bidver
Home » technology » Anti-NSA protests on July 4
Anti-NSA protests on July 4
Diposkan oleh Maestro Goberan on Friday, July 5, 2013
Protesters in cities across the United States called for an end to NSA surveillance programs
They are calling their movement "Restore the Fourth"
They say Internet and phone monitoring violates the Fourth Amendment
(CNN) -- Anti-NSA protesters took to the streets in cities across the United States on Thursday, using the Independence Day holiday to call attention to recent disclosures about the U.S. government's telephone and Internet surveillance programs.
The movement, called "Restore thFourth," says the government programs such as Prism violate the Fourth Amendment of the Constitution, which protects against unreasonable searches and seizures without warrants. Specifically, it wants the National Security Agency's surveillance programs shut down.
"It's important that we speak up and let our elected officials know that our rights are being violated," said Kyle Smeallie, a protester in San Francisco.
Online, popular websites such as Reddit showed support for the protesters by embedding Restore the Fourth images emblazoned with a hashtag.
.cnnArticleGalleryNav{border:1px solid #000;cursor:pointer;float:left;height:25px;text-align:center;width:25px}
.cnnArticleGalleryNavOn{background-color:#C03;border:1px solid #000;float:left;height:25px;text-align:center;width:20px}
.cnnArticleGalleryNavDisabled{background-color:#222;border:1px solid #000;color:#666;float:left;height:25px;text-align:center;width:25px}
.cnnArticleExpandableTarget{background-color:#000;display:none;position:absolute}
.cnnArticlePhotoContainer{height:122px;width:214px}
.cnnArticleBoxImage{cursor:pointer;height:122px;padding-top:0;width:214px}
.cnnArticleGalleryCaptionControl{background-color:#000;color:#FFF}
.cnnArticleGalleryCaptionControlText{cursor:pointer;float:right;font-size:10px;padding:3px 10px 3px 3px}
.cnnArticleGalleryPhotoContainer cite{background:none repeat scroll 0 0 #000;bottom:48px;color:#FFF;height:auto;left:420px;opacity:.7;position:absolute;width:200px;padding:10px}
.cnnArticleGalleryClose{background-color:#fff;display:block;text-align:right}
.cnnArticleGalleryCloseButton{cursor:pointer}
.cnnArticleGalleryNavPrevNext span{background-color:#444;color:#CCC;cursor:pointer;float:left;height:23px;text-align:center;width:26px;padding:4px 0 0}
.cnnArticleGalleryNavPrevNextDisabled span{background-color:#444;color:#666;float:left;height:23px;text-align:center;width:25px;padding:4px 0 0}
.cnnVerticalGalleryPhoto{padding-right:68px;width:270px;margin:0 auto}
.cnnGalleryContainer{float:left;clear:left;margin:0 0 20px;padding:0 0 0 10px}
if (typeof cnnArticleGallery == "undefined") {
var cnnArticleGallery = {};
}
if(typeof cnnArticleGallery.currentImageList =="undefined"){
cnnArticleGallery.currentImageList = [];
}
var expGallery51=new ArticleExpandableGallery();
expGallery51.setImageCount(4);
//cnn_adbptrackpgalimg("Reports: Slides outline data-mining program", 1);
U.S. intelligence agencies operated a broad data-mining program that extracted e-mail, photos and other private communications from some of the biggest Internet companies, The Guardian and The Washington Post reported on Thursday, June 6.
cnnArticleGallery.currentImageList[cnnArticleGallery.currentImageList.length] = {"currentPicture":true,"x":5,"y":1,"pos":1,"title":"Reports: Slides outline data-mining program"}
The Washington Post said it had been provided a detailed briefing presentation document on the program, called PRISM. This slide explains how international traffic is intercepted as it passes through the United States.
cnnArticleGallery.currentImageList[cnnArticleGallery.currentImageList.length] = {"currentPicture":false,"x":5,"y":1,"pos":2,"title":"Reports: Slides outline data-mining program"}
The intelligence agencies reportedly have access to the central servers of nine major firms, including Microsoft, Apple, Google, Yahoo and Facebook. The information they can collect varies by provider.
cnnArticleGallery.currentImageList[cnnArticleGallery.currentImageList.length] = {"currentPicture":false,"x":5,"y":1,"pos":3,"title":"Reports: Slides outline data-mining program"}
The program has been running since 2007 and has undergone "exponential growth" since then, The Washington Post reported.
cnnArticleGallery.currentImageList[cnnArticleGallery.currentImageList.length] = {"currentPicture":false,"x":5,"y":1,"pos":4,"title":"Reports: Slides outline data-mining program"}
Reports: Slides outline data-mining program
Reports: Slides outline data-mining program
Reports: Slides outline data-mining program
Reports: Slides outline data-mining program
HIDE CAPTION
<<
<
1
2
3
4
>
>>
Reports: Slides outline data-mining program
var currExpandable="expand25";
if(typeof CNN.expandableMap==='object'){CNN.expandableMap.push(currExpandable);}
var mObj={};
mObj.type='video';
mObj.contentId='';
mObj.source='bestoftv/2013/06/27/lead-edward-snowden-latest-ecuador-glenn-greenwald.cnn';
mObj.videoSource='CNN';
mObj.videoSourceUrl='';
mObj.lgImage="http://i2.cdn.turner.com/cnn/dam/assets/130627182937-lead-edward-snowden-latest-ecuador-glenn-greenwald-00001513-story-body.jpg";
mObj.lgImageX=300;
mObj.lgImageY=169;
mObj.origImageX="214";
mObj.origImageY="120";
mObj.contentType='video';
CNN.expElements.expand25Store=mObj;
Report: NSA mined U.S. e-mail data
var currExpandable="expand35";
if(typeof CNN.expandableMap==='object'){CNN.expandableMap.push(currExpandable);}
var mObj={};
mObj.type='video';
mObj.contentId='';
mObj.source='world/2013/07/05/pkg-pleitgen-russia-snowden.cnn';
mObj.videoSource='CNN';
mObj.videoSourceUrl='';
mObj.lgImage="http://i2.cdn.turner.com/cnn/dam/assets/130616121308-edward-snowden-getty-image-story-body.jpg";
mObj.lgImageX=300;
mObj.lgImageY=169;
mObj.origImageX="214";
mObj.origImageY="120";
mObj.contentType='video';
CNN.expElements.expand35Store=mObj;
What will Edward Snowden do next?
Study: Reddit used by 6% of adult Internet users
The grassroots, nonpartisan movement started a month ago when a group of people met on Reddit and decided to take action.
"It is something a lot of people care about. We're trying to get that narrative out there," said Sam Oslos, 23, one of the protest organizers.
In the month following Edward Snowden's leaks about U.S. government programs collecting information from phone and Internet companies, some U.S. citizens seemed unsurprised and resigned to being monitored. According to a poll conducted by the Pew Research Center last month, 56% of Americans think the collection of telephone metadata is acceptable.
The loosely coordinated activist group helped organize protests in more than 80 U.S. cities using online message boards and Twitter. There were demonstrations in New York City, Seattle, San Francisco, Denver, Chicago and Los Angeles. In Utah, protesters gathered near the new $1.5 billion NSA data center, which is scheduled to open later this year.
The movement even spread overseas, where protesters showed up in front of the U.S. Consulate in Munich, Germany, donning Edward Snowden masks.
In San Francisco, protesters walked from City Hall to the Embarcadero with signs that read "Legalize the U.S. Constitution" and "I refuse to sacrifice my liberty for security." Police estimated there were at least 250 people protesting, but said the group was growing larger throughout the day.
"The Fourth Amendment is there to protect us, but there comes a time when we have to step in and protect it," Parker Higgins, an activist at the Electronic Frontier Foundation, said to the crowd. He later told CNN.com that getting people on the street was a way to let officials know that there are people who care about their privacy.
Dawn Ligiter was at the San Francisco protests with her husband and two dogs.
"We're expecting our first child and we want him to have the same rights under the constitution that we grew up with," she said.
Opinion: U.S. intelligence community is out of control
NSA director: Data mining follows law, thwarts terror
How to hide your data from Internet snoops
if(typeof CNN.expElements==='object'){CNN.expElements.init();}
Label:
cnn,
Computer,
info,
Internet,
knowledge,
networking,
Operating System,
Programming,
technology
Entri Populer
-
Facebook found and fixed a bug that compromised the contact information of 6M users The exposure of e-mail addresses and phone number appear...
-
THE ARTICLE BELOW IS FROM MUSICIANSWAGES.COM AND AT TALENTS FOR ASIA ARE IN TOTAL AGREEMENT WITH THE WRITER by DAVID J. HAHN Two years ag...
-
Review: Kindle Paperwhite keeps Amazon at top of the pile for e-readers There's a little light bleeding at screen bottom, but overall f...
-
Viral video shows a Canadian astronaut singing David Bowie's "Space Oddity" from space Posted Sunday, video has more than 1 mi...
-
Report: Samsung Galaxy S4 will roll out in February at Mobile World Congress in Spain Phone will have a 5-inch screen, more powerful hardwa...
-
Ashton Kutcher will play tech visionary Steve Jobs in an indie film on his early life Movie will follow Jobs' life until he returned to...
-
Anonymous member appears on a documentary panel at surreal SXSW panel Gregg Housh tells crowd of about 200 that Anonymous associates remain...
-
New PetMatch app lets you upload photos to find a lookalike for a dog or cat App's photo-recognition searches PetFinder for the closest ...
-
Facebook is testing a new design for Timeline pages that places all posts in a single column The current format, a two-column layout, inclu...
{ 0 komentar... read them below or add one }
Post a Comment