Jessica+Debski

=[|NSA surveillance: A guide to staying secure]= Author: Bruce Schneier
 * SOAPStone:**
 * Subject:** How to keep secure from the NSA.
 * Occasion:** People were finding out the government was seeing their activities on the internet and other media so the website was created to inform people how to keep safe from the government and precautions to take.
 * Audience:** The public and citizens of America.
 * Purpose:** To inform the audience of the happenings of the NSA and update the audience of anything they could do to keep the government limited on the content they could search through.
 * Speaker:** The guardian news letter, a citizen who is concerned
 * Tone:** informative, intuitive
 * 1) "The primary way the NSA  eavesdrops on internet communications is in the network".
 * 2) "Leveraging [|its] [|secret] [|agreements]  with telecommunications companies – all the US and UK ones, and many other "partners" around the world – the NSA  gets access to the communications trunks that move internet traffic."
 * 3) "The NSA  collects much more [|metadata]  about internet traffic: who is talking to whom, when, how much, and by what mode of communication".

=[|NSA Infected 50,000 Computer Networks Worldwide With Malware: Report]= Author: Lorenzo Franceschi-Bicchierai
 * SOAPStone:**
 * Subject:** The NSA using malware to hack to personal computers
 * Occasion:** 50,000 computers were hacked last year and the article is used to inform people of what was done to the 50,000 hacked computers.
 * Audience:** The general public and anyone who wants to be informed of the doings of the NSA. Also, to the people who had computers that were hacked into.
 * Purpose:** To inform people what was done to the computers and to explain to people what malware is and how the NSA is using it against the citizens of America.
 * Speaker:** The concerned citizen, Mashable
 * Tone:** Alarming, cautionary
 * 1) "Once the malware is planted inside a network, the NSA's hackers can control it remotely to extract data at will."
 * 2) "<span style="background-color: #ffffff; color: #555555; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 15px;">NSA complained that current U.S. laws don't allow the scope of surveillance that it would like to conduct."
 * 3) "<span style="background-color: #ffffff; color: #555555; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 15px;">more than 50,000 computer networks worldwide last year, infecting them with malware used to conduct sophisticated spy operations, according to a top-secret slide leaked by <span style="background-color: #ffffff; color: #0c74a6; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 15px; text-decoration: none;">[|Edward Snowden] <span style="background-color: #ffffff; color: #555555; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 15px;">."

= [|N.S.A. Report Outlined Goals for More Power] = Author: James Risen **Subject:** NSA wants more power and what the NSA wants to do in the future. ** Purpose: **inform the government of the ambitions of the NSA and that the laws right now are restricting the cause of the NSA. The NSA wants to surveillance people throughout the whole world not just in America.
 * SOAPStone: **
 * Occasion: ** The NSA feels as if the American laws do not give the organization the freedom it needs to fully surveillance media
 * Audience: ** Public, Government, Anyone who is interested about the next steps of the NSA
 * Speaker: **New York Times, the NSA
 * tone: **Demanding, surprising
 * 1) "<span style="background-color: #ffffff; font-family: georgia,'times new roman',times,serif; font-size: 15px; text-align: left;">agency’s long-term goal of being able to collect virtually everything available in the digital world"
 * 2) "<span style="background-color: #ffffff; font-family: georgia,'times new roman',times,serif; font-size: 15px; text-align: left;">Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A."
 * 3) "<span style="background-color: #ffffff; font-family: georgia,'times new roman',times,serif; font-size: 15px; text-align: left;">Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.”"