Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
NSA surveillance and individual privacy
Transcript of NSA surveillance and individual privacy
What does the NSA do?
Who helps the NSA data mine?
Where do they gather Information from?
By Inka Zimmer
10.8 Billion in 2013
The NSA was created during WWII, in November of 1952 as a unit to decrypt German and Japanese code. It has now grown vastly and has one of the largest staff populations and budgets of any U.S. intelligence organization.
According to NSA's website, "The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances." (nsa.gov)
How does the NSA collect information?
NSA Surveillance and Individual Privacy
The NSA has come up with many ways to collect information including wiretaps, video surveillance, GPS trackers, but now a days they don't have to work so hard since the public has done most of the work for them just by using and surfing the internet.
Pros of NSA Surveillance
Chappell, Bill. "NSA Reportedly Mines Servers Of U.S. Internet Firms For Data." NPR. NPR, n.d. Web. 01 Apr. 2014.
Lee, Timothy B. "Here’s Everything We Know about PRISM to Date." Here’s Everything We Know about PRISM to Date. Washington Post, 12 June 2013. Web. 01 Apr. 2014.
"National Security Agency." Wikipedia. Wikimedia Foundation, 04 Feb. 2014. Web. 31 Mar. 2014.
"NSA Mission." The NSA/CSS Mission. N.p., n.d. Web. 31 Mar. 2014.
Risen, James, and Laura Poitras. "N.S.A. GathersData on SocialConnections OfU.S. Citizens." The New York Times. The New York Times, 28 Sept. 2013. Web. 02 Apr. 2014.
"What Is the FISA Court?" CNN. Cable News Network, 17 Jan. 2014. Web. 02 Apr. 2014.
Fort Mead, MD
What does this mean in layman's terms?
The NSA's goal is to protect U.S. citizens by cracking codes. Through SIGINT the NSA collects data that America's enemies wish to keep secret. Through IA the NSA protects America's security information and security systems from theft or damage.
According to the New York Times, "The spy agency (NSA) began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations." (nytimes.com) Most of the online data collected comes from the most popular Internet services available.
In one of the documents that former NSA employee, Edward Snowden leaked, it states that the NSA's PRISM system is used "to gain access to the private communications of users of nine popular Internet services. We know that access is governed by Section 702 of the Foreign Intelligence Surveillance Act (FISA), which was enacted in 2008." (washingtonpost.com) This access to information includes emails, pictures, videos and connection logs.
Foreign Intelligence Surveillance Act (FISA)
Cons of NSA Surveillance
In a surveillance society people are left without privacy which can leave citizens feeling uncomfortable.
It can also be seen as a violation of the 4th amendment.
Is a federal law that grants the government access to physical and electronic monitoring specifically for foreign intelligence purposes.
So whats the concern?
The Washington Post believes that "the surveillance may not "intentionally target" an American, but the NSA can obtain the private communications of Americans as part of a request that officially "targets" a foreigner."
FISA and our privacy
Picture taken from Washingtonpost.com
A surveillance society makes the world a safer place to live in as it holds people accountable for their actions.
It can help prevent crimes from happening before its too late.
Since the Snowden leak, there has been a uproar about how the public's information is being collected and what it is being used for. The accused companies have claimed that the public's information is protected and that they are not giving the NSA direct access. However, the New York Times has claimed that these companies have systems in place that "involve access to data under individual FISA requests. And in some cases, the data is transmitted to the government electronically, using a company’s servers."(nytimes.com)
Individual Privacy Concern