Difference between revisions of "Edward Snowden"

From SI410
Jump to: navigation, search
(Government Programs Revealed in the Leak)
Line 27: Line 27:
  
 
*PRISM
 
*PRISM
**Most of the reports from the respective agencies that had copies of the documents Snowden leaked focused on the NSA program PRISM. The report from the Guardian claimed that the PRISM program was using nine leading American internet companies servers to extract personal data such as email, audio chats, video chats, documents, and other forms of data. It was also reported that these companies are allowing the government to do this. Snowden later confirmed that tons of US communications “were being intercepted and stored without a warrant, without any requirement for criminal suspicion, probable cause, or individual designation.” <ref name = "WIRED"/> The nine companies that were listed in the secret documents were: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. The program was started during the Bush Administration, under the Protect America Act of 2007.<ref name = "Wash Post">https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html</ref> When the initial reports were released, most of the companies that were rumored to be involved unsurprisingly denied to have any knowledge of the program or ever allowing the government unrestricted access to their servers.
+
**Most of the reports from the respective agencies that had copies of the documents Snowden leaked focused on the NSA program PRISM. The report from the Guardian claimed that the PRISM program was using nine leading American internet companies servers to extract personal data such as email, audio chats, video chats, documents, and other forms of data. It was also reported that these companies are allowing the government to do this. Snowden later confirmed that tons of US communications “were being intercepted and stored without a warrant, without any requirement for criminal suspicion, probable cause, or individual designation.” <ref name = "WIRED"/> The nine companies that were listed in the secret documents were: Microsoft, Yahoo, Google, Facebook, Skype, YouTube, and Apple. The program was started during the Bush Administration, under the Protect America Act of 2007.<ref name = "Wash Post">https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html</ref> When the initial reports were released, most of the companies that were rumored to be involved unsurprisingly denied to have any knowledge of the program or ever allowing the government unrestricted access to their servers.
 
*Bullrun
 
*Bullrun
 
**Project Bullrun was the NSA's decryption program. It's main focus was to crack the encryption of network communication technology. Snowden did not have complete access to information on this program, so the only information that is known about it is contained in the slides released. The program is used by the NSA to crack online encryption in order to get access to personal data. The program was designed to weaken online commercial encryption by inserting vulnerabilities that only the NSA knew about. This encryption protected sensitive data such as emails, banking, and medical records, etc.<ref>http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security</ref><ref>http://www.eweek.com/blogs/security-watch/nsa-bullrun-911-and-why-enterprises-should-walk-before-they-run.html</ref>
 
**Project Bullrun was the NSA's decryption program. It's main focus was to crack the encryption of network communication technology. Snowden did not have complete access to information on this program, so the only information that is known about it is contained in the slides released. The program is used by the NSA to crack online encryption in order to get access to personal data. The program was designed to weaken online commercial encryption by inserting vulnerabilities that only the NSA knew about. This encryption protected sensitive data such as emails, banking, and medical records, etc.<ref>http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security</ref><ref>http://www.eweek.com/blogs/security-watch/nsa-bullrun-911-and-why-enterprises-should-walk-before-they-run.html</ref>
Line 35: Line 35:
 
**Tailored Access Operations, or TAO, is a program that hacks into, monitors, and collects data from foreign computer systems. TAO reportedly consists of over one thousand military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers. These workers work in shifts twenty-four hours a day, looking to find and hack potential security threats to the United States. Tailored Access Operations is centered in Fort Meade. <ref>http://foreignpolicy.com/2013/06/10/inside-the-nsas-ultra-secret-china-hacking-group/</ref><ref>https://en.wikipedia.org/wiki/Tailored_Access_Operations</ref>
 
**Tailored Access Operations, or TAO, is a program that hacks into, monitors, and collects data from foreign computer systems. TAO reportedly consists of over one thousand military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers. These workers work in shifts twenty-four hours a day, looking to find and hack potential security threats to the United States. Tailored Access Operations is centered in Fort Meade. <ref>http://foreignpolicy.com/2013/06/10/inside-the-nsas-ultra-secret-china-hacking-group/</ref><ref>https://en.wikipedia.org/wiki/Tailored_Access_Operations</ref>
 
*Xkeyscore
 
*Xkeyscore
**Xkeyscore is a program that allows the NSA to sift through all of the meta data that they have collected using other methods. In an Interview with NDR, Snowden described the scope and functionality of the program. He said that if you had access to the program, you could look at any email, invade an computer, and go into company networks using a persons username. He also says that if you wanted to, you could track any laptop across the world if it were moving from place to place. The NSA isn't the only country that has access to this technology, as Snowden tells us that Germany is capable of using it  as well. <ref>http://www.ndr.de/nachrichten/netzwelt/snowden277_page-3.html></ref><ref>http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection</ref>
+
**Xkeyscore is a program that allows the NSA to sift through all of the meta data that they have collected using other methods.This program allows the NSA to extract the data that the NSA wants in real time.<ref>https://www.researchgate.net/profile/David_Lyon10/publication/265965268_Big_Data__Society_Big_Data__Society_On_behalf_of/links/5421d9e60cf238c6ea678102.pdf</ref> In an Interview with NDR, Snowden described the scope and functionality of the program. He said that if you had access to the program, you could look at any email, invade an computer, and go into company networks using a persons username. He also says that if you wanted to, you could track any laptop across the world if it were moving from place to place. The NSA isn't the only country that has access to this technology, as Snowden tells us that Germany is capable of using it  as well. <ref>http://www.ndr.de/nachrichten/netzwelt/snowden277_page-3.html></ref><ref>http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection</ref>
  
 
= Ethical Implications =
 
= Ethical Implications =
Line 44: Line 44:
  
 
==Mass Surveillance==
 
==Mass Surveillance==
 +
The programs that were revealed in Snowden's documents created a lot of concern from not only US citizens but also from others around the world. Surveillance in this new information age is starting to move more towards Mass Monitoring, rather than smaller scale, targeted observations. The ability for the NSA and other government agencies to do this comes with the evolution of Big Data technologies.
 +
 
=References=
 
=References=
 
<references/>
 
<references/>

Revision as of 20:14, 18 February 2016


SiLogo.png
Imgres.jpg
Edward Snowden's Twitter Avatar
Birthname Edward Snowden
Date of Birth June 21, 1983
Birth Place Elisabeth City, North Carolina
Nationality American
Occupation Computer Professional
Biography Best known for his leak of confidential NSA documents that revealed the unlawful practices of their security programs

Life Before the Government Employment

Edward Snowden was born on June 21, 1983, in Elisabeth City, North Carolina.[1] He moved at a young age and grew up in the suburbs of Maryland. Coincidentally, he did not grow up far from the NSA’s headquarters at Fort Meade, in the suburbs of Maryland. Snowden did not graduate from college or high school, but was enrolled in the Anne Arundel County public school system until he was forced to miss eight months of school due to a battle with mononucleosis. Snowden then enrolled in community college, and began to explore his passion in technology. At this point in time Snowden began to work for one of his friends that ran his own tech company.[2]

Family Ties to Government Service

Snowden came from a family that was heavily involved in government affairs. In one of his extensive interviews with the magazine WIRED, Snowden says “Everybody in my family has worked for the government in one way or another.” [2] Snowden’s family ties to Government Agencies go all the way back to his maternal Grandfather, who worked in the Pentagon[3], continued through his parents and to his sister, Jessica, who was a lawyer for The Federal Judicial Center in Washington. Snowden found himself attracted to the idea of being able to serve his country. Inspired by the events that took place on 9/11 and the ensuing Iraq War on Terrorism, Snowden volunteered his services to the Army special forces in 2004. He passed aptitude tests, but was discharged after suffering two broken legs during a training exercise. After accepting and excelling at a job with the CIA, Snowden was then transferred to a job with the NSA. He worked for the NSA until he left the country, prior to leaking the Government documents that he had collected.[3]

The Leak

In early June 2013, Edward Snowden leaked government documents that he had collected during his time at the NSA to journalist Glenn Greenwald, journalist Barton Gellman and filmmaker Laura Poitras. He also gave the documents to four organizations: First Look Media, The Washington Post, The New York Times, and The Guardian. Snowden had seen first hand what the NSA had been doing with the people's private data, and decided that it was time for action. By releasing these documents, he risked being sent to prison and charged with treason against the government that he had once wanted to serve so badly. In his exclusive interview with WIRED magazine, Snowden explains his motivations for leaking the documents. In an audio recording embedded in the article, he says: "My name is Ed Snowden. I used to work for the government, and now I work for the public. Technology is the greatest equalizer in human history. It allows us to try on new faces, join new communities, engage in new conversations, and discover who we are, and what we want to become. Our generation is facing a time where governments around the world are questioning whether or not individuals can be trusted with the power of technology, if we can be left to our own devices and use it creatively rather than destructively. While I don’t know the answer to that question, what I do know is that governments shouldn’t be the ones to decide, we should. And what I did was not to benefit myself, I didn’t ask for money, I gave this information back to public hands, and the reason I did that was not to gain a label, but to give you back a choice about the country you want to live in" Snowden also insists that though he was the leaker, he does not have copies of the original documents anymore.[2]

Government Programs Revealed in the Leak

PRISM might have been the most talked about government program after Snowden's leak, but the information did not stop there. In the documents, there was also information about other programs such as: Upstream, Bullrun, Xkeyscore and, Quantuminsert, and Dishfire. The documents also included information about the United Kingdom's version of the NSA, the GCHQ, being involved in similar activity that the NSA was.[4]

  • PRISM
    • Most of the reports from the respective agencies that had copies of the documents Snowden leaked focused on the NSA program PRISM. The report from the Guardian claimed that the PRISM program was using nine leading American internet companies servers to extract personal data such as email, audio chats, video chats, documents, and other forms of data. It was also reported that these companies are allowing the government to do this. Snowden later confirmed that tons of US communications “were being intercepted and stored without a warrant, without any requirement for criminal suspicion, probable cause, or individual designation.” [2] The nine companies that were listed in the secret documents were: Microsoft, Yahoo, Google, Facebook, Skype, YouTube, and Apple. The program was started during the Bush Administration, under the Protect America Act of 2007.[5] When the initial reports were released, most of the companies that were rumored to be involved unsurprisingly denied to have any knowledge of the program or ever allowing the government unrestricted access to their servers.
  • Bullrun
    • Project Bullrun was the NSA's decryption program. It's main focus was to crack the encryption of network communication technology. Snowden did not have complete access to information on this program, so the only information that is known about it is contained in the slides released. The program is used by the NSA to crack online encryption in order to get access to personal data. The program was designed to weaken online commercial encryption by inserting vulnerabilities that only the NSA knew about. This encryption protected sensitive data such as emails, banking, and medical records, etc.[6][7]
  • Dishfire
    • Dishfire is a program uses text messages and missed call alerts to retrieve data about people. The program is said to have collected almost 200 million text messages a day from places all around the world. [8] The program does not only collect information from previous surveillance targets, but aims to collect as much data as possible about anything and everything that is being transmitted via text message.
  • Tailored Access Operations
    • Tailored Access Operations, or TAO, is a program that hacks into, monitors, and collects data from foreign computer systems. TAO reportedly consists of over one thousand military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers. These workers work in shifts twenty-four hours a day, looking to find and hack potential security threats to the United States. Tailored Access Operations is centered in Fort Meade. [9][10]
  • Xkeyscore
    • Xkeyscore is a program that allows the NSA to sift through all of the meta data that they have collected using other methods.This program allows the NSA to extract the data that the NSA wants in real time.[11] In an Interview with NDR, Snowden described the scope and functionality of the program. He said that if you had access to the program, you could look at any email, invade an computer, and go into company networks using a persons username. He also says that if you wanted to, you could track any laptop across the world if it were moving from place to place. The NSA isn't the only country that has access to this technology, as Snowden tells us that Germany is capable of using it as well. [12][13]

Ethical Implications

Edward Snowden and his actions have brought about a lot of controversy in terms of Ehtics. His leaks, on one hand, started a conversation about what it means when governments use the term "National Security". The information released revealed to us what had previously been unknown about some of the Governments Practice . We now know how much information government agencies really can, and do collect about it's citizens on a day to day basis. The other conversation that the actions of Snowden has started is a conversation on the ethics of Whistleblowing. Though Snowden was exposing illegal programs in the government, If he were to come back to the United States, he would still be tried for three felonies, two of which are under the Espionage Act, a near century old law that was passed in order to fight dissenters in World War 1.[14][15]

Whistle Blowing

Whistle Blowing is the practice of revealing information about the unethical or illegal practices of any organization, public or private.[16] Snowden's case has become one of the most high profile cases of whistle blowing in the past couple of years. One reason for this is that the case is slightly ironic in the way that when President Obama was running for office, one of his selling points was the fact that he was going to protect whistleblowers when it came to government agencies. He has not exactly practiced what he preached, though, as Snowden has been the seventh case in which someone who blew the whistle on government practices has been charged. President Obama also issued an Executive Order called the Insider Threat Program, a response to massive data leaks.[17] There are some laws in place to protect Whistle Blowers, however. There is a debate that Snowden could have taken a more legal and confidential route to change the practices that are in place, but there is question as to whether or not he would have been able to change anything. Under the Intelligence Community Whistleblower Protection Act of 1998, Snowden could have taken the information that he had gathered to higher committes in order to try and deal with his urgent concern that way, and would have been protected.[18][19]

Mass Surveillance

The programs that were revealed in Snowden's documents created a lot of concern from not only US citizens but also from others around the world. Surveillance in this new information age is starting to move more towards Mass Monitoring, rather than smaller scale, targeted observations. The ability for the NSA and other government agencies to do this comes with the evolution of Big Data technologies.

References

  1. http://www.theguardian.com/world/2013/jun/10/edward-snowden-army-special-forces
  2. 2.0 2.1 2.2 2.3 http://www.wired.com/2014/08/edward-snowden/]
  3. 3.0 3.1 https://en.wikipedia.org/wiki/Edward_Snowden
  4. http://www.cips-cepi.ca/wp-content/uploads/2014/09/Didier-Bigo_document-Oct6.pdf
  5. https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
  6. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
  7. http://www.eweek.com/blogs/security-watch/nsa-bullrun-911-and-why-enterprises-should-walk-before-they-run.html
  8. http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
  9. http://foreignpolicy.com/2013/06/10/inside-the-nsas-ultra-secret-china-hacking-group/
  10. https://en.wikipedia.org/wiki/Tailored_Access_Operations
  11. https://www.researchgate.net/profile/David_Lyon10/publication/265965268_Big_Data__Society_Big_Data__Society_On_behalf_of/links/5421d9e60cf238c6ea678102.pdf
  12. http://www.ndr.de/nachrichten/netzwelt/snowden277_page-3.html>
  13. http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection
  14. http://www.theguardian.com/commentisfree/2013/jun/22/snowden-espionage-charges
  15. http://www.nytimes.com/2013/06/22/us/snowden-espionage-act.html?pagewanted=all&_r=0
  16. https://www.scu.edu/ethics/focus-areas/government-ethics/resources/introduction/whistle-blowing-in-the-public-sector/
  17. https://en.wikipedia.org/wiki/Insider_Threat_Program
  18. http://www.politifact.com/punditfact/statements/2014/jan/07/glenn-greenwald/greenwald-nsa-leaker-snowden-has-no-whistleblower-/
  19. https://www.gpo.gov/fdsys/pkg/PLAW-105publ272/html/PLAW-105publ272.htm