SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
z
This Photo by Unknown Author is licensed under CC BY-SA-NC
WHAT IS GOVERNMENT
SURVEILANCE ?
My position on this subject is that, I think that security is somewhat
necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct
when he states that terrorism can be a cover up to put a plan In action. I am
aware of the fact that the more acts of terror that are committed ,the more laws
can be implicated due to perceived terrorist acts.
This also gives people the right to invade foreign countries and take whatever
they want to take from these countries, including natural resources ,etc.
This Photo by Unknown Author is licensed under CC BY-SA
Privacy today faces growing threats from a growing surveillance
apparatus that is often justified in the name of national
security. Numerous government agencies—including the
National Security Agency, the Federal Bureau of Investigation,
the Department of Homeland Security, and state and local law
enforcement agencies—intrude upon the private
communications of innocent citizens, amass vast databases of
who we call and when, and catalog “suspicious activities”
based on the vaguest standards.
z
SECURITY
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Numerous government agencies—
including the National Security Agency, the Federal Bureau of Investigation, the
Department of Homeland Security, and state and local law enforcement agencies—
intrude upon the private communications of innocent citizens, amass vast
databases of who we call and when, and catalog “suspicious activities” based on
the vaguest standards.
The government’s collection of this sensitive information is itself an invasion of
privacy. But its use of this data is also rife with abuse. Innocuous data is fed into
bloated watchlists, with severe consequences—innocent individuals have found
themselves unable to board planes, barred from certain types of jobs, shut out of
their bank accounts, and repeatedly questioned by authorities. Once information is
in the government’s hands, it can be shared widely and retained for years, and the
rules about access and use can be changed entirely in secret without the public
ever knowing.
This Photo by Unknown Author is licensed under CC BY-SA-NC
z DOUBLE EDGED
SWORD
Another important idea that we
must observe s the notion that all
the technology we are given
including apps ,Internet,
cellphones etc.(sky drives)can be
used against us .Cloud storages
can store tangible evidence of all
of your documents and pics ,etc. A
cell phone is almost always in the
palm of our hands. GPS can track
us through cellular devices.
Facebook shows the world, who
we know and associate with.
This Photo by Unknown Author is licensed under CC BY-NC-ND
z
ACLU
AMERICAN CIVIL
LIBERTIES UNION
7 Facts About ACLU
▪ ACLU is Non Profit
▪ The ACLU Was founded after
WW1 (1917) in 1920 to protect
those who objected to the war
▪ Many members are lawyers and
volunteers
▪ The New York times was not
initially a fan
▪ Nor was President Woodrow
Wilson
▪ One of the earliest cases was one
of most legendary
▪ ACLU participates in more
Supreme Court cases than any
other private organization
z
NSA
The National Security
Agency (NSA) is an
intelligence agency of
the United States and
comes under the
Department of Defense.
This Photo by Unknown Author is licensed under CC BY-SA
z
The primary purpose of NSA is the collection of foreign
communications data and its analysis with regards to the security
of American communications against other agencies. The Director
of National Intelligence heads the agency.
The NSA headquarter is based 16km from Washington at Fort
George G. Meade in Maryland. NSA is one of the most secretive
intelligence agencies in the world. For many years the United
States government didn't acknowledge its existence. It was
jokingly referred as ‘No Such Agency’.
NSA is one of the most secretive intelligence agencies in the
world. For many years the United States government didn't
acknowledge its existence. It was jokingly referred as ‘No Such
Agency’.
NSA eavesdrops on all forms of intercepted communication
including internet and radio broadcast by different individuals and
organizations. All confidential, sensitive government
FACTS ABOUT NSA
REFERENCES https://www.youtube.com/watch?v=tRRJnAbSdRE
https://www.youtube.com/watch?v=FmnLa3F5Piw
https://www.topspysecrets.com/national-security-agency.html

Contenu connexe

Tendances

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation AssignmentMuhammed Haidri
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyKavitha Gupta, CIPP-Asia
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010neeraj tiwari
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacyjbaton
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issuesGeritt Contillo
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2Kerry McCartney-Prout
 

Tendances (19)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Presentación3
Presentación3Presentación3
Presentación3
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Chapter14
Chapter14Chapter14
Chapter14
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 

Dernier

Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...Krashi Coaching
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17Celine George
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptxmanishaJyala2
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIagpharmacy11
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfMinawBelay
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 

Dernier (20)

Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 

GOVERNMENT SURVEILANCE

  • 1. z This Photo by Unknown Author is licensed under CC BY-SA-NC WHAT IS GOVERNMENT SURVEILANCE ?
  • 2. My position on this subject is that, I think that security is somewhat necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct when he states that terrorism can be a cover up to put a plan In action. I am aware of the fact that the more acts of terror that are committed ,the more laws can be implicated due to perceived terrorist acts. This also gives people the right to invade foreign countries and take whatever they want to take from these countries, including natural resources ,etc. This Photo by Unknown Author is licensed under CC BY-SA
  • 3. Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies—including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards.
  • 4. z SECURITY Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies— including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies— intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse. Innocuous data is fed into bloated watchlists, with severe consequences—innocent individuals have found themselves unable to board planes, barred from certain types of jobs, shut out of their bank accounts, and repeatedly questioned by authorities. Once information is in the government’s hands, it can be shared widely and retained for years, and the rules about access and use can be changed entirely in secret without the public ever knowing. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 5. z DOUBLE EDGED SWORD Another important idea that we must observe s the notion that all the technology we are given including apps ,Internet, cellphones etc.(sky drives)can be used against us .Cloud storages can store tangible evidence of all of your documents and pics ,etc. A cell phone is almost always in the palm of our hands. GPS can track us through cellular devices. Facebook shows the world, who we know and associate with. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. z ACLU AMERICAN CIVIL LIBERTIES UNION 7 Facts About ACLU ▪ ACLU is Non Profit ▪ The ACLU Was founded after WW1 (1917) in 1920 to protect those who objected to the war ▪ Many members are lawyers and volunteers ▪ The New York times was not initially a fan ▪ Nor was President Woodrow Wilson ▪ One of the earliest cases was one of most legendary ▪ ACLU participates in more Supreme Court cases than any other private organization
  • 7. z NSA The National Security Agency (NSA) is an intelligence agency of the United States and comes under the Department of Defense. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. z The primary purpose of NSA is the collection of foreign communications data and its analysis with regards to the security of American communications against other agencies. The Director of National Intelligence heads the agency. The NSA headquarter is based 16km from Washington at Fort George G. Meade in Maryland. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA eavesdrops on all forms of intercepted communication including internet and radio broadcast by different individuals and organizations. All confidential, sensitive government FACTS ABOUT NSA