Professional Documents
Culture Documents
SAIKUMAR DASS
INITIAL INQUIRY
TO WHAT EXTENT
SURVEILLANCE
NSA METADATA FISA PRISM
EDWARD SNOWDEN
ANALYST
GUARDIAN BECAUSE
SURVEILLANCE
LARGEST INTELLIGENCE
ORGANIZATION IN THE
GOVERNMENT
THE GOVERNMENT RECEIVES ON A
THEIR MISSION IS TO PROCESS AND ANALYZE INTELLIGENCE DAILY BASIS TO PROTECT THE UNITED STATES
METADATA
ADDED ON TO GEORGE BUSHS PATRIOT ACT IN 2006 AND 2007 IT ESTABLISHED A COURT THAT HAD TO APPROVE REQUESTS
COLLECT DATA ON CERTAIN THINGS FROM THE
US GOVERNMENT
TO
MADE BY THE
UNITED STATES
AS OF TODAY
MARINA
GOES THROUGH
ALL METADATA AND REVEALS TIME, PLACE, AND DATE OF PEOPLES LIVES THROUGH THE METADATA USED IN SITES
PRISM
THESE COMPANIES INCLUDE GOOGLE, YAHOO, FACEBOOK, TWITTER, MICROSOFT, APPLE, AND AOL.
NUCLEON
THE GUARDIAN
NSA
WAS SPYING IT
TALKED ABOUT WHAT INFORMATION THEY COLLECTED AND HOW THEY COLLECTED
NSAS
SURVEILLANCE PROGRAM
CONVINCING SINCE IT IS LEAKED DOCUMENTS DIRECTLY FROM THE GOVERNMENT ABLE TO ORGANIZE THE
THE VERGE
VOX MEDIA
THIS ARTICLE WAS DEFINITELY ONE THAT WAS ABLE TO EXPLAIN WHAT THE NSA WAS DOING IN IT KEPT UNBIASED AND JUST PROVIDED STRAIGHT FACTS THROUGHOUT
BUSINESS INSIDER
FISC
ON ALL TOPICS
THEY ALSO SHOW THE GOVERNMENTS SIDE OF WHY THEY DID THE SURVEILLANCE STORY MORE COMPLEX AND MULTI-FACED THE REFERENCES
THE ARTICLE
THIS ARTICLE LOOKS INTO WHAT THE NSA DIRECTOR (JAMES CLAPPER) SAID INITIALLY ABOUT THE PRISM PROGRAM IT ALSO TALKS ABOUT CERTAIN LAWS INVOLVED WITH MAKES IT LEGAL.
THESE LAWS INCLUDE THE THE SURVEILLANCE PROGRAM THAT
THEY TAKE A DIFFERENT APPROACH TO THE NSA SURVEILLANCE GOVERNMENT, THEREFORE THEY MAY BE BIAS
GOOD SUPPORT FOR THEIR ARGUMENT
OF THE
NSAS
THIS WAS PROBABLY THE ONLY ACADEMIC JOURNAL THAT WAS AVAILABLE ON THIS TOPIC
SINCE IT IS RELATIVELY NEW
AUDIENCE
LEAKED INFORMATION
Explanation: This slide shows the companies involved in the PRSIM program and when they joined the program
LEAKED INFORMATION
Explanation: Shows what kind of information the companies supply/collect
LEAKED INFORMATION
Explanation: Flow chart of the flow of information through laws and programs
LEAKED INFORMATION
Explanation: This explains the collection of data flow.
LEAKED INFORMATION
Explanation: How the data is classified, the codes
LEAKED INFORMATION
Explanation: How the communications (cell phone and email) flows through the united states
GOVERNMENT
4TH
ADDITIONAL IDEAS/QUESTIONS
WORKS CITED
"EVERYTHING YOU NEED TO KNOW ABOUT PRISM." THE VERGE. ED. THE VERGE. N.P., 17 JULY 2013. WEB. 21 OCT. 2013. GREENWALD, GLENN, AND EWEN MACASKILL. "NSA PRISM PROGRAM TAPS IN TO USER DATA OF APPLE, GOOGLE AND OTHERS." THE GUARDIAN. THE GUARDIAN, 6 JUNE 2013. WEB. 30 AUG. 2013. JR., ROBERT OHARROW, ELLEN NAKASHIMA, AND BARTON GELLMAN. "U.S., COMPANY OFFICIALS: INTERNET SURVEILLANCE DOES NOT INDISCRIMINATELY MINE DATA." WASHINGTON POST. THE WASHINGTON POST, 09 JUNE 2013. WEB. 23 OCT. 2013. KELLY, MICHAEL. "THE BEST EXPLANATION YET OF HOW THE NSA'S PRISM SURVEILLANCE PROGRAM WORKS." BUSINESS INSIDER. BUSINESS INSIDER, 15 JUNE 2013. WEB. 23 OCT. 2013. MINTCHEVA, SVETLANA. "LAND OF THE FREE?" INDEX ON CENSORSHIP (2013): 70-73. EBSCO. WEB. 24 OCT. 2013.