Premium Essay

Edward Snowden Research Paper

Submitted By
Words 1557
Pages 7
Max Romanoff
Operating System’s Class
The NSA

The National Security Agency known as the “NSA” was created on November 4th 1952. The National Security Agency’s job is to provide information to United States decision makers and military leaders. The NSA has recently been brought up in the news because a man by the name of Edward Snowden released information about the United States Government spying on us.
Edward Joseph Snowden born in 1983, is an American computer professional. Edward Snowden grew up in Elizabeth City, North Carolina. Snowden dropped out of high school in the 10th grade and later earned a high school diploma equivalent. Mr. Snowden is a former employee of the National Security Agency. “The agency’s missions are to ensure …show more content…
“For example “AT&T charges $325 for each activation fee and $10 a day to monitor the account, according to the AP. Verizon charges $775 per tapping for the first month and then $500 a month thereafter (Lenzner) I feel that it is wrong that the big cell carriers are selling our private information away for money. According to the Washington Post The National Security Agency has built a huge surveillance system that has the power to record 100% of the foreign countries telephone calls that are incoming to the United States. The program is call MYSTIC and it began in 2009, The senior manager of the phone spying program compared this new system to a huge time machine that can replay voices from any call without requiring that person to be notified in advanced of the screening. There screening system uses something called that RETRO tool (retrospective …show more content…
According to Tech Crunch he says that people are taking the approach of “I have nothing to hide from the government” are looking at in the wrong way. Edward Snowden stated in his interview “When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights.”(Snowden & Ha) He thinks regardless if you have nothing to hide from the government your rights as a citizen of the United States is to be in control of your privacy. People need to come and face the truth that government and spying on us behind our backs. The information that Edward Snowden released could be just scratching the surface of what the government is doing behind our backs. “We can have secret programs. You know, the American people don’t have to know the name of every individual that’s under investigation. We don’t need to know the technical details of absolutely every program in the intelligence community. But we do have to know the bare and broad outlines of the powers our government is claiming … and how they affect us and how they affect our relationships overseas. Because if we don’t, we are no longer citizens, we no longer have leaders. We’re subjects, and we have

Similar Documents

Premium Essay

Edward Snowden Research Paper

...Following Edward Snowden’s leak about the NSA, or the National Security Agency, there have been questions after questions regarding the privacy of the things people do online. People are fearing that the government and their respective agencies are overreaching in their collection of citizens’ data. The whole topic on its own, raises quandaries; and at times even resentment due to America’s belief in securing their personal data from the government. In today’s highly technological society, surveillance and monitoring do not encroach upon privacy, but rather aid in promoting civil liberties and public security. The NSA’s actions do not infringe on the 4th amendment and stand to be legal in the eyes of the constitution and that of the judiciary....

Words: 959 - Pages: 4

Premium Essay

Edward Snowden Research Paper

...Assignment on NSA Edward Snowden Revelations and Congress reaction By ABC Date; NSA Edward Snowden Revelations and Congress reaction 1. NSA Edward Snowden Revelations The first bombs hell story was published on the basis of the top secret documents. This was related to the national security agency who spy on the American citizen. When the story was leaked, it was not mentioned that the treasure trove is based on NSA documents and source was not come in front. After three days, the person has leaked his identity. When the identity was leaked, it is revealed that he is “Edward Snowden”. Some of revelations were in queue and in coming years, explosive stories started to trickle the documents. Some of revelations are following: 1. Sweeping...

Words: 1501 - Pages: 7

Free Essay

Whistleblowing

...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience...

Words: 3746 - Pages: 15

Premium Essay

What Is Edward Snowden Unethical

...Review of Issue Edward Snowden’s actions of disclosing valuable and classified NSA documents raise a number of ethical issues. Some people claim that Snowden did not do any wrong since he disclosed the wrong thing that was going on. However true that may be, this paper argues that there are better channels in which he could have used to let the cat out of the bag. Many are questioning if our government was betraying citizens because of the monitoring activity, and never revealing it. There was an absence present that lacked a legitimate procedure of informing citizens that they may be conducting unethical and unconstitutional activities. With the government’s activities set aside, the fact that he chose to reveal the classified information without following the right procedure will earn him the title of a whistleblower. A...

Words: 907 - Pages: 4

Premium Essay

Hr Management

...Human Resource Management Jennifer Harden Indiana Wesleyan University Dropbox 1 Introduction to Topic The topic for this paper is veteran recruiting and the outreach methods that are successful in hiring transitioning military. Telepresence robots could increase employee satisfaction for some because it would allow for less travel. The Harris Interactive poll commissioned by The Workforce Institute also revealed that 48 percent of people said commuting has a significant impact on their job satisfaction. (HERSHORN, 2011) Employees that save time traveling and commenting have more personal time, increasing job satisfaction. On the other side of the coin some employees will feel uncomfortable with the new technology lowering their job satisfaction. The resistance to change and new technology is not a new concept in the human resource industry. Employees may feel that the technology acts as a “big brother” and that they are being micromanaged. The people that would benefit most from this technology are the ones that travel 50% or more globally for their position. The robots would limit the amount of traveling for the key decision makers. Tasks such as brainstorming or planning events could easily be handled by Robots. Competing through Sustainability In 2012 new CEO Marissa Mayer announced that she was terminating the flextime policy at Yahoo. Mayer felt that people were more creative in groups and flextime was not conducive to creativity in the long run....

Words: 894 - Pages: 4

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors. The executive branch of the government led by the Department of Homeland Security with close cooperation with other agencies including the National Institute of Standard and Technology (NIST) create mandatory policies and enforces their implementation by the private industry. This change was as a result of the September 11, attack...

Words: 1899 - Pages: 8

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Premium Essay

The Patriot Act and Its Effect on Corporations

...The Patriot Act and its Effect on Corporations SECR 5080 – Term Paper 9 May 2015 Table of Contents Abstract – page 3 Introduction – page 3 Current State of Affairs as by the law – page 5 Impact on computing – page 6 Surveillance on Businesses – page 9 Penalty on non-compliance – page 10 Internet Service Providers – page 10 Conclusion – page 12 References – page 13 Abstract The Patriot Act was written into law just a mere 45 days after the September 11, 2001 terrorist attacks on the United States. The Patriot Act was intended to counter terrorism by providing law enforcement agencies and intelligence agencies with an easier means to target those connected to terrorism. The Patriot Act has had a great impact on corporations, how they are surveilled and monitored, and huge penalties on noncompliance of the Patriot Act. This paper will further discuss the Patriot Act and its effects on Corporations. Introduction The terrorist attack on the United States on September 11, 2001 shook the foundation of the faith that America had in her security. This prompted congressional action on counteractive action to avoid a repeat occurrence of the terrorist attack on US soil. Measures that were taken included the passage of a Congressional Act referred to as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, hereby referred to as the Patriot Act. The passing of the Patriot Act was...

Words: 3253 - Pages: 14

Premium Essay

Student

...Data Collection and Surveillance Andrew John Martin UNCW Computer Science Department Abstract The purpose of the research is to see if the mass collection and surveillance of U.S citizens legal and ethical. The goal is to have a better understanding of the how data is collected, and the what the Fourth Amendment means. This is done by examining several aspects of the Fourth Amendment, and recent articles on the NSA. Upon examination, it becomes clear that the NSA is indeed breaching the rights of lawful U.S citizens. Through showing that the Fourth Amendment protects the U.S citizens against such actions. Key Words: NSA, Fourth, Amendment, warrant, PRISM, Edward, Snowden. The NSA collects millions of American phone, internet, and personal information. They do this by using a system call PRISM which allows them to collect this data through several different internet websites. However, many believe this is in complete violation of the Fourth Amendment which protects against unwarranted searches and seizures. The Fourth Amendment of the U.S. Constitution provides, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." The ultimate goal of this provision is to protect people’s...

Words: 2486 - Pages: 10

Premium Essay

Why Are Shield Laws Important?

...Shield laws are “Statutes affording a privilege to journalists not to disclose in legal proceedings confidential information or sources of information obtained in their professional capacities.” While there is no federal shield law, 49 states and the District of Columbia have some form of protection for journalists. In all, 12 states have a shield law that gives absolute privilege to journalists, 25 states give journalists limited quantified privileges, and most of the remaining states have a court-recognized precedent that shields journalists. The purpose of this paper is to examine how states define exactly what a journalist is, and what definition would work best for a federal law. Rem Rieder, a media columnist at USA Today explains why shield laws are important, writing: “This is hardly an issue that matters only to journalists. Many watchdog stories important to the American people depend on confidential sources, people who would put themselves or their jobs in danger if they were identified.” When a source has a journalist’s promise their name will not be public, some groundbreaking stories can be written. With additional backing of a federal shield law, more people might be willing to come forward and be part of watchdog stories. However journalists historically do not have an...

Words: 2558 - Pages: 11

Premium Essay

1984 George Orwell Analysis

...and his own view.. Knapps uses the view of other authors like Bernard Crick to express the opinions of others. His opinion on how someone of the books are closely related. With the authors of this section credentials and literary skills it can be used as a reliable source. He also uses many facts from his own studies and isn't afraid to express his own opinion and the opinion of others in his writing. He includes his research and a short bibliography with a small annotations afterwards. His writing style expresses his literary background, and his information on george orwell is very persist. Lakoff, George. "What Orwell Didn't Know About The Brain, The Mind, and Language." EScholarship. UC Berkeley, 2008. Web. 23 Oct. 2015. Lakoff tells of George Orwell’s 1984 and how he used to love the book, but now since he has more knowledge of the mind and how it works his opinion has changed. George Lakoff is Goldman Distinguished Professor of Cognitive Science and Linguistics at the University of California, Berkeley, and Senior Fellow at the Rockridge Institute. This paper seems reliable from the credential he has and how he voices his opinion with facts to back it up. The uses of this article help show by the authors facts and opinion, how Orwell didn't know much about the brain. That how Orwell describes how the mind is working within the citizens is inaccurate, because the lack of knowledge in the time period the book was written. This source is good to compare with the knowledge...

Words: 1819 - Pages: 8

Premium Essay

Week 7 Project

...wasn’t a need to worry about networks being attacked, and now to the current evolution of people where it’s not if your network will be attacked, it is when. The Current Problems with Network Security and How We Can Fix Them Network Security is defined by Sans Institute as the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment (SANS, 2014). As you can see with that definition the meaning can interpreted many different ways, so with this paper I will describe what network security is and how we can fix the ongoing problems. Current State of Network Security Before you fix or document any problems with network security you must first evaluate the current state of the problems we face. Most networks are somewhat secure, meaning they have the resources to make them nearly “bullet-proof”, but due to current policies within organizations, the information technology team is unable to enforce maximum security due to employees needing to plug their IPod’s in, charge their cell phones, and access social media sites, etc. the list could go on and on. The functionally of most organizations network security is geared toward making the customers and employees happy and no regards toward...

Words: 2317 - Pages: 10

Free Essay

Cyber Law

...FULL PAPER. AUTHOR’S NAME: NUPUR AGARWAL AFFILIATION: INSTITUTE OF LAW , NIRMA UNIVERSITY MAILING ADDRESS: 1 , RADHANPUR SOCIETY , BEHIND SWAMINARAYAN MANDIR , RAMBAUG , MANINAGAR , AHMEDABAD – 380008 PHONE NO: 09898839289 EMAIL-ID: nupuragarwal201995@yahoo.com CO-AUTHOR’S NAME: NUPUR JOSHI AFFILIATION: UNITED WORLD , SCHOOL OF LAW MAILING ADDRESS: 67, SWAGAT CITY , GANDHINAGAR – MEHSANA ROAD ADALAJ GANDHINAGAR PHONE NO: 9408968686 EMAIL-ID: nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and...

Words: 6245 - Pages: 25

Premium Essay

Corporate Ethics and Government

...Corporate Ethics and Government assignment Name: Grade Course: Tutor’s Name: (16, April, 2012) Corporate Ethics and Government assignment Introduction In recent past, corporate ethics and governance has attracted a great deal of public interest due to its apparent importance in the economic health of corporations and society. In general, corporate ethics and governance include the relationship of the company to its shareholders as well as the society. It also includes promotion of fairness, transparency, accountability in references to the mechanism used in the governance so that the actions taken are consistent with the shareholders interest. Therefore, to ensure that corporate ethics and governance is properly addressed, issues of transparency, accountability, measures of risk management, proper information flow both vertical and horizontal should be properly addressed. This will help the companies to adopt the appropriate legal compliance mechanisms to ensure that ethics and conduct of issues are formally addressed. However, compliance of corporate ethics and governance do not come in handy. There are several issues hurdles that several companies and organizations have undergone in achieving these milestones. This has made this topic to be widely discussed especially in the media as will be demonstrated in the articles that will be discussed here after. Most of the newspapers have taken this issue with a lot of seriousness and dedicated their time to discuss...

Words: 5001 - Pages: 21

Premium Essay

Techonology and Privacy

...The development of Information Communication Technology has created new ethical dilemmas due to the out-of-date moral, legal, and social boundaries. These boundaries can be represented by rules and legislation, laws and human nature. The expansion of technology has created a new era of office work. The majority of offices around the world are now filled with newly available technological advances; from personal computers to large network servers. Over the last decade there has been an increase among employers to monitor the actions and performance of their employees. This is due to worries about; quality of work, productivity employee theft or misuse of company property One of the main ethical issues of the workplace is employee privacy and surveillance. Argument raised is: is it ethical to monitor employees whilst they are in the workplace? Is there privacy for employees and should employees expect Privacy at workplace? Technology has offered various options to help people maintain privacy depending on their situation. At the same time, technology has made it almost impossible for anyone to have privacy. There are devices and programs that can help you get privacy but they can also be used to invade it. Modern society has too many incidences and events that include invasion of privacy, including on national and international levels. Is it possible to ever maintain a level of privacy when you are on the computer, your cellphone, or even in your own home due to technology advancements...

Words: 3636 - Pages: 15