{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"The Case Supporting the NSA's PRISM Decrypting","metadata":[{"label":"dc.author","value":"2013-09-06"},{"label":"dc.contributor.advisor","value":"Miller, Dean S"},{"label":"dc.contributor.author","value":"Acohido, Byron"},{"label":"dc.contributor.other","value":"Resource Management, Stony Brook University Libraries"},{"label":"dc.date.accessioned","value":"2014-09-29T00:04:06Z"},{"label":"dc.date.available","value":"2014-09-29T00:04:06Z"},{"label":"dc.date.issued","value":"2013-09-06"},{"label":"dc.description","value":"This article discusses the use of encryption software by NASA to decode internet traffic and how this could leave an open door for cyber attacks. Dave Javen's chief technology officer of Marble Security, explains that this is a ridiculous assumption."},{"label":"dc.description.appearsincollection","value":"Center for News Literacy."},{"label":"dc.description.contributor","value":"The work(s) contained within this record have been analyzed and cataloged by members of the University Libraries' Resource Management Division."},{"label":"dc.description.provenance","value":"Made available in DSpace on 2014-09-29T00:04:06Z (GMT). No. of bitstreams: 1\n4thecasesupportingnsa.pdf: 743003 bytes, checksum: 2d3b269afc9b142db8c9d637fb8be9b2 (MD5)\n Previous issue date: 9"},{"label":"dc.description.tableofcontents","value":"The Case Supporting the NSA's PRISM Decrypting -- 4. The case supporting NSA.pdf"},{"label":"dc.format","value":"Lecture Notes"},{"label":"dc.format.medium","value":"Electronic Resource"},{"label":"dc.identifier","value":"4thecasesupportingnsa.pdf"},{"label":"dc.identifier.slug","value":"1103"},{"label":"dc.identifier.uri","value":"http://hdl.handle.net/11401/9867"},{"label":"dc.language.iso","value":"en_US"},{"label":"dc.publisher","value":"School of Journalism, Stony Brook University"},{"label":"dc.publisher.location","value":"Stony Brook, NY"},{"label":"dc.relation.ispartof","value":"Know Your Neighborhood"},{"label":"dc.rights","value":"Attribution-NonCommercial-ShareAlike (CC BY-NC-SA)"},{"label":"dc.source","value":"USA Today"},{"label":"dc.subject","value":"NSA"},{"label":"dc.subject.lcsh","value":"Liability (Law)"},{"label":"dc.subject.other","value":"Direct Evidence"},{"label":"dc.terms.audience","value":"College/University"},{"label":"dcterms.audience","value":"College/University"},{"label":"dc.title","value":"The Case Supporting the NSA's PRISM Decrypting"},{"label":"dc.title.alternative","value":"Chicago Summer Institute - Crowd-Sourcing and the News- How Photos Impact News Gathering"},{"label":"dc.type","value":"Article"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/19%2F81%2F89%2F19818967843201965595884760516075912727/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/19%2F81%2F89%2F19818967843201965595884760516075912727","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}