The+National+Security+Agency

Students from all three of my AP classes will upload source-data here.

Debate topic: The **benefits** of domestic surveillance by the NSA **outweigh** any potential short- or long-term **costs**.

Debate teams

 * Period 2: Pro:** David, Jacob, Joe vs. **Con:** Esther, Atsi, Nick, Vinod
 * Period 4: Pro:** Becky, Brooke vs. **Con:** Sam, Tyler, Joy (Tues, 11/26)
 * Period 8: Pro**: Allison, James, Evanna vs. **Con:** Ricson, Jess, Jacqueline (Tues, 11.26)

What to post

 * source title (hyperlink to the source if available)
 * Your name (first & last)
 * Author's name
 * a SOAPSTone for the source (Subject, Occasion, Audience, Purpose, Speaker, Tone)
 * 2-3 key quotes

How many of these to post

 * At least three per student by Sun. night
 * Careful not to post over/delete someone else's work
 * Consider taking notes in another document and then copy/pasting in


 * Where to post? Right here in the space below.**


 * Joseph D'Addesa**

NSA repeatedly broke, vowed to obey surveillance rules, court records show **Speaker**: CBS News writer, government, NSA
 * Author **: CBS News
 * SOAPstone **:
 * Subject **: They talk about how the court told the NSA to stop looking at peoples' phone records and other personal things but they continued to anyway . It also talks about the reason why the NSA keeps doing this is because they have a lack of discipline and no one is stepping in to stop them from doing these things.
 * Occasion **<span style="background-color: #ffffff; font-family: Arial,Helvetica,sans-serif; line-height: 1.5;">: The NSA's intentional breaking of the court ruling is the reason this article has been written as well as their lack of compliance to stop spying on other people.
 * <span style="font-family: Arial,Helvetica,sans-serif; line-height: 1.5;">Audience **<span style="background-color: #ffffff; font-family: Arial,Helvetica,sans-serif; line-height: 1.5;">: Anyone who wants to know what the government is doing to stop the NSA from looking at other peoples personal information or empower them to do it even more.
 * <span style="font-family: Arial,Helvetica,sans-serif; line-height: 1.5;">Purpose **<span style="background-color: #ffffff; font-family: Arial,Helvetica,sans-serif; line-height: 1.5;">: This was written to inform people of what the NSA has been doing and what the government is doing as a reaction. It is giving the people a reason to fight against the NSA or work with them to make this country <span class="GINGER_SOFATWARE_correct">safer from terrorists.

Author: (none stated)
 * EFF VS NSA**

Nick Zienkiewicz

1." The US government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001." 2."Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution." 3."Secret government documents, published by the media in 2013, confirm the NSA obtains full copies of everything that is carried along major domestic fiber optic cable networks."
 * Subject:** What the NSA is doing as far as spying on Americans through phone calls and online. Also talks about how the EFF ( electronic frontier foundation ) fought the NSA in court)
 * Occasion:** The NSA's spying on Americans has finally been brought to light by the whistle blowers on the NSA.
 * Audience:** Americans, everyday internet/ phone users, NSA<span class="GINGER_SOFATWARE_correct">, American government.
 * Purpose****:** written to show how the NSA is spying on everyday Americans and storing their personal data in their archives. EFF wants to campaign against the NSA for their wrong doings in court.
 * Speaker:** The EFF, NSA, USA government, American laws, AT&T.
 * Tone:** informative, persuasive, bias (against NSA).

NSA <span class="GINGER_SOFATWARE_correct">Survelince Program Failed to Invade Tamerlan Tsarnaev's Privacy
 * Author:** Michael Daly

1. " One person whose privacy was not invaded by U.S. <span class="GINGER_SOFATWARE_correct">intelligence was Tamerlan Tsarnaev, as he repeatedly visited the al Qaeda online magazine Inspire for its recipe “Build a Bomb in the Kitchen of Your Mom." 2. "In the case of Tsarnaev, the databases also failed to uncover the online communications that Tsarnaev had with a known Muslim extremist in Dagestan." 3. "They would not have needed a multi-billion-dollar intelligence apparatus to go on YouTube and see that Tsarnaev had posted a video playlist he labeled “Terrorists.”
 * Subject:** The subject of this article is to inform readers how useless the NSA is because they failed to prevent the Boston Bombing attack even after Tsarnaev looked up extremely suspicious content on the web.
 * Occasion:** This article was written because people are questioning the relevance of the NSA's spying because the NSA has failed to stop numerous terrorist attacks (failing to accomplish their main goal as an organization).
 * Audience: T**he audience for this article is anyone who cares about their privacy online as well as the people who are skeptical about the NSA's <span class="GINGER_SOFATWARE_correct">sucess . Also, people connected to the Boston Bombing are part of the audience.
 * Purpose:** To inform people of how the NSA has failed to keep us safe and prevent terrorist attacks.
 * Speaker:** Author, NSA, NSA skeptics
 * Tone:** Informative, Chose to be biased (against NSA), factual

The Criminal NSA 1." We may never know all the details of the mass surveillance programs, but we know this: The administration has justified them through abuse of language, intentional evasion of statutory protections, secret, <span class="GINGER_SOFATWARE_noSuggestion GINGER_SOFATWARE_correct">unreviewable investigative procedures and constitutional arguments that make a mockery of the government’s professed concern with protecting Americans’ privacy. It’s time to call the N.S.A.’s mass surveillance programs what they are: criminal." 2." No statute explicitly authorizes mass surveillance." 3. "The law under which the government collected this data, Section 215 of the Patriot Act, allows the F.B.I. <span class="GINGER_SOFATWARE_correct">to obtain court orders demanding that a person or company <span class="GINGER_SOFATWARE_correct">produce “tangible things,” upon showing reasonable grounds that the things sought are “relevant” to an authorized foreign intelligence investigation. The F.B.I. <span class="GINGER_SOFATWARE_correct">does not need to demonstrate probable cause that a crime has been committed, or any connection to terrorism."
 * Author:** Jennifer Stisa
 * Subject:** NSA violates rights of people online by viewing their private emails and even phone calls.
 * Occasion:** The online community and general public have begun to question what the NSA is collecting and why.
 * Audience:** Online community, general public, NSA, USA government.
 * Purpose****:** Informs, people how much they are being spied on and how our government is not doing anything to control the NSA.
 * Tone:** Informative, opinion based, biased (against NSA), chose to involve specific government <span class="GINGER_SOFATWARE_correct">officails and leaders (quoting them).


 * Jacob Tyles **

[]


 * Author:** Devlin Barret


 * Subject:** Albert Gonzalez pleads guilty to hacking into 130 million credit card accounts, 40 million just within American borders.


 * Occasion:** The arrest and trial of Albert Gonzalez in 2009


 * Audience:** The Internet, critics, website, teachers, students


 * Purpose:** To inform readers about the recent plot that hacked over 130 million credit and debit card accounts. This recent event has put the surveillance technology and matters of privacy into the front spotlight within the American public interest.


 * Speaker:** Devlin Barret, various prosecutors, Scott Christie


 * Tone:** informative, informal, friendly

“Federal prosecutors on Monday charged a Miami man with the largest case of credit and debit card data theft ever in the United States, accusing the one-time government informant of swiping 130 million accounts on top of 40 million he stole previously.”

“According to the indictment, Gonazalez and his two Russian coconspirators would hack into corporate computer networks and secretly place "malware," or malicious software, that would allow them backdoor access to the networks later to steal data.”


 * []**


 * Author:** Members of NISO Press, Rebecca Guenther and Jacqueline Radebaugh


 * Subject:** Understanding the processing, origination, and implementation of metadata


 * Occasion:** To clear up conceptions on data v. metadata


 * Audience:** Concerned/interested citizens, the Internet, NISO Press


 * Purpose:** Again, to clear up the misinformation concerning data and metadata, as well as formally go over the functions metadata serve.


 * Speaker:** NISO Press


 * Tone:** Formal, cold, calculated


 * Author:** NISO Press

“Metadata is structured information that describes, explains, locates, or otherwise makes it easier to retrieve, use, or manage an information resource. Metadata is often called data about data or information about information.”

“Metadata can describe resources at any level of aggregation.”

[]


 * Author:** Eric Boehm


 * Subject:** Law enforcement uses NSA metadata base to go after common criminals in areas such as the war on drugs.


 * Occasion:** Clear up and offer information to benefits of having a massive surveillance program


 * Audience:** The Internet, debaters from around the world, political enthusiasts, the Reuters website team


 * Purpose:** To assert some form of good the NSA has done for this country.


 * Speaker:** Eric Boehm, U.S. Drug Enforcement Agency, Nancy Gertner


 * Tone:** Analytical, thoughtful

“ The DEA takes information collected by the FBI, CIA and NSA and uses it to launch its own operations that “rarely involve national security issues,” according to the news service.”

“It seems the information being collected by the NSA and other branches of America’s security infrastructure is being used to do more than fight the War on Terror. It’s being used to fight the War on Drugs too.”

=David Tsai=

Boundless Informant
[|Boundless Informant: the NSA's secret tool to track global surveillance data | World news | theguardian.com]

Subject

 * NSA Data Anlytical Tool
 * Name: Boundless Informant
 * Real Name: US-984XN

Occasion

 * Fear of government conspiracies to spy on people
 * Fear of being watched

Audience

 * Citizens of the world, for the NSA spies on all communications that pass through the U.S.
 * Data is routed through the fastest, not shortest, route.
 * Therefore, due to the link topology of the infrastructure, many international communications pass through servers in the United States.

Purpose

 * To inform just how the NSA could handle such large quantities of data
 * To let people know that it is all possible

Speaker

 * Two journalists, Glenn Greenwald and Ewen MacAskill

Decisions

 * Stayed objective
 * Did not state position on issue

NSA Approached Linus Torvalds to Install Back Doors into GNU/Linux
This is a video from a recent meeting European Parliament. At 3:06:59, a discussion in which it is revealed that the NSA approached the creator of the Linux kernel, Linus Torvalds, to install software back doors into the GNU/Linux operating system and a representative from Microsoft is questioned <span class="GINGER_SOFATWARE_correct">on her company's involvement with the NSA ensues. media type="custom" key="24469526" media type="custom" key="24469532"

NSA Infiltrates Google and Yahoo! Data Center Links
Article Here: @http://wapo.st/1bCL7HK The particularly interesting tidbit is the quote: <span style="background-color: #ffffff; font-family: Georgia,serif; font-size: 15px;">NSA applies Attorney General-approved processes to protect the privacy of U.S. <span class="GINGER_SOFATWARE_correct">persons — minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination. = = =//<span style="font-family: Georgia,serif;">Esther Han //= <span style="font-family: Georgia,serif;">[] <span style="font-family: Georgia,serif;">Subject: <span style="font-family: Georgia,serif;">Occasion: <span style="font-family: Georgia,serif;">Audience: <span style="font-family: Georgia,serif;">Purpose: <span style="font-family: Georgia,serif;">Speaker: <span style="font-family: Georgia,serif;">Tone:
 * <span style="font-family: Georgia,serif;">NSA Surveillance
 * <span style="font-family: Georgia,serif;">Boston Bombing (Marathon)
 * <span style="font-family: Georgia,serif;">NSA does not prevent terrorist attacks
 * <span style="font-family: Georgia,serif;">Ongoing debate about whether NSA Surveillance should be allowed or not
 * <span style="font-family: Georgia,serif;">Boston Marathon Bombing and other previous terrorist attacks
 * <span style="font-family: Georgia,serif;">anyone interested in the debate of the approval of NSA surveillance
 * <span style="font-family: Georgia,serif;">people who read news articles online
 * <span style="font-family: Georgia,serif;">us students preparing for this debate
 * <span style="font-family: Georgia,serif;">support the position of disapproval of nsa surveillance
 * <span style="font-family: Georgia,serif;">give support and details to back up reasoning
 * <span style="font-family: Georgia,serif;">show how NSA does not prevent terrorist attacks
 * <span style="font-family: Georgia,serif;">Washingtonsblog
 * <span style="font-family: Georgia,serif;">anyone who does not support the surveillance of the NSA
 * <span style="font-family: Georgia,serif;">Barry Rubins
 * <span style="font-family: Georgia,serif;">William Binney
 * <span style="font-family: Georgia,serif;">Judy Woodruff
 * <span style="font-family: Georgia,serif;">persuasive
 * <span style="font-family: Georgia,serif;">informative
 * <span style="font-family: Georgia,serif;">biased

<span style="font-family: Georgia,serif;">[] <span style="font-family: Georgia,serif;">Subject: <span style="font-family: Georgia,serif;">Occasion: <span style="font-family: Georgia,serif;">Audience: <span style="font-family: Georgia,serif;">Purpose: <span style="font-family: Georgia,serif;">Speaker: <span style="font-family: Georgia,serif;">Tone:
 * <span style="font-family: Georgia,serif;">NSA Spying
 * <span style="font-family: Georgia,serif;">NSA failure to foil terrorist plot
 * <span style="font-family: Georgia,serif;">debate on approval of NSA surveillance
 * <span style="font-family: Georgia,serif;">ongoing debate on whether or not NSA surveillance should be allowed
 * <span style="font-family: Georgia,serif;">author claims that no terrorist attacks happened
 * <span style="font-family: Georgia,serif;">anyone interested in the debate
 * <span style="font-family: Georgia,serif;">anyone who reads news articles online often (or blogs)
 * <span style="font-family: Georgia,serif;">anyone who has this as a homework assignment
 * <span style="font-family: Georgia,serif;">show how NSA is failing at their job
 * <span style="font-family: Georgia,serif;">explain with details and examples to support the author's claim
 * <span style="font-family: Georgia,serif;">show how much government is sucking up information that they cannot find anything, no benefits
 * <span style="font-family: Georgia,serif;">Washingtonsblog
 * <span style="font-family: Georgia,serif;">all of the critics and people reported in this article
 * <span style="font-family: Georgia,serif;">anyone who supports the same side in this debate
 * <span style="font-family: Georgia,serif;">persuasive
 * <span style="font-family: Georgia,serif;">informative
 * <span style="font-family: Georgia,serif;">biased

<span style="font-family: Georgia,serif;">[]

<span style="font-family: Georgia,serif;">Subject: <span style="font-family: Georgia,serif;">Occasion: <span style="font-family: Georgia,serif;">Audience: <span style="font-family: Georgia,serif;">Purpose: <span style="font-family: Georgia,serif;">Speaker: <span style="font-family: Georgia,serif;">Tone:
 * <span style="font-family: Georgia,serif;">NSA Surveillance Debate
 * <span style="font-family: Georgia,serif;">Con side
 * <span style="font-family: Georgia,serif;">costs of NSA surveillance
 * <span style="font-family: Georgia,serif;">ongoing debate about NSA surveillance approval
 * <span style="font-family: Georgia,serif;">people who need help to support their debate (at school)
 * <span style="font-family: Georgia,serif;">used as a resource/data
 * <span style="font-family: Georgia,serif;">people who are interested in this ongoing debate
 * <span style="font-family: Georgia,serif;">people who want to know more about the topic
 * <span style="font-family: Georgia,serif;">people who dont know why cons are supporting their view
 * <span style="font-family: Georgia,serif;">to convince the audience that NSA surveillance should not be permitted
 * <span style="font-family: Georgia,serif;">to prove a point (generally speaking)
 * <span style="font-family: Georgia,serif;">to support claim with many details and good reasoning
 * <span style="font-family: Georgia,serif;">con supporters
 * <span style="font-family: Georgia,serif;">James M. Kellans
 * <span style="font-family: Georgia,serif;">alll of the other critics mentioned
 * <span style="font-family: Georgia,serif;">persuasive
 * <span style="font-family: Georgia,serif;">biased
 * <span style="font-family: Georgia,serif;">factual
 * <span style="font-family: Georgia,serif;">argumental

Vinod Raman-NSA Files: Decoded Vinod Raman- Self-Censorship Vinod Raman- NSA Effeciency

=Tyler Stark= <span style="background-color: #ffffff; font-family: periodico-text-1,periodico-text-2,helvetica,arial,sans-serif; font-size: 24px;">[|The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)]

Subject

 * NSA spying on the American public

Occasion

 * NSA has decided to build a new spy center

Audience

 * The American public
 * President
 * Congress

Purpose

 * To expose the extents the NSA has been going to, to not only collect but store mass amounts of data on anyone they suspect even a little for an indefinite period of time.

Speaker

 * Wired - James Bamford

Decisions

 * This piece covers the technology of the NSA rather than the actually politics behind them

Important Quotes

 * "<span style="background-color: #ffffff; color: #333333; font-family: Arial,Verdana,sans-serif; font-size: 14px;">But first the supercomputer must break the encryption, and to do that, speed is everything. The faster the computer, the faster it can break codes. "
 * <span style="background-color: #ffffff; color: #333333; font-family: Arial,Verdana,sans-serif; font-size: 14px;">"Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the world’s fastest computer in 2009."

=Tyler Stark= <span style="font-family: Arial,Helvetica,sans-serif; vertical-align: baseline;">[|Google's Eric Schmidt Lambasts NSA Over Spying]

Subject

 * NSA spying on the American public

Occasion

 * A top exec at an important IT firm has spoken out against the NSA's spying practices

Audience

 * American public
 * President
 * Congress

Purpose

 * The article gives an insider point of view of the spying the NSA does and the extents they have gone to increase their network

Speaker

 * The Wallstreet Journal - Deborah Kan
 * Eric Schmidt

Decisions

 * Is a one on one interview

Important Quotes
> "<span style="color: #333333; font-family: Arial,Helvetica,sans-serif; font-size: 15px; line-height: 1.5;">Google in 2011 rerouted its China-based search engine to Hong Kong due to censorship concerns."
 * <span style="color: #333333; font-family: Arial,Helvetica,sans-serif; font-size: 15px;">"There clearly are cases where evil people exist, but you don't have to violate the privacy of every single citizen of America to find them,"

=Tyler Stark= <span style="font-family: Arial,Helvetica,sans-serif; vertical-align: baseline;">[|They Know Much More Than You Think]

Subject

 * NSA spying on the American public

Occasion

 * Information has come out revealing the NSA knows much more than originally expected

Audience

 * American public
 * Congress
 * President

Purpose

 * This article is the most in-depth out of my three and tries to cover all the ground surrounding the scandal. It focuses on the big picture as well as the little details unlike the other two articles which has a singular focus.

Speaker

 * The New York Review of Books - James Bamford

Decisions

 * Includes pictures to aid in conveying his message

Important Quotes

 * " Church sounds as if he had absorbed the lessons of // 1984 // . From the recent evidence, they are still to be learned."
 * "That capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back"

[]
 * Samantha Lerner**

Author: Associated Press The NSA repeatedly violating surveillance laws Supreme Court refusing to intervene The NSA admitting to their mistakes and promising to take extra security measures in the future Acknowledgement of improperly collected material Acknowledgement of listening to phone calls of the American public for the last seven years American public The government To allow readers access to the actuality of the NSA's spying and breaking of surveillance rules Associated Press The NSA Serious Factual
 * Subject**
 * Occasion**
 * Audience**
 * Purpose**
 * Speaker**
 * Tone**

[] Author: Bill Mears The NSA being allowed to continue looking at telephone records The Electronic Privacy Information Center filing its petition to the high court, because there was information made available that the NSA has previously gotten approval from a secret court NSA American public To make people aware that although the NSA broke surveillance rules, the Supreme Court has allowed them to keep searching through phone records To publically declare that the NSA is being punished and given warnings The Supreme Court Informative Casual Biased
 * Subject**
 * Occasion **
 * Audience**
 * Purpose **
 * Speaker**
 * Tone **

[]

James Risen and Laura Poitras NSA pushing to expand its surveillance powers America's concern on this issue Outlying the NSA's ambitions Warning the American public and shining light on the actuality of the surveillance done by the NSA and the secrets of which they are keeping A strategy to gain more surveillance powers The American public Congress The government and Supreme Court To give the public access to classified NSA documents that impact their lives To reveal the secrets the government has been keeping through classified documents and statements from Snowden According to the NSA, existing American laws do not meet the sufficient needs of the NSA for their surveillance The NSA Informative Serious
 * Author:**
 * Subject**
 * Occasion**
 * Audience**
 * Purpose**
 * Speaker**
 * Tone**

<span class="GINGER_SOFATWARE_correct">Ricson Cheng Subject Tor and preventing anonymity
 * [|Peeling back the layers of Tor with Egotistical Giraffe] **

Occasion The large number of dissidents, targets, and terrorists who use Tor Widespread use of Tor

Audience People who work on the Egotistical Giraffe project The public (document will be declassified in 2037)

Purpose List the various attempts and exploits that have been used in an attempt to deanonymize Tor Describe difficulties in exploiting Tor

Speaker Tailored Access Operations Data Network Technologies NSA

Tone Broken and fragmented (because it is a slideshow)

<span class="GINGER_SOFATWARE_correct">Ricson Cheng [|Procedures used by NSA to]<span class="GINGER_SOFATWARE_correct">[|target] [| non-US persons Exhibit A]

Subject Procedures for targeting Non-US citizens

Occasion A need for the regulation of the NSA and surveillance.

Audience Attorney General NSA workers The U.S. Government public (in 2032)

Purpose Regulates the NSA's activities Creates a system for targeting Non-US citizens Allows for departure from procedures

Speaker Attorney General NSA

Tone careful exact logical

<span class="GINGER_SOFATWARE_correct">Ricson Cheng [|Gone in 30 seconds] Subject BREACH, an attack on the https, tsl, and ssl security protocol

Occasion the recent development of BREACH, to be demonstrated a few days after the article was published.

Audience ars-technica readers the technically inclined the technically disinclined

Purpose inform the audience about problems with https explain exactly how the attack works

Speaker writers of article: Dan Goodlin developers of attack: prado, harris, gluck

Tone sometimes simplistic dramatic

Atsi Shah

[]

Jameel Jaffer

Subject: Stating what the NSA does and summarizing the information collected by other sources such as //The Gaurdian// and //The Washington Post//.

Occasion: This article was probably written in response to the NSA scandal that happened recently.

Audience: Anyone who wants to be informed about the NSA and get a different viewpoint on this matter.

Purpose: To tell the people about how the government is wrong about spying on people

Speaker: Jameel Jaffer

Tone: informative, debatable, opinionated

1. " <span style="background-color: #ffffff; font-family: georgia,;">The surveillance activities disclosed last week are the result of systemic failure — a failure of all three branches of government — and if we are going to restore some measure of the privacy that the Constitution guarantees, we will need systemic reform."

<span style="background-color: #ffffff; font-family: georgia,;">2. <span class="remarkable-pre-marked" style="background-color: #ffffff; font-family: georgia,;">"The Guardian and The Washington Post also revealed last week that the N.S.A. has secured direct access to the major <span class="remarkable-pre-marked" style="background-color: #ffffff; color: #009900; font-family: inherit; font-size: inherit; line-height: 1.5; vertical-align: baseline;">__Internet companies__ <span class="remarkable-pre-marked" style="background-color: #ffffff; font-family: georgia,;">’ central servers."

<span class="remarkable-pre-marked" style="background-color: #ffffff; font-family: georgia,;">3. " <span style="background-color: #ffffff; font-family: georgia,;">in some national security cases, requires Verizon to tell the government who made each call, whom they called, when they made the call, how long the call lasted, and (maybe) where the parties to the call were located."

[|http://www.latimes.com/news/opinion/editorials/la-ed-nsa-surveillance-amash-amendment-house-vote-20130729,0,6084823.story#axzz2lazZNNHV]

The Times Editorial Board

Subject: Talking about the House and how they are trying to send a message on NSA surveillance

Occasion: This article was written in response to the amendment propsed by Justin Amash

Audience: The American people

Purpose: To inform the people about the decisions happening in the House

Speaker: The Times Editorial Board

Tone: informative

1. "<span class="remarkable-pre-marked" style="font-family: Georgia,;">the question of whether the NSA should be allowed to assemble what officials have referred to as a "haystack " of metadata in order to search for the "needle" of a connection to terrorism."

<span class="remarkable-pre-marked" style="font-family: Georgia,;">2. "It now seems that the court, in another secret opinion, authoriz <span style="background-color: #ffffff; font-family: Georgia,;">ed the bulk collection of virtually all domestic telephone data on the theory that the overall war on terror is a single "investigation."

<span style="background-color: #ffffff; font-family: Georgia,;">3. " <span class="remarkable-pre-marked" style="font-family: Georgia,;">(It wouldn't be the first time that a government agency used personal information to harass dissidents or political opponents.)"

[]

Zack Whittaker

Subject: To inform the readers of the impact of the NSA documents being leaked.

Occasion: Written as a response to the NSA leaked documents

Audience: Anyone looking to know about the NSA and what is gripping the nation

Purpose: Wants to inform the people, of the events leading after the leaked documents

Speaker: Zack Whittaker

Tone: informative

1. " <span class="remarkable-pre-marked" style="background-color: #ffffff; color: #252525; font-family: Verdana,Arial,sans-serif; font-size: 12px; vertical-align: baseline;">The scandal has implicated numerous high-profile G20 countries in assisting the U.S. government in its <span class="remarkable-pre-marked" style="background-color: #ffffff; color: #009900; font-family: inherit; font-size: inherit; line-height: 1.5; vertical-align: baseline;">__intelligence gathering__ <span class="remarkable-pre-marked" style="background-color: #ffffff; color: #252525; font-family: Verdana,Arial,sans-serif; font-size: 12px; vertical-align: baseline;"> efforts. "

<span class="remarkable-pre-marked" style="background-color: #ffffff; color: #252525; font-family: Verdana,Arial,sans-serif; font-size: 12px; vertical-align: baseline;">2. " <span style="background-color: #ffffff; color: #252525; font-family: Verdana,Arial,sans-serif; font-size: 12px; line-height: 1.5;">The past six months alone have seen some of the toughest tests to global diplomatic relations since World War II."

<span style="background-color: #ffffff; color: #252525; font-family: Verdana,Arial,sans-serif; font-size: 12px; line-height: 1.5;">3. " <span style="background-color: #ffffff; color: #961515; font-family: Georgia,serif; font-size: 14px; line-height: 1.5;">Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation"


 * JOY MARICONDA link 1: [] **

Subject: How much does the National Security Agency cost the United States, as individual taxpayers, according to Edward Snowden's documents.

Occasion : Intelligence Contractor Edward Snowden leaked information on the National Security Agency recently.

Audience: U.S. Taxpayers, people interested in Edward Snowden, people interested in the NSA, the actual NSA, and economists.

Purpose: To adress how much each citizen of the United States is giving up for this program, to inform public on what the NSA actually doing to them and possibly using their money for. It also informs on whether the price will likely go up or down and why, and how much money the NSA recieves from the government.

Speaker: Joe Kloc, an average U.S. taxpayer, and an author at the daily dot.

Tone: informative, moderate, a little harried but reasonably calm.

>
 * <span style="background-color: #ffffff; font-family: Georgia,;">"The controversial massive surveillance operations conducted by the U.S. <span style="background-color: #ffffff; color: #20607f; font-family: Georgia,;">[|National Security Agency] <span style="background-color: #ffffff; font-family: Georgia,;"> together cost each taxpayer about $574,"
 * <span style="background-color: #ffffff; font-family: Georgia,;">"A <span style="background-color: #ffffff; color: #20607f; font-family: Georgia,;">[|bill] <span style="background-color: #ffffff; font-family: Georgia,;"> known as the USA Freedom Act, which would stop the NSA from collecting and storing the phone metadata of every American, has been introduced in Congress."
 * <span style="background-color: #ffffff; font-family: Georgia,;"> "the secret court <span style="background-color: #ffffff; color: #20607f; font-family: Georgia,;">[|warrants] <span style="background-color: #ffffff; font-family: Georgia,;"> for their social media data and emails, the <span style="background-color: #ffffff; color: #20607f; font-family: Georgia,;">[|splitting] <span style="background-color: #ffffff; font-family: Georgia,;"> of fibre optic submarine Internet cables, and the tapping of foreign leaders’ phones."


 * JOY MARICONDA link 2: []**

Subject: Edward Snowden is giving more information against the U.S. and is safe in hiding.

Occasion: Edward Snowden is giving out new information has a new job and may speak out in public against the United States

Audience: people who watch fox news, people interested in whistleblowers, or interested in Edward Snowden

Purpose: inform American Public further on Edward Snowden

Speaker: Fox News and their reporters (conservative), James Lewis, of the Center for Strategic and International Studies, and Edward Snowden

Tone: informative, worrisome


 * "They'll stop at //nothing// to persecute someone who __told them the truth.__" -Edward Snowden
 * "spying on German Chancellor Angela Merkel....and the leaders of 34 other countries." -Fox News Reporter
 * "We have to do something to turn this off, we have to repair the damage otherwise it's going to spin out of control." -James Lewis, of the Center for Strategic and International Studies


 * JOY MARICONDA link 3:** []

Subject: the diplomatic costs of the NSA surveillance, meaning the heads of states and governments, posing "friend" issues for the United States.

Occasion: Edward Snowden and other whistle-blowers have outed the United States in it's monitoring of the chancellor of Germany, etc.

Audience: United States citizens, people interested in whistle-blowing and the relationship of the United States with its allies.

Purpose: make talk about what the emotional/non monetary cost of whistle-blowing is. And what the United States is doing wrong or right, whether they have changed anything after Edward Snowden 'blew his whistle' persay.

Speakers: Ray Suarez, interviewer for PBS, P.J. Crowley, <span style="background-color: #ffffff; color: #313131; font-family: georgia,;">former assistant secretary of state for public affairs, a professor at George Washington University, <span style="background-color: #ffffff; color: #313131; font-family: georgia,;"> And Philip Mudd, a senior research fellow at the New America foundation, who held senior positions at the CIA, FBI and the National Security Council.

Tone: informative, conversational, serious, critical


 * <span style="background-color: #ffffff; color: #313131; font-family: georgia,;">"It is a serious and awkward diplomatic problem for the United States." -PJ Crowley
 * <span style="background-color: #ffffff; color: #313131; font-family: georgia,;">"I don't think the cost is worth it. I'm not sure what the value is of those conversations. That said, I could see value in looking at other information across Europe, for example, telephone numbers that might suggest that someone in Europe is talking to a phone number we have on file in a place like Yemen. So there is a qualitative difference in looking at the leader of an allied country, I think." -Phillip Mudd
 * <span style="background-color: #ffffff; color: #313131; font-family: georgia,;">"I think, in these kinds of things, there's no bright line between secrecy or surveillance and privacy and intelligence cooperation. Those lines are constantly being redrawn." -Phillip Mudd

“Here Is the Pro-NSA Surveillance Argument” [] Becky Cardinali -why the program will help the controversy in contrast to the widespread con argument -ongoing controversy over such programs and widespread con argument -the NSA, government officials, and the media -those who are interested in the debate -future leaders of America -to show the benefits and necessity of NSA surveillance -to explain how the NSA uses large scale surveillance -to explain why alternatives to such surveillance would not work -journalist and reporter with degree in mass communication/journalism -quotes Marc A. Thiessen, writer for the Washington Post with experience working in presidential administrations -“President Barack Obama vigorously defended sweeping secret surveillance into America’s phone records and foreigners’ Internet use, declaring ‘we have to make choices as a society.’” -“‘That leaves signals intelligence – monitoring the enemy’s phone calls and Internet communications – as our principal source of intelligence to stop terrorist plots.’”
 * Author: ** Jason Howerton
 * Subject: ** -pro side of the NSA surveillance controversy
 * Occasion: ** -recent controversy over the NSA surveillance program after the leaking of two large programs using data surveillance to the press
 * Audience: ** -the American public
 * Purpose: ** -to provide a lesser known argument of the pro side
 * Speaker: ** -Jason Howerton, writer for The Blaze
 * Tone: ** -informative, formal, explanatory, partially persuasive, partly biased
 * Quotes: ** -“Thiessen goes on to point out the various ways that President Barack Obama has stifled the federal government’s ability to gather intelligence.”

"The NSA’s Surveillance: No Clear Constitutional Violations" [] Becky Cardinali -application of NSA policies in relation to specifics of the Fourth Amendment -controversy over Obama administration in relation to the NSA -the NSA -both Democrats and Republicans -those interested in the controversy -show that the way the surveillance is being applied differs from what is not allowed in the Constitution -explain how the controversy over anti-terrorism programs may be related to politics between parties rather than principles -highly educated law professor, attorney, and author -“The program does not represent a violation of the Constitution because the Fourth Amendment does not protect dialed phone numbers, in contrast to the content of the communications, because individuals lose privacy over those numbers when they are given to the phone company.” -“The Constitution protects the content of the communications, whether it be a phone call, e-mail, or old-fashioned letter.”
 * Author: ** John Yoo
 * Subject: ** -constitutionality of NSA surveillance
 * Occasion: ** -recent debate on the controversy of NSA surveillance
 * Audience: ** -the American public
 * Purpose: ** -provide reasons for why the surveillance does not violate the Constitution
 * Speaker: ** -John Yoo, writer for the National Review Online
 * Tone: ** -informative, descriptive, formal, credible
 * Quotes: ** -“As the Supreme Court has made clear, the Fourth Amendment does not protect the communications of non-U.S. persons that take place abroad.”

"Claim on “Attacks Thwarted” by NSA Spreads Despite Lack of Evidence" [] Becky Cardinali -controversy in recent years over NSA surveillance -evidence is not as blatant and clear cut as some would like it to be -the NSA, government officials, and media writers -those interested in the controversy -to show that NSA officials have changed their wording on their claim -to provide examples of successful prevention of terrorist-related attacks that the NSA has been involved in -to further debate the necessity or lack of necessity of NSA surveillance -reporters who seemingly favor one side -Meyer apparently has more journalism education than Elliott -“Officials have openly discussed only a few of the cases (see below), and the agency has identified only one – involving a San Diego man convicted of sending $8,500 to Somalia to support the militant group Al Shabab – in which NSA surveillance played a dominant role.” -“Intelligence officials have said that NSA surveillance helped thwart a subsequent plot involving Headley to attack a Danish newspaper.”
 * Authors: ** James Elliott and Theodoric Meyer
 * Subject: ** -controversy over the claim that the NSA has thwarted 54 attempts at terrorism, many directed toward the U.S.
 * Occasion: ** -many government officials and media writers have been using the statistic recently
 * Audience: ** -the American public
 * Purpose: ** -to show that the NSA lacks blatant evidence of thwarting 54 terrorist attacks
 * Speakers: ** -James Elliott and Theodoric Meyer, writers for ProPublica
 * Tone: ** -informative, formal, critical, explanatory, possibly biased
 * Quotes: ** -“When NSA chief Gen. Keith Alexander spoke at a Las Vegas security conference in July, for instance, he referred to ‘54 different terrorist-related activities,’ 42 of which were plots and 12 of which were cases in which individuals provided ‘material support’ to terrorism.”

<span style="font-family: Arial,Helvetica,sans-serif;">1. [] <span style="font-family: Arial,Helvetica,sans-serif;">S- NSA surveillance, national security, international and domestic affairs <span style="font-family: Arial,Helvetica,sans-serif;">O- release of new information about surveillance, summarizing old <span style="font-family: Arial,Helvetica,sans-serif;">A- U.S. citizens, voters, international citizens <span style="font-family: Arial,Helvetica,sans-serif;">P- reveal 9/11 connection, explain authorization of program, point out technicalities <span style="font-family: Arial,Helvetica,sans-serif;">S- Wall Street Journal writer, sympathetic but still skeptical <span style="font-family: Arial,Helvetica,sans-serif;">Tone- well informed, explanatory <span style="font-family: Arial,Helvetica,sans-serif;">2. [] <span style="font-family: Arial,Helvetica,sans-serif;">S-NSA surveillance, attacks on programs, international and domestic affairs <span style="font-family: Arial,Helvetica,sans-serif;">O-release of new information about surveillance, summarizing old <span style="font-family: Arial,Helvetica,sans-serif;">A- U.S. citizens, voters, international citizens <span style="font-family: Arial,Helvetica,sans-serif;">P- discuss hacking and cyber intrusions by foreign nations and NSA’s role in thwarting them-greater threat than terrorism, regulation of the internet, how the NSA could improve its image <span style="font-family: Arial,Helvetica,sans-serif;">S- Harvard professor, sympathetic to NSA, focused on internet security rather than terrorism <span style="font-family: Arial,Helvetica,sans-serif;">Tone- educated, persuasive <span style="font-family: Arial,Helvetica,sans-serif;">3. [] <span style="font-family: Arial,Helvetica,sans-serif;">S- NSA surveillance’s impact on Cloud security <span style="font-family: Arial,Helvetica,sans-serif;">O-change in business after major NSA revelation <span style="font-family: Arial,Helvetica,sans-serif;">A- U.S. citizens, consumers, people in the web industry <span style="font-family: Arial,Helvetica,sans-serif;">P- to explain the positive affect NSA surveillance will have on the Cloud industry by forcing it to develop and evolve, personal internet security <span style="font-family: Arial,Helvetica,sans-serif;">S- someone in the Cloud business, internet users, marketer, Edward Snowden, government <span style="font-family: Arial,Helvetica,sans-serif;">Tone- casual, advisory, well informed
 * Brooke Lockwood (Pro): **