Free Essay

Terrorism and Metadata - Interview

In:

Submitted By ddayan
Words 626
Pages 3
My Interviewees

My Father

My Grandmother

Questions

Since 9/11 the western world has been on alert for terrorism. Approximately 9 months ago a U.S. government contractor, Edward Snowden, revealed that the U.S. has been collecting phone records of millions of Verizon customers. It also revealed that Canada is doing the same.

Last week the head of Canada’s communication and surveillance agency (CSEC&CSIS0) testified in front of the Canadian senate that it has been collecting data in public places like airports and hotels. This data called Meta data. Metadata shows information like the location and telephone numbers of all calls a person makes and receives. It also tracks the Wi-Fi data. It does not include what is being said in the call.

1. Is the collection of metadata by Canada’s spy agency against our social justice? Is this an invasion of our privacy?

2.The head of the spy’s agency says that they don’t collect data of Canadians, just foreigners going through our public places because terrorists hide in public places, though many times foreigners call or email Canadians and that information is collected. If this is all for the security of Canadians and foreigners are the targets, shouldn’t this be okay?

3.Can u suggest any other legal way to spy on Canadians to secure the country and its people?

Answers- My Father

1. I believe this is an invasion to our privacy. However, it is necessary in order to catch the terrorists before they commit a crime.

2.I believe it should be allowed. A person who is not guilty should have nothing to hide. If the government is inadvertently collecting data from Canadian citizens then so be it. The only worry I have with countries collecting data on foreigners is that there is an agreement between countries to share information So in reality each country will receive data about their own citizens, via other countries.

3.I would have no problem if there were cameras on every street and public places so if a crime is committed, the person would be caught.

My Grandmother

1. It is completely an invasion of our privacy. When the government sits there hearing your conversation, you just invited strangers into your privacy.

2. They say that the information they are gathering is to find any terrorists. Who says they aren’t using this information for something else? Who’s the one getting this information? How do I know they aren’t looking through my business and stealing information or going through my bank accounts? A lot of privacy is being taken away.

When America had one of their elections, the tea party tried getting a tax ID number from the IRS and they IRS denied them. The IRS is part of the government. How did the IRS know to deny them? They called up anybody that had to do with the tea party and made it harder for any republican parties to win just so Obama can be re-elected. They were able to get all these numbers and information because all the data was saved. The reason for the government collecting data from the citizens of the country is to catch terrorists. But now we see that they are using it for something totally different.

3.They have enough information about terrorists’ sights, so they should track those people. Don’t follow everybody. They have what is called, a racial profile. What it does is it picks up anyone who may look suspicious. For example at the border a person can show signs of lying. Such as twitching or not speaking clearly or in a low voice. That shows you who you should watch out for. Don’t start going through the privacy of innocent people.

Similar Documents

Premium Essay

Nsa Surveillance

...life 230 years ago, but recent actions of the National Security Agency is interpreted to be defying the Bill of Rights by the government and depriving the citizens their constitutional right to privacy. However, when posed with the question: Do people want to live in a surveillanced environment like animals in a zoo, with justice and safety ensured but privacy denied completely ? , the answers vary in the community. The revelation of the National Security Agency's massive surveillance of American citizens has prompted a debate about the constitutionality of the agency's actions. The policies of the the National Security Agency is said to be conflicting with the basic right of privacy guaranteed to citizens in the Fourth Amendment. The "metadata" collection carried out by the National Security Agency, including all kinds of personal records and assets along with a list of phone calls and electronic messages poses a challenge to the Fourth Amendment of the Bill of Rights. Eavesdropping on people is a loaded feature of NSA: " It specializes in pretty much one thing, and that's eavesdropping on communications around the world, whether it's e-mail, cell phones, regular telephones--any kind of communications--and also in breaking codes" (Michele par. 4). The onset of the technological era led to digital network holding the upper hand on global communications network; this demand for a powerful and global presence in the communications network for mass protection of the citizens was...

Words: 1025 - Pages: 5

Premium Essay

The Importance Of Internet Privacy

...They were collecting data from social media, Internet search media, emails and even Skype sessions to create digital profiles of millions of US citizens who have never been accused of any crime. Many showed their dissaproval over this activity. Also, outrage over the Verizon Metadata program revealed by Edward Snowden, resulted in a number of lawsuits being filed, to combat what was viewed as a violation of online privacy rights. Privacy has also been issue on government’s websites. According to several reports, a lot of Federal websites don’t respects the values of Internet privacy. It is a very delicate issue considering the amount of information the government contains. An additional issue that we can make a note of with the government is how they try to get information from companies on their customers. Several years ago, this happened to Northwest Airlines when they received all information on their customers. They are trying to access records of citizens and the right the government has to get these records is...

Words: 1336 - Pages: 6

Free Essay

Who Is Edward Snowden?

...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...

Words: 1691 - Pages: 7

Free Essay

Digital Forensic

...NAME OF GROUP MEMBERS: HON HAO KONG TP027895 THOR LIH YIN TP024383 YUVARAJ MURALITHARAN TP028059 GROUP : GROUP C2I INTAKE CODE : UC3F1402IT{FC} MODULE CODE : CT040-3.5-3-LEAFC MODULE TITLE : LEGAL EVIDENTRARY ASPECTS OF FORENSIC COMPUTING, LEAFC PROJECT TITLE : LEAFC 2nd Group Assignment HAND-OUT DATE : 27th MAY 2014 HAND-IN DATE : 16TH JUNE 2014 LECTURER : MR. ALI JAVAN Table of Contents 1.0 Workload Matrix 3 2.0 Executive Summary 4 3.0 Case Detail and Assumptions 5 4.0 First Responder 7 4.1 Overview 7 4.2 First Responder Procedures 7 4.2.1 Securing and evaluating electronic crime scene 7 4.2.2 Documenting electronic crime scene 10 4.2.3 Collecting and preserving electronic evidence 15 4.2.4 Packaging electronic evidence 21 4.2.5 Transporting electronic evidence 22 4.3 Chain of Custody 23 5.0 Critical Analysis 24 5.1 Forensic Analysis 29 6.0 Case Reconstruction 40 6.1 Functional Analysis 40 6.2 Timeline Analysis 42 6.3 Relational Analysis 43 7.0 Apply and Result of Subpoena 44 8.0 Legal Discussion and Implication 45 8.1 Legal Discussion Perspectives 47 9.0 Conclusion and recommendations 51 9.1 Conclusion 51 9.2 Recommendations 51 10.0 References 52 Appendix A– Affadavit 54 Appendix B- Subpoena 59 1.0 Workload Matrix | Thor Lih Yin (TP024383)...

Words: 11150 - Pages: 45

Free Essay

Barcode License Plate Recognition

...ABSTRACT Barcode License Plate Recognition (BLPR) is a system capable of recognising number plates by scanning their barcodes for various different uses. A sophisticated barcode reader and algorithm converts the barcodes, into identifiable data. This allows the capture of critical information such as the registration of every vehicle entering a site or crossing the red light at traffics. This information can be passed to the police to assist in the pursuit and identification of contraventions. Visual proof of traffic contraventions with the corresponding time and date information can be provided as evidence and to avoid disputes. Using information supplied by the Driver Vehicle Licensing Authority (DVLA), because of our approved operator status, it is possible to identify the registered keeper of a vehicle and process the contravention automatically. The BLPR is to help eradicate road accidents on our roads which has become a headache to the government since all efforts are proving futile. It is been developed with Visual Basic.Net and Structured Query Language(SQL) Server using the Waterfall model. All data gathered by the BLPR system is stored in a database for future analysis and reporting. This project will provide an efficient way of combating crime and making the work of the MTTU easier. ACKNOWLEDGEMENT Our greatest and foremost thanks goes to God the Almighty Father. To Him be the glory for the great things he has done. It is just by His grace and guidance that...

Words: 6502 - Pages: 27

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Free Essay

Referencing Guide Harvard

...2010 Edition 1 A GUIDE TO REFERENCING with examples in the Harvard style A GUIDE TO REFERENCING with examples in the Harvard style RMIT International University Vietnam 2010 Edition 1 Learning Skills Unit RMIT International University Vietnam 702 Nguyen Van Linh Blvd. District 7, HCMC, Vietnam Tel: +84 8 3776 1300 Fax: +84 8 3776 1399 Website: www.rmit.edu.vn Acknowledgements The following RMIT Vietnam lecturers and staff assisted with this project: Christopher Barker Christopher Leute David Feliz Dominic Mahon Robert Hollenbeck Oanh, Pham Thi Hoang Tin, Nguyen Minh Tri Thuy, Le Mong Thank you very much for giving so generously of your time. Robyn Keech Coordinator, Learning Skills Unit February 2010 A softcopy of this referencing guide is available on Blackboard. TABLE OF CONTENTS INTRODUCTION………………………………………………..…………….… 5 I. Which referencing style should I use?........................................................................... 5 II. Why must I cite and reference my sources?.................................................................. 5 III. What is plagiarism?........................................................................................................ 5 IV. Is there plagiarism in sources on the Internet?.............................................................. 6 V. What is paraphrasing?................................................................................................... 6 VI. What is summarising?........

Words: 20028 - Pages: 81

Premium Essay

Information Technology Cma

...Information Technology Page 2 of 103 © CMA Ontario, 2011 Information Technology .................................................... Error! Bookmark not defined. 1 Foreword ....................................................................................................................... 4 2 Introduction ................................................................................................................... 4 3 Section 1 – The Business of IT ..................................................................................... 5 3.1 Defining Information Technology (IT) .................................................................. 5 3.2 IT Jobs & Roles ..................................................................................................... 6 3.3 Link between Corporate Strategy and IT ............................................................... 9 3.4 Organization of IT departments ........................................................................... 10 3.4.1 Additional IT Human Resources Factors ...................................................... 11 3.5 Use of Consultants ............................................................................................... 11 3.6 Outsourcing .......................................................................................................... 12 3.7 Augmenting the Technology Decision Making Process ...................................... 14 3.7.1 Technology vs. The Marketplace...

Words: 33324 - Pages: 134

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Free Essay

Law Report

...Contemporary Privacy Issues Report Introduction Privacy is one of the fundamental human rights, every individual should have full control over their personal information. However due to the continuous evolution of society and technology, the importance of a person's right to privacy has been eroded. This report discusses the contemporary privacy issues on different levels and areas, with specific focus on credit reporting, protection of customer’s private information by businesses, health records, internet data and government intelligence access to information. Sections of the current Privacy Act 1988, the new Australian Privacy Principles 2014, and legislations related to the topic areas mentioned above will also be discussed in detail, and the effectiveness of these laws will be analysed. A person's credit history contains a vast amount of personally sensitive information which have a high commercial value, therefore it is extremely important to ensure businesses adhere to the privacy act to prevent the unauthorised use of these information. Any misuse of information can cause great personal and financial harm to the victim. Privacy of health information is fundamental principle in health care. Lack of privacy information might result in people not seeking the health care they need which might be very risky to their own health and the health of others. The rate of technological development is accelerating too quickly and current laws are becoming irrelevant...

Words: 11809 - Pages: 48

Premium Essay

Disaster Management

...[pic] Records Management Disaster Planning Guideline June 2007 Version 1.1 Table of Contents Acknowledgments 5 Foreword 5 Introduction 6 Background 6 Scope of this guideline 6 Related Documents 6 Reference to the Adequate Records Management Standard 7 Variation to this guideline 7 Records and Disasters 7 Disasters affecting records 8 Disasters affecting Australian organisations 8 Counter disaster management for records 9 Disaster review of your agency 10 Risk Assessment 10 Establish the context 11 Identify the risks 11 Critical needs determination 13 Analyse the risks 14 Assess the risks 15 Treat the risks 15 Monitor and review 16 Planning 16 Project Planning 17 Project team responsibilities 18 Content of the plan 18 How to prepare the response and recovery plan 19 Components of the response and recovery plan 20 Lists and supplies 22 Insurance and emergency funding arrangements 23 On-site equipment 23 Implementing the plan 24 Maintaining the plan 24 Distribution issues 25 Plan maintenance responsibilities 25 Training and testing 25 Post disaster analysis 27 Vital Records Protection 28 Identifying vital records 29 Protecting vital records 31 Preventative measures 31 Recovery and restoration 33 Critical data...

Words: 16993 - Pages: 68

Premium Essay

Forensic Evidence in It

...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094 between...

Words: 22743 - Pages: 91

Premium Essay

Jkhghjjhgjhjhjggh

...Solution Architecture IRDA Business Analytics Project Nov 2010 Solution Architecture Document - IRDA Business Analytics Project Table of Contents List of Abbreviations Used with Their Definition .......................................................................................... 5 List of Terms Used with Their Definition ...................................................................................................... 9 1. 1.1 1.2 2. 3. 4. 5. 5.1 5.2 6. 7. 7.1 7.2 7.3 7.4 7.5 8. 9. 9.1 9.2 10. 10.1 Executive Summary ......................................................................................................................... 14 Introduction ................................................................................................................................ 14 Solution Architecture .................................................................................................................. 14 Objectives of the Business Analytics Solution ................................................................................ 17 Key Business Drivers ....................................................................................................................... 17 Solution Themes ............................................................................................................................. 18 Present IT Infrastructure at IRDA ..............................................................................................

Words: 50163 - Pages: 201

Premium Essay

Unesco

...Freedom of Connection – Freedom of Expression: The Changing Legal and Regulatory Ecology Shaping the Internet     by       William H. Dutton   Anna Dopatka   Michael Hills   Ginette Law   and   Victoria Nash       Oxford Internet Institute   University of Oxford   1 St Giles Oxford OX1 3JS   United Kingdom                                     19 August 2010         A report prepared for UNESCO’s Division for Freedom of Expression, Democracy and Peace. The opinions expressed in this report are those of the authors and do not necessarily reflect the views of UNESCO or its Division for Freedom of Expression, Democracy and Peace.   Preface As stated in its Constitution, UNESCO is dedicated to “Promoting the free flow of ideas by word and image”. Part of this mission, therefore, is to promote freedom of expression and freedom of the press through sensitization and monitoring activities, as a central element in building strong democracies, contributing to good governance, promoting civic participation and the rule of law, and encouraging human development and security. Media independence and pluralism are fostered by the Organization, providing advisory services on media legislation and sensitizing governments and parliamentarians, as well as civil society and relevant professional associations. However, UNESCO recognizes that the principle of freedom of expression must apply not only to traditional media, but also...

Words: 39228 - Pages: 157

Premium Essay

Ethics

...(FINAL REQUIREMENTS: PROFESSIONAL ETHICS CS 170) Submitted to: Mrs. Abegale B Lajo Submitted by: Perez, Kleimar B. Course Year and Section: BSIT-3A An overview of ethics Questions: * Give at least 5 life experiences that helped you define your own personal code of ethics. Explain completely your answer. * Do you think that the importance of ethical behavior in business is increasing or decreasing? Defend your answer. * Write an essay discussing the ethics, risks, and benefits of using cookies and spyware to track customer browsing and online purchasing habits. My Answer: 1. In my whole entire life as a citizen of the Philippines and as a student taking up bachelor of science in information technology, I always do the things what is right and wrong. Even though I do things that is wrong, I always do a good things and a ethical way, here are some of my experience that included an ethical way: - When I always in the bus and there’s no more seat, I stand, when someone stands in their seat, I always check if there’s any women who is standing and struggling to balance herself in a very fast bus and I always do is poking or making a sign in the girl for her to know that there was a available seat for her to seat and not struggling. I always do that in order for me to be a gentleman and doesn’t want girls to struggle to stand. - When do I have a exam and I don’t have a time to review, I do is a quick review, when the exam starts, I struggle and tempted...

Words: 24802 - Pages: 100