SlideShare a Scribd company logo
SNOWDEN
Hero OR Traitor
Who is Edward Snowden










Edward Joseph Snowden, June 21, 1983 (age 30),
Wilmington, North Carolina
Residence: Russia (temporary asylum)
Nationality: American
Occupation: System administrator
Known for :Revealing details of classified United
States government surveillance programs
Criminal charge :Theft of government property,
unauthorized communication of national defence
information, and wilful communication of classified
intelligence to an unauthorized person (June 2013).
Awards :Sam Adams Award
How NSA Works?
The NSA plays "three degrees of Kevin Bacon."
e.g. With a phone with 260 contacts ,
4,569,760,000 other people can be monitored
 Real Time Access to Phone and Internet Traffic
 The NSA asks for information companies
already have
 The NSA sifts through everything that crosses
the border.
 The NSA assumes you're foreign until proven
otherwise

Issue?




Guardian started publishing a series of
exposes revealing NSA operated a major
web of spying programs in May 2013.
Snowden identity was revealed on 9th
June.
Correctness of his actions


NSA Claims wiretapping was not intrusion
to US citizens Privacy but legitimate way
to intercept terrorist activities or
communications



“ he wasn’t blowing the whistle on anything illegal;
he was exposing something that failed to meet his
own standards of propriety. The question, of
course, is whether the government can function
when all of its employees (and contractors) can
take it upon themselves to sabotage the programs
they don’t like. That’s what Snowden has done.”
Correctness of his actions
Snowden contends that he simply wanted
the public to know that government was
watching and recording people who were
doing no wrong.
“to inform the public as to that which is
done in their name and that which is done
against them”





The NSA view of
Americans

What People Think

Polls between June
and August 2013
Legal Implications

Credit:Mapsofworld
Discussions
1.What is the NSA mission?
How deep is the involvement of corporate America in this whole scheme?
Is Security of country is more important than Privacy?

Credit:Mapsofworld
Widescreen Test Pattern (16:9)

Aspect Ratio
Test
(Should appear
circular)

4x3
16x9

More Related Content

What's hot

Chapter6
Chapter6Chapter6
Fourth Amendment notes
Fourth Amendment notesFourth Amendment notes
Fourth Amendment notes
Jennifer Vogt-Erickson
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
Harold Sowards
 
State v. burrell
State v. burrellState v. burrell
State v. burrell
Harold Sowards
 
George lee mims, sr. v. us
George lee mims, sr. v. usGeorge lee mims, sr. v. us
George lee mims, sr. v. us
Harold Sowards
 
Investigation powerpoint
Investigation powerpointInvestigation powerpoint
Investigation powerpoint
left4sims
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
Harold Sowards
 
Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics ppt
phebemoore
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
Harold Sowards
 
Fs Ch 6
Fs Ch 6Fs Ch 6
Fs Ch 6
warren142
 
State v. stark
State v. starkState v. stark
State v. stark
Harold Sowards
 
Proposal Report of white-collar crime
Proposal Report of white-collar crimeProposal Report of white-collar crime
Proposal Report of white-collar crime
RebekahSamuel2
 
Criminal Trial Process
Criminal Trial ProcessCriminal Trial Process
Criminal Trial Process
Mr Shipp
 
Prison management system
Prison management systemPrison management system
Prison management system
Tomásio De J. Leite Pilar
 
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
Quanam
 
COMUNICADO 333-2023
COMUNICADO 333-2023COMUNICADO 333-2023
COMUNICADO 333-2023
FGJEM
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
Hi Tech Criminal Justice
 
State v. jantzi
State v. jantziState v. jantzi
State v. jantzi
Harold Sowards
 
INTERPOL(FS).pdf
INTERPOL(FS).pdfINTERPOL(FS).pdf
INTERPOL(FS).pdf
Shashi738182
 
Law Relating to Culpable Homicide & Murder in India.
Law Relating to Culpable Homicide & Murder in India.Law Relating to Culpable Homicide & Murder in India.
Law Relating to Culpable Homicide & Murder in India.
Nilendra Kumar
 

What's hot (20)

Chapter6
Chapter6Chapter6
Chapter6
 
Fourth Amendment notes
Fourth Amendment notesFourth Amendment notes
Fourth Amendment notes
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
 
State v. burrell
State v. burrellState v. burrell
State v. burrell
 
George lee mims, sr. v. us
George lee mims, sr. v. usGeorge lee mims, sr. v. us
George lee mims, sr. v. us
 
Investigation powerpoint
Investigation powerpointInvestigation powerpoint
Investigation powerpoint
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
 
Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics ppt
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
 
Fs Ch 6
Fs Ch 6Fs Ch 6
Fs Ch 6
 
State v. stark
State v. starkState v. stark
State v. stark
 
Proposal Report of white-collar crime
Proposal Report of white-collar crimeProposal Report of white-collar crime
Proposal Report of white-collar crime
 
Criminal Trial Process
Criminal Trial ProcessCriminal Trial Process
Criminal Trial Process
 
Prison management system
Prison management systemPrison management system
Prison management system
 
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
"Transformando el Conocimiento Empresarial en Resultados" - Ibm i2
 
COMUNICADO 333-2023
COMUNICADO 333-2023COMUNICADO 333-2023
COMUNICADO 333-2023
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
State v. jantzi
State v. jantziState v. jantzi
State v. jantzi
 
INTERPOL(FS).pdf
INTERPOL(FS).pdfINTERPOL(FS).pdf
INTERPOL(FS).pdf
 
Law Relating to Culpable Homicide & Murder in India.
Law Relating to Culpable Homicide & Murder in India.Law Relating to Culpable Homicide & Murder in India.
Law Relating to Culpable Homicide & Murder in India.
 

Viewers also liked

Snowden slides
Snowden slidesSnowden slides
Snowden slides
David West
 
Présentation : Edward Snowden
Présentation : Edward SnowdenPrésentation : Edward Snowden
Présentation : Edward Snowden
Nicolas G
 
Elon musk
Elon muskElon musk
Elon musk
Shiraz316
 
Elon Musk
Elon MuskElon Musk
Elon Musk
Miloš Ivković
 
Elon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, EntrepreneurElon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, Entrepreneur
Muhtasim Sarowat Rayed
 
Entrepreneur Elon musk
Entrepreneur   Elon muskEntrepreneur   Elon musk
Entrepreneur Elon musk
Shashank Tiwari
 

Viewers also liked (6)

Snowden slides
Snowden slidesSnowden slides
Snowden slides
 
Présentation : Edward Snowden
Présentation : Edward SnowdenPrésentation : Edward Snowden
Présentation : Edward Snowden
 
Elon musk
Elon muskElon musk
Elon musk
 
Elon Musk
Elon MuskElon Musk
Elon Musk
 
Elon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, EntrepreneurElon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, Entrepreneur
 
Entrepreneur Elon musk
Entrepreneur   Elon muskEntrepreneur   Elon musk
Entrepreneur Elon musk
 

Similar to Snowden -Hero OR Traitor

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
carlt4
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
jbaton
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
rosemaryralphs52525
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
Margaret Hoisington
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
bagotjesusa
 
Case study: Edward Snowden
Case study: Edward SnowdenCase study: Edward Snowden
Case study: Edward Snowden
HeatherKing90
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
toltonkendal
 

Similar to Snowden -Hero OR Traitor (12)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
 
Case study: Edward Snowden
Case study: Edward SnowdenCase study: Edward Snowden
Case study: Edward Snowden
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Snowden -Hero OR Traitor

  • 2. Who is Edward Snowden        Edward Joseph Snowden, June 21, 1983 (age 30), Wilmington, North Carolina Residence: Russia (temporary asylum) Nationality: American Occupation: System administrator Known for :Revealing details of classified United States government surveillance programs Criminal charge :Theft of government property, unauthorized communication of national defence information, and wilful communication of classified intelligence to an unauthorized person (June 2013). Awards :Sam Adams Award
  • 3. How NSA Works? The NSA plays "three degrees of Kevin Bacon." e.g. With a phone with 260 contacts , 4,569,760,000 other people can be monitored  Real Time Access to Phone and Internet Traffic  The NSA asks for information companies already have  The NSA sifts through everything that crosses the border.  The NSA assumes you're foreign until proven otherwise 
  • 4. Issue?   Guardian started publishing a series of exposes revealing NSA operated a major web of spying programs in May 2013. Snowden identity was revealed on 9th June.
  • 5. Correctness of his actions  NSA Claims wiretapping was not intrusion to US citizens Privacy but legitimate way to intercept terrorist activities or communications  “ he wasn’t blowing the whistle on anything illegal; he was exposing something that failed to meet his own standards of propriety. The question, of course, is whether the government can function when all of its employees (and contractors) can take it upon themselves to sabotage the programs they don’t like. That’s what Snowden has done.”
  • 6. Correctness of his actions Snowden contends that he simply wanted the public to know that government was watching and recording people who were doing no wrong. “to inform the public as to that which is done in their name and that which is done against them” 
  • 7.   The NSA view of Americans What People Think Polls between June and August 2013
  • 9. Discussions 1.What is the NSA mission? How deep is the involvement of corporate America in this whole scheme? Is Security of country is more important than Privacy? Credit:Mapsofworld
  • 10. Widescreen Test Pattern (16:9) Aspect Ratio Test (Should appear circular) 4x3 16x9