The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.

Slides:



Advertisements
Similar presentations
1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.
Advertisements

Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Chapter 17 Law and Terrorism.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
USA PATRIOT ACT USA PATRIOT ACT
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Scams Stevie's Scam School videos
CIS 1310 – HTML & CSS Web Metrics Stats ’n Stuff.
Internet Surveillance George Corser February 5, 2015.
Chapter 18 - The Fourth Amendment and National Security.
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
RSS FEED By Andrea Piombo. Professor Jim Foley has trouble hearing and wanted an app that could help him.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Chapter 18 - The Fourth Amendment and National Security.
Role of the Financial Intelligence Unit in Implementing an Effective Anti-Money Laundering (AML) Framework Jafar Sadat, Da Afghanistan Bank General Director,
Scandals of Elected Officials at the National Level By: Dera Burreson.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Integrating social media into PR Strategies by K Srinivasan Chairman, Prime Point Foundation & Editor in Chief, PreSense (Emagazine) Chennai, India 13.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Possible Changes to Telephone Program. The Obama administration is preparing to unveil a legislative proposal to drastically overhaul the National Security.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
The Patriot Act Is Spying on US citizens Ethical?
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
By: Alex Wilson.  Dismayed by the lack of marksmanship shown by their troops, Union veterans Col. William C. Church and Gen. George Wingate formed the.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
NSA AFF – Background Information. Plan The U.S. Supreme Court should hold in American Civil Liberties Union (ACLU) v. Clapper that the collection of metadata.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Edward Snowden An Introduction.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
National Security Agency (NSA) Surveillance Christopher Boyd.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Recrusoft A web product developed for Recruitment / Placement Agencies by Gridaxis softwares recrusoft.gridaxis.in Gridaxis Softwares.
US Executive Branch NCSCOS 2.02/2.03. Executive Branch Located in Article II Includes the President and the Vice President main job: enforce laws.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Summer Bridge 2011 /Freshman Seminar By: William Sears & Jonathan Suits.
Ruqayya Y Khan, Trinity University
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
How Does Electronic Surveillance Work Legally?
The texts are too long and people don’t want to take the time.
Is privacy research objective?
GDPR General Data Protection Regulation EU: Coming May 25, 2018
Define the Problem Constant surveillance of citizens in our country
The Surveillance State
Electronic Surveillance, Post 9/11
MyLion Registration Website | Mobile device
NPHS 1510 Federal and International
Presentation transcript:

The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14

Who is the NSA National Security Agency Formed in 1952 responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes Motto: "Defending Our Nation. Securing The Future.“ NSA is also charged with protection of U.S. government communications and information systems against penetration and network warfare

NSAs Warrantless Searches National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications The NSA's collection programs are supposedly targeted at foreigners Director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons” One of the NSA's controversial program called Prism, allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies Before the NSA wasn’t allowed to search for information among US citizens but after October 2011 a court ruling approved just that

Americans Targeted in NSA Searches Nine of 10 of intercepted conversations were not the intended surveillance targets but were caught in a net the agency had cast for somebody else Nearly half of the surveillance files contained names, addresses or other details that the NSA marked as belonging to U.S. citizens or residents The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless Many of the photos and conversations collected are rather personal to the owners ◦Medical Records ◦Job Resumes ◦Academic Transcripts of students ◦Infants and toddlers in bathtubs, swings, being held by their mothers ◦Men showing of their bodies ◦Women modeling lingerie

NSAs Use of Smartphone Apps The NSA is tapping into smartphone apps to peek into the personal data including age, location, sex and even sexual preferences The agency uses Google Maps, which can pinpoint a phone owner's whereabouts Angry Birds maker Rovio said it had no knowledge of the NSA tapping into its users’ data The president is quoted in his Jan. 17 speech, “to the extent data is collected by the NSA, through whatever means, we are not interested in the communications of people who are not valid foreign intelligence targets and we are not after the information of ordinary Americans”.

Cites y y -surveillance-loophole-americans- data?CMP=share_btn_link -surveillance-loophole-americans- data?CMP=share_btn_link security/in-nsa-intercepted-data-those-not-targeted- far-outnumber-the-foreigners-who- are/2014/07/05/8139adf8-045a-11e b1b969b6322_story.html security/in-nsa-intercepted-data-those-not-targeted- far-outnumber-the-foreigners-who- are/2014/07/05/8139adf8-045a-11e b1b969b6322_story.html spying-through-angry-birds-google- maps/#.VGU6t3kjafY. spying-through-angry-birds-google- maps/#.VGU6t3kjafY.