You are on page 1of 31

NSAS SURVEILLANCE PROGRAM: AN INSIDE LOOK

SAIKUMAR DASS

INITIAL INQUIRY

TO WHAT EXTENT

IS THE GOVERNMENT MONITORING PEOPLE AROUND THE WORLD

SOME BASIC TERMS TO KNOW


EDWARD SNOWDEN

SURVEILLANCE
NSA METADATA FISA PRISM

EDWARD SNOWDEN

FORMER NSA COMPUTER HIS LINE OF WORK LEAKED THE DOCUMENTS

ANALYST

ENABLED HIM TO HAVE ACCESS TO CLASSIFIED GOVERNMENT DOCUMENTS TO THE

GUARDIAN BECAUSE

HE THOUGHT THE GOVERNMENT WAS

OVERSTEPPING THEIR BOUNDS ON PRIVACY

SURVEILLANCE

ACCORDING TO MERRIAM-WEBSTER SOMEONE OR SOMETHING THE EXISTENCE


OF THE

SURVEILLANCE IS THE ACT OF CAREFULLY WATCHING

NSA IS FOR SURVEILLANCE

NATIONAL SECURITY AGENCY (NSA)

LARGEST INTELLIGENCE

ORGANIZATION IN THE

GOVERNMENT
THE GOVERNMENT RECEIVES ON A

THEIR MISSION IS TO PROCESS AND ANALYZE INTELLIGENCE DAILY BASIS TO PROTECT THE UNITED STATES

THEY ALSO HELP TO MAKE POLICIES REGARDING INTELLIGENCE

METADATA

ACCORDING TO THE GUARDIAN, IT IS THE INFORMATION GENERATED


TECHNOLOGY

WHEN YOU USE

BASICALLY DATA ABOUT DATA EXAMPLES: DATE, TIME, LOCATION


HTTP://WWW.THEGUARDIAN.COM/TECHNOLOGY/INTERACTIVE/2013/JUN/12/WHAT-ISMETADATA-NSA-SURVEILLANCE#META=0000000

FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA)

ADDED ON TO GEORGE BUSHS PATRIOT ACT IN 2006 AND 2007 IT ESTABLISHED A COURT THAT HAD TO APPROVE REQUESTS
COLLECT DATA ON CERTAIN THINGS FROM THE

US GOVERNMENT

TO

THEY HAVE APPROVED EVERY REQUEST

MADE BY THE

UNITED STATES

AS OF TODAY

MARINA

GOES THROUGH

ALL METADATA AND REVEALS TIME, PLACE, AND DATE OF PEOPLES LIVES THROUGH THE METADATA USED IN SITES

IT TRACKS AND BUILDS A SUMMARY LIKE FACEBOOK, AND TWITTER.

PRISM

THE PROGRAM WHICH THE NSA USES AMERICAN INTERNET

TO COLLECT DATA THROUGH ACCESS FROM MAJOR

THESE COMPANIES INCLUDE GOOGLE, YAHOO, FACEBOOK, TWITTER, MICROSOFT, APPLE, AND AOL.

NUCLEON

THE PROGRAM THAT INTERCEPTS

PHONE CALLS AND MESSAGES OF PHONE CONVERSATIONS

IT ALSO ANALYZES THE SPOKEN WORDS

THE GUARDIAN

ONE OF THE FIRST SOURCES


ON PEOPLE

TO LEAK THE FILES ABOUT THE

NSA
WAS SPYING IT

HAD 12 CLASSIFIED POWERPOINT SLIDES EXPLAINING HOW THE GOVERNMENT

TALKED ABOUT WHAT INFORMATION THEY COLLECTED AND HOW THEY COLLECTED

CREDIBILITY AND VALIDITY OF THE GUARDIAN

ONE OF THE FIRST NEWS IT IS PRETTY THEY WERE

SOURCES THAT LEAKED THE INFORMATION ABOUT THE

NSAS

SURVEILLANCE PROGRAM
CONVINCING SINCE IT IS LEAKED DOCUMENTS DIRECTLY FROM THE GOVERNMENT ABLE TO ORGANIZE THE

CLASSIFIED SLIDES IN A ORDERLY MANNER MAKING IT

EASIER FOR PEOPLE TO UNDERSTAND

IT TALKED ABOUT WHY


THE COUNTRY

THE GOVERNMENT HAD TO START THIS PROGRAM IN ORDER TO PROTECT

THE VERGE

EXPLAINED WHAT PRISM WAS IN LAYMANS TERMS


GAVE DETAILED GRAPHICS AND FLOW CHARTS OF HOW THE NSA SURVEILLANCE
WORKS PROGRAM

ALSO GIVES A TIMELINE OF EVENTS

SINCE THE FILES WERE LEAKED

CREDIBILITY AND VALIDITY OF THE VERGE

THE VERGE IS THE ONLINE NEWS


A SIMPLE MANNER

BRANCH OF A LARGER MEDIA GROUP CALLED

VOX MEDIA

THIS ARTICLE WAS DEFINITELY ONE THAT WAS ABLE TO EXPLAIN WHAT THE NSA WAS DOING IN IT KEPT UNBIASED AND JUST PROVIDED STRAIGHT FACTS THROUGHOUT

THE ARTICLE WAS MEANT TO INFORM AND IT DID THAT

BUSINESS INSIDER

THIS SOURCE TALKED MORE ABOUT THE SOURCES


INTELLIGENCE FROM

THAT THE GOVERNMENT GETS ITS ALL FULFILLED BY THE

IT ALSO TALKS ABOUT THE COURT ORDERS THAT WERE

FISC

CREDIBILITY AND VALIDITY OF BUSINESS INSIDER


A BUSINESS
WEBSITE MAY NOT SEEM LIKE A CREDIBLE SOURCE FOR INFORMATION BASED ON

TECHNOLOGY, BUT INFORMATION

BUSINESS INSIDER ALSO PROVIDES THE LASTS NEWS

ON ALL TOPICS

IT ALSO USED REFERENCES FORM OTHER RELIABLE NEWS

SOURCES TO PRESENT THEIR


TO MAKE THE

THEY ALSO SHOW THE GOVERNMENTS SIDE OF WHY THEY DID THE SURVEILLANCE STORY MORE COMPLEX AND MULTI-FACED THE REFERENCES
THE ARTICLE

FROM OTHER SOURCES ALSO HELPS TO BACK UP THE INFORMATION STATED IN

THE WASHINGTON POST

THIS ARTICLE LOOKS INTO WHAT THE NSA DIRECTOR (JAMES CLAPPER) SAID INITIALLY ABOUT THE PRISM PROGRAM IT ALSO TALKS ABOUT CERTAIN LAWS INVOLVED WITH MAKES IT LEGAL.
THESE LAWS INCLUDE THE THE SURVEILLANCE PROGRAM THAT

FISA AND PATRIOT ACTS


DEFENDING WHAT THE GOVERNMENT IS DOING AND THAT

THIS ARTICLE LEANS MORE TOWARD


IT IS NOT INVADING PRVACY

CREDIBILITY AND VALIDITY OF THE WASHINGTON POST

THEY TAKE A DIFFERENT APPROACH TO THE NSA SURVEILLANCE GOVERNMENT, THEREFORE THEY MAY BE BIAS
GOOD SUPPORT FOR THEIR ARGUMENT

PROGRAMS AND DEFEND THE PROGRAM IN PLACE WAS

THEIR ANALYSIS OF THE LAWS THAT HELPED PUT THE SURVEILLANCE

INDEX ON CENSORSHIP: LAND OF THE FREE?

THE MAIN POINT OF THIS JOURNAL IS THE ETHICS AND CONSTITUTIONALITY


SURVEILLANCE PROGRAM

OF THE

NSAS

IT TALKS ABOUT HOW THE FOURTH


GOVERNMENT SURVEILLANCE

AMENDMENT (RIGHT TO PRIVACY) IS BEING VIOLATED BY

RELIABILITY AND VALIDITY OF INDEX ON CENSORSHIP

THIS WAS PROBABLY THE ONLY ACADEMIC JOURNAL THAT WAS AVAILABLE ON THIS TOPIC
SINCE IT IS RELATIVELY NEW

THIS ONE SEEMED TO BE THE MOST BIASED BECAUSE


AGAINST GOVERNMENT SURVEILLANCE

IT LEANED HEAVILY TOWARD BEING

BUT IT PROVIDED SUPPORT

FOR ITS ARGUMENT AND OFFERED A DIFFERENT VIEW OF THE TOPIC

AUDIENCE

FOR ALL OF THE SOURCES

THE ENTIRE PUBLIC IS THE AUDIENCE TECHNOLOGY

THIS IS A TOPIC THAT AFFECTS EVERYONE IN THE WORLD THAT USES

LEAKED INFORMATION

Explanation: This slide shows the companies involved in the PRSIM program and when they joined the program

LEAKED INFORMATION
Explanation: Shows what kind of information the companies supply/collect

LEAKED INFORMATION
Explanation: Flow chart of the flow of information through laws and programs

LEAKED INFORMATION
Explanation: This explains the collection of data flow.

LEAKED INFORMATION
Explanation: How the data is classified, the codes

LEAKED INFORMATION
Explanation: How the communications (cell phone and email) flows through the united states

WHY ALL THIS IMPORTANT?

IT AFFECTS ANYONE WHO USES ONE OF THE WAYS AMENDMENT)


THE

TECHNOLOGY (WHICH IS EVERYONE) IS OVERSTEPPING ITS BOUNDS (VIOLATING THE

GOVERNMENT

4TH

ADDITIONAL IDEAS/QUESTIONS

WHAT IS THE EXTENT WHY

TO WHICH THE GOVERNMENT HAS GATHERED DATA ON THE POPULATION?

WOULD THE GOVERNMENT BE TRACKING INNOCENT CIVILIANS?

WORKS CITED
"EVERYTHING YOU NEED TO KNOW ABOUT PRISM." THE VERGE. ED. THE VERGE. N.P., 17 JULY 2013. WEB. 21 OCT. 2013. GREENWALD, GLENN, AND EWEN MACASKILL. "NSA PRISM PROGRAM TAPS IN TO USER DATA OF APPLE, GOOGLE AND OTHERS." THE GUARDIAN. THE GUARDIAN, 6 JUNE 2013. WEB. 30 AUG. 2013. JR., ROBERT OHARROW, ELLEN NAKASHIMA, AND BARTON GELLMAN. "U.S., COMPANY OFFICIALS: INTERNET SURVEILLANCE DOES NOT INDISCRIMINATELY MINE DATA." WASHINGTON POST. THE WASHINGTON POST, 09 JUNE 2013. WEB. 23 OCT. 2013. KELLY, MICHAEL. "THE BEST EXPLANATION YET OF HOW THE NSA'S PRISM SURVEILLANCE PROGRAM WORKS." BUSINESS INSIDER. BUSINESS INSIDER, 15 JUNE 2013. WEB. 23 OCT. 2013. MINTCHEVA, SVETLANA. "LAND OF THE FREE?" INDEX ON CENSORSHIP (2013): 70-73. EBSCO. WEB. 24 OCT. 2013.

You might also like