Digital Communications - Communication Encryption
1) What is "Going Dark"?
2) What is "End to End Encryption"? 3) Is additional government access necessary to track and bust terrorists? 4) Can terrorists hide who they're communicating by using encryption? 5) Is it easy to regulate released/releasing apps or websites to allow monitoring communications? |
Digital Communications - Federal Surveillance
1) Declassified documents released that the NSA has been collecting communications of American citizens with ___________ connection to terrorists.
2) The Foreign Intelligence Surveillance Court ruled American data collection methods were ______________.. 3) Reports release state that the NSA has programs to cover and monitor _______% of all United States internet traffic, including e-mail, cell phone calls and texts. 4) _____________ leaked NSA documents to reporters about the reach of American Surveillance. 5) After ruling that American data collection was Unconstitutional, the NSA and CIA are ______________ collecting data on American citizens. 6) Russ Tice was fired from the NSA after asking for greater protection for _______________. 7) He claims that the NSA tapped the phones of ____________________________. 8) William Binney states that hundreds of millions of _______________ of U.S. citizens, every day. 9) Tim Clemente, during his CNN interview, said that "No _______________ is secure." 10) Russ Tice said, "Yes, the NSA is collecting ______________. Contents, word for word, of every ___________________ in the country." 11) Bluff Dale, the collection site, could collect all world wide communications for _________ years. 12) Joel Brenner claims that the NSA ___________ go beyond what the law permits. 13) He continues, saying that Tice and Binney have been gone for several years, and thus they __________ know what is going on in the NSA. |
Digital Communications - Privacy?
1) In 2008, congress passed a law called the FISA Amendments Act, which legalized ________________ surveillance originally done under the Bush administration.
2) PRISM (702 Orders), requires internet providers to turn over _________________. 3) Not only Verizon, but also ___________ and ____________ are all required to follow the FISA Amendment for secret surveillance. 4) Since September 11th, __________________ transactions are now being monitored. 5) The NSA and FBI are assembling a giant library of ____________. This is called META-DATA. 6) Every time you call someone, there is now a _________ __________. 7) These record collection programs were all authorized under the ___________ ACT, which was signed into law after 9/11/2001. |