SlideShare a Scribd company logo
z
This Photo by Unknown Author is licensed under CC BY-SA-NC
WHAT IS GOVERNMENT
SURVEILANCE ?
My position on this subject is that, I think that security is somewhat
necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct
when he states that terrorism can be a cover up to put a plan In action. I am
aware of the fact that the more acts of terror that are committed ,the more laws
can be implicated due to perceived terrorist acts.
This also gives people the right to invade foreign countries and take whatever
they want to take from these countries, including natural resources ,etc.
This Photo by Unknown Author is licensed under CC BY-SA
Privacy today faces growing threats from a growing surveillance
apparatus that is often justified in the name of national
security. Numerous government agencies—including the
National Security Agency, the Federal Bureau of Investigation,
the Department of Homeland Security, and state and local law
enforcement agencies—intrude upon the private
communications of innocent citizens, amass vast databases of
who we call and when, and catalog “suspicious activities”
based on the vaguest standards.
z
SECURITY
Privacy today faces growing threats from a growing surveillance apparatus that is
often justified in the name of national security. Numerous government agencies—
including the National Security Agency, the Federal Bureau of Investigation, the
Department of Homeland Security, and state and local law enforcement agencies—
intrude upon the private communications of innocent citizens, amass vast
databases of who we call and when, and catalog “suspicious activities” based on
the vaguest standards.
The government’s collection of this sensitive information is itself an invasion of
privacy. But its use of this data is also rife with abuse. Innocuous data is fed into
bloated watchlists, with severe consequences—innocent individuals have found
themselves unable to board planes, barred from certain types of jobs, shut out of
their bank accounts, and repeatedly questioned by authorities. Once information is
in the government’s hands, it can be shared widely and retained for years, and the
rules about access and use can be changed entirely in secret without the public
ever knowing.
This Photo by Unknown Author is licensed under CC BY-SA-NC
z DOUBLE EDGED
SWORD
Another important idea that we
must observe s the notion that all
the technology we are given
including apps ,Internet,
cellphones etc.(sky drives)can be
used against us .Cloud storages
can store tangible evidence of all
of your documents and pics ,etc. A
cell phone is almost always in the
palm of our hands. GPS can track
us through cellular devices.
Facebook shows the world, who
we know and associate with.
This Photo by Unknown Author is licensed under CC BY-NC-ND
z
ACLU
AMERICAN CIVIL
LIBERTIES UNION
7 Facts About ACLU
▪ ACLU is Non Profit
▪ The ACLU Was founded after
WW1 (1917) in 1920 to protect
those who objected to the war
▪ Many members are lawyers and
volunteers
▪ The New York times was not
initially a fan
▪ Nor was President Woodrow
Wilson
▪ One of the earliest cases was one
of most legendary
▪ ACLU participates in more
Supreme Court cases than any
other private organization
z
NSA
The National Security
Agency (NSA) is an
intelligence agency of
the United States and
comes under the
Department of Defense.
This Photo by Unknown Author is licensed under CC BY-SA
z
The primary purpose of NSA is the collection of foreign
communications data and its analysis with regards to the security
of American communications against other agencies. The Director
of National Intelligence heads the agency.
The NSA headquarter is based 16km from Washington at Fort
George G. Meade in Maryland. NSA is one of the most secretive
intelligence agencies in the world. For many years the United
States government didn't acknowledge its existence. It was
jokingly referred as ‘No Such Agency’.
NSA is one of the most secretive intelligence agencies in the
world. For many years the United States government didn't
acknowledge its existence. It was jokingly referred as ‘No Such
Agency’.
NSA eavesdrops on all forms of intercepted communication
including internet and radio broadcast by different individuals and
organizations. All confidential, sensitive government
FACTS ABOUT NSA
REFERENCES https://www.youtube.com/watch?v=tRRJnAbSdRE
https://www.youtube.com/watch?v=FmnLa3F5Piw
https://www.topspysecrets.com/national-security-agency.html

More Related Content

What's hot

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
sevans-idaho
 
The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
Muhammed Haidri
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
Bill Bode
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
neeraj tiwari
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
Geritt Contillo
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
Kerry McCartney-Prout
 

What's hot (19)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Presentación3
Presentación3Presentación3
Presentación3
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Encryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's PrivacyEncryption - Conflict between National Interest and Individual's Privacy
Encryption - Conflict between National Interest and Individual's Privacy
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Chapter14
Chapter14Chapter14
Chapter14
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Mea#4 1.1
Mea#4 1.1Mea#4 1.1
Mea#4 1.1
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-210 Year Anniversary 9-11- How Has Law Enforcement Responded-2
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

GOVERNMENT SURVEILANCE

  • 1. z This Photo by Unknown Author is licensed under CC BY-SA-NC WHAT IS GOVERNMENT SURVEILANCE ?
  • 2. My position on this subject is that, I think that security is somewhat necessary, but it can be a bit intrusive. I think Mykko Hypponen is correct when he states that terrorism can be a cover up to put a plan In action. I am aware of the fact that the more acts of terror that are committed ,the more laws can be implicated due to perceived terrorist acts. This also gives people the right to invade foreign countries and take whatever they want to take from these countries, including natural resources ,etc. This Photo by Unknown Author is licensed under CC BY-SA
  • 3. Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies—including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards.
  • 4. z SECURITY Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of national security. Numerous government agencies— including the National Security Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and state and local law enforcement agencies— intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse. Innocuous data is fed into bloated watchlists, with severe consequences—innocent individuals have found themselves unable to board planes, barred from certain types of jobs, shut out of their bank accounts, and repeatedly questioned by authorities. Once information is in the government’s hands, it can be shared widely and retained for years, and the rules about access and use can be changed entirely in secret without the public ever knowing. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 5. z DOUBLE EDGED SWORD Another important idea that we must observe s the notion that all the technology we are given including apps ,Internet, cellphones etc.(sky drives)can be used against us .Cloud storages can store tangible evidence of all of your documents and pics ,etc. A cell phone is almost always in the palm of our hands. GPS can track us through cellular devices. Facebook shows the world, who we know and associate with. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. z ACLU AMERICAN CIVIL LIBERTIES UNION 7 Facts About ACLU ▪ ACLU is Non Profit ▪ The ACLU Was founded after WW1 (1917) in 1920 to protect those who objected to the war ▪ Many members are lawyers and volunteers ▪ The New York times was not initially a fan ▪ Nor was President Woodrow Wilson ▪ One of the earliest cases was one of most legendary ▪ ACLU participates in more Supreme Court cases than any other private organization
  • 7. z NSA The National Security Agency (NSA) is an intelligence agency of the United States and comes under the Department of Defense. This Photo by Unknown Author is licensed under CC BY-SA
  • 8. z The primary purpose of NSA is the collection of foreign communications data and its analysis with regards to the security of American communications against other agencies. The Director of National Intelligence heads the agency. The NSA headquarter is based 16km from Washington at Fort George G. Meade in Maryland. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA is one of the most secretive intelligence agencies in the world. For many years the United States government didn't acknowledge its existence. It was jokingly referred as ‘No Such Agency’. NSA eavesdrops on all forms of intercepted communication including internet and radio broadcast by different individuals and organizations. All confidential, sensitive government FACTS ABOUT NSA