...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:Dr. Natasha Jones FROM:Team Underachievers DATE:2014-10-7 SUBJECT:Proposal PURPOSE:To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses across...
Words: 3481 - Pages: 14
...NSA Eavesdropping and Data Mining Table of Contents Abstract..........................................................................................................3 Introduction....................................................................................................4 Literature Review............................................................................................6 Discussion.......................................................................................................13 Conclusion......................................................................................................15 References.......................................................................................................17 Abstract Technology is constantly around us and from this point forward it is never going away not that most of us can remember a time without cell phones but for some of us we can still recall a time when it didn’t exist. Eavesdropping has been a complex endeavor and has been evolving over the years from placing a listening device which had a built in microphone and a short distance transmitter. Now it is complex algorithms that can when completely decrypted give a person or an organization complete information on a person and allow them access into a private life. I say private life when in all actuality we seem to be more responsive to sharing everything with everyone in fact it is a lack of anonymity and of a global pandemic...
Words: 4920 - Pages: 20
...controversial surveillance organization - the NSA. The NSA stores information about everything an individual views that is connected to the Internet and can keep that information for decades for possible later review. “Americans place a high value on privacy. It is generally accepted that a certain core of one's individual and family affairs should be protected against interference, or even investigation, by outside forces—including...
Words: 2230 - Pages: 9
...of industrial espionage after Jose Ignacio Lopez General Motors’ chief of production moved to Volkswagen. The case settled in 1997, resulting in one of the largest settlements in the history of industrial espionage, with Volkswagen agreeing to pay General Motors 100$ million and to buy at least 1$ billion of car parts from the company over 7 years, although it did not really apologize for Lopez’s behavior. Another case of industrial espionage is the Hilton vs. Starwood case. Indeed, according to the Guardian, Hilton has been sued by Starwood hotels for stealing documents to develop a luxury hotel chain called Denizen. This chain was designed by two of Starwood’s former employees. Hilton’s chief executive Christopher Nassetta said in a statement: “ Hilton Worldwide regrets the circumstances surrounding the dispute with Starwood Hotels and is pleased to bring an end to this prolonged...
Words: 1336 - Pages: 6
...the Union Address in February. (MacLeod, 2013) At the same time, President Obama signed an executive order to protect our country’s infrastructure from cyberattacks, a very real and dangerous problem. Our own government admits to cyber espionage and while former CIA and NSA agents confirm this, we, as citizens, must wonder how far our government takes this liberty while pointing their fingers at other countries, namely China. While the article gives specific information to secretive government branches and even a secretive unit known as Tailored Access Operations, it cites a Pentagon official as well as two former U.S. government officials, all who asked not to be named. Informing the readers of possible secretive organizations within our own country and how they conduct business was achieved quite well. The facts in the article can be argued, however, considering their sources are unnamed and none of the information in the report can be unequivocally confirmed from the government. The article does consider alternative views, namely the U.S. government. The argument is stated early in the article, “The U.S. position is that some kinds of hacking are more acceptable than others –and the kind the NSA does is in keeping with unofficial, unspoken rules going back to the Cold War about what secrets are OK for one country to steal from another” (Riley, 2013, pp. 2-3) Chief Executive Officer Leonard Moodispaw, of KEYW, a security company who trains hackers for U.S. intelligence...
Words: 792 - Pages: 4
...reassuring America is not alone. Is there any way to be 100% protect from hacking? There is one-way NSA cannot read someone's information, and is possible only if a person has a computer that...
Words: 1184 - Pages: 5
...As Francis provides her readers with facts, it is a true statement the Snowden knowingly broke the law and should face consequences that await him in the United States. Conversely, the Editorial board of The New York Times implores readers and the President alike to evoke clemency, because of all of the good that has come out of the situation. They also preach that people should stop the slandering of Mr. Snowden and give him “incentive to return home.” Finally, I am inspired by the words of Mr. Snowden (2013) and agree with him on all levels as I refer to his Christmas message from 2013: “I don’t want to live in a world, where everything I say, everything I do, everyone I talk to, every expression of creativity or love or friendship is recorded.” Mr. Snowden did indeed damage the image that the US people have of the NSA, however, he also made room for justice, confidentiality, and future purposeful...
Words: 896 - Pages: 4
...EDWARD SNOWDEN TRAITOR OR HERO Regarding the Edward Snowden case there is a an very interesting ethical problem. Just to give us a bit of background context ; Edward Snowden was an employee of the CIA and NSA, who revealed details of several monitoring programs and American mass britanniques. For some peolpe he was considered like a hero because he has brought to light confidential information that deserves to be in the public domain and for other a villainous traitor because those put in danger his country, it is important to ask whether his revelations comes under the ethical or the legal fact. Ethical : We know that most people would feel betrayed by Edward because he released personal information about them but it was in order to prove that the US Government is recording the communications of its citizens. But it is Ethic to help other isn’t it ? Ethics are moral principles that guide the way a behaves. It issued by a business is a particular kind of policy statement. A code of ethic issued by a company is some kind of policy statement. A properly framed code is, in effect, a form of binding legislation within the company for its employees, specific sanctions for breaches of the code. If these sanctions are absent, the code is just a list of piety. The heaviest sentence usually dismissal unless a crime has been committed. Focusing on ethics, for those who feel that Snowden did was morally acceptable, calculating almost everyone has to weigh the benefits and...
Words: 1125 - Pages: 5
...United States, and all calls made to the United States from other countries. The data the NSA received, provided information on the phone number the call was made to and from, the call’s duration, the date of the call, and the time of day. No Financial data, nor content of the calls, were ever obtained by NSA. This action proceeded without a warrant for any of the information provided. In addition, there was no individual suspicion since this was considered “meta-data” or “bulk data collection” of phone records. The vast majority of the data was analyzed by computer programs and never looked at by NSA personnel. Before we delve into an analysis of the court’s decision in this case, it is prudent we first address an important point. Prior to the September 11, 2001 terror attacks, few American’s contemplated a threat to homeland security. Today, the fear of terrorism is ingrained in our daily thoughts. Following the events of 9/11, American’s sense of safety nearly vanished, and the direction, and scope of national security were forever changed. The National Security Administration (NSA), a key governmental counterterrorism agency, is responsible for ensuring national security. With this in mind, we believe that a reasonable person would consider the data obtained through these phone records to be of use to the NSA in stopping future terrorist attacks before they occur. Further, if the NSA were to obtain a warrant based on probable cause to wiretap a phone, the...
Words: 2770 - Pages: 12
...Hayden on behalf of the White House to discuss giving more authority to the NSA in order to gather more information about the Al-Qaeda members living in Southwest Asia and potential terrorists living in the United States(“Timeline”). This surveillance began on September 26, 2001, when Congress passed a law that said, “any Afghan telephone number in contact with a U.S. telephone number . . . was presumed to be of foreign intelligence value and could be disseminated to the FBI” (“Timeline”). The creation of this law allowed the federal government to demand telephone data from private corporations and review the calls made to Afghanistan, and later other Middle Eastern countries, all without the knowledge of the consumers making these calls. Domestic espionage was confirmed when an NSA Inspector General report was leaked, saying that the NSA was allowed “to spy on four types of data: 1) telephony content, 2) Internet content, 3) telephony metadata, 4) Internet metadata” (“Timeline”). Many Americans were outraged at the misuse of power demonstrated by the United States security officials; they believed the NSA was violating their fourth amendment rights. Before the Twin Towers tragedy, widespread use of technology to spy on American citizens was uncommon. However, in the following years, domestic espionage would gain popularity among high-ranking government officials, claiming that monitoring citizens’ personal data would help fight against terrorist groups who are a threat to the country...
Words: 1521 - Pages: 7
...During what is arguably the most difficult period in U.S. history, Honest Abe expressed his hopes that “government of the people, by the people, for the people, shall not perish from the earth.” The NSA surveillance program goes against this principle. It poses a substantial threat to the social contract and is illegal both domestically and globally. Edward Snowden’s revelations about these activities were done so in the public interest and set him apart from many other Americans charged with espionage by the U.S. government- he is a whistleblower. For this reason, in the eyes of the international community he has committed a non-violent political crime (under the assumption that he has committed a crime). Because of this and other reasons, granting Snowden political asylum is absolutely within Russia’s rights. One can witness a large effort on behalf of the US government, from the latter half of the 20th century...
Words: 2540 - Pages: 11
...lives, a question as to how much privacy they can truly maintain away from the government is hotly debated. The government has the abilities in this modern age to watch, listen, and read whatever is out in the open, but it should be fair because these privileges allow the government to keep America safe and stay vigilant over potential threats. The National Security Agency (NSA) should be able to invade American citizens’ privacy to a certain extent for the sake of protection. To keep the country out of harm’s way, sacrificing a minimal amount of security is genuinely reasonable and civil. One of the most common modern day tools seen encompassing people are cameras. When they’re not wielded in someone’s pocket or hands, they are all around: mounted on buildings in neighborhoods, public places, and around traffic signals. Many argue that these...
Words: 867 - Pages: 4
...now”?. This post makes reference to when he was silenced and hunted by the NSA for his “crimes”. The biggest issue Snowden faces as a hacktivist is the ability and permission of the content he produces. Yet his goals includepublicity and controversy to draw influence and power of the many who areliberated by the information he shares.Snowden is a symbol to the liberation of social media. He may not realize this due to how people question the validity and how beneficial social media is to our society. Previous to the creation of his Twitter account Snowden was unable to reach his followers on a 1st person basis.Many supporters even took it upon themselves to create support pages and websites to free and lift the censorship Snowden faced. Overnight Snowden's twitter page received 1.1 million followers. This enormous fluctuation of followers goes to show the significance and notoriety he possesses. For Snowden I believe social media is used not to reach his followers, but simply to inspire them through social satire and publicity. Hissocial media serves as a living testimony to the rights he advocates for onebeing limited by government control over Internet content. Snowden's twitter liberates and serves as an active force supporting and helping the hacktivist community.Recently a pardon for Snowden was filed and sent to President Obama. USA today writes “The White House has rejected a petition to pardon NSA whistleblower Edward Snowden, dubbing the former contractor’s revelations...
Words: 938 - Pages: 4
...Why correct writing and grammar in the NSA field is important. Kenny Carroll Daymar Composition 1 ENG 211 Ms. Kingery October 15, 2014 Why correct writing and grammar in the NSA field is important. Writing and grammar at first may not seem that important in an I.T. techs everyday business life, yet we would be wrong. In a business environment no matter what your job position or title is proper writing and grammar are a vital part of everyday communication. If you’re the computer repairman and you need to send out a companywide memo to warn against a virus or a computer threat, you do not want to sound as if you have no educational background Especially if you have not personal most of the individuals included on the email, they will have a bad first impression without actually meeting you. Good writing skills are a key asset at every stage of your career, from the moment you write your very first cover letter and resume until your retirement party. This is especially true for administrative professionals who are responsible for a significant amount of written communication on a daily basis. You don’t have to be a published author or hold a degree in comparative literature to be a skilled writer. Sound written communication is advantageous for ambitious administrative professionals at all levels and across many levels within the computer world (Hosking, 2014, para. 1). Whether we think about it or not, we communicate in writing every day. Every time you send an email...
Words: 755 - Pages: 4
...sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001, requiring that schools and libraries that receive certain types of federal technology funding have safe-use Internet policies. The policies require the use of Internet filtering software to screen material...
Words: 2799 - Pages: 12