Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of NSA
Controversies Regarding the NSA and the Rights to Citizen Privacy
By: Marlen Alvarez
Misconceptions About the NSA
NSA: Video Hacking
Big Brother is Watching
Controversies Regarding the NSA Group 8
What Do The Forgotten People Have To Say About The NSA?
NSA’s Efforts to Fight Terrorism
Do the surveillance programs really help stop terrorism?
By: Rachel Harner
The NSA and The Patriot Act
By: Caitlin O'Neill
Some Unknown Human Rights
NSA Domestic Spy Program Clearly Violates Citizen's Rights
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to the Washington Post.
The 4th amendment to the Bill of rights spells out the fundamental legal principles in this area:
“We have 30 Basic Human Rights: Do You Know Them?” SamaritanMag. Nov. 13, 2009. http://www.samaritanmag.com/we-have-30-basic-human-rights-do-you-know-them
Basic rights known
Basic rights unknown?
Ways the NSA CLEARLY violates those rights
Video about why transparency is essential to the government of a free society
Those who allow it
Topics to Discuss
We have 30 basic human rights, according to the Universal Declaration of Human Rights, created by the United Nations in 1948 to provide a global understanding of how to treat individuals.
Some of those rights are
We are all free and equal
The Right to Life: We all have the right to life, and to live in freedom/ safety.
The Right to Privacy
Free to say what you want
: We all have the right to make up our own minds, to think what we like, to say what we think, and to share our ideas with other people.
The Right to Asylum
: If we are frightened of being badly treated in our own country, we all have the right to run away to another country to be safe
Prohibits unreasonable searches/seizures and requires any warrant to be judicially sanctioned and supported by probable cause.
NSA Domestic Spy Program Clearly Violates Citizen's Rights (Con't)
The primary reason the U.S. government is spying on/restricting the activities of its citizens is that the government has failed to take appropriate action against Islamic terrorists and the states that continue to support them, who continue to threaten U.S. citizens/America in general.
Americans who care to preserve our liberty and our security must demand that our government stop spying on peaceable citizens and start doing its job.
People okay with it
A majority of Americans say the National Security Agency’s program tracking the telephone records of millions of Americans is an acceptable way for the government to investigate terrorism, though a substantial minority say it is unacceptable.
The public is more evenly divided over the government’s monitoring of email and other online activities to prevent possible terrorism, these views are largely unchanged since 2002, shortly after the 9/11 terrorist attacks.
These opinions have changed little since an ABC News/Washington Post survey in January 2006. Currently, there are only modest partisan differences in these opinions: 69% of Democrats say it is more important for the government to investigate terrorist threats, even at the expense of personal privacy, as do 62% of Republicans and 59% of independents.
“NSA Domestic Spy Program Clearly Violates Citizens’ Rights.” The Objective Standard. August 16, 2013. http://www.theobjectivestandard.com/2013/08/nsa-domestic-spy-program-clearly-violates-citizens-rights/
“Freedom Requires Whistleblowers: The Importance of Transparency .” Youtube. August 27, 2013.
“Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic.” Pew Research Center for the People & the Press. June 10, 2013. http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic/
Not Accounted For
By: Kyle Walker
Article One: NSA collects web cam images from yahoo users.
“The Guardian reports that the UK’s GCHQ spy agency has been using NSA systems to collect millions of still images from private webcam feeds.”
In 2008 optic nerve supposedly saved screen shots of 1.8 million yahoo users.
“The Five Eye Spying Alliance”
Article Three: Common Security Camera Systems Can Be Easily Hacked to Spy on You
“Major camera systems could be hacked to freeze a frame and allow nefarious activity to take place without being seen on the feed.”
“The hack is done through the public Internet and is one where the perpetrator would be able to keep the frame on a certain image or could spy through it.”
Article Four: US hacked into UN video conferencing, spied on EU
According from the files leaked from Edward Snowden, the NSA has hacked into the UN’s video conference feeds.
"The data traffic gives us internal video teleconferences of the United Nations (yay!),"
The NSA has surveillance of more than 80 embassies and consultants throughout the globe, an initiative called "Special Collection Service.”
Are we as a country in trusting our government to spy into our personal lives?
Is our government taking a communistic approach to spying on their citizens?
Is the true purpose of the US spying on it’s citizens to prevent terroristic attack?
Adam Sneed. “The NSA’s Best Tool for Snooping: You Carry It in Your Pocket Every Day”. Slate. Oct. 29, 14. http://www.slate.com/blogs/future_tense/2013/06/07/nsa_surveillance_iphones_make_snooping_easy_for_spies_and_law_enforcement.html.
Adi Roberts. “NSA reportedly bugged UN offices, hacked into video conferencing feeds”. The Verge. Oct. 29, 14. http://www.theverge.com/2013/8/25/4656798/nsa-reportedly-bugged-un-offices-hacked-into-video-conferencing-feeds.
Andrew Rafferty, “Report: US hacked into UN video conferencing, spied on EU”, NBC News. Oct. 29, 14. http://www.nbcnews.com/news/other/report-us-hacked-un-video-conferencing-spied-eu-f8C10998104.
Graham Tempeton. “GCHQ, NSA secretly collected webcam images from millions of Yahoo users”. ExtremeTech. http://www.extremetech.com/extreme/177500-gchq-nsa-secretly-collected-webcam-images-from-millions-of-yahoo-users.
Liz Klimas. “Ex-NSA Expert: Common Security Camera Systems Can be Easily Hacked to Spy on You”. The Blaze. Oct. 29 2014. http://www.theblaze.com/stories/2013/06/18/ex-nsa-expert-common-security-camera-systems-can-be-easily-hacked-to-spy-on-you/.
Article Two: The NSA’s Best Tool for Snooping: You Carry It in Your Pocket Every Day
“We carry the world’s best surveillance device with us every day.”
“In 2006 it was revealed that the FBI used this technique, called a “roving bug,” to listen into the lives of two alleged mobsters in New York.”
Well, what is it?
“The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances .”
“This Agency also enables Network Warfare operations to defeat terrorists and their organizations at home and abroad, consistent with U.S. laws and the protection of privacy and civil liberties. ”
Is this just a game to you?
Not to the NSA...
Source #1: nsa.gov (“credible”)
Credible: This is their official website
Had a few copies of released cryptologic documents in pdf out for the public eye
“Credible”: They put what looks appealing
Therefore, they have secrets, like Angry Birds
Source #2: ProPublica.org (most credible)
A little outdated (2013)
ProPublica, Journalism in the Public Interest, so it is what they think the public will want to know and should know about.
Gave the most information on what NSA actually collects from americans and non-americans alike and forms a conclusion if its legal or not.
Source #3 Newsy.com (not too credible)
Sources used for the video: The New York Times ProPublica The Guardian National Journal Rovio Salon Kotaku BGR NBC
All Sources Used
“Misson.” NSA.gov. Jan. 15, 2009. https://www.nsa.gov/about/mission/index.shtml
“How the NSA Used Angry Birds For Spying.” Newsy. Jan. 27, 2014. http://www.newsy.com/videos/how-the-nsa-used-angry-birds-for-spying/
“FAQ: What You Need to Know About the NSA’s Surveillance Programs.” Propublica. June 27, 2013. ”http://www.propublica.org/article/nsa-data-collection-faq
Where do they get their information…?
Metadata of phonecalls
“Email, Facebook posts and instant messages”
“Massive amounts of raw Internet traffic”
“The contents of an unknown number of phone calls”
Only in some cases do they need a warrant to listen to calls or look at emails
Legal or not?
Video was "by Matt Picht"
“Although it's unclear whether the NSA has actually plucked user data from Angry Birds players, the mere act of targeting the game has ruffled more than a few feathers around the Internet.”
By: Camillah Sbaity
“Appeals Court Takes On NSA Surveillance Case”
Issue: NSA’s phone data surveillance program makes nation safer or violates privacy?
How program works:
“FBI Spied on American Muslims”
Document released by Snowden and leaked by The Intercept titled, “Meet the Muslim- American Leaders the FBI and NSA Have Been Spying On.”
Standards for probable cause for warrant to be issued for spying on domestic individuals which are:
“US Privacy Confidence At New Low”
91% - “consumers have lost control over how personal information is collected and used by companies.”
Purpose: examine different attitudes towards privacy and the data collected from Edward Snowden’s allegations of government spying.
Report author Mary Madden- “There is both widespread concern about government surveillance among the American public and a lack of confidence in the security of core communication channels.”
According to survey:
Clear differences between mainstream and alternative media sources
Many alternative sources referred to the government as a whole and not as Obama
My articles covered different topics regarding the same issue.
Big Media Coverage of NSA
By: Tony Huber
Edward Snowden: Patriot or Traitor?
By: Richard Luthringshauser
1. FBI receives orders from Foreign Intelligence Court for phone companies to create telephone “metadata”
2.NSA inserts records into a database that searches for suspicions of terrorism.
People Involved in Case:
Judge David Sentelle- “Invasion with mere collection.”
Activist Attorney Larry Klayman- “This is not an insignificant matter with the government standing over our shoulder. I can’t talk on the phone with my clients.”
Justice Department Lawyer H. Thomas Byron- NSA Activist
U.S. District Judge Richard Leon- “Constitution’s ban on reasonable searches.”
No Warrant, No Phone
Person is an agent of foreign power
Person was in violation of U.S. criminal law
Muslims in leaked document did not follow under the standards, they were important public figures
Significance of leaked document:
1st time that specific names are displayed
Shows that NSA may be basing the spying off of religion
Office of the Director of National Intelligence denies that the spying was because of their religion.
No evidence retrieved from released document.
80%- worried about third parties accessing their data
70%- concerned government could access data
64%- it is the government’s job to determine how advertisers retrieve data
Which is safer? Social networks or landline telephone?
84% chose telephone
16% chose internet
AJC News- How NSA collects data and if it was beneficial
NPR News- Spying is lying
BBC News- Statistical facts
Wakefield, J. (Nov. 12, 2014). “US Privacy Confidence At New Low, Survey Indicates.”
BBC News. http://www.bbc.com/news/technology-30004304
Yost, P. (Nov. 04, 2014). “Appeals Court Takes On NSA Surveillance Case.” AJC News.
No Author. (July 10, 2014). “FBI, NSA Spied on American Muslims, Report Says.”
NPR News. http://www.npr.org/2014/07/10/330325121/fbi-nsa-spied-on-american-muslims-report-says
By: Irma Hadziahmetovic
FOX NEWS: NSA Surveillance Programs Helped Foil Terror Plots in 20 Countries ?
US intelligence officials released 3-page document regarding NSA's controversial programs gathering millions of phone and email records that "help foil dozens of potential terror plots" in the US and in more than 20 other countries
NSA destroys data every 5 years
"In recent years, the intelligence gathered under them has contributed to the disruption of dozens of potential terrorist pots here in the homeland and in more than 20 countries around the world"
officials say that phone records program helped NSA stop a 2009 Al-Qaeda plot to blow up New York City subways
program helped track a co-conspirator of Al-Qaeda, Najibullah Zazi
debates and legal actions against Obama administration by privacy activists who claim the data collection goes far beyond what was intended when expanded counter-terrorism measures were authorized by Congress after the terror attacks of Sept. 11, 2001
article failed to explain in depth just how the programs have helped fight terrorism plots
why is the data destroyed every 5 years
article failed to explain what the programs are
Al-Jazeera News: Reports Suggests NSA Surveillance Has NOT Stopped Terrorism?
New analysis of the NSA’s data-collection programs suggests that some of its most controversial techniques may not be effective in stopping Al-Qaeda and other groups from attacking the US
New American Foundation conducted study on NSA and Obama's claims that the agency's bulk data collection programs helped stop dozens of attacks on US target
study examined records for investigations into 225 people who have been indicted, convicted or killed by the U.S. for their reported ties to Al-Qaeda and Al-Qaeda-affiliated groups like Al-Shabab after Sept. 11, 2001.
review found that collection of data was responsible for initiating investigations in only 4 of the 225 cases detailed by the New America Foundation and that none of those 4 prevented attacks
“We know of at least 50 threats that have been averted because of this information not just in the United States but, in some cases, threats in Germany. So lives have been saved.”
New America Foundation found that less controversial NSA programs — like monitoring of non–U.S. citizens suspected of being affiliated with Al-Qaeda or similar groups — played more crucial but still small roles in initiating investigations after 9/11
"The overall problem for U.S. counter terrorism officials is not that they need the information from the bulk collection of phone data but that they don’t sufficiently understand or widely share the information they already possess that is derived from conventional law enforcement and intelligence techniques"
CNN News: Snooping is Crucial to Fighting Terrorism?
NSA director General Keith Alexander says government surveilaance programs have prevented 54 terrorist attacks around the world, including 13 in the US
programs collect phone metadata and online communications in an effort to root out potential terrorists
"I promise you the truth -- what we know, what we're doing, and what I cannot tell you because we don't want to jeopardize our future defense"
NSA collects metadata on phone calls in US, including the date and time of the call, the numbers involved and the length of the conversations, but makes clear the NSA does not have access to the content of the citizens' calls or messages
NSA's PRISM surveillance program probes digital activity such as emails, instant messages and Web searches that focus on foreign actors and does not apply to people in the US
CNN News: Snooping is Crucial to Fighting Terrorism? (Con't)
“Officials: NSA surveillance programs helped foil terror plots in 20 countries.” FOX News. June 16, 2013. http://www.foxnews.com/politics/2013/06/16/officials-nsa-programs-broke-plots-in-20-nations-1706735692/
“NSA chief: Snooping is crucial to fighting terrorism." CNN News. August 1, 2013. http://www.cnn.com/2013/07/31/tech/web/nsa-alexander-black-hat/
“Report suggests NSA surveillance has not stopped terrorism." Al-Jazeera America News. January 13, 2014. http://america.aljazeera.com/articles/2014/1/13/review-finds-nsametadatacollectionhasntstoppedanattack.html
Phone and internet data are necessary to "connect the dot's" and identify potential terrorists before they act
NSA is not abusing access to the databases to intrude on Americans' privacy
Congress and courts make sure programs operate within bounds of the Foreign Intelligence Surveillance Act
no mention of another secret program: XKeyscore
XKeyscore allows analysts to search wit no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of people
Alexander denied that NSA programs allow government to collect all online data on everyone, says, "We can't afford to and don't want to collect everything."
"If we tell everyone exactly what we're doing, then the adversaries will know exactly how to get through our defenses"
"You lied to Congress. Why would we believe you're not lying to us right now?"
article fully discussed which programs NSA was using and how they work
didn’t fully provide enough evidence
biased, only covered one side
covered both sides
facts for what they are
How the did the Patriot Act legalize the unconstitutional actions of the NSA?
The Patriot Act And Phone Data Collection: Source 1
"...vague wording in the Patriot Act is to blame... which has been ruled to grant the NSA the power to collect phone numbers and call data"
Where the Spying Comes From: Source 2
Most of the NSA's justification for privacy invasion comes from Section 215
The Constant Battle: Source 3
Since the Patriot Act has been put into law, several amendments have been attempted
Chokshi, Niraj. (2013). National Journal. Retrieved from http://www.nationaljournal.com/nationalsecurity/nsa-spying-appears-to-stem-from-550-word-section-of-patriot-act-20130607
Lichtblau, Eric, Risen, James. (2005, Dec 16). The New York Times. Retrieved from http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=print
Mead, Derek. (2013, Sept 7). Motherboard. Retrieved from http://motherboard.vice.com/blog/how-congress-and-the-patriot-act-made-the-nsas-phone-data-collection-legal
The justification is that the only way to know the terrorists phone call habits is to collect ALL call data as a control
"The explicit terms of the statute require 'a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant'
Congress did not define what the parameters of "relevant" are
Allows violation of "audio and video chats, photographs, e-mails, documents, and connection logs"
authorizes the government to order businesses to turn over "the production of any tangible things (including books, records, papers, documents, and other items)," provided a secret court approves and deems the data relevant to a national security investigation
So a secret organization, with a secret court, defines what is legal to seize,
without a warrant
, based on the vague terminology of an unconstitutional law
The Supreme Court rejected an appeal that would allow for those labeled as "enemy combatants" to be detain indefinitely without a trial
The NSA was originally only authorized to "eavesdrop" on foreign entities. With the passing of the Patriot Act the NSA was not only permitted, but now obligated, to spy on the American people
The agency can choose its eavesdropping targets and does not have to seek approval from Justice Department
: A valid opinion and well written, but it came from a web page that isn't well known, and had very little supporting evidence for the opinion.
: Stated an interpretation directly from the Patriot Act. Supported the opinion with evidence, and had valid sources
: This source was the most credible. It came from a well known organization, the New York Times. It was also detailed and discussed the issues in depth.
"The government listens to my telephone calls"
The government does not listen to your telephone calls
The NSA is only allowed to:
"The NSA tracks everyone at all times"
This is incorrect
Only certain people are targeted
The NSA has filters on the internet and telecom systems
Only information that has the right key words, target words, names and telephone information are tracked
"The NSA gets information without warrants and gets away with it"
This is incorrect
The NSA is required to get a warrant
The warrant needs to come from a three judge court
Information without a warrant is worth nothing and cannot be used against you
"U.S. people that leave the country are still being targeted"
It is illegal under Section 702 of the Foreign Intelligence Surveillance Act
Section 702 states that U.S. People cannot be targeted if they are abroad
Misconceptions arise from not enough research and people giving false information
It cause paranoia and dislike towards our government
The NSA is helping to fight terrorism
They also have certain boundaries they cannot cross
Bamford, Jim. (2013). NSA investigator from wired magazine answers your questions. Hot Stock Market: Financial Message Boards. Retrieved from http://www.hotstockmarket.com/t/274685/nsa-investigator-from-wired-magazine-answers-your-questions
(2014). Myths of NSA surveillance program debunked. NBC News. Retrieved from http://www.nbcnews.com/watch/nbc-news/myths-of-nsa-surveillance-program-debunked-295225411773
Shapiro, Gary. (2013). Five myths about telephone snooping and our government. Fox News. Retrieved from http://www.foxnews.com/opinion/2013/06/28/five-myths-about-telephone-snooping-and-our-government/
"My call information does not help fight terrorism"
Your information combined with others information helps to see patterns
The NSA identifies the patterns that may be linked to a terrorist plot
And this helps fight terrorism
analyze the numbers being called
the duration of the calls
person being called
They have access to your phone records not to what you said
Big Media Background
Typical new stations on TV
Big name newspapers and magazines
Brian Williams Interview with Snowden
Tone of interview and other commentaries after interview were hostile towards Snowden
I felt as if NBC sided with the government and was belittling Snowden’s findings and kept brushing it off and saying that the NSA is what the government told everyone it was and Snowden’s findings may be fake.
They did focus on how smart they thought he was
Obama never says for sure that everything Snowden said is true but he did, however, plan to change how the NSA collects the phone records and speaks about how they directly violate privacy.
Narrowed the rules to: When having a suspect they can only go 2 steps from the suspect, as opposed to three before. Also, now they have to have a court approval to use phones number to make queries in the database.
Obama very much bashes Snowden for what he did and indirectly discredits anything he has said by saying that he's "just a hacker".
More in depth with what exactly the NSA is doing
Very in depth on how they collected data from phones and internet usage
Never gave an opinion on how they feel about all of this happening
Although not giving their opinion directly, they do give information on the legality of the wire tapping and collection of data. They also talk about various law suits that prohibit this
Overview of Big Media
Although credible, they were biased towards the government. Even though they do not particularly agree with the NSA having as much power as they do, they do not bash on it at all. In the example of Snowden they discredited his work and focused more on how his findings may be wrong, opposed to talking about how the NSA may do these things and we need to be worried about it. This is because news today tries to be so neutral so no one gets offended and they lose viewers and ultimately funding. The Washington post did, however, go into more depth of what the NSA was actually doing, but on a very diluted scale as to what was unveiled by Snowden. Also, they may have a younger audience so they try to keep things at a moderate level in terms of world wide pandemic. Obama does a very good job at not making this a world wide terror.
Snowden Video Clip:
Washington Post Article: http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html
Obama Article: http://www.nytimes.com/2014/03/25/us/obama-to-seek-nsa-curb-on-call-data.html?_r=0
Who is Edward Snowden?
Subcontractor for Booz Allen
“Freedom must be won anew by every new generation” – Jack Kemp
Copying of information from NSA was theft
Snowden fled the United States to China
Snowden leaked this information to unauthorized people
The information leaked has damaged relations with other countries
The information leaked has damaged the ability to protect this country.
60% of people polled after the leak showed that people in their 20’s agreed with Snowden and believed it was in the public’s interest
Terror organizations have now changed the way they communicate to avoid detection by the NSA
Leaking how the intelligence apparatus works has made it harder to protect the country
Two contradictory Reactions
Boston Marathon Bombing
Two contradictory reactions ( con't)
The NSA leaks by Snowden
Worked in the NSA’s Oahu office
Spent three months collecting top-secret documents pertaining to NSA surveillance practices, which he claims he found personally disturbing.
Outcry that not enough was done to identify potential terror suspects
The government is doing too much to identify potential terror suspects
Where is the middle ground?
Edward Joseph Snowden. (2014). The Biography.com website. Retrieved Nov 01, 2014, from http://www.biography.com/people/edward-snowden-21262897.
Van Cleave, M. (2013). What it Takes. World Affairs, 176(4), 57-64.
Edward Snowden has stripped us of all illusion about our digital world. (2014). Infoworld.com website. Retrieved Nov 01, 2014, from http://www.infoworld.com/article/2609634/internet-privacy/edward-snowden-has-stripped-us-of-all-illusion-about-our-digital-world.html.
Edward Snowden – Patriot or Traitor? (2014). Youtube.com website. Retrieved Nov 01, 2014, from