SlideShare a Scribd company logo
1 of 13
Case 9: Security vs. Privacy
Edward Snowden and the NSA
NSA and Verizon


FISC issued a secret order requiring Verizon to hand over vast
metadata to the NSA



Order specified that Verizon was required to share the information
on an “ongoing, daily basis”



Encompassed the phone records pertaining to all of Verizon's
American customers, whether the communications were between
US-based callers or between a US caller and an international caller



Verizon is only one officially published to date; working assumption
that other American telephone companies have been served with
similar orders


Partnership between government and industry to spy on anyone who uses
popular Internet services



Grants the NSA access to conversations, not just records, including full emails,
chat conversations, voice calls, and file transfers



Microsoft (2007), Yahoo (2008), Google (2009), Facebook (2009), YouTube
(2010), AOL (2011), Skype (2011), and Apple (2012) all participate



Dropbox, the cloud storage service, may soon be added to that list



NSA seeks to “expand collection services from existing providers”



Started under the Bush administration and has continued under Obama
Boundless Informant: The NSA’s Secret
Tool to Track Global Surveillance Data


Records and analyzes where the NSA’s intelligence comes from



Details and even maps by country the information it collects from computer and
telephone networks



Designed to give NSA officials answers to questions like, “What type of coverage
do we have on country X” in “near real-time”



NSA’s focus is on counting and categorizing records of communications, known
as metadata, rather than the content of an e-mail or an instant message



Allows users to select a country on a map, view the metadata volume, and
select details about the collections against that country, including how many
records and what type
How much data is Boundless Informant
collecting?
 In

March 2013, 97 billion pieces of intelligence was collected from computer
networks world wide.

 Top

5 Countries Where the Largest Amount of Intelligence Was Gathered:

a.

Iran: 14 billion reports

b.

Pakistan: 13.5 billion reports

c.

Jordan*: 12.7 billion reports

d.

Egypt: 7.6 billion reports

e.

India: 6.3 billion reports

*one of America’s closest Arab allies
Iran
Pakistan
Jordan
India
Egypt

Heatmap gives each nation a color code based on how extensively it is subjected to
NSA surveillance; ranges from green (least subjected to surveillance) through yellow
and orange to red (most surveillance)
How does Boundless Informant impact
American citizens?


NSA is able to determine the individual IP addresses of reports



“IP address is not a perfect proxy for someone’s physical location but it is rather
close. If you don’t take steps to hide it…it will certainly tell you what country,
state, and typically city you are in”.-Chris Soghoian, principal technologist with
the Speech Privacy and Technology Project of the American Civil Liberties Union



Ongoing oversight battle between intelligence agencies and Congress


Senators frustrated with NSA for refusing to supply statistics, sating “it is not possible
to provide even a rough estimate of how many American communications have been
collected…and [have] even declined to estimate the scale of this collection” –Senator
Mark Udall
NSA’s Response to
Exposure of Boundless Informant
Whistleblower: Yes or No?








Those who believe he has shed light on improper government actions believe he
deserves to be called a “whistleblower.”
Not covered under legal whistle-blower protection because he was not a government
employee, he is a contractor
Intelligence contractors instructed to report wrongdoing to Congress or their agency’s
inspector general
Not covered under Intelligence Community Whistle-blower Protection Act either





Did not expose type of actions covered by the act: illegal conduct, fraud, waste, or abuse
Only applies if public disclosure “if such disclosure is not specifically prohibited by law”; would
only cover Snowden if he had taken his concerns to the NSA’s inspector general or a member of
one of the Congressional intelligence committees with the proper security clearances

More accurately a “leaker”
Charges Against Edward Snowden
 Embezzlement:


maximum 10 years in jail and a fine

 Unauthorized

Espionage Act


theft of government property

communication of national defense information under the

maximum 10 years in jail and a fine

 Willful

communication of classified communications intelligence
information to an unauthorized person under the Espionage Act


maximum 10 years in jail and a fine
Is it justifiable to charge Snowden with
espionage?


Espionage is defined as disclosing information “with intent or reason to
believe that the information is to be used to the injury of the United States.”



“He could have—but chose not to—sold the information he had to a foreign
intelligence service for vast sums of money, or covertly passed it to one of
America’s enemies, or worked at the direction of a foreign government. That
is espionage. He did none of those things” (Greenwald).



Snowden is the 8th person to be charged under the Espionage Act under
Obama. Prior to Obama’s administration, only three people had been
charged under the Espionage Act since it’s inception in 1917.



“The Guardian’s Glenn Greenwald wonders how these prosecutions are even
remotely defensible coming from a president who vowed to usher in an era
of transparency in Washington….’The irony is obvious…the same people who
are building a ubiquitous surveillance system to spy on everyone in the
world, including their own citizens are now accusing the person who exposed
it of ‘espionage” (Politi).















June 21, 2013: U.S. filed espionage charges and requested that Hong Kong detain him for
extradition
June 23, 2013: Snowden left Hong Kong for Moscow, aided by WikiLeaks
June 25, 2013: Obama vows to extradite Snowden.
June 26, 2013: Putin says Snowden will not be extradited to America.
June 27, 2013: Obama declares he will not spend much capital on apprehending Snowden.
June 28, 2013: Ecuador denies Snowden’s request for asylum. The next day, President Correa
reveals that Biden asked him to deny Snowden’s request.
July 1, 2013: Snowden applies for asylum in Russia.
July 2, 2013: Brazil, India, Norway, Poland, Ecuador, Austria, Finland, Germany, Ireland, the
Netherlands, Spain, and Switzerland have refused Snowden asylum.
July 6, 2013: Venezuela offers Snowden asylum
July 12, 2013: Snowden says in a letter to human rights groups that there is “an unlawful
campaign by officials in the U.S. government to deny my right to seek and enjoy asylum,” and
that he will accept temporary asylum in Russia while applying for permanent asylum in a Latin
American country.
July 24, 2013: Snowden’s lawyer claims Snowden “intends to stay in Russia, study Russian
culture” implying he may live in Russia for good.
August 2013: Snowden’s father visits him in Russia.
Case 9 Security vs Privacy

More Related Content

Viewers also liked

Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bulliesjbaton
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaKarin Wahl-Jorgensen
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckDavid Coallier
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation pptParth Godhani
 

Viewers also liked (7)

Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bullies
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
Muslim Organizing Update - July, 2013
Muslim Organizing Update - July, 2013Muslim Organizing Update - July, 2013
Muslim Organizing Update - July, 2013
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor Deck
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 

Similar to Case 9 Security vs Privacy

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxcarlt4
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR TraitorApijay Kumar
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patreleanorabarrington
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxtoltonkendal
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramJoseph V. Moreno
 
Assange & Snowden
Assange & SnowdenAssange & Snowden
Assange & SnowdenPearlyn Low
 

Similar to Case 9 Security vs Privacy (12)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patr
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 
Assange & Snowden
Assange & SnowdenAssange & Snowden
Assange & Snowden
 

More from jbaton

World Cup Controversy
World Cup ControversyWorld Cup Controversy
World Cup Controversyjbaton
 
Photoshop Fiction
Photoshop FictionPhotoshop Fiction
Photoshop Fictionjbaton
 
Hurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. PouHurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. Poujbaton
 
Heart Attack Grill
Heart Attack GrillHeart Attack Grill
Heart Attack Grilljbaton
 
Case 14 presentation show
Case 14 presentation showCase 14 presentation show
Case 14 presentation showjbaton
 
Case 4 presentation
Case 4 presentationCase 4 presentation
Case 4 presentationjbaton
 

More from jbaton (6)

World Cup Controversy
World Cup ControversyWorld Cup Controversy
World Cup Controversy
 
Photoshop Fiction
Photoshop FictionPhotoshop Fiction
Photoshop Fiction
 
Hurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. PouHurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. Pou
 
Heart Attack Grill
Heart Attack GrillHeart Attack Grill
Heart Attack Grill
 
Case 14 presentation show
Case 14 presentation showCase 14 presentation show
Case 14 presentation show
 
Case 4 presentation
Case 4 presentationCase 4 presentation
Case 4 presentation
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Case 9 Security vs Privacy

  • 1. Case 9: Security vs. Privacy Edward Snowden and the NSA
  • 2. NSA and Verizon  FISC issued a secret order requiring Verizon to hand over vast metadata to the NSA  Order specified that Verizon was required to share the information on an “ongoing, daily basis”  Encompassed the phone records pertaining to all of Verizon's American customers, whether the communications were between US-based callers or between a US caller and an international caller  Verizon is only one officially published to date; working assumption that other American telephone companies have been served with similar orders
  • 3.  Partnership between government and industry to spy on anyone who uses popular Internet services  Grants the NSA access to conversations, not just records, including full emails, chat conversations, voice calls, and file transfers  Microsoft (2007), Yahoo (2008), Google (2009), Facebook (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012) all participate  Dropbox, the cloud storage service, may soon be added to that list  NSA seeks to “expand collection services from existing providers”  Started under the Bush administration and has continued under Obama
  • 4. Boundless Informant: The NSA’s Secret Tool to Track Global Surveillance Data  Records and analyzes where the NSA’s intelligence comes from  Details and even maps by country the information it collects from computer and telephone networks  Designed to give NSA officials answers to questions like, “What type of coverage do we have on country X” in “near real-time”  NSA’s focus is on counting and categorizing records of communications, known as metadata, rather than the content of an e-mail or an instant message  Allows users to select a country on a map, view the metadata volume, and select details about the collections against that country, including how many records and what type
  • 5. How much data is Boundless Informant collecting?  In March 2013, 97 billion pieces of intelligence was collected from computer networks world wide.  Top 5 Countries Where the Largest Amount of Intelligence Was Gathered: a. Iran: 14 billion reports b. Pakistan: 13.5 billion reports c. Jordan*: 12.7 billion reports d. Egypt: 7.6 billion reports e. India: 6.3 billion reports *one of America’s closest Arab allies
  • 6. Iran Pakistan Jordan India Egypt Heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance; ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance)
  • 7. How does Boundless Informant impact American citizens?  NSA is able to determine the individual IP addresses of reports  “IP address is not a perfect proxy for someone’s physical location but it is rather close. If you don’t take steps to hide it…it will certainly tell you what country, state, and typically city you are in”.-Chris Soghoian, principal technologist with the Speech Privacy and Technology Project of the American Civil Liberties Union  Ongoing oversight battle between intelligence agencies and Congress  Senators frustrated with NSA for refusing to supply statistics, sating “it is not possible to provide even a rough estimate of how many American communications have been collected…and [have] even declined to estimate the scale of this collection” –Senator Mark Udall
  • 8. NSA’s Response to Exposure of Boundless Informant
  • 9. Whistleblower: Yes or No?     Those who believe he has shed light on improper government actions believe he deserves to be called a “whistleblower.” Not covered under legal whistle-blower protection because he was not a government employee, he is a contractor Intelligence contractors instructed to report wrongdoing to Congress or their agency’s inspector general Not covered under Intelligence Community Whistle-blower Protection Act either    Did not expose type of actions covered by the act: illegal conduct, fraud, waste, or abuse Only applies if public disclosure “if such disclosure is not specifically prohibited by law”; would only cover Snowden if he had taken his concerns to the NSA’s inspector general or a member of one of the Congressional intelligence committees with the proper security clearances More accurately a “leaker”
  • 10. Charges Against Edward Snowden  Embezzlement:  maximum 10 years in jail and a fine  Unauthorized Espionage Act  theft of government property communication of national defense information under the maximum 10 years in jail and a fine  Willful communication of classified communications intelligence information to an unauthorized person under the Espionage Act  maximum 10 years in jail and a fine
  • 11. Is it justifiable to charge Snowden with espionage?  Espionage is defined as disclosing information “with intent or reason to believe that the information is to be used to the injury of the United States.”  “He could have—but chose not to—sold the information he had to a foreign intelligence service for vast sums of money, or covertly passed it to one of America’s enemies, or worked at the direction of a foreign government. That is espionage. He did none of those things” (Greenwald).  Snowden is the 8th person to be charged under the Espionage Act under Obama. Prior to Obama’s administration, only three people had been charged under the Espionage Act since it’s inception in 1917.  “The Guardian’s Glenn Greenwald wonders how these prosecutions are even remotely defensible coming from a president who vowed to usher in an era of transparency in Washington….’The irony is obvious…the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens are now accusing the person who exposed it of ‘espionage” (Politi).
  • 12.             June 21, 2013: U.S. filed espionage charges and requested that Hong Kong detain him for extradition June 23, 2013: Snowden left Hong Kong for Moscow, aided by WikiLeaks June 25, 2013: Obama vows to extradite Snowden. June 26, 2013: Putin says Snowden will not be extradited to America. June 27, 2013: Obama declares he will not spend much capital on apprehending Snowden. June 28, 2013: Ecuador denies Snowden’s request for asylum. The next day, President Correa reveals that Biden asked him to deny Snowden’s request. July 1, 2013: Snowden applies for asylum in Russia. July 2, 2013: Brazil, India, Norway, Poland, Ecuador, Austria, Finland, Germany, Ireland, the Netherlands, Spain, and Switzerland have refused Snowden asylum. July 6, 2013: Venezuela offers Snowden asylum July 12, 2013: Snowden says in a letter to human rights groups that there is “an unlawful campaign by officials in the U.S. government to deny my right to seek and enjoy asylum,” and that he will accept temporary asylum in Russia while applying for permanent asylum in a Latin American country. July 24, 2013: Snowden’s lawyer claims Snowden “intends to stay in Russia, study Russian culture” implying he may live in Russia for good. August 2013: Snowden’s father visits him in Russia.