SlideShare a Scribd company logo
1 of 9
Privacy and Surveillance
What?In the next two lessons, you will read news articles on
Edward Snowden, produce an informative powerpoint or word
document on Snowden and his actions and then consider
questions regarding surveillance and privacy.
Why? (1) Reading news articles improves your reading skills and
close reading skills; and (2) this task will also function as research
for our study of George Orwell’s ‘1984’.
What is ‘Surveillance’?
What is ‘privacy’?
Edward Snowden
Many people feel that Edward Snowden, the 29
year old responsible for leaking top secret details
regarding national surveillance, has opened up
the debate around privacy and forced people to
consider and question the boundaries of
government surveillance.
You are going to spend today’s lesson learning
about and researching Snowden and the
repercussions of this leak.
You will demonstrate this understanding by creating
a word document/Powerpoint presentation which
explains:
1) Who Edward Snowden is;
2) What he has done;
3) Why it has caused international uproar;
4) The repercussions of his actions;
5) What you think will happen next with this case.
This should be finished by the end of today’s lesson
and then emailed to shamilton1@edubuzz.org
Start here…
• http://news.yahoo.com/timeline-edward-
snowdens-life-know-215318119--abc-news-
topstories.html
• http://www.guardian.co.uk/world/2013/jun/1
1/edward-snowden-nsa-whistleblower-profile
• http://www.guardian.co.uk/world/2013/jun/0
6/us-tech-giants-nsa-data
• http://www.guardian.co.uk/world/2013/jun/1
7/edward-snowden-nsa-files-whistleblower
Start here…
• http://www.guardian.co.uk/commentisfree/2
013/jun/21/obama-national-security-state-
rogue
• http://www.guardian.co.uk/world/2013/jun/2
2/nsa-leaks-britain-us-surveillance
• http://theweek.com/article/index/245788/ha
s-snowden-crossed-a-red-line
Once you’ve created your
Powerpoint/Word document and
emailed it to Miss Hamilton, you are
ready to consider privacy and
surveillance more generally…
Answer these questions on paper and hand it in to Miss Hamilton at
the end of the lesson.
Many people feel that Edward Snowden, the 29 year old
responsible for leaking top secret details regarding national
surveillance, has opened up the debate around privacy and forced
people to consider and question the boundaries of government
surveillance.
1. To what extent do you think this is the case?
2. How do you feel about the revelations regarding the extent of the
US Government’s surveillance?
3. Do you think Snowden was wrong to leak details of national
security? Explain your answer fully.
4. Do you have a problem with your Government accessing your
emails, texts, tweets, Facebook status updates, photos etc?
Explain your answer.
5. Lots of people are saying that if you have nothing to hide then you
should have no problem with surveillance. To what extent do you
agree with this? Explain your answer fully.

More Related Content

Viewers also liked

Mass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden CaseMass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden Case
Hacking Mom
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Mass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden CaseMass Internet Surveillance: The Snowden Case
Mass Internet Surveillance: The Snowden Case
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Smart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PISmart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PI
 
"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 

More from misshamilton1 (20)

Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

Privacy and surveillance

  • 1. Privacy and Surveillance What?In the next two lessons, you will read news articles on Edward Snowden, produce an informative powerpoint or word document on Snowden and his actions and then consider questions regarding surveillance and privacy. Why? (1) Reading news articles improves your reading skills and close reading skills; and (2) this task will also function as research for our study of George Orwell’s ‘1984’.
  • 4. Edward Snowden Many people feel that Edward Snowden, the 29 year old responsible for leaking top secret details regarding national surveillance, has opened up the debate around privacy and forced people to consider and question the boundaries of government surveillance. You are going to spend today’s lesson learning about and researching Snowden and the repercussions of this leak.
  • 5. You will demonstrate this understanding by creating a word document/Powerpoint presentation which explains: 1) Who Edward Snowden is; 2) What he has done; 3) Why it has caused international uproar; 4) The repercussions of his actions; 5) What you think will happen next with this case. This should be finished by the end of today’s lesson and then emailed to shamilton1@edubuzz.org
  • 6. Start here… • http://news.yahoo.com/timeline-edward- snowdens-life-know-215318119--abc-news- topstories.html • http://www.guardian.co.uk/world/2013/jun/1 1/edward-snowden-nsa-whistleblower-profile • http://www.guardian.co.uk/world/2013/jun/0 6/us-tech-giants-nsa-data • http://www.guardian.co.uk/world/2013/jun/1 7/edward-snowden-nsa-files-whistleblower
  • 7. Start here… • http://www.guardian.co.uk/commentisfree/2 013/jun/21/obama-national-security-state- rogue • http://www.guardian.co.uk/world/2013/jun/2 2/nsa-leaks-britain-us-surveillance • http://theweek.com/article/index/245788/ha s-snowden-crossed-a-red-line
  • 8. Once you’ve created your Powerpoint/Word document and emailed it to Miss Hamilton, you are ready to consider privacy and surveillance more generally…
  • 9. Answer these questions on paper and hand it in to Miss Hamilton at the end of the lesson. Many people feel that Edward Snowden, the 29 year old responsible for leaking top secret details regarding national surveillance, has opened up the debate around privacy and forced people to consider and question the boundaries of government surveillance. 1. To what extent do you think this is the case? 2. How do you feel about the revelations regarding the extent of the US Government’s surveillance? 3. Do you think Snowden was wrong to leak details of national security? Explain your answer fully. 4. Do you have a problem with your Government accessing your emails, texts, tweets, Facebook status updates, photos etc? Explain your answer. 5. Lots of people are saying that if you have nothing to hide then you should have no problem with surveillance. To what extent do you agree with this? Explain your answer fully.