Digitial Media FYS Introduction questions
Tuesday, December 17, 2013
Tuesday, December 3, 2013
Why Edward Snowden Is a Patriot
A patriot is defined as someone who feels strong support for their country. Edward Snowden claims he leaked sensitive information of the U.S. Governments public surveillance program to protect the US people for being spied on. He gave up a high paying secure job and a comfortable life style to leak this information because it caused him to have to go into hiding. This suggests Snowden cares more for the public people’s rights than for his own personal well-being. Therefore, this makes him a patriort; someone who gives up everything for the good of the U.S. people.
Saturday, November 23, 2013
edward snowden trador or patroit?
Thursday, November 21, 2013
The issues of the NSA
PRISM; the top secret NSA 20 million dollar per year surveillance program, stresses to the public that they do not go beyond what they are forced to do under law in handing over user data.
What isn't expressed to the public is the PRISM program has access that is granted to various records such as emails, chat conversations, voice calls, documents and more.
PRISM has direct access to providers such as Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube and Apple.
The problem is that NSA collects this data without the companies knowledge in most cases. Apple, Microsoft, Facebook, Google, and Yahoo, all claim that they do not provide the government with direct access to their servers, unless it is directed by court orders.
When executives from these companies found out about the claims in NSA documents they claimed to be very confused. Basically, PRISM can get around any security system.
On the other hand companies like Skype are working with PRISM. They enable PRISM to easily collect Video and Audio conversations. At the same time Skype claims to there users that they are unable to perform wiretaps.
Companies such as Microsoft claim to protect their systems from the government. In reality they are helping the NSA to get through encryption so they can intercept web chats on the new outlook.com portal. Before Microsoft's help the NSA was already able to access emails on Outlook.com.
Companies such as Yahoo and Facebook are pushing for the right to be allowed to publish the number of requests they receive from the NSA. These companies are forbidden by law to disclose how much data the NSA provides. When founder of facebook and CEO of Yahoo tried to fight off NSA surveillance they were threatened to face jail time. Yahoo has previously even unsuccessfully sued the FISA court that provides the framework for the NSA surveillance
What isn't expressed to the public is the PRISM program has access that is granted to various records such as emails, chat conversations, voice calls, documents and more.
PRISM has direct access to providers such as Microsoft, Yahoo, Google, Facebook, Paltalk, AOL, Skype, YouTube and Apple.
The problem is that NSA collects this data without the companies knowledge in most cases. Apple, Microsoft, Facebook, Google, and Yahoo, all claim that they do not provide the government with direct access to their servers, unless it is directed by court orders.
When executives from these companies found out about the claims in NSA documents they claimed to be very confused. Basically, PRISM can get around any security system.
On the other hand companies like Skype are working with PRISM. They enable PRISM to easily collect Video and Audio conversations. At the same time Skype claims to there users that they are unable to perform wiretaps.
Companies such as Microsoft claim to protect their systems from the government. In reality they are helping the NSA to get through encryption so they can intercept web chats on the new outlook.com portal. Before Microsoft's help the NSA was already able to access emails on Outlook.com.
Companies such as Yahoo and Facebook are pushing for the right to be allowed to publish the number of requests they receive from the NSA. These companies are forbidden by law to disclose how much data the NSA provides. When founder of facebook and CEO of Yahoo tried to fight off NSA surveillance they were threatened to face jail time. Yahoo has previously even unsuccessfully sued the FISA court that provides the framework for the NSA surveillance
Tuesday, November 19, 2013
Digital Story Annotated Bibliography
"National
Security Agency / Central Security Service - Top Banner." The NSA/CSS
Mission. N.p., n.d. Web. 18 Nov. 2013.
The National Security Agency’s mission statement
“The
National Security Agency/Central Security Service (NSA/CSS) leads the U.S.
Government in cryptology that encompasses both Signals Intelligence (SIGINT)
and Information Assurance (IA) products and services, and enables Computer
Network Operations (CNO) in order to gain a decision advantage for the Nation
and our allies under all circumstances.”
When the NSA was
initially formed on December 4th of 1998 The roles of this
organization where;
1. “Collect
(including through clandestine means), process, analyze, produce, and
disseminate signals intelligence information and data for foreign intelligence
and counterintelligence purposes to support national and departmental missions;”
2. “Act
as the National Manager for National Security Systems as established in law and
policy, and in this capacity be responsible to the Secretary of Defense and to
the Director, National Intelligence;”
3. “Prescribe
security regulations covering operating practices, including the transmission,
handling, and distribution of signals intelligence and communications security
material within and among the elements under control of the Director of the
National Security Agency, and exercise the necessary supervisory control to
ensure compliance with the regulations.”
IN 2008 on July 31st the NSA was granted the
rights by the government to;
1. “Align
EO12333 with the Intelligence Reform and Terrorism Prevention Act of 2004;”
2. “Implement
additional recommendations of the 9/11 and WMD Commissions;”
3. “Further
integrate the Intelligence Community and clarify and strengthen the role of the
DNI as the head of the Community;”
4. “Maintain
or strengthen privacy and civil liberties protections”
I chose to copy and paste this information directly
from the NSA website because I want to exactly show what the NSA claims to be.
I will start my digital story off including this information, most likely word
for word. To give viewers who don’t have an education on what the NSA is an
idea of what they are all about and what they claim to be. After my audience
has an idea of the jobs the NSA are supposed to peruse I will then move into
issues that people have with NSA spying.
"Three
Leaks, Three Weeks, and What We've Learned About the US Government's Other
Spying Authority: Executive Order 12333 | Electronic Frontier Foundation."
Electronic Frontier Foundation. N.p., n.d. Web. 19 Nov. 2013.
·
The changes made to the Executive Order In
2008 allows the National Security Agency to secretly steal data from companies
such as Yahoo and google. This also includes fiber optic connections between
company servers at various parts around the world. This allows the NSA to
obtain millions of records each month including personal data such as audio,
video, text and pictures. Even if the user has a block or a password on the
information and is secured by the website, the NSA can still hack their
information.
·
The NSA uses the excuse of protecting us
from foreign threats by collecting our address books, buddy lists, calling
records, phone calls, emails, and storing everything in a database that can be
viewed by the NSA. They can get away with this because they twist the rights of
the Executive Order 12333. This order relies on the Executive oversight, the
problem is that the Congress isn’t concerned about overseeing the actions of
the NSA.
·
The NSA uses the “supposed authority the order grants to collect information”
act in the EO12333 to hack into data center links, Americans address books and
contacts. They can do this because they can consider this information foreign
data. The definition of this act is
incredibly broad and can easily be twisted.
·
The guidelines for “Supplemental
Procedures and Guidelines for Governing Metadata Analysis” allows the NSA to
create secret guidelines without the approval of congress, for when and how the
NSA can use Americans information outside of the oversight of the FISA court.
The NSA uses metadata to create a social network of Americans for the “foreign
intelligence purpose”. There are no restrictions on the use of this data.
·
The foreign intelligence definition
is loose and allows the NSA to create any limit they would like on collecting
internal data from Google and Yahoo. Since databases such as Google and yahoo
take place overseas the NSA believes that they are entitled to presume
communications through them as foreign.
Through this information I wish to give my audience revelations
they can put together to show them that NSA can collect any and all data that
they wish to. I wish to express to them that even innocent Americans
information can be hacked by NSA without reasoning. I hope that it shows my
audience that this needs to be stopped and make them wonder what else they have
collected. I wish to show my audience how the NSA uses laws policies and
procedures to get around the constitution.
Press, The
Associated. "N.H.L. ROUNDUP; Flyers Win Their Third in a Row." The
New York Times. The New York Times, 31 Dec. 2007. Web. 18 Nov. 2013.
I want to inform my viewer that hacking into
personal information can tell the government a lot about a person thinks like;
·
Phone and email logs
o
allow analysts to identify peoples friends and
associates
o
Detect where they were at certain times
o
Gives clues to religious and political affiliations
o
Pick up sensitive information
§ Calls
to a psychologist
§ Late-night
messages to a spouse or partner
I want to make my audience realize that mediadata
can be very revealing.
""We
Don’t Live in a Free Country": Jacob Appelbaum on Being Target of
Widespread Gov’t Surveillance." Democracy Now! N.p., n.d. Web. 19
Nov. 2013.
This video and article shows a real life experience
of someone who was targeted by the NSA I hope to display it to show my audience
a real life experience of NSA hacking.
Basically Jacob Applebaulm life became difficult due
to NSA hacking, he has been target and detained several times at airports,
sometimes met at the jetway by men with guns. He was interrogated by men that
wanted to know his political views. They didn’t care about terrorism or drugs
which would be valid reasons for interrogation.
Friday, November 15, 2013
Subscribe to:
Posts (Atom)