SlideShare una empresa de Scribd logo
1 de 10
SNOWDEN
Hero OR Traitor
Who is Edward Snowden










Edward Joseph Snowden, June 21, 1983 (age 30),
Wilmington, North Carolina
Residence: Russia (temporary asylum)
Nationality: American
Occupation: System administrator
Known for :Revealing details of classified United
States government surveillance programs
Criminal charge :Theft of government property,
unauthorized communication of national defence
information, and wilful communication of classified
intelligence to an unauthorized person (June 2013).
Awards :Sam Adams Award
How NSA Works?
The NSA plays "three degrees of Kevin Bacon."
e.g. With a phone with 260 contacts ,
4,569,760,000 other people can be monitored
 Real Time Access to Phone and Internet Traffic
 The NSA asks for information companies
already have
 The NSA sifts through everything that crosses
the border.
 The NSA assumes you're foreign until proven
otherwise

Issue?




Guardian started publishing a series of
exposes revealing NSA operated a major
web of spying programs in May 2013.
Snowden identity was revealed on 9th
June.
Correctness of his actions


NSA Claims wiretapping was not intrusion
to US citizens Privacy but legitimate way
to intercept terrorist activities or
communications



“ he wasn’t blowing the whistle on anything illegal;
he was exposing something that failed to meet his
own standards of propriety. The question, of
course, is whether the government can function
when all of its employees (and contractors) can
take it upon themselves to sabotage the programs
they don’t like. That’s what Snowden has done.”
Correctness of his actions
Snowden contends that he simply wanted
the public to know that government was
watching and recording people who were
doing no wrong.
“to inform the public as to that which is
done in their name and that which is done
against them”





The NSA view of
Americans

What People Think

Polls between June
and August 2013
Legal Implications

Credit:Mapsofworld
Discussions
1.What is the NSA mission?
How deep is the involvement of corporate America in this whole scheme?
Is Security of country is more important than Privacy?

Credit:Mapsofworld
Widescreen Test Pattern (16:9)

Aspect Ratio
Test
(Should appear
circular)

4x3
16x9

Más contenido relacionado

La actualidad más candente

Ch. 1 Criminal Justice
Ch. 1 Criminal JusticeCh. 1 Criminal Justice
Ch. 1 Criminal JusticeKatrina Homer
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
Al qaeda ppt
Al qaeda pptAl qaeda ppt
Al qaeda pptmrbruns
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence communityDoing What I Do
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Rights of the Accused: The 5th Amendment
Rights of the Accused: The 5th AmendmentRights of the Accused: The 5th Amendment
Rights of the Accused: The 5th AmendmentLina Nandy
 
The Truth About Wrongful Conviction
The Truth About Wrongful ConvictionThe Truth About Wrongful Conviction
The Truth About Wrongful ConvictionSheila Berry
 
Técnicas de búsqueda y análisis de fuentes abiertas
 Técnicas de búsqueda y análisis de fuentes abiertas Técnicas de búsqueda y análisis de fuentes abiertas
Técnicas de búsqueda y análisis de fuentes abiertasemilianox
 

La actualidad más candente (20)

Ch. 1 Criminal Justice
Ch. 1 Criminal JusticeCh. 1 Criminal Justice
Ch. 1 Criminal Justice
 
Inteligencia de Fuentes Abiertas en Redes Sociales
Inteligencia de Fuentes Abiertas en Redes SocialesInteligencia de Fuentes Abiertas en Redes Sociales
Inteligencia de Fuentes Abiertas en Redes Sociales
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
Al qaeda ppt
Al qaeda pptAl qaeda ppt
Al qaeda ppt
 
Fs Ch 6
Fs Ch 6Fs Ch 6
Fs Ch 6
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
What Was Watergate
What Was WatergateWhat Was Watergate
What Was Watergate
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Watergate Scandal
Watergate ScandalWatergate Scandal
Watergate Scandal
 
United States v Nixon
United States v NixonUnited States v Nixon
United States v Nixon
 
Rights of the Accused: The 5th Amendment
Rights of the Accused: The 5th AmendmentRights of the Accused: The 5th Amendment
Rights of the Accused: The 5th Amendment
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Development of criminology
Development of criminologyDevelopment of criminology
Development of criminology
 
The Truth About Wrongful Conviction
The Truth About Wrongful ConvictionThe Truth About Wrongful Conviction
The Truth About Wrongful Conviction
 
Técnicas de búsqueda y análisis de fuentes abiertas
 Técnicas de búsqueda y análisis de fuentes abiertas Técnicas de búsqueda y análisis de fuentes abiertas
Técnicas de búsqueda y análisis de fuentes abiertas
 
File000152
File000152File000152
File000152
 

Destacado

Snowden slides
Snowden slidesSnowden slides
Snowden slidesDavid West
 
Présentation : Edward Snowden
Présentation : Edward SnowdenPrésentation : Edward Snowden
Présentation : Edward SnowdenNicolas G
 
Elon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, EntrepreneurElon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, EntrepreneurMuhtasim Sarowat Rayed
 

Destacado (6)

Snowden slides
Snowden slidesSnowden slides
Snowden slides
 
Présentation : Edward Snowden
Présentation : Edward SnowdenPrésentation : Edward Snowden
Présentation : Edward Snowden
 
Elon musk
Elon muskElon musk
Elon musk
 
Elon Musk
Elon MuskElon Musk
Elon Musk
 
Elon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, EntrepreneurElon Musk- Visionary, Leader, Entrepreneur
Elon Musk- Visionary, Leader, Entrepreneur
 
Entrepreneur Elon musk
Entrepreneur   Elon muskEntrepreneur   Elon musk
Entrepreneur Elon musk
 

Similar a Snowden -Hero OR Traitor

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxcarlt4
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacyjbaton
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxbagotjesusa
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxtoltonkendal
 

Similar a Snowden -Hero OR Traitor (11)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Case 9 Security vs Privacy
Case 9 Security vs PrivacyCase 9 Security vs Privacy
Case 9 Security vs Privacy
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docxEdward Snowden was a whistleblower and former NSA contractor, in the.docx
Edward Snowden was a whistleblower and former NSA contractor, in the.docx
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Snowden -Hero OR Traitor

  • 2. Who is Edward Snowden        Edward Joseph Snowden, June 21, 1983 (age 30), Wilmington, North Carolina Residence: Russia (temporary asylum) Nationality: American Occupation: System administrator Known for :Revealing details of classified United States government surveillance programs Criminal charge :Theft of government property, unauthorized communication of national defence information, and wilful communication of classified intelligence to an unauthorized person (June 2013). Awards :Sam Adams Award
  • 3. How NSA Works? The NSA plays "three degrees of Kevin Bacon." e.g. With a phone with 260 contacts , 4,569,760,000 other people can be monitored  Real Time Access to Phone and Internet Traffic  The NSA asks for information companies already have  The NSA sifts through everything that crosses the border.  The NSA assumes you're foreign until proven otherwise 
  • 4. Issue?   Guardian started publishing a series of exposes revealing NSA operated a major web of spying programs in May 2013. Snowden identity was revealed on 9th June.
  • 5. Correctness of his actions  NSA Claims wiretapping was not intrusion to US citizens Privacy but legitimate way to intercept terrorist activities or communications  “ he wasn’t blowing the whistle on anything illegal; he was exposing something that failed to meet his own standards of propriety. The question, of course, is whether the government can function when all of its employees (and contractors) can take it upon themselves to sabotage the programs they don’t like. That’s what Snowden has done.”
  • 6. Correctness of his actions Snowden contends that he simply wanted the public to know that government was watching and recording people who were doing no wrong. “to inform the public as to that which is done in their name and that which is done against them” 
  • 7.   The NSA view of Americans What People Think Polls between June and August 2013
  • 9. Discussions 1.What is the NSA mission? How deep is the involvement of corporate America in this whole scheme? Is Security of country is more important than Privacy? Credit:Mapsofworld
  • 10. Widescreen Test Pattern (16:9) Aspect Ratio Test (Should appear circular) 4x3 16x9