What is it? Do you have it?. Answer these questions  Why is privacy important to you?  What are some things that you keep private?

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Right to Privacy: The Unwritten Right
Government Access To Private Databases By Kathleen Isley and John D’Alessandro.
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
Privacy & Personal Information -- Why do we care or do we?
Do you know how to keep yourself safe?
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
4th Amendment.
Hanjiao1ban Song Pan 11hao. The most enduring portrait of Uncle Sam appeared in American recruiting poster in the first World War, and which got a wide.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
Chapter 18 - The Fourth Amendment and National Security.
The Patriot Act Protecting the US or Violating People’s Freedoms.
“The Fourth Amendment protects people, not places.”
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
JUSTICE  The principle of fairness: the idea of moral equality. Criminal Justice Today  The proper ordering of things and persons within a society.
Bullying and Harassment Be a hero, take a STAND Speak out against bullying Tell an adult when you see someone being bullied Always set a good example.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Chapter 18 - The Fourth Amendment and National Security.
Teacher Behavior and Instructional Strategies Amy Boritzke, Kelsey Kasik, Marcus Reinhardt, Megan Sarangoulis.
Analyzing Political Cartoons Instruction and Practice.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
Starter Activities for Today “Engagement” 1) Which amendments in the Bill of Rights protect the rights of accused persons? (pp ) 2) What are the.
Bill of Rights. 2 Do Now Explain how the United States government provides its citizens the opportunity to “Life, Liberty, and the pursuit of Happiness”.
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
Writing 1 and Writing 2—January 13, 2016 Journal #7: What do you think about ghosts or aliens or other supernatural occurrences? Do you believe in them?
What is Law?. Law vs. Values  Laws Reflect and promote societies values  Values/Morals (as per dictionary.com) of, pertaining to, or concerned with.
Chapter 5 (cont’d) 5.4 – Legal Rights and Search Laws.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Step Forward Step Back 1.Those who would exchange freedom for security deserve neither. 2.To assure our country’s freedom, the government should be able.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
Fourth Amendment Search and Seizure Civil Liberties.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Task Two – Suggested Structure By Catherine McSherry.
Chapter 10 – The Bill of Rights VOCABULARY AND READING NOTES.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
How to use the internet safely and How to protect my personal data?
Cloud computing and government surveillance
How to use the internet safely and How to protect my personal data?
Protection Or Violation ?
Warm Up – Last Meals row-prisoners-last-meals.
Social Studies School Year.
Define the Problem Constant surveillance of citizens in our country
The Investigation Chapter 12
Political Cartoons American History.
The Surveillance State
Electronic Surveillance, Post 9/11
Pre AP – 08/20/2018 Pick up a laptop
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
APK Bellwork Think* Pair* Share
Presentation transcript:

What is it? Do you have it?

Answer these questions  Why is privacy important to you?  What are some things that you keep private?

Where in the Bill of Rights is Privacy guaranteed?  Think…..  Write down your guess.

And the Amendments are…  4 th : Protects our privacy from "unreasonable searches and seizures.” Also, says police must have a warrant to enter our homes  9 th : Says that just because other rights aren't listed, doesn't mean you don't have them...Privacy could be included here.

But, are there circumstances where your privacy can be violated?  Can your privacy ever be violated?  Should other people's privacy be violated?  Try to think of one example.  Write it down.  Are you stuck? Think about if you are other people in danger.

Consider this scenario…  You are sitting in Civics class. Someone has texted a bomb threat to the school. The cops have been called and they figured out that the call came from THIS classroom!!!  The Police are here and they want to search everyone's phones... They even have a way to search your deleted messages...Now it is your turn, they are ready to search YOUR phone. Is that okay?  Whether you like it or not, they are going to search your phone– this is a matter of security and safety for every child in this school.

During the search, this is what they found…someone texted about:  Cheating on the last Math Quiz...Can they use this information and let the Math teacher know?  Stealing somebody’s password they could change their Instagram profile.  Stealing a Google Chrome laptop. Can they use this information to let the school know who the culprit is?  Another person texted about how they are stealing extra gummies from the cafeteria every day... can this information be used?

The end of the story…  They found the person who made the threat and that person is in custody.  The school and students are safe.  Remember all of that other information they found?

Things to consider…  Does this violate your rights?  How does that make you feel?  Are there certain times when it is okay for your rights to be violated?  What are they and where can we draw the line? Do they now have the right to use that information?

Things changed one day, so let’s consider that day.

The United State's Government has been in pretty much the same situation.. After the terrorist attacks of 9/11/01, The U.S. Government wanted to catch future terrorists BEFORE they were able to commit their crimes (just like in the school situation, we wanted to catch the person who made the bomb threat).

 In order to catch terrorists, the U.S. government said they needed to SUSPEND SOME RIGHTS of Americans in order to PROTECT Americans.  Thus, they argued that they needed to TAKE SOME OF OUR RIGHTS AWAY to help keep us safe.  What do you think about that?  What would John Locke say?

So they came up with the Patriot Act. Patriot Act AKA: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 Did you know that it was an acronym? What is the Patriot Act?

The Patriot Act allows police to…  Enter a suspect’s home WITHOUT A WARRANT and seize their belongings.  Gain access to a suspect’s records... phone records, medical records, financial records, library and school records, and spy on their internet usage WITHOUT A WARRANT.  Wiretap or “bug” a suspect WITHOUT A WARRANT. to do so.

 And to do all of this, all the government has to do is allege that it needs the information for an ongoing TERRORISM investigation. The government doesn't even have to provide PROOF of its allegations. Basically they just have to say "I think this could be TERRORIST related..."

Some arguments FOR the Patriot Act  It is hard to catch terrorist before terrorist attacks.  Lots of people could die from other terrorist attacks without the Patriot Act.  We should trust our government with this power.  If a terrorist knows the government can do these things, they'll be less likely to do terrorist acts.

Some arguments AGAINST the Patriot Act  The Bill of Rights is being violated.  Taking away rights destroys the very definition of what it means to be an American.  The Patriot Act leads to racial profiling and other methods of discrimination and harassment.  Profiling can create more terrorist by pushing these minorities into fighting back.

What did the public think?

But that’s not all.  In the time between 2001 and today.  Here’s what has been in the news since then.  Before we look at the incident, let’s figure out who we are dealing with.

What is the NSA?  NSA stands for the National Security Agency  Formed after WWII to protect United States information systems and to produce foreign intelligence information.

 NSA is estimated to be the largest of U.S. intelligence organizations in terms of personnel and budget.  The NSA is mainly tasked with global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes. In case you were wondering…

The NSA has been experiencing controversy lately over accusations that they have been accessing and storing American's private information  The US NSA is accused of breaking privacy laws  Many former employees of the NSA have become "whistleblowers" which is someone who speaks up about something they think is wrong, regardless of the consequences.

The most notable of these NSA whistleblowers is Edward Snowden. The main problem that Snowden and several Americans have with the actions of the NSA is that they have access to a lot of American’s private information.

Give me details…  Snowden was concerned that the NSA was abusing it's powers and released classified information that was published The Washington Post and The Guardian newspapers.  Since 2006, the government has been using one of many programs to access customer data of companies like... Google, Facebook, Microsoft, Skype, YouTube, Yahoo, Apple… Gaining access to individual’s personal s, photos, documents, videos, audio, etc.  This is being stored as meta data and many people are concerned about how this information will/could be used in the future.

How did the NSA become Big Brother? First, let’s define “big brother” Big Brother is a fictional character in George Orwell's novel He is the dictator leader of a place called Oceania, a totalitarian state where the ruling Party wields total power. In the society that Orwell describes, every citizen is under constant surveillance by the authorities, mainly by telescreens. The people are constantly reminded of this by the slogan "Big Brother is watching you": surveillancetelescreens So when we call the NSA “big brother” we are referring to this cultural reference. Watch this video 

Similar to the Patriot Act…  Many people agree with the government surveillance of American citizens if it is keeping them safe...However, many people also feel that their rights are being trampled and this is a dangerous route to head down.

Arguments FOR NSA Surveillance From NY Times UpFront article "Watching You”  "You can't have 100% security and also then have 100% privacy." says President Obama  He called this a "modest encroachments on privacy."  These programs are authorized by Congress and reviewed by Federal Courts which means that our government officials were aware of the collection of data.  This gathered information has helped prevent about 50 attacks according to NSA director  If you're not doing anything wrong, why should you care?  Pew Poll found the 53% of Americans are okay with this increased surveillance.

Arguments AGAINST NSA Surveillance From NY Times UpFront article "Watching You”  This violates the 4th amendment (unreasonable searches and seizures) because police don't have search warrants.  NSA's job is foreign intelligence, not domestic intelligence.  This is another part of in increasing trend to limit people's rights in the name of safety (like the Patriot Act).  Some fear the U.S. becoming a "surveillance state“  If we allow this now, how and when do we draw a line... will it be too late?

Look at these next few cartoons with a critical eye. Political Cartoons often use five main elements to convey a certain point of view… Look for some of these elements in the Cartoons we are about to look at.  1-Symbolism- using an object to stand for an idea (example- democrat= donkey)  2-Captions and Labels- used to clarify what is being depicted and to provide emphasis  3-Analogy- a comparison between two unlike things that share some  4-Irony- the difference between the ways things are and the way things should be or the way things are expected to be  5-Exaggeration- overstating or magnifying a problem or a physical feature or habit

1-Symbolism: using an object to stand for an idea 2-Captions and Labels: used to clarify what is being depicted and to provide emphasis 3-Analogy: a comparison between two unlike things that share some 4-Irony: the difference between the ways things are and the way things should be or the way things are expected to be 5-Exaggeration: overstating or magnifying a problem or a physical feature or habit Which elements are used?

1-Symbolism: using an object to stand for an idea 2-Captions and Labels: used to clarify what is being depicted and to provide emphasis 3-Analogy: a comparison between two unlike things that share some 4-Irony: the difference between the ways things are and the way things should be or the way things are expected to be 5-Exaggeration: overstating or magnifying a problem or a physical feature or habit Which elements are used?

1-Symbolism: using an object to stand for an idea 2-Captions and Labels: used to clarify what is being depicted and to provide emphasis 3-Analogy: a comparison between two unlike things that share some 4-Irony: the difference between the ways things are and the way things should be or the way things are expected to be 5-Exaggeration: overstating or magnifying a problem or a physical feature or habit Which elements are used?

1-Symbolism: using an object to stand for an idea 2-Captions and Labels: used to clarify what is being depicted and to provide emphasis 3-Analogy: a comparison between two unlike things that share some 4-Irony: the difference between the ways things are and the way things should be or the way things are expected to be 5-Exaggeration: overstating or magnifying a problem or a physical feature or habit

Mission Impossible? Your task, you shall complete it.  Create a political cartoon.  Pick a topic: 1) The Patriot Act or 2) NSA Surveillance Programs  Express your feelings about it – FOR or AGAINST it  Think about the elements provided and make sure your cartoon clearly articulates YOUR view on the issue!