SlideShare a Scribd company logo
1 of 13
Download to read offline
COVERT GOVERNMENT
SURVEILLANCE
WHERE DO WE DRAW THE LINE
BETWEEN SAFETY AND PRIVACY?
By Michael Micka
Double click
box below
Fourth Amendment
 The right of the people to be secure
in their persons, houses, papers, and
effects, against unreasonable
searches and seizures, shall not be
violated, and no Warrants shall
issue, but upon probable cause,
supported by Oath or affirmation,
and particularly describing the
place to be searched, and the
persons or things to be seized.
Why The Fourth Amendment Was
Added To The Constitution
 Before the American Revolution English agents could enter any
colonist’s house or building to look for prohibited goods without
probable cause.
 Our forefathers wanted to protect it’s citizens from its newly formed
government and put the prohibition against unreasonable searches
and seizures in the Bill of Rights .
Wiretapping
 Started 1890
 New York made it a felony in 1892
 Police ignored law and continued wire tapping
listening to private conversations
 Popular for catching bootleggers 1919-1933
 In 1934 the U.S. Congress Passed Federal
Communications Act making warrantless
wiretapping illegal
 FBI Continued wire tapping despite ruling and is
still done today
Bugs
 FBI tried using bugs to get around law which
is a hidden microphone used for surveillance
 Tried placing a bug outside phone booth
thinking it did not intrude into the booth
 Supreme court ruled the Fourth Amendment
protected people not places so bugging is
illegal also.
Operation Shamrock
 Government illegally censored all messages entering
and leaving country from foreign governments
 Started duringWorldWar II
 NSA took over in 1952
 Transition from telegram to computers allowed for
key word and phrase search
 Became useful for monitoring governmental
concerns among foreign nations and U.S. civilians
(Cuba,Vietnam,War on Drugs).
 Ended in 1975 after Congressional and press scrutiny
Carnivore Surveillance
System
 Developed by FBI in 1990 to monitor Internet
traffic
 With a search warrant it was set up at the
suspect’s internet service provider to detect and
record packets
 FBI forced an Internet Service Provider (ISP) to
allow them to use it without a warrant and it was
upheld by the U.S. District Court
 FBI replaced it in 2001 with a commercial
software that could perform the same function
After 9/11
 2002 CIA captured several al-Qaeda members
along with their computers and cell phones
 This allowed NSA to eavesdrop without a
warrant and disrupt future terrorist attacks
 List grew to 500 inside USA, including US
citizens, and 5000 to 7000 outside USA
 2010 Federal District Court in San Francisco
rules warrantless wiretapping illegal
 Still under appeal by Obama administration
TALON Database
 Created in 2003 by Department of Defense
 Database of reports of suspicious activities
near military bases
 2005 NBC News found anti-war protesters
and college students protesting on-campus
military recruiting were added to the data
base
 Department of Defense removed many of
these reports after an in-house review
 TALON was shut down September 17, 2007
Covert Government Activities
Today
 Andrew Snowden a contractor working for NSA
recently released information that the NSA is
using secret surveillance against the American
public
 All electronic communication from anyone in the
country can be intercepted, stored, and retrieved
by NSA
 Snowden a junior employee who didn’t even
work directly for the federal government had
access to this information
Terrorists Activities
Continue
 Despite covert government surveillance
terrorists activities continue in the US and
around the world
 The bombing of the Boston Marathon April
15, 2003 using two pressure cooker bombs
 3 people died and 264 others were injured
 Two brothers of Chechen origin are convicted
of committing the attacks
 They were caught because of camera
surveillance at the scene
Safety VS Privacy
 Where do we draw the line between our right to
privacy and our safety
 Citizens want their right to privacy, but they also
want the government to ensure their safety and
security
 Covert government surveillance has been around
since the 1890’s and continues to this day
 We need to find common ground between
surveillance accountability and our privacy
References
 Boston MarathonTerror Attack Fast Facts. (2013, July 11).CNN, Retrieved from
http://www.cnn.com/2013/06/03/us/boston-marathon-terror-attack-fast-facts/
 Daniel Ellsberg:Snowden's NSA LeakWas Heroic, Historic. (n.d.).Justice Integrity Project,
Retrieved from http://www.justice-integrity.org/faq/490-daniel-ellsberg-snowden-s-nsa-
leak-was-heroic-historic
 Quinn, M. J. (Ed.). (2013).Ethics ForThe Information Age(5 ed.). Upper Saddle River, NJ:

More Related Content

What's hot

Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
White7e ppt ch13revised
White7e ppt ch13revisedWhite7e ppt ch13revised
White7e ppt ch13reviseddifordham
 
Case study: Edward Snowden
Case study: Edward SnowdenCase study: Edward Snowden
Case study: Edward SnowdenHeatherKing90
 
Death Penalty: Troy Davis
Death Penalty: Troy DavisDeath Penalty: Troy Davis
Death Penalty: Troy Davisamnestyrhul
 
Bezbednost na internetu 2
Bezbednost na internetu 2Bezbednost na internetu 2
Bezbednost na internetu 2Jelena Popara
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 

What's hot (20)

Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Ted Bundy
Ted BundyTed Bundy
Ted Bundy
 
White7e ppt ch13revised
White7e ppt ch13revisedWhite7e ppt ch13revised
White7e ppt ch13revised
 
Case study: Edward Snowden
Case study: Edward SnowdenCase study: Edward Snowden
Case study: Edward Snowden
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Death Penalty: Troy Davis
Death Penalty: Troy DavisDeath Penalty: Troy Davis
Death Penalty: Troy Davis
 
Bezbednost na internetu 2
Bezbednost na internetu 2Bezbednost na internetu 2
Bezbednost na internetu 2
 
Deep web
Deep webDeep web
Deep web
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Router forensics
Router forensicsRouter forensics
Router forensics
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Semen as a drug
Semen as a drugSemen as a drug
Semen as a drug
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
HLADNI RAT.pptx
HLADNI RAT.pptxHLADNI RAT.pptx
HLADNI RAT.pptx
 

Similar to Covert government surveillance

The Controversy Over U.S. Domestic Surveillance
The Controversy Over U.S. Domestic SurveillanceThe Controversy Over U.S. Domestic Surveillance
The Controversy Over U.S. Domestic SurveillanceBrenda Higgins
 
A Study Of The Foreign Intelligence Surveillance Act
A Study Of The Foreign Intelligence Surveillance ActA Study Of The Foreign Intelligence Surveillance Act
A Study Of The Foreign Intelligence Surveillance ActJessica Huston
 
NSA Spying Agency Analysis
NSA Spying Agency AnalysisNSA Spying Agency Analysis
NSA Spying Agency AnalysisKatie Booth
 
Nsa Is The Spying Ofu.S Citizens
Nsa Is The Spying Ofu.S CitizensNsa Is The Spying Ofu.S Citizens
Nsa Is The Spying Ofu.S CitizensGina Alfaro
 
The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)Kelly Ratkovic
 
Edward Snowden And The Government Data Collection Program
Edward Snowden And The Government Data Collection ProgramEdward Snowden And The Government Data Collection Program
Edward Snowden And The Government Data Collection ProgramChristina Santos
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Governmentprimeteacher32
 
Government Spying Is For The Greater Good Essay
Government Spying Is For The Greater Good EssayGovernment Spying Is For The Greater Good Essay
Government Spying Is For The Greater Good EssayJill Bell
 
Foreign Intelligence Surveillance Act Pros And Cons
Foreign Intelligence Surveillance Act Pros And ConsForeign Intelligence Surveillance Act Pros And Cons
Foreign Intelligence Surveillance Act Pros And ConsApril Watson
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Essay Freedom Of Information Indonesia
Essay Freedom Of Information IndonesiaEssay Freedom Of Information Indonesia
Essay Freedom Of Information IndonesiaSerena Brown
 
Surveillance And The National Security Agency
Surveillance And The National Security AgencySurveillance And The National Security Agency
Surveillance And The National Security AgencyNicole Hodges
 
Essay On Foreign Intelligence Surveillance Act
Essay On Foreign Intelligence Surveillance ActEssay On Foreign Intelligence Surveillance Act
Essay On Foreign Intelligence Surveillance ActMaritza Tyson
 
U.S. National Security Agency
U.S. National Security AgencyU.S. National Security Agency
U.S. National Security AgencyMelissa Jimenez
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretappingAngela Strudwick
 
The Security Agency Nsa ( Nsa )
The Security Agency Nsa ( Nsa )The Security Agency Nsa ( Nsa )
The Security Agency Nsa ( Nsa )Connie Ripp
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 

Similar to Covert government surveillance (20)

The Controversy Over U.S. Domestic Surveillance
The Controversy Over U.S. Domestic SurveillanceThe Controversy Over U.S. Domestic Surveillance
The Controversy Over U.S. Domestic Surveillance
 
A Study Of The Foreign Intelligence Surveillance Act
A Study Of The Foreign Intelligence Surveillance ActA Study Of The Foreign Intelligence Surveillance Act
A Study Of The Foreign Intelligence Surveillance Act
 
NSA Spying Agency Analysis
NSA Spying Agency AnalysisNSA Spying Agency Analysis
NSA Spying Agency Analysis
 
Nsa Is The Spying Ofu.S Citizens
Nsa Is The Spying Ofu.S CitizensNsa Is The Spying Ofu.S Citizens
Nsa Is The Spying Ofu.S Citizens
 
NSA Argument Essay
NSA Argument EssayNSA Argument Essay
NSA Argument Essay
 
The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA)
 
Edward Snowden And The Government Data Collection Program
Edward Snowden And The Government Data Collection ProgramEdward Snowden And The Government Data Collection Program
Edward Snowden And The Government Data Collection Program
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Government Spying Is For The Greater Good Essay
Government Spying Is For The Greater Good EssayGovernment Spying Is For The Greater Good Essay
Government Spying Is For The Greater Good Essay
 
Nsa, Nsa And The Nsa
Nsa, Nsa And The NsaNsa, Nsa And The Nsa
Nsa, Nsa And The Nsa
 
Foreign Intelligence Surveillance Act Pros And Cons
Foreign Intelligence Surveillance Act Pros And ConsForeign Intelligence Surveillance Act Pros And Cons
Foreign Intelligence Surveillance Act Pros And Cons
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Essay Freedom Of Information Indonesia
Essay Freedom Of Information IndonesiaEssay Freedom Of Information Indonesia
Essay Freedom Of Information Indonesia
 
Surveillance And The National Security Agency
Surveillance And The National Security AgencySurveillance And The National Security Agency
Surveillance And The National Security Agency
 
Preserving Liberty
Preserving LibertyPreserving Liberty
Preserving Liberty
 
Essay On Foreign Intelligence Surveillance Act
Essay On Foreign Intelligence Surveillance ActEssay On Foreign Intelligence Surveillance Act
Essay On Foreign Intelligence Surveillance Act
 
U.S. National Security Agency
U.S. National Security AgencyU.S. National Security Agency
U.S. National Security Agency
 
Us legislation authorizing wiretapping
Us legislation authorizing wiretappingUs legislation authorizing wiretapping
Us legislation authorizing wiretapping
 
The Security Agency Nsa ( Nsa )
The Security Agency Nsa ( Nsa )The Security Agency Nsa ( Nsa )
The Security Agency Nsa ( Nsa )
 
The Security Era
The Security EraThe Security Era
The Security Era
 

Recently uploaded

How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxKatherine Villaluna
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 

Recently uploaded (20)

How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 

Covert government surveillance

  • 1. COVERT GOVERNMENT SURVEILLANCE WHERE DO WE DRAW THE LINE BETWEEN SAFETY AND PRIVACY? By Michael Micka Double click box below
  • 2. Fourth Amendment  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
  • 3. Why The Fourth Amendment Was Added To The Constitution  Before the American Revolution English agents could enter any colonist’s house or building to look for prohibited goods without probable cause.  Our forefathers wanted to protect it’s citizens from its newly formed government and put the prohibition against unreasonable searches and seizures in the Bill of Rights .
  • 4. Wiretapping  Started 1890  New York made it a felony in 1892  Police ignored law and continued wire tapping listening to private conversations  Popular for catching bootleggers 1919-1933  In 1934 the U.S. Congress Passed Federal Communications Act making warrantless wiretapping illegal  FBI Continued wire tapping despite ruling and is still done today
  • 5. Bugs  FBI tried using bugs to get around law which is a hidden microphone used for surveillance  Tried placing a bug outside phone booth thinking it did not intrude into the booth  Supreme court ruled the Fourth Amendment protected people not places so bugging is illegal also.
  • 6. Operation Shamrock  Government illegally censored all messages entering and leaving country from foreign governments  Started duringWorldWar II  NSA took over in 1952  Transition from telegram to computers allowed for key word and phrase search  Became useful for monitoring governmental concerns among foreign nations and U.S. civilians (Cuba,Vietnam,War on Drugs).  Ended in 1975 after Congressional and press scrutiny
  • 7. Carnivore Surveillance System  Developed by FBI in 1990 to monitor Internet traffic  With a search warrant it was set up at the suspect’s internet service provider to detect and record packets  FBI forced an Internet Service Provider (ISP) to allow them to use it without a warrant and it was upheld by the U.S. District Court  FBI replaced it in 2001 with a commercial software that could perform the same function
  • 8. After 9/11  2002 CIA captured several al-Qaeda members along with their computers and cell phones  This allowed NSA to eavesdrop without a warrant and disrupt future terrorist attacks  List grew to 500 inside USA, including US citizens, and 5000 to 7000 outside USA  2010 Federal District Court in San Francisco rules warrantless wiretapping illegal  Still under appeal by Obama administration
  • 9. TALON Database  Created in 2003 by Department of Defense  Database of reports of suspicious activities near military bases  2005 NBC News found anti-war protesters and college students protesting on-campus military recruiting were added to the data base  Department of Defense removed many of these reports after an in-house review  TALON was shut down September 17, 2007
  • 10. Covert Government Activities Today  Andrew Snowden a contractor working for NSA recently released information that the NSA is using secret surveillance against the American public  All electronic communication from anyone in the country can be intercepted, stored, and retrieved by NSA  Snowden a junior employee who didn’t even work directly for the federal government had access to this information
  • 11. Terrorists Activities Continue  Despite covert government surveillance terrorists activities continue in the US and around the world  The bombing of the Boston Marathon April 15, 2003 using two pressure cooker bombs  3 people died and 264 others were injured  Two brothers of Chechen origin are convicted of committing the attacks  They were caught because of camera surveillance at the scene
  • 12. Safety VS Privacy  Where do we draw the line between our right to privacy and our safety  Citizens want their right to privacy, but they also want the government to ensure their safety and security  Covert government surveillance has been around since the 1890’s and continues to this day  We need to find common ground between surveillance accountability and our privacy
  • 13. References  Boston MarathonTerror Attack Fast Facts. (2013, July 11).CNN, Retrieved from http://www.cnn.com/2013/06/03/us/boston-marathon-terror-attack-fast-facts/  Daniel Ellsberg:Snowden's NSA LeakWas Heroic, Historic. (n.d.).Justice Integrity Project, Retrieved from http://www.justice-integrity.org/faq/490-daniel-ellsberg-snowden-s-nsa- leak-was-heroic-historic  Quinn, M. J. (Ed.). (2013).Ethics ForThe Information Age(5 ed.). Upper Saddle River, NJ: