vs Apple Currently, the FBI and Apple are in a battle over an iPhone owned by a domestic terrorist from San Bernardino California. The cell phone could.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
6 Kiss privacy goodbye What is privacy? They know where we are
Law and Terrorism Chapter 17.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Evolutionary Powers of the Presidency Not mentioned in the Constitution… 1.
Shirin Nilizadeh Indiana University Bloomington
Protection Or Violation ?
How Democratic is the USA?
Saman Elyahoodayan Wire Taping
Surveillance Topic Baxter July 26th, 2015
Is privacy research objective?
Internet.
1984 – The Modern Context of Reception
Think / Pair / Share What are Human Rights?
“Congress lets the NSA run Amok”
The Surveillance Speech: A Low Point in Barack Obama's Presidency
How Democratic is the USA?
Holding surveillant power to account: Democratic problems & solutions
U.S. Intelligence Oversight Reforms & the Cloud Act
The Surveillance State
(Information) Privacy
Electronic Surveillance, Post 9/11
Criticisms of US “Democracy”
Pre AP – 08/20/2018 Pick up a laptop
APK Bellwork Think* Pair* Share
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Define the Problem Constant surveillance of citizens in our country Mr. V Social Studies / Law Ditmas I.S. 62 ivillota88@gmail.com Do Now: Describe and Explain what you see in the picture?

Public Policy Analyst Define the problem Gather the evidence Identify the causes Evaluate an existing policy Develop solutions Select the best solution (Feasibility vs. Effectiveness)

Gather the information Discuss the meaning behind the quote, and discuss what you see in the picture

Gather the Information “Always eyes watching you and the voice enveloping you. Asleep or awake, indoors or out of doors, in the bath or bed- no escape. Nothing was your own except the few cubic centimeters in your skull.” ― George Orwell, 1984

NSA NSA – National Security Agency The National Security Agency is the Nation's cryptologic organization. It coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information. A high technology organization, NSA is on the frontiers of communications and data processing. It is also one of the most important centers of foreign language analysis and research within the government. http://www.criticalcommons.org/Members/ccManager/clips/DarkKnightMontage.mov/view

Gather the information

Share Pair Students will discuss the Court case Jewel v. NSA. They will discuss whether or not the NSA had the right to spy and Jewel. Discuss the Pro’s and Con’s on spying on people to protect National Security.

Gather the Information Jewel v. NSA This case involves claims by numerous citizens that their constitutional rights were violated by the United States government through unauthorized surveillance of their telephone and internet activity by the National Security Agency (NSA) and other government actors under the "Terrorist Surveillance Program" or TSP. The NSA  continued to acquire the content of a significant portion of phone calls, emails, instant messages, text messages, web communications and other communications, both international and domestic, of practically every American who uses the phone system or the internet

Gather the information Analyze the following document On June 6, 2013, 29-year old computer assistant Edward Snowden made public a collection of classified documents from the government’s National Security Agency (NSA). The documents revealed details about government surveillance of U.S. citizens’ phone records and internet histories. Under a program known as PRISM, which partners government with well-known technology and communications companies such as Verizon, Yahoo, Microsoft, Google, and Facebook, the NSA was able to obtain access to data about citizens' personal communications.   Glenn Greenwald, the journalist who broke the story for the British paper The Guardian(link is external), wrote an article on June 7 explaining the scale of the surveillance that Snowden’s leak revealed. He wrote:   The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other U.S. internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.….The NSA access was enabled by changes to U.S. surveillance law introduced under President Bush and renewed under Obama in December 2012. . . . . . . . . . . . . . . . . . . . . . . . . . The documents will be handed out to the students. . . . . http://www.morningsidecenter.org/teachable-moment/lessons/nsa-surveillance-politics-whistleblowing

Gather the Information Answer the following questions According to the reading, what did the information leaked by Edward Snowden reveal about U.S. government activities? What sacrifices did Snowden make in revealing this information? What does he say his motives for doing this were? Do you think his explanation is credible? Jeffrey Toobin argues that Snowden should have gone through official channels rather than leaking information to a newspaper. What do you think of this argument? While some critics have attacked Snowden’s character, his defenders hold him up as a hero. What do you think? Is Snowden’s personal character relevant to the debate?

Identify the Causes 9 -11- 2001 United States Patriot Act