Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
Chapter 14.1 Protecting Individual Rights
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Data, Information and Coding In today’s lesson we will look at: The difference between data, information and knowledge How we can code data to make it.
An Outline of the Constitution
THE LEGISLATIVE PROCESS
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
THE USA PATRIOT ACT AND THE DOMESTIC WAR ON TERROR Essential Questions: What limits should be put on the executive branch to carry out the domestic war.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Lawrence Kerr December 5,  Overview  Background  Foreign Intelligence Surveillance Act (FISA)  USA PARTRIOT Act  Proposed changes  FISA Improvements.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Privacy & Personal Information -- Why do we care or do we?
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
HTML Internet Basics & Beyond. What The Heck Is HTML? HTML is the language of web pages. In order to truly understand HTML, you need to know a little.
WHO WATCHES THE WATCHERS? SHAE BUNAS UNIVERSITY OF CENTRAL OKLAHOMA Domestic Surveillance: Topic Analysis.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
What makes a good interactive resume? Click for detailed information Multimedia Navigation Communication.
Civil Liberties Challenges
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
The USA PATRIOT Act An Overstatement of ALA Concerns?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
PATRIOT Act Timeline of Key Recent Federal Actions on the PATRIOT Act
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Aim: To what extent does the Patriot Act violate civil liberties? Do Now: Using your cell phone, take the following poll. “Of the 10 civil liberties guaranteed.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
Bill of Rights Video eo.php?video_id=45924.
June May 2015 PATRIOT Act Timeline of Key Recent Federal Actions on PATRIOT Act Potential Actions in 114 th Congress Following the passage of.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Consequences of Federalism. Learning Objectives To identify and explain the consequences of federalism - Legal - Political - Economic - Regionalism.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
The Structure of a Debate Constructive Speeches 1AC: 8 Minutes Cross-Examined by 2NC: 3 Minutes 1NC: 8 Minutes Cross-Examined by 1AC: 3 Minutes 2AC: 8.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
Judging Policy Debate Rich Edwards & Russell Kirkscey June 2015.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
Ruqayya Y Khan, Trinity University
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Privacy and the Law.
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
How Does Electronic Surveillance Work Legally?
HSC Legal Studies.
Surveillance Topic Baxter July 26th, 2015
Define the Problem Constant surveillance of citizens in our country
U.S. Intelligence Oversight Reforms & the Cloud Act
Electronic Surveillance, Post 9/11
Presentation transcript:

Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment

INTRODUCTION TO THE PACKET MATERIALS Monday, July 6 th  By Will Repko,  Michigan State University

About this lecture  It is okay to read through the packet while I talk.  Located at:  On the right hand side, there’s an link to “2015 Packet and Core Files”  Think about some specific questions as we are talking  Ask questions – I won’t bite  It is less about writing down every word from every slide… it’s about understanding the concept

The Political Spectrum

What are some characteristics ?..  Of being politically conservative ?....  Of being politically liberal ?...

Some details about the Political Spectrum:  The politics of surveillance policies don’t neatly cut along party lines.  Amongst Republicans, there is a distinction between TEA PARTY and the REST OF THE REPUBLICAN PARTY.  Example – two Senators from Kentucky.  Senator Mitch McConnell – example of a “hawk”  Senator Rand Paul – example of a conservative that’s anti surveillance.  Golden Rule:  Most Democrats and Tea Party = anti-surveillance  Most Republicans and some conservative Democrats = pro-surveillance

What is metadata ?...

Examples of meta-data:  Originating Phone number, address, etc  The terminating phone number, address, etc.  Time of call  Duration of call  …..This Information is collected in bulk (indiscriminately) as opposed to being collected based upon an individually-targeted warrant.

It may be easier to explain what Metadata is NOT:  It is NOT ABOUT CONTENT of your phone calls, s, etc.  It is NOT ONLY ABOUT PHONE DATA – can be collected on , text, skype, etc  It is not UNAUTHORIZED – some judge has to give a thumbs-up (warrant, probable cause)

The Difference between Meta- Data and Warranted Surveillance:  Meta-data collects surveillance “in bulk” or “indiscriminately” – examples might include:  The web activity of all persons in a zip code.  The phone activity of all persons in an area code. Warranted Surveillance requires probable cause and tends to search a single person or a narrower range of persons. Warranted surveillance can be used to search any person – but tends to collect less raw information (than meta-data). This is because meta-data gathers info on hundred – if not thousands of US person.

But what about “Hops” ?...

How hops work  A “seed #” is a phone number where probable cause has been obtained (a warrant).  Once a seed is identified – the agency is allowed to follow-up on all #’s within “two hops”  Here’s an example:

So who stores this meta-data ?..  It is always COLLECTED by the phone and internet companies  … but there’s a major debate about who STORES this meta-data:  NSA – National Security Agency (an intelligence agency)  Phone Companies (i.e. Verizon, Sprint, etc)

But, who really cares about the meta-data ?...  I mean, so what, if the Federal Government has my meta-data ?...  How meta-data can be used to gather a lot of information on an individual.

Let’s Talk about the PATRIOT ACT.  The strikes happen – it was basically before your time, but – trust me – it was a huge event in terms of shaping US policy.  On the heels of 9-11, the Congress passed an act called:  Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001  It’s also called the “USA PATRIOT ACT”… or just the “Patriot Act”  The Act enhanced investigatory tools to counter-terrorism  It specifically passed “Section 215 of the Patriot Act” (often referred to as “215”) – which is important to understanding the Affirmative.

…and then this guy comes along:

Snowden’s Revelations  What can you all tell me about Snowden ?...  He revealed many things – but the most central one (for the Aff in the packet) is the revelation of the 215 PHONE meta-data program.  This sets the stage for the Freedom Act

Important Info About the Freedom Act  The technical name is the “USA FREEDOM ACT” – which stands for  U niting and S trengthening A merica by F ulfilling R ights and E nding E avesdropping, D ragnet-collection and O nline M onitoring Act.“  Important dates:  2014 Original Freedom Act  May 13 th, 2015 – The US House of Representative passes New Freedom Act.  June 2 nd, 2015 – The US Senate passes the New Freedom Act

Differences between the Old Freedom Act and the New Freedom Act  General Consensus – from pro-privacy groups – that the New Freedom Act was a bit watered-down.  The Aff – in the packet – will argue that some of the provisions of the Old Freedom Act should pass.  Specific Changes that were stripped from the Old Act that the Aff will say should be added :  SST’s – “Specific Selector Terms”  “Super-minimization” procedures  Pen-Register and “Trap and Trace” devices.

Advantages to the Packet Aff  Privacy Advantage  Bigotry Advantage  Journalism Advantage  Global Internet Freedom Advantage  India advantage and the “CMS”  Data Overload  US Tech Sector – and the “Cloud Computing” Industr y

Important Laws that Authorize Surveillance:  We’ve talked a lot about the PATRIOT ACT – and, amongst other things, the PATRIOT ACT contains:  Section 215 – which allows phone records to be collected. And – until recently – was interpreted to allow “bulk” collection of phone records.  Section 214 – which is the Pen Register Section There is also Section 702 of the “F.A.A.” (FISA Amendments Act). This is home to the PRISM program And Executive Order (usually called “Twelve-Triple 3”)

Sets up some important Negative Solvency attacks:  The topic limits the Aff to dealing with “domestic” surveillance. But some “foreign” surveillance programs can be used on US persons.  Examples of Lawyering:  702 and “information about a foreign person or target”  Ending 215 = may be no good