You are on page 1of 4

Caune 1 T.J. Caune English 1103 Professor Malcolm Campbell November 19, 2013 NSA Operation Bullrun I.

Overview of operation Bullrun (A) (B) (C) II. What Bullrun can access. XKeyscore Edward Snowden

Argument against XKeyscore (A) (B) Capabilities of XKeyscore My argument (1) (C) I am not plotting a terrorist attack, so why watch me?

Source to support my argument (1) (2) Colbert Report NY Times

III.

Constitutionality of operation Bullrun (A) (B) Is it constitutional? Tell what we know so far (1) (2) (3) (C) (D) Active since 2010 NSA created it Operation is also overseas

Why it matters to Americans Personal opinion

IV.

Ethical concerns of operation Bullrun

Caune 2 (A) (B) (C) (D) V. How Americans feel Research on further capabilities Why it matters to Americans The government is lying to us

The government has betrayed us (A) Internet blogger opinions (1) (B) My opinion as an internet blogger

Both sides of the argument have a problem with operation Bullrun

VI.

Real World evidence from fellow classmates (A) (B) (C) The against operation Bullrun The for operation Bullrun Then covered my opinion on operation Bullrun (1) The NSA is committing an illegal act

VII.

Conference debate at UNCC (A) (B) (C) Overview of the two debaters Quick overview of what is being viewed ACLU argument (1) (2) Suing the USA How the information became accessible

VIII.

ACLU main argument (A) (B) (C) (D) Can reveal people's qualities that shouldn't be revealed America is stealing from us Verizon can't be prosecuted Walten's argument (1) intelligence agencies communicate better

Caune 3 (2) (3) IX. Terrorist attacks diminished Citizens will feel safer

How operation Bullrun was discovered (A) (B) Edward Snowden ACLU for Snowden (1) (2) (C) Described him as a whistle blower Whistle Blower Protection Act doesn't apply to Edward Snowden

Mr. Walten against Snowden (1) (2) Described him as a traitor Aided China and Russia

(D) X.

My opinion on Snowden

NSA's social media network (A) (B) (C) (D) Datacoup & GETPRSM Gathering meta data Block Quote Article 702 argument introduced

XI.

Article 02 of the Patriot Act (A) (B) (C) (D) Description of the article ACLU describes how the NSA has broken the act Opposing side agrees with ACLU In my opinion I also agree

XII.

Problems with operation Bullrun (A) (B) (C) Using the program in malice? My personal problem with it Common knowledge of the operation

Caune 4 XIII. Storage Capabilities (A) (B) XIV. Block Quote My argument against storing meta data

Why it matters to Americans (A) (B) EVERYTHING is being viewed Possible alternative to Bullrun?

XV.

Conclusion of operation Bullrun (A) (B) Final argument against Bullrun End with hanging question

You might also like