SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
z
This Photo by Unknown Author is licensed under CC BY-SA-NC
WHAT IS GOVERNMENT
SURVEILANCE ?
My position on this subject is that, I think that security is somewhat
necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct
when he states that terrorism can be a cover up to put a plan In action. I am
aware of the fact that the more acts of terror that are committed ,the more laws
can be implicated due to perceived terrorist acts.
This also gives people the right to invade foreign countries and take whatever
they want to take from these countries, including natural resources ,etc.
This Photo by Unknown Author is licensed under CC BY-SA
Privacy today faces growing threats from a growing surveillance
apparatus that is often justified in the name of national
security. Numerous government agencies—including the
National Security Agency, the Federal Bureau of Investigation,
the Department of Homeland Security, and state and local law
enforcement agencies—intrude upon the private
communications of innocent citizens, amass vast databases of
who we call and when, and catalog “suspicious activities”
based on the vaguest standards.
z
SECURITY
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Numerous government agencies—
including the National Security Agency, the Federal Bureau of Investigation, the
Department of Homeland Security, and state and local law enforcement agencies—
intrude upon the private communications of innocent citizens, amass vast
databases of who we call and when, and catalog “suspicious activities” based on
the vaguest standards.
The government’s collection of this sensitive information is itself an invasion of
privacy. But its use of this data is also rife with abuse. Innocuous data is fed into
bloated watchlists, with severe consequences—innocent individuals have found
themselves unable to board planes, barred from certain types of jobs, shut out of
their bank accounts, and repeatedly questioned by authorities. Once information is
in the government’s hands, it can be shared widely and retained for years, and the
rules about access and use can be changed entirely in secret without the public
ever knowing.
This Photo by Unknown Author is licensed under CC BY-SA-NC
z DOUBLE EDGED
SWORD
Another important idea that we
must observe s the notion that all
the technology we are given
including apps ,Internet,
cellphones etc.(sky drives)can be
used against us .Cloud storages
can store tangible evidence of all
of your documents and pics ,etc. A
cell phone is almost always in the
palm of our hands. GPS can track
us through cellular devices.
Facebook shows the world, who
we know and associate with.
This Photo by Unknown Author is licensed under CC BY-NC-ND
z
ACLU
AMERICAN CIVIL
LIBERTIES UNION
7 Facts About ACLU
▪ ACLU is Non Profit
▪ The ACLU Was founded after
WW1 (1917) in 1920 to protect
those who objected to the war
▪ Many members are lawyers and
volunteers
▪ The New York times was not
initially a fan
▪ Nor was President Woodrow
Wilson
▪ One of the earliest cases was one
of most legendary
▪ ACLU participates in more
Supreme Court cases than any
other private organization
z
NSA
The National Security
Agency (NSA) is an
intelligence agency of
the United States and
comes under the
Department of Defense.
This Photo by Unknown Author is licensed under CC BY-SA
z
The primary purpose of NSA is the collection of foreign
communications data and its analysis with regards to the security
of American communications against other agencies. The Director
of National Intelligence heads the agency.
The NSA headquarter is based 16km from Washington at Fort
George G. Meade in Maryland. NSA is one of the most secretive
intelligence agencies in the world. For many years the United
States government didn't acknowledge its existence. It was
jokingly referred as ‘No Such Agency’.
NSA is one of the most secretive intelligence agencies in the
world. For many years the United States government didn't
acknowledge its existence. It was jokingly referred as ‘No Such
Agency’.
NSA eavesdrops on all forms of intercepted communication
including internet and radio broadcast by different individuals and
organizations. All confidential, sensitive government
FACTS ABOUT NSA
REFERENCES https://www.youtube.com/watch?v=tRRJnAbSdRE
https://www.youtube.com/watch?v=FmnLa3F5Piw
https://www.topspysecrets.com/national-security-agency.html

Contenu connexe

Tendances

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
sevans-idaho
 
The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
Muhammed Haidri
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
Bill Bode
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
neeraj tiwari
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
Geritt Contillo
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
Kerry McCartney-Prout
 

Tendances (19)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Presentación3
Presentación3Presentación3
Presentación3
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Chapter14
Chapter14Chapter14
Chapter14
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 

Dernier

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 

Dernier (20)

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 

GOVERNMENT SURVEILANCE

  • 1. z This Photo by Unknown Author is licensed under CC BY-SA-NC WHAT IS GOVERNMENT SURVEILANCE ?
  • 2. My position on this subject is that, I think that security is somewhat necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct when he states that terrorism can be a cover up to put a plan In action. I am aware of the fact that the more acts of terror that are committed ,the more laws can be implicated due to perceived terrorist acts. This also gives people the right to invade foreign countries and take whatever they want to take from these countries, including natural resources ,etc. This Photo by Unknown Author is licensed under CC BY-SA
  • 3. Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies—including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards.
  • 4. z SECURITY Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies— including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies— intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse. Innocuous data is fed into bloated watchlists, with severe consequences—innocent individuals have found themselves unable to board planes, barred from certain types of jobs, shut out of their bank accounts, and repeatedly questioned by authorities. Once information is in the government’s hands, it can be shared widely and retained for years, and the rules about access and use can be changed entirely in secret without the public ever knowing. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 5. z DOUBLE EDGED SWORD Another important idea that we must observe s the notion that all the technology we are given including apps ,Internet, cellphones etc.(sky drives)can be used against us .Cloud storages can store tangible evidence of all of your documents and pics ,etc. A cell phone is almost always in the palm of our hands. GPS can track us through cellular devices. Facebook shows the world, who we know and associate with. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. z ACLU AMERICAN CIVIL LIBERTIES UNION 7 Facts About ACLU ▪ ACLU is Non Profit ▪ The ACLU Was founded after WW1 (1917) in 1920 to protect those who objected to the war ▪ Many members are lawyers and volunteers ▪ The New York times was not initially a fan ▪ Nor was President Woodrow Wilson ▪ One of the earliest cases was one of most legendary ▪ ACLU participates in more Supreme Court cases than any other private organization
  • 7. z NSA The National Security Agency (NSA) is an intelligence agency of the United States and comes under the Department of Defense. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. z The primary purpose of NSA is the collection of foreign communications data and its analysis with regards to the security of American communications against other agencies. The Director of National Intelligence heads the agency. The NSA headquarter is based 16km from Washington at Fort George G. Meade in Maryland. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA eavesdrops on all forms of intercepted communication including internet and radio broadcast by different individuals and organizations. All confidential, sensitive government FACTS ABOUT NSA