SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
z
This Photo by Unknown Author is licensed under CC BY-SA-NC
WHAT IS GOVERNMENT
SURVEILANCE ?
My position on this subject is that, I think that security is somewhat
necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct
when he states that terrorism can be a cover up to put a plan In action. I am
aware of the fact that the more acts of terror that are committed ,the more laws
can be implicated due to perceived terrorist acts.
This also gives people the right to invade foreign countries and take whatever
they want to take from these countries, including natural resources ,etc.
This Photo by Unknown Author is licensed under CC BY-SA
Privacy today faces growing threats from a growing surveillance
apparatus that is often justified in the name of national
security. Numerous government agencies—including the
National Security Agency, the Federal Bureau of Investigation,
the Department of Homeland Security, and state and local law
enforcement agencies—intrude upon the private
communications of innocent citizens, amass vast databases of
who we call and when, and catalog “suspicious activities”
based on the vaguest standards.
z
SECURITY
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Numerous government agencies—
including the National Security Agency, the Federal Bureau of Investigation, the
Department of Homeland Security, and state and local law enforcement agencies—
intrude upon the private communications of innocent citizens, amass vast
databases of who we call and when, and catalog “suspicious activities” based on
the vaguest standards.
The government’s collection of this sensitive information is itself an invasion of
privacy. But its use of this data is also rife with abuse. Innocuous data is fed into
bloated watchlists, with severe consequences—innocent individuals have found
themselves unable to board planes, barred from certain types of jobs, shut out of
their bank accounts, and repeatedly questioned by authorities. Once information is
in the government’s hands, it can be shared widely and retained for years, and the
rules about access and use can be changed entirely in secret without the public
ever knowing.
This Photo by Unknown Author is licensed under CC BY-SA-NC
z DOUBLE EDGED
SWORD
Another important idea that we
must observe s the notion that all
the technology we are given
including apps ,Internet,
cellphones etc.(sky drives)can be
used against us .Cloud storages
can store tangible evidence of all
of your documents and pics ,etc. A
cell phone is almost always in the
palm of our hands. GPS can track
us through cellular devices.
Facebook shows the world, who
we know and associate with.
This Photo by Unknown Author is licensed under CC BY-NC-ND
z
ACLU
AMERICAN CIVIL
LIBERTIES UNION
7 Facts About ACLU
▪ ACLU is Non Profit
▪ The ACLU Was founded after
WW1 (1917) in 1920 to protect
those who objected to the war
▪ Many members are lawyers and
volunteers
▪ The New York times was not
initially a fan
▪ Nor was President Woodrow
Wilson
▪ One of the earliest cases was one
of most legendary
▪ ACLU participates in more
Supreme Court cases than any
other private organization
z
NSA
The National Security
Agency (NSA) is an
intelligence agency of
the United States and
comes under the
Department of Defense.
This Photo by Unknown Author is licensed under CC BY-SA
z
The primary purpose of NSA is the collection of foreign
communications data and its analysis with regards to the security
of American communications against other agencies. The Director
of National Intelligence heads the agency.
The NSA headquarter is based 16km from Washington at Fort
George G. Meade in Maryland. NSA is one of the most secretive
intelligence agencies in the world. For many years the United
States government didn't acknowledge its existence. It was
jokingly referred as ‘No Such Agency’.
NSA is one of the most secretive intelligence agencies in the
world. For many years the United States government didn't
acknowledge its existence. It was jokingly referred as ‘No Such
Agency’.
NSA eavesdrops on all forms of intercepted communication
including internet and radio broadcast by different individuals and
organizations. All confidential, sensitive government
FACTS ABOUT NSA
REFERENCES https://www.youtube.com/watch?v=tRRJnAbSdRE
https://www.youtube.com/watch?v=FmnLa3F5Piw
https://www.topspysecrets.com/national-security-agency.html

Mais conteúdo relacionado

Mais procurados

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation AssignmentMuhammed Haidri
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyKavitha Gupta, CIPP-Asia
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010neeraj tiwari
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacyjbaton
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issuesGeritt Contillo
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2Kerry McCartney-Prout
 

Mais procurados (19)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Presentación3
Presentación3Presentación3
Presentación3
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Chapter14
Chapter14Chapter14
Chapter14
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

GOVERNMENT SURVEILANCE

  • 1. z This Photo by Unknown Author is licensed under CC BY-SA-NC WHAT IS GOVERNMENT SURVEILANCE ?
  • 2. My position on this subject is that, I think that security is somewhat necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct when he states that terrorism can be a cover up to put a plan In action. I am aware of the fact that the more acts of terror that are committed ,the more laws can be implicated due to perceived terrorist acts. This also gives people the right to invade foreign countries and take whatever they want to take from these countries, including natural resources ,etc. This Photo by Unknown Author is licensed under CC BY-SA
  • 3. Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies—including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards.
  • 4. z SECURITY Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies— including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies— intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse. Innocuous data is fed into bloated watchlists, with severe consequences—innocent individuals have found themselves unable to board planes, barred from certain types of jobs, shut out of their bank accounts, and repeatedly questioned by authorities. Once information is in the government’s hands, it can be shared widely and retained for years, and the rules about access and use can be changed entirely in secret without the public ever knowing. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 5. z DOUBLE EDGED SWORD Another important idea that we must observe s the notion that all the technology we are given including apps ,Internet, cellphones etc.(sky drives)can be used against us .Cloud storages can store tangible evidence of all of your documents and pics ,etc. A cell phone is almost always in the palm of our hands. GPS can track us through cellular devices. Facebook shows the world, who we know and associate with. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. z ACLU AMERICAN CIVIL LIBERTIES UNION 7 Facts About ACLU ▪ ACLU is Non Profit ▪ The ACLU Was founded after WW1 (1917) in 1920 to protect those who objected to the war ▪ Many members are lawyers and volunteers ▪ The New York times was not initially a fan ▪ Nor was President Woodrow Wilson ▪ One of the earliest cases was one of most legendary ▪ ACLU participates in more Supreme Court cases than any other private organization
  • 7. z NSA The National Security Agency (NSA) is an intelligence agency of the United States and comes under the Department of Defense. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. z The primary purpose of NSA is the collection of foreign communications data and its analysis with regards to the security of American communications against other agencies. The Director of National Intelligence heads the agency. The NSA headquarter is based 16km from Washington at Fort George G. Meade in Maryland. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA eavesdrops on all forms of intercepted communication including internet and radio broadcast by different individuals and organizations. All confidential, sensitive government FACTS ABOUT NSA