SlideShare a Scribd company logo
Case 9: Security vs. Privacy
Edward Snowden and the NSA
NSA and Verizon


FISC issued a secret order requiring Verizon to hand over vast
metadata to the NSA



Order specified that Verizon was required to share the information
on an “ongoing, daily basis”



Encompassed the phone records pertaining to all of Verizon's
American customers, whether the communications were between
US-based callers or between a US caller and an international caller



Verizon is only one officially published to date; working assumption
that other American telephone companies have been served with
similar orders


Partnership between government and industry to spy on anyone who uses
popular Internet services



Grants the NSA access to conversations, not just records, including full emails,
chat conversations, voice calls, and file transfers



Microsoft (2007), Yahoo (2008), Google (2009), Facebook (2009), YouTube
(2010), AOL (2011), Skype (2011), and Apple (2012) all participate



Dropbox, the cloud storage service, may soon be added to that list



NSA seeks to “expand collection services from existing providers”



Started under the Bush administration and has continued under Obama
Boundless Informant: The NSA’s Secret
Tool to Track Global Surveillance Data


Records and analyzes where the NSA’s intelligence comes from



Details and even maps by country the information it collects from computer and
telephone networks



Designed to give NSA officials answers to questions like, “What type of coverage
do we have on country X” in “near real-time”



NSA’s focus is on counting and categorizing records of communications, known
as metadata, rather than the content of an e-mail or an instant message



Allows users to select a country on a map, view the metadata volume, and
select details about the collections against that country, including how many
records and what type
How much data is Boundless Informant
collecting?
 In

March 2013, 97 billion pieces of intelligence was collected from computer
networks world wide.

 Top

5 Countries Where the Largest Amount of Intelligence Was Gathered:

a.

Iran: 14 billion reports

b.

Pakistan: 13.5 billion reports

c.

Jordan*: 12.7 billion reports

d.

Egypt: 7.6 billion reports

e.

India: 6.3 billion reports

*one of America’s closest Arab allies
Iran
Pakistan
Jordan
India
Egypt

Heatmap gives each nation a color code based on how extensively it is subjected to
NSA surveillance; ranges from green (least subjected to surveillance) through yellow
and orange to red (most surveillance)
How does Boundless Informant impact
American citizens?


NSA is able to determine the individual IP addresses of reports



“IP address is not a perfect proxy for someone’s physical location but it is rather
close. If you don’t take steps to hide it…it will certainly tell you what country,
state, and typically city you are in”.-Chris Soghoian, principal technologist with
the Speech Privacy and Technology Project of the American Civil Liberties Union



Ongoing oversight battle between intelligence agencies and Congress


Senators frustrated with NSA for refusing to supply statistics, sating “it is not possible
to provide even a rough estimate of how many American communications have been
collected…and [have] even declined to estimate the scale of this collection” –Senator
Mark Udall
NSA’s Response to
Exposure of Boundless Informant
Whistleblower: Yes or No?








Those who believe he has shed light on improper government actions believe he
deserves to be called a “whistleblower.”
Not covered under legal whistle-blower protection because he was not a government
employee, he is a contractor
Intelligence contractors instructed to report wrongdoing to Congress or their agency’s
inspector general
Not covered under Intelligence Community Whistle-blower Protection Act either





Did not expose type of actions covered by the act: illegal conduct, fraud, waste, or abuse
Only applies if public disclosure “if such disclosure is not specifically prohibited by law”; would
only cover Snowden if he had taken his concerns to the NSA’s inspector general or a member of
one of the Congressional intelligence committees with the proper security clearances

More accurately a “leaker”
Charges Against Edward Snowden
 Embezzlement:


maximum 10 years in jail and a fine

 Unauthorized

Espionage Act


theft of government property

communication of national defense information under the

maximum 10 years in jail and a fine

 Willful

communication of classified communications intelligence
information to an unauthorized person under the Espionage Act


maximum 10 years in jail and a fine
Is it justifiable to charge Snowden with
espionage?


Espionage is defined as disclosing information “with intent or reason to
believe that the information is to be used to the injury of the United States.”



“He could have—but chose not to—sold the information he had to a foreign
intelligence service for vast sums of money, or covertly passed it to one of
America’s enemies, or worked at the direction of a foreign government. That
is espionage. He did none of those things” (Greenwald).



Snowden is the 8th person to be charged under the Espionage Act under
Obama. Prior to Obama’s administration, only three people had been
charged under the Espionage Act since it’s inception in 1917.



“The Guardian’s Glenn Greenwald wonders how these prosecutions are even
remotely defensible coming from a president who vowed to usher in an era
of transparency in Washington….’The irony is obvious…the same people who
are building a ubiquitous surveillance system to spy on everyone in the
world, including their own citizens are now accusing the person who exposed
it of ‘espionage” (Politi).















June 21, 2013: U.S. filed espionage charges and requested that Hong Kong detain him for
extradition
June 23, 2013: Snowden left Hong Kong for Moscow, aided by WikiLeaks
June 25, 2013: Obama vows to extradite Snowden.
June 26, 2013: Putin says Snowden will not be extradited to America.
June 27, 2013: Obama declares he will not spend much capital on apprehending Snowden.
June 28, 2013: Ecuador denies Snowden’s request for asylum. The next day, President Correa
reveals that Biden asked him to deny Snowden’s request.
July 1, 2013: Snowden applies for asylum in Russia.
July 2, 2013: Brazil, India, Norway, Poland, Ecuador, Austria, Finland, Germany, Ireland, the
Netherlands, Spain, and Switzerland have refused Snowden asylum.
July 6, 2013: Venezuela offers Snowden asylum
July 12, 2013: Snowden says in a letter to human rights groups that there is “an unlawful
campaign by officials in the U.S. government to deny my right to seek and enjoy asylum,” and
that he will accept temporary asylum in Russia while applying for permanent asylum in a Latin
American country.
July 24, 2013: Snowden’s lawyer claims Snowden “intends to stay in Russia, study Russian
culture” implying he may live in Russia for good.
August 2013: Snowden’s father visits him in Russia.
Case 9 Security vs Privacy

More Related Content

Viewers also liked

Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bulliesjbaton
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaKarin Wahl-Jorgensen
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckDavid Coallier
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation pptParth Godhani
 

Viewers also liked (7)

Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bullies
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
Muslim Organizing Update - July, 2013
Muslim Organizing Update - July, 2013Muslim Organizing Update - July, 2013
Muslim Organizing Update - July, 2013
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor Deck
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 

Similar to Case 9 Security vs Privacy

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxcarlt4
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR TraitorApijay Kumar
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patreleanorabarrington
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxtoltonkendal
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramJoseph V. Moreno
 
Assange & Snowden
Assange & SnowdenAssange & Snowden
Assange & SnowdenPearlyn Low
 

Similar to Case 9 Security vs Privacy (12)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patr
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 
Assange & Snowden
Assange & SnowdenAssange & Snowden
Assange & Snowden
 

More from jbaton

World Cup Controversy
World Cup ControversyWorld Cup Controversy
World Cup Controversyjbaton
 
Photoshop Fiction
Photoshop FictionPhotoshop Fiction
Photoshop Fictionjbaton
 
Hurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. PouHurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. Poujbaton
 
Heart Attack Grill
Heart Attack GrillHeart Attack Grill
Heart Attack Grilljbaton
 
Case 14 presentation show
Case 14 presentation showCase 14 presentation show
Case 14 presentation showjbaton
 
Case 4 presentation
Case 4 presentationCase 4 presentation
Case 4 presentationjbaton
 

More from jbaton (6)

World Cup Controversy
World Cup ControversyWorld Cup Controversy
World Cup Controversy
 
Photoshop Fiction
Photoshop FictionPhotoshop Fiction
Photoshop Fiction
 
Hurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. PouHurricane Katrina and Dr. Pou
Hurricane Katrina and Dr. Pou
 
Heart Attack Grill
Heart Attack GrillHeart Attack Grill
Heart Attack Grill
 
Case 14 presentation show
Case 14 presentation showCase 14 presentation show
Case 14 presentation show
 
Case 4 presentation
Case 4 presentationCase 4 presentation
Case 4 presentation
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 

Case 9 Security vs Privacy

  • 1. Case 9: Security vs. Privacy Edward Snowden and the NSA
  • 2. NSA and Verizon  FISC issued a secret order requiring Verizon to hand over vast metadata to the NSA  Order specified that Verizon was required to share the information on an “ongoing, daily basis”  Encompassed the phone records pertaining to all of Verizon's American customers, whether the communications were between US-based callers or between a US caller and an international caller  Verizon is only one officially published to date; working assumption that other American telephone companies have been served with similar orders
  • 3.  Partnership between government and industry to spy on anyone who uses popular Internet services  Grants the NSA access to conversations, not just records, including full emails, chat conversations, voice calls, and file transfers  Microsoft (2007), Yahoo (2008), Google (2009), Facebook (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012) all participate  Dropbox, the cloud storage service, may soon be added to that list  NSA seeks to “expand collection services from existing providers”  Started under the Bush administration and has continued under Obama
  • 4. Boundless Informant: The NSA’s Secret Tool to Track Global Surveillance Data  Records and analyzes where the NSA’s intelligence comes from  Details and even maps by country the information it collects from computer and telephone networks  Designed to give NSA officials answers to questions like, “What type of coverage do we have on country X” in “near real-time”  NSA’s focus is on counting and categorizing records of communications, known as metadata, rather than the content of an e-mail or an instant message  Allows users to select a country on a map, view the metadata volume, and select details about the collections against that country, including how many records and what type
  • 5. How much data is Boundless Informant collecting?  In March 2013, 97 billion pieces of intelligence was collected from computer networks world wide.  Top 5 Countries Where the Largest Amount of Intelligence Was Gathered: a. Iran: 14 billion reports b. Pakistan: 13.5 billion reports c. Jordan*: 12.7 billion reports d. Egypt: 7.6 billion reports e. India: 6.3 billion reports *one of America’s closest Arab allies
  • 6. Iran Pakistan Jordan India Egypt Heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance; ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance)
  • 7. How does Boundless Informant impact American citizens?  NSA is able to determine the individual IP addresses of reports  “IP address is not a perfect proxy for someone’s physical location but it is rather close. If you don’t take steps to hide it…it will certainly tell you what country, state, and typically city you are in”.-Chris Soghoian, principal technologist with the Speech Privacy and Technology Project of the American Civil Liberties Union  Ongoing oversight battle between intelligence agencies and Congress  Senators frustrated with NSA for refusing to supply statistics, sating “it is not possible to provide even a rough estimate of how many American communications have been collected…and [have] even declined to estimate the scale of this collection” –Senator Mark Udall
  • 8. NSA’s Response to Exposure of Boundless Informant
  • 9. Whistleblower: Yes or No?     Those who believe he has shed light on improper government actions believe he deserves to be called a “whistleblower.” Not covered under legal whistle-blower protection because he was not a government employee, he is a contractor Intelligence contractors instructed to report wrongdoing to Congress or their agency’s inspector general Not covered under Intelligence Community Whistle-blower Protection Act either    Did not expose type of actions covered by the act: illegal conduct, fraud, waste, or abuse Only applies if public disclosure “if such disclosure is not specifically prohibited by law”; would only cover Snowden if he had taken his concerns to the NSA’s inspector general or a member of one of the Congressional intelligence committees with the proper security clearances More accurately a “leaker”
  • 10. Charges Against Edward Snowden  Embezzlement:  maximum 10 years in jail and a fine  Unauthorized Espionage Act  theft of government property communication of national defense information under the maximum 10 years in jail and a fine  Willful communication of classified communications intelligence information to an unauthorized person under the Espionage Act  maximum 10 years in jail and a fine
  • 11. Is it justifiable to charge Snowden with espionage?  Espionage is defined as disclosing information “with intent or reason to believe that the information is to be used to the injury of the United States.”  “He could have—but chose not to—sold the information he had to a foreign intelligence service for vast sums of money, or covertly passed it to one of America’s enemies, or worked at the direction of a foreign government. That is espionage. He did none of those things” (Greenwald).  Snowden is the 8th person to be charged under the Espionage Act under Obama. Prior to Obama’s administration, only three people had been charged under the Espionage Act since it’s inception in 1917.  “The Guardian’s Glenn Greenwald wonders how these prosecutions are even remotely defensible coming from a president who vowed to usher in an era of transparency in Washington….’The irony is obvious…the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens are now accusing the person who exposed it of ‘espionage” (Politi).
  • 12.             June 21, 2013: U.S. filed espionage charges and requested that Hong Kong detain him for extradition June 23, 2013: Snowden left Hong Kong for Moscow, aided by WikiLeaks June 25, 2013: Obama vows to extradite Snowden. June 26, 2013: Putin says Snowden will not be extradited to America. June 27, 2013: Obama declares he will not spend much capital on apprehending Snowden. June 28, 2013: Ecuador denies Snowden’s request for asylum. The next day, President Correa reveals that Biden asked him to deny Snowden’s request. July 1, 2013: Snowden applies for asylum in Russia. July 2, 2013: Brazil, India, Norway, Poland, Ecuador, Austria, Finland, Germany, Ireland, the Netherlands, Spain, and Switzerland have refused Snowden asylum. July 6, 2013: Venezuela offers Snowden asylum July 12, 2013: Snowden says in a letter to human rights groups that there is “an unlawful campaign by officials in the U.S. government to deny my right to seek and enjoy asylum,” and that he will accept temporary asylum in Russia while applying for permanent asylum in a Latin American country. July 24, 2013: Snowden’s lawyer claims Snowden “intends to stay in Russia, study Russian culture” implying he may live in Russia for good. August 2013: Snowden’s father visits him in Russia.