SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
z
This Photo by Unknown Author is licensed under CC BY-SA-NC
WHAT IS GOVERNMENT
SURVEILANCE ?
My position on this subject is that, I think that security is somewhat
necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct
when he states that terrorism can be a cover up to put a plan In action. I am
aware of the fact that the more acts of terror that are committed ,the more laws
can be implicated due to perceived terrorist acts.
This also gives people the right to invade foreign countries and take whatever
they want to take from these countries, including natural resources ,etc.
This Photo by Unknown Author is licensed under CC BY-SA
Privacy today faces growing threats from a growing surveillance
apparatus that is often justified in the name of national
security. Numerous government agencies—including the
National Security Agency, the Federal Bureau of Investigation,
the Department of Homeland Security, and state and local law
enforcement agencies—intrude upon the private
communications of innocent citizens, amass vast databases of
who we call and when, and catalog “suspicious activities”
based on the vaguest standards.
z
SECURITY
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Numerous government agencies—
including the National Security Agency, the Federal Bureau of Investigation, the
Department of Homeland Security, and state and local law enforcement agencies—
intrude upon the private communications of innocent citizens, amass vast
databases of who we call and when, and catalog “suspicious activities” based on
the vaguest standards.
The government’s collection of this sensitive information is itself an invasion of
privacy. But its use of this data is also rife with abuse. Innocuous data is fed into
bloated watchlists, with severe consequences—innocent individuals have found
themselves unable to board planes, barred from certain types of jobs, shut out of
their bank accounts, and repeatedly questioned by authorities. Once information is
in the government’s hands, it can be shared widely and retained for years, and the
rules about access and use can be changed entirely in secret without the public
ever knowing.
This Photo by Unknown Author is licensed under CC BY-SA-NC
z DOUBLE EDGED
SWORD
Another important idea that we
must observe s the notion that all
the technology we are given
including apps ,Internet,
cellphones etc.(sky drives)can be
used against us .Cloud storages
can store tangible evidence of all
of your documents and pics ,etc. A
cell phone is almost always in the
palm of our hands. GPS can track
us through cellular devices.
Facebook shows the world, who
we know and associate with.
This Photo by Unknown Author is licensed under CC BY-NC-ND
z
ACLU
AMERICAN CIVIL
LIBERTIES UNION
7 Facts About ACLU
▪ ACLU is Non Profit
▪ The ACLU Was founded after
WW1 (1917) in 1920 to protect
those who objected to the war
▪ Many members are lawyers and
volunteers
▪ The New York times was not
initially a fan
▪ Nor was President Woodrow
Wilson
▪ One of the earliest cases was one
of most legendary
▪ ACLU participates in more
Supreme Court cases than any
other private organization
z
NSA
The National Security
Agency (NSA) is an
intelligence agency of
the United States and
comes under the
Department of Defense.
This Photo by Unknown Author is licensed under CC BY-SA
z
The primary purpose of NSA is the collection of foreign
communications data and its analysis with regards to the security
of American communications against other agencies. The Director
of National Intelligence heads the agency.
The NSA headquarter is based 16km from Washington at Fort
George G. Meade in Maryland. NSA is one of the most secretive
intelligence agencies in the world. For many years the United
States government didn't acknowledge its existence. It was
jokingly referred as ‘No Such Agency’.
NSA is one of the most secretive intelligence agencies in the
world. For many years the United States government didn't
acknowledge its existence. It was jokingly referred as ‘No Such
Agency’.
NSA eavesdrops on all forms of intercepted communication
including internet and radio broadcast by different individuals and
organizations. All confidential, sensitive government
FACTS ABOUT NSA
REFERENCES https://www.youtube.com/watch?v=tRRJnAbSdRE
https://www.youtube.com/watch?v=FmnLa3F5Piw
https://www.topspysecrets.com/national-security-agency.html

Weitere ähnliche Inhalte

Was ist angesagt?

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
sevans-idaho
 
The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
Muhammed Haidri
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
Bill Bode
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
neeraj tiwari
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
Geritt Contillo
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
Kerry McCartney-Prout
 

Was ist angesagt? (19)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Presentación3
Presentación3Presentación3
Presentación3
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Chapter14
Chapter14Chapter14
Chapter14
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 

Kürzlich hochgeladen

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Kürzlich hochgeladen (20)

Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 

GOVERNMENT SURVEILANCE

  • 1. z This Photo by Unknown Author is licensed under CC BY-SA-NC WHAT IS GOVERNMENT SURVEILANCE ?
  • 2. My position on this subject is that, I think that security is somewhat necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct when he states that terrorism can be a cover up to put a plan In action. I am aware of the fact that the more acts of terror that are committed ,the more laws can be implicated due to perceived terrorist acts. This also gives people the right to invade foreign countries and take whatever they want to take from these countries, including natural resources ,etc. This Photo by Unknown Author is licensed under CC BY-SA
  • 3. Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies—including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards.
  • 4. z SECURITY Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies— including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies— intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse. Innocuous data is fed into bloated watchlists, with severe consequences—innocent individuals have found themselves unable to board planes, barred from certain types of jobs, shut out of their bank accounts, and repeatedly questioned by authorities. Once information is in the government’s hands, it can be shared widely and retained for years, and the rules about access and use can be changed entirely in secret without the public ever knowing. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 5. z DOUBLE EDGED SWORD Another important idea that we must observe s the notion that all the technology we are given including apps ,Internet, cellphones etc.(sky drives)can be used against us .Cloud storages can store tangible evidence of all of your documents and pics ,etc. A cell phone is almost always in the palm of our hands. GPS can track us through cellular devices. Facebook shows the world, who we know and associate with. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. z ACLU AMERICAN CIVIL LIBERTIES UNION 7 Facts About ACLU ▪ ACLU is Non Profit ▪ The ACLU Was founded after WW1 (1917) in 1920 to protect those who objected to the war ▪ Many members are lawyers and volunteers ▪ The New York times was not initially a fan ▪ Nor was President Woodrow Wilson ▪ One of the earliest cases was one of most legendary ▪ ACLU participates in more Supreme Court cases than any other private organization
  • 7. z NSA The National Security Agency (NSA) is an intelligence agency of the United States and comes under the Department of Defense. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. z The primary purpose of NSA is the collection of foreign communications data and its analysis with regards to the security of American communications against other agencies. The Director of National Intelligence heads the agency. The NSA headquarter is based 16km from Washington at Fort George G. Meade in Maryland. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA eavesdrops on all forms of intercepted communication including internet and radio broadcast by different individuals and organizations. All confidential, sensitive government FACTS ABOUT NSA