SlideShare a Scribd company logo
1 of 3
Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues,
Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations,
counterintelligence operations, and collects and analyzes foreign intelligence for the president
and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is
responsible for global monitoring, collection, and processing of information for foreign
intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI )
conducts domestic counterintelligence and counterterrorism operations in addition to its role as
the lead law enforcement agency in the country. hese three agencies have implemented
sophisticated programs to capture, store, and analyze electronic communications. The
Downstream program (formerly called PRISM) extracts data from the ervers of nine major
American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk,
Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails,
ocuments, and connection logs for each of these systems. The Upstream program taps into the
infrastructure of the Internet to capture the online communications of foreigners outside the
United States ulile their communications are in transit. The leaders of the intelligence agencies
argue that these programs are essential to fighting terrorism. The agencies can also provide a
dozen or more examples of ow use of the data gathered by these programs has thwarted the
efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA
Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose
is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any
information that "relates to" the conduct of foreign affairs. This broad definition mears that the
target being survelled need not be a terrorist. The target needs only be thought to have
information that is relevant to the government's foreign intelligence objective-whatever that may
be. he process of gathering foreign electronic communications necessarily means the incidental
capture of many conversations involving an American (who may be here in the United States)
and a foreign arget. They may well be having a totally innocent communication with a foreign
triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The
total number of Americans' ommunications "incidentally" collected since the inception of
Section 702 is well into the millions. fection 702 also allows the government to pool all the
messages it intercepts into a giant database and then search the database, including conversations
involving Americans - without a warrant. Varrantless survelliance of communications between
Americans and foreigners is known as a "backdoor search because it effectively evades other
provisions of United States law that require an ndividualized warrant or court order for access to
such data. The agencies are authorized to conduct unlimited warrantless backdoor searches of
those communications for information about Americans or ndividuals located in the United
States during any investigation. The agencies are only required to obtain a warrant to view
American's data if the investigation is not related to national security. here is a rigorous process
that law enforcement agents must go through to wiretap a phone with three key requirements that
clearly distinguishes this method of gathering data from Downstream and Ipstream. First, before
beginning the wiretap. agents must prove to a judge that they have probable cause to believe that
tapping a specific phone will help them solve serious federal crimes such as errorism, money
laundering, or drug tratficking Second. a time limit must be defined for the wiretapping to start
and end: it cannot go on forever. Third, the wiretapping is limited only to those conversations nat
are likely to yield evidence against the suspect. There are also major differences between the way
Downstream and Upstream programs collect data and the way data is gathered under an ordinary
search warrant. Downstream and Upstream gather all he data there is to be collected and create a
source of data that can be querled to find evidence of a crime. If a police department obtains a
search warrant to search a house for illegal drugs, agents can communications "incidentally"
collected since the inception of Section 702 is well into the millions. Section 702 also allows the
govemment to pool all the messages it intercepts into a giant database and then search the
database, including conversations involving Americans - without a warrant. Warrantless
survelllance of communications between Americans and foreigners is known as a "backdoor
search" because it effectively evades other provisions of United States law that require an
individualized warrant or court order for access to such data. The agencies are authorized to
conduct unlimited warrantless backdoor searches of those communications for information about
Americans or individuals located in the United States during any investigation. The agencies are
only required to obtain a warrant to view American's data if the investigation is not related to
national security. There is a rigorous process that law enforcement agents must go through to
wiretap a phone with three key requirements that clearly distinguishes this method of gathering
data from Downstream and Upstream. First, before beginning the wiretap, agents must prove to a
judge that they have probable cause to believe that tapping a specific phone will help them solve
serious federal crimes such as There are also major differences between the way Downstream
and Upstream programs collect data and the way data is gathered under an ordinary search
warrant. Downstream and Upstream gather all the data there is to be collected and create a
source of data that can be queried to find evidence of a crime. If a police department obtains a
search warrant to search a house for illegal drugs, agents can lowtully enter the house and search
every room. But after finding (or failing to find) the drugs, they cannot then go rummaging
through file cabinets for evidence of sex-traflicking and then seize computers to search for
evidence of tax evasion, even though the officers are lawfully present in the house. They must
get a separate warrant to conduct each search in advance of any search. Critical Thinking
Questions 1. Many people believe that the lack of evidence that an American is engaged in
wrongdoing is hardly a compeling justification for a warrantless search of his or her
communications. To the contrary: if the intelligence agencies do not have probable cause to
suspect criminal activity, they have no business reading Americans' emails and listening to their
phone calls. Imagine that you agree with this position, what changes do you feel are needed to
FISA Section 702? 2. Others believe that our intelligence agencies should capture all the data
possible to protect us from terrorists and if, while doing this, a source of data is created that can
be used in criminal cases, so much the better. Imagine that you agree with this position, what
changes do you feel are needed to FISA Section 702 ? 3. Do you believe that the Downstream
and Upstream programs are examples of tipping the scales of justice in favor of security over
privacy? Justify your answer. Sources: "Survelllance Techniques: How Your Data Becomes Our
Data, "Domestic Survelllance Directorate, https. //nsa gov1 info/ surveillance, accessed August
10. 2018; "NSA Stops Certain Section 702: Upstream Activities," "NSA Statement, April 28,
2017, https:/lwww nsa. govinews-reatures/press-room/statements/2017-04-28-702-statement.
shtml; "Upstream vs. PRISM," Electronic Frontier Foundation, Greene, "Americans Wanted
More Privacy, Protections Const 10, 2018: "Backdoor Search." Electronic Frontier Foundation,
https://www. eff.org/pages/ backdoor-search, accessed August 10, 2018. Robyn Greene,
"Americans Wanted More Privacy Protections. Congress Gave Them Fewer". New America,
January 26, 2018, https :/www newamerica org/ot//articles/ americans-wanted-more-
privacyprotections-congress-gave-them-fewer, Laura Hautala, "NSA Surveillance Programs Live
On, In Case You Hadn't Noticed, cinet, January 19, 2018, hittps: I/mww.cnet
com/news/nsasurvelilance-programsprism-upstream-live-on-snowden; and "Guide to Section
702 Value Examples October 2017, htips:/www.dnigovifiles/ icotr/Guide-to-Section-702-Value-
Examples.pdr.

More Related Content

Similar to Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx

Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgBryan Gaston
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Drug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates AmericansDrug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates Americans3carportspta
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vafelipaser7p
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
This assignment will be submitted to Turnitin®.Instructions (100
This assignment will be submitted to Turnitin®.Instructions (100This assignment will be submitted to Turnitin®.Instructions (100
This assignment will be submitted to Turnitin®.Instructions (100GrazynaBroyles24
 

Similar to Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx (15)

Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Drug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates AmericansDrug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates Americans
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
This assignment will be submitted to Turnitin®.Instructions (100
This assignment will be submitted to Turnitin®.Instructions (100This assignment will be submitted to Turnitin®.Instructions (100
This assignment will be submitted to Turnitin®.Instructions (100
 

More from LeonardN9WWelchw

Choose the scenario that uses social engineering- 1- Bob pretends t.docx
Choose the scenario that uses social engineering-    1- Bob pretends t.docxChoose the scenario that uses social engineering-    1- Bob pretends t.docx
Choose the scenario that uses social engineering- 1- Bob pretends t.docxLeonardN9WWelchw
 
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docx
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docxCiastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docx
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docxLeonardN9WWelchw
 
Choose the correct statement- A- A chartered bank is a private firm- c.docx
Choose the correct statement- A- A chartered bank is a private firm- c.docxChoose the correct statement- A- A chartered bank is a private firm- c.docx
Choose the correct statement- A- A chartered bank is a private firm- c.docxLeonardN9WWelchw
 
ClearView Investment Company reported the following data retrieved fro.docx
ClearView Investment Company reported the following data retrieved fro.docxClearView Investment Company reported the following data retrieved fro.docx
ClearView Investment Company reported the following data retrieved fro.docxLeonardN9WWelchw
 
choose a country (not Canada- and not your home country) and create a.docx
choose a country (not Canada- and not your home country) and create a.docxchoose a country (not Canada- and not your home country) and create a.docx
choose a country (not Canada- and not your home country) and create a.docxLeonardN9WWelchw
 
Cindy Nelson is a real estate property manager who has just quit her p.docx
Cindy Nelson is a real estate property manager who has just quit her p.docxCindy Nelson is a real estate property manager who has just quit her p.docx
Cindy Nelson is a real estate property manager who has just quit her p.docxLeonardN9WWelchw
 
choose the correct answer- choose the correct answer- financia instrum.docx
choose the correct answer- choose the correct answer- financia instrum.docxchoose the correct answer- choose the correct answer- financia instrum.docx
choose the correct answer- choose the correct answer- financia instrum.docxLeonardN9WWelchw
 
choose 4 national culture dimensions from the list and explain what th.docx
choose 4 national culture dimensions from the list and explain what th.docxchoose 4 national culture dimensions from the list and explain what th.docx
choose 4 national culture dimensions from the list and explain what th.docxLeonardN9WWelchw
 
Choose 3 things that are true for this diagram- Left side is hypotonic.docx
Choose 3 things that are true for this diagram- Left side is hypotonic.docxChoose 3 things that are true for this diagram- Left side is hypotonic.docx
Choose 3 things that are true for this diagram- Left side is hypotonic.docxLeonardN9WWelchw
 
Choices to match with above- temperate grasslands coral reef Ocean tem.docx
Choices to match with above- temperate grasslands coral reef Ocean tem.docxChoices to match with above- temperate grasslands coral reef Ocean tem.docx
Choices to match with above- temperate grasslands coral reef Ocean tem.docxLeonardN9WWelchw
 
h G- Give adjacency list representation- 7 8.docx
h G- Give adjacency list representation- 7 8.docxh G- Give adjacency list representation- 7 8.docx
h G- Give adjacency list representation- 7 8.docxLeonardN9WWelchw
 
Habitable features of exoplanets On the habitable planet (left)- plate.docx
Habitable features of exoplanets On the habitable planet (left)- plate.docxHabitable features of exoplanets On the habitable planet (left)- plate.docx
Habitable features of exoplanets On the habitable planet (left)- plate.docxLeonardN9WWelchw
 
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docx
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docxGuide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docx
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docxLeonardN9WWelchw
 
gueltion 16 A social injustice is a situation where b- equity is appli.docx
gueltion 16 A social injustice is a situation where b- equity is appli.docxgueltion 16 A social injustice is a situation where b- equity is appli.docx
gueltion 16 A social injustice is a situation where b- equity is appli.docxLeonardN9WWelchw
 
Grokster- along with Morpheus and Kazaa- are considered second-generat.docx
Grokster- along with Morpheus and Kazaa- are considered second-generat.docxGrokster- along with Morpheus and Kazaa- are considered second-generat.docx
Grokster- along with Morpheus and Kazaa- are considered second-generat.docxLeonardN9WWelchw
 
Given a function declaration as below- float IncomeTax(float grossinco.docx
Given a function declaration as below- float IncomeTax(float grossinco.docxGiven a function declaration as below- float IncomeTax(float grossinco.docx
Given a function declaration as below- float IncomeTax(float grossinco.docxLeonardN9WWelchw
 
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docx
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docxGranite rock- what is the texture (fine grained- phaneritic- glassy- v.docx
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docxLeonardN9WWelchw
 
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docx
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docxGraded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docx
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docxLeonardN9WWelchw
 
Governmental population policies 39- True-false- Today- almost every s.docx
Governmental population policies 39- True-false- Today- almost every s.docxGovernmental population policies 39- True-false- Today- almost every s.docx
Governmental population policies 39- True-false- Today- almost every s.docxLeonardN9WWelchw
 
Given your understanding of how financial decisions are made in either.docx
Given your understanding of how financial decisions are made in either.docxGiven your understanding of how financial decisions are made in either.docx
Given your understanding of how financial decisions are made in either.docxLeonardN9WWelchw
 

More from LeonardN9WWelchw (20)

Choose the scenario that uses social engineering- 1- Bob pretends t.docx
Choose the scenario that uses social engineering-    1- Bob pretends t.docxChoose the scenario that uses social engineering-    1- Bob pretends t.docx
Choose the scenario that uses social engineering- 1- Bob pretends t.docx
 
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docx
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docxCiastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docx
Ciastion- Bextint- Hand to tovinitroct- Guarution 7pirect n Requiremen.docx
 
Choose the correct statement- A- A chartered bank is a private firm- c.docx
Choose the correct statement- A- A chartered bank is a private firm- c.docxChoose the correct statement- A- A chartered bank is a private firm- c.docx
Choose the correct statement- A- A chartered bank is a private firm- c.docx
 
ClearView Investment Company reported the following data retrieved fro.docx
ClearView Investment Company reported the following data retrieved fro.docxClearView Investment Company reported the following data retrieved fro.docx
ClearView Investment Company reported the following data retrieved fro.docx
 
choose a country (not Canada- and not your home country) and create a.docx
choose a country (not Canada- and not your home country) and create a.docxchoose a country (not Canada- and not your home country) and create a.docx
choose a country (not Canada- and not your home country) and create a.docx
 
Cindy Nelson is a real estate property manager who has just quit her p.docx
Cindy Nelson is a real estate property manager who has just quit her p.docxCindy Nelson is a real estate property manager who has just quit her p.docx
Cindy Nelson is a real estate property manager who has just quit her p.docx
 
choose the correct answer- choose the correct answer- financia instrum.docx
choose the correct answer- choose the correct answer- financia instrum.docxchoose the correct answer- choose the correct answer- financia instrum.docx
choose the correct answer- choose the correct answer- financia instrum.docx
 
choose 4 national culture dimensions from the list and explain what th.docx
choose 4 national culture dimensions from the list and explain what th.docxchoose 4 national culture dimensions from the list and explain what th.docx
choose 4 national culture dimensions from the list and explain what th.docx
 
Choose 3 things that are true for this diagram- Left side is hypotonic.docx
Choose 3 things that are true for this diagram- Left side is hypotonic.docxChoose 3 things that are true for this diagram- Left side is hypotonic.docx
Choose 3 things that are true for this diagram- Left side is hypotonic.docx
 
Choices to match with above- temperate grasslands coral reef Ocean tem.docx
Choices to match with above- temperate grasslands coral reef Ocean tem.docxChoices to match with above- temperate grasslands coral reef Ocean tem.docx
Choices to match with above- temperate grasslands coral reef Ocean tem.docx
 
h G- Give adjacency list representation- 7 8.docx
h G- Give adjacency list representation- 7 8.docxh G- Give adjacency list representation- 7 8.docx
h G- Give adjacency list representation- 7 8.docx
 
Habitable features of exoplanets On the habitable planet (left)- plate.docx
Habitable features of exoplanets On the habitable planet (left)- plate.docxHabitable features of exoplanets On the habitable planet (left)- plate.docx
Habitable features of exoplanets On the habitable planet (left)- plate.docx
 
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docx
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docxGuide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docx
Guide Week 03a First Natural Philosophers Spring 2023-d dy Guide Week.docx
 
gueltion 16 A social injustice is a situation where b- equity is appli.docx
gueltion 16 A social injustice is a situation where b- equity is appli.docxgueltion 16 A social injustice is a situation where b- equity is appli.docx
gueltion 16 A social injustice is a situation where b- equity is appli.docx
 
Grokster- along with Morpheus and Kazaa- are considered second-generat.docx
Grokster- along with Morpheus and Kazaa- are considered second-generat.docxGrokster- along with Morpheus and Kazaa- are considered second-generat.docx
Grokster- along with Morpheus and Kazaa- are considered second-generat.docx
 
Given a function declaration as below- float IncomeTax(float grossinco.docx
Given a function declaration as below- float IncomeTax(float grossinco.docxGiven a function declaration as below- float IncomeTax(float grossinco.docx
Given a function declaration as below- float IncomeTax(float grossinco.docx
 
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docx
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docxGranite rock- what is the texture (fine grained- phaneritic- glassy- v.docx
Granite rock- what is the texture (fine grained- phaneritic- glassy- v.docx
 
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docx
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docxGraded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docx
Graded Audit Task -#1 Consolidated Construction Inc-- an issuer- is a.docx
 
Governmental population policies 39- True-false- Today- almost every s.docx
Governmental population policies 39- True-false- Today- almost every s.docxGovernmental population policies 39- True-false- Today- almost every s.docx
Governmental population policies 39- True-false- Today- almost every s.docx
 
Given your understanding of how financial decisions are made in either.docx
Given your understanding of how financial decisions are made in either.docxGiven your understanding of how financial decisions are made in either.docx
Given your understanding of how financial decisions are made in either.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx

  • 1. Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues, Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is responsible for global monitoring, collection, and processing of information for foreign intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI ) conducts domestic counterintelligence and counterterrorism operations in addition to its role as the lead law enforcement agency in the country. hese three agencies have implemented sophisticated programs to capture, store, and analyze electronic communications. The Downstream program (formerly called PRISM) extracts data from the ervers of nine major American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk, Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails, ocuments, and connection logs for each of these systems. The Upstream program taps into the infrastructure of the Internet to capture the online communications of foreigners outside the United States ulile their communications are in transit. The leaders of the intelligence agencies argue that these programs are essential to fighting terrorism. The agencies can also provide a dozen or more examples of ow use of the data gathered by these programs has thwarted the efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any information that "relates to" the conduct of foreign affairs. This broad definition mears that the target being survelled need not be a terrorist. The target needs only be thought to have information that is relevant to the government's foreign intelligence objective-whatever that may be. he process of gathering foreign electronic communications necessarily means the incidental capture of many conversations involving an American (who may be here in the United States) and a foreign arget. They may well be having a totally innocent communication with a foreign triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The total number of Americans' ommunications "incidentally" collected since the inception of Section 702 is well into the millions. fection 702 also allows the government to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Varrantless survelliance of communications between Americans and foreigners is known as a "backdoor search because it effectively evades other provisions of United States law that require an ndividualized warrant or court order for access to such data. The agencies are authorized to conduct unlimited warrantless backdoor searches of those communications for information about Americans or ndividuals located in the United States during any investigation. The agencies are only required to obtain a warrant to view American's data if the investigation is not related to national security. here is a rigorous process that law enforcement agents must go through to wiretap a phone with three key requirements that clearly distinguishes this method of gathering data from Downstream and Ipstream. First, before beginning the wiretap. agents must prove to a judge that they have probable cause to believe that tapping a specific phone will help them solve serious federal crimes such as errorism, money laundering, or drug tratficking Second. a time limit must be defined for the wiretapping to start and end: it cannot go on forever. Third, the wiretapping is limited only to those conversations nat are likely to yield evidence against the suspect. There are also major differences between the way Downstream and Upstream programs collect data and the way data is gathered under an ordinary search warrant. Downstream and Upstream gather all he data there is to be collected and create a
  • 2. source of data that can be querled to find evidence of a crime. If a police department obtains a search warrant to search a house for illegal drugs, agents can communications "incidentally" collected since the inception of Section 702 is well into the millions. Section 702 also allows the govemment to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Warrantless survelllance of communications between Americans and foreigners is known as a "backdoor search" because it effectively evades other provisions of United States law that require an individualized warrant or court order for access to such data. The agencies are authorized to conduct unlimited warrantless backdoor searches of those communications for information about Americans or individuals located in the United States during any investigation. The agencies are only required to obtain a warrant to view American's data if the investigation is not related to national security. There is a rigorous process that law enforcement agents must go through to wiretap a phone with three key requirements that clearly distinguishes this method of gathering data from Downstream and Upstream. First, before beginning the wiretap, agents must prove to a judge that they have probable cause to believe that tapping a specific phone will help them solve serious federal crimes such as There are also major differences between the way Downstream and Upstream programs collect data and the way data is gathered under an ordinary search warrant. Downstream and Upstream gather all the data there is to be collected and create a source of data that can be queried to find evidence of a crime. If a police department obtains a search warrant to search a house for illegal drugs, agents can lowtully enter the house and search every room. But after finding (or failing to find) the drugs, they cannot then go rummaging through file cabinets for evidence of sex-traflicking and then seize computers to search for evidence of tax evasion, even though the officers are lawfully present in the house. They must get a separate warrant to conduct each search in advance of any search. Critical Thinking Questions 1. Many people believe that the lack of evidence that an American is engaged in wrongdoing is hardly a compeling justification for a warrantless search of his or her communications. To the contrary: if the intelligence agencies do not have probable cause to suspect criminal activity, they have no business reading Americans' emails and listening to their phone calls. Imagine that you agree with this position, what changes do you feel are needed to FISA Section 702? 2. Others believe that our intelligence agencies should capture all the data possible to protect us from terrorists and if, while doing this, a source of data is created that can be used in criminal cases, so much the better. Imagine that you agree with this position, what changes do you feel are needed to FISA Section 702 ? 3. Do you believe that the Downstream and Upstream programs are examples of tipping the scales of justice in favor of security over privacy? Justify your answer. Sources: "Survelllance Techniques: How Your Data Becomes Our Data, "Domestic Survelllance Directorate, https. //nsa gov1 info/ surveillance, accessed August 10. 2018; "NSA Stops Certain Section 702: Upstream Activities," "NSA Statement, April 28, 2017, https:/lwww nsa. govinews-reatures/press-room/statements/2017-04-28-702-statement. shtml; "Upstream vs. PRISM," Electronic Frontier Foundation, Greene, "Americans Wanted More Privacy, Protections Const 10, 2018: "Backdoor Search." Electronic Frontier Foundation, https://www. eff.org/pages/ backdoor-search, accessed August 10, 2018. Robyn Greene, "Americans Wanted More Privacy Protections. Congress Gave Them Fewer". New America, January 26, 2018, https :/www newamerica org/ot//articles/ americans-wanted-more- privacyprotections-congress-gave-them-fewer, Laura Hautala, "NSA Surveillance Programs Live On, In Case You Hadn't Noticed, cinet, January 19, 2018, hittps: I/mww.cnet com/news/nsasurvelilance-programsprism-upstream-live-on-snowden; and "Guide to Section
  • 3. 702 Value Examples October 2017, htips:/www.dnigovifiles/ icotr/Guide-to-Section-702-Value- Examples.pdr.