Premium Essay

Edward Snowden's Right To Data Privacy

Submitted By
Words 792
Pages 4
Summer of 2013 a former National Security Agency contractor by the name of Edward Snowden disclosed classified information from the National Security Agency (NSA). The root of the data that was leaked was regarding the way the United States Government was gathering browsing habits and personal data of citizens. Basically, their ability to monitor the average citizen without their knowledge. Snowden’s feeling was that our privacies and liberties did not need to be crumpled upon to secure the nation. As a result, this was weakening our nation and causing mistrust by the government instead of securing it. The very popular debate was born, people’s right to data privacy versus the necessity for appropriate intelligence gathering. In this paper …show more content…
This also includes the political, legal and ethical issues. Every American citizen is permitted to the right to privacy granted under the fourth amendment to the United States constitution, which escapes to the following: “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Now while not explicit in its inclusion of privacy when functioning in cyberspace it is perceived that the same belief of privacy is extended to our personal online identity. But, due to the nature of the existing world we work in it can be claimed that some freedoms and confidentialities could and should be invaded on to secure our borders against acts of …show more content…
Snowden had threatened the lives of intelligence representatives. He constantly stated that while the competences existed to generalize metadata and information from the world wide web, organizations like the NSA were only concerned with individuals and groups who were hitting key terms and words that would indicate some type of nefarious act or plans. (Talks, Richard Ledgett: The NSA Responds to Edward Snowden’s TED Talk (Links to an external site.), 2014) While this is encouraging he did very little to disclaim the claims from Mr. Snowden that the government had the plans in place to surveil and gather, and that in addition to that numerous companies were supporting in providing this information to government agencies to assist with their gatherings. This was seemingly in direct contrast to claims made by the DNI James Clapper under oath to Congress where he denied to the U.S. Senate Select Committee on Intelligence that the NSA willingly collects data on millions of Americans. (Greenberg,

Similar Documents

Premium Essay

Edward Snowden: Hero Or Hero?

...Introduction Edward Snowden was born on June 21, 1983 in North Carolina. He was a high school and a community college dropout, who eventually obtained a GED. He was medically discharged from the Army Reserves after breaking both legs in an accident. Snowden studied computers during his two short stints at a community college in Maryland. Soon after, he began working for the National Security Administration (NSA) as a security guard and then secured a high paying IT position with the Central Intelligence Agency (CIA) as a federal contractor. Eventually he landed a job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...

Words: 2005 - Pages: 9

Premium Essay

Edward Snowden Persuasive Essay

...principle. It poses a substantial threat to the social contract and is illegal both domestically and globally. Edward Snowden’s revelations about these activities were done so in the public interest and set him apart from many other Americans charged with espionage by the U.S. government- he is a whistleblower. For this reason, in the eyes of the international community he has committed a non-violent political crime (under the assumption that he has committed a crime). Because of this and other reasons, granting Snowden political asylum is absolutely within Russia’s rights. One can witness a large effort on behalf of the US government, from the latter half of the 20th century...

Words: 2540 - Pages: 11

Premium Essay

Edward Snowden Research Paper

...Assignment on NSA Edward Snowden Revelations and Congress reaction By ABC Date; NSA Edward Snowden Revelations and Congress reaction 1. NSA Edward Snowden Revelations The first bombs hell story was published on the basis of the top secret documents. This was related to the national security agency who spy on the American citizen. When the story was leaked, it was not mentioned that the treasure trove is based on NSA documents and source was not come in front. After three days, the person has leaked his identity. When the identity was leaked, it is revealed that he is “Edward Snowden”. Some of revelations were in queue and in coming years, explosive stories started to trickle the documents. Some of revelations are following: 1. Sweeping...

Words: 1501 - Pages: 7

Free Essay

Who Is Edward Snowden?

...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...

Words: 1691 - Pages: 7

Free Essay

Nsa: Surveillance Awareness Project Proposal

...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:​​Dr. Natasha Jones FROM:​Team Underachievers DATE:​​2014-10-7 SUBJECT:​Proposal PURPOSE:​To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses across...

Words: 3481 - Pages: 14

Premium Essay

Edward Snowden Propaganda

...The story of Edward Snowden is perhaps the biggest and most famous intelligence breach in United States history. The 29-year-old computer programmer who made headlines in 2013 was working for the National Security Agency through subcontractor Booz Allen in the NSA’s office in Oahu, Hawaii when he became disturbed and uncomfortable with some of the NSA’s data. He began collecting top-secret documents regarding NSA domestic surveillance practices. These documents confirmed unsettling spy activity against American citizens. The story of how Snowden fled the U.S. and leaked the documents to the press is shocking and exciting, like something only seen in movies. After watching a Frontline report on the story, a TED Talk with one of the reporters...

Words: 1117 - Pages: 5

Premium Essay

Argumentative Essay On Security Vs Freedom

...government made drastic security changes in hopes of making America safer for its citizens. Some of those changes had citizens wondering if they were giving up some of their rights in exchange for national security. Security has also been brought up more recently with the rise of technology. Adding technology to the...

Words: 938 - Pages: 4

Free Essay

Nsa- Edward Snowden

...classified as heros or villans and if whistleblowing acts should be considered helpful or harmful. The whistleblower I will be talking about in this essay is Edward Snowden and how he released information about the NSA's spying program. In my opinion I believe Edward Snowden did way more harm than good to America by releasing secure information held by the NSA. A whistleblower is a person who exposes wrongful information that goes on in a organization. Mainly, whistleblowers reach out to parties that can publicize this new found information. These parties include the media, hotlines, members of politics, managers of organizations, other rival businesses and other sources. In most cases the information revealed by the whistleblower goes against a law and harms the public in one way or another. Edward Snowden is a former CIA technical assistant who has claimed responsibility for leaking headline-making information about the National Security Agency's (NSA) surveillance program. He revealed that the NSA has records of majority of calls made in America, including those who are making and receiving the calls phone number, conversations between people in emails, on Twitter, Facebook etc. They also have huge amounts of data on the internet including history in web searches and websites. There are many reasons why Edward Snowden’s actions were...

Words: 946 - Pages: 4

Premium Essay

Edward Snowden's National Security Agency

...The NSA's activities have been a controversial topic of debate, especially in the aftermath of Edward Snowden's revelations of the NSA's intrusive spying on Americans as well as foreigners. Through programs such as PRISM and the USA PATRIOT Act, the NSA has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple, and Paltalk, and doesn't need a search warrant to access such...

Words: 484 - Pages: 2

Premium Essay

Edward Snowden Research Paper

...Following Edward Snowden’s leak about the NSA, or the National Security Agency, there have been questions after questions regarding the privacy of the things people do online. People are fearing that the government and their respective agencies are overreaching in their collection of citizens’ data. The whole topic on its own, raises quandaries; and at times even resentment due to America’s belief in securing their personal data from the government. In today’s highly technological society, surveillance and monitoring do not encroach upon privacy, but rather aid in promoting civil liberties and public security. The NSA’s actions do not infringe on the 4th amendment and stand to be legal in the eyes of the constitution and that of the judiciary....

Words: 959 - Pages: 4

Premium Essay

How Has the Nsa's Surveillance Impacted the Economy?

...agency’s contractors named Edward Snowden. The national opinions from several interested parties concentrates on simplistic debates evaluating the tradeoff between individual privacy and national security. However, it is an important time for the government and other stakeholders to begin weighing the benefits and costs associated with the surveillance more carefully. In spite of the strong defense by intelligence officials in favor of the NSA programs, the officials fail to table any credible evidence in support of the benefits they suggest. In fact, some initial analysis of the programs indicates that the benefits are dubious. It is true that the United States is a target for terrorist and other malicious groups, state officials often use the threat as an excuse to conduct and promote the activities of the National Security Agency. It may be beneficial in the context of security, but the surveillance programs also jeopardize the activities and operations of other organizations and individuals within the United States. The impact of the activities of the NSA on other parties is a cause for an analysis of the economic effects realized within the economy of the United States by various parties. For the period that the National Security Agency has conducted its surveillance, through its programs, many nations lost trust in the intentions of the USA leading to a strain in economic relations in both private and government sectors. For many years the NSA has used data as a key to preventing...

Words: 1851 - Pages: 8

Premium Essay

The Patriot Act and Its Effect on Corporations

...The Patriot Act and its Effect on Corporations SECR 5080 – Term Paper 9 May 2015 Table of Contents Abstract – page 3 Introduction – page 3 Current State of Affairs as by the law – page 5 Impact on computing – page 6 Surveillance on Businesses – page 9 Penalty on non-compliance – page 10 Internet Service Providers – page 10 Conclusion – page 12 References – page 13 Abstract The Patriot Act was written into law just a mere 45 days after the September 11, 2001 terrorist attacks on the United States. The Patriot Act was intended to counter terrorism by providing law enforcement agencies and intelligence agencies with an easier means to target those connected to terrorism. The Patriot Act has had a great impact on corporations, how they are surveilled and monitored, and huge penalties on noncompliance of the Patriot Act. This paper will further discuss the Patriot Act and its effects on Corporations. Introduction The terrorist attack on the United States on September 11, 2001 shook the foundation of the faith that America had in her security. This prompted congressional action on counteractive action to avoid a repeat occurrence of the terrorist attack on US soil. Measures that were taken included the passage of a Congressional Act referred to as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, hereby referred to as the Patriot Act. The passing of the Patriot Act was...

Words: 3253 - Pages: 14

Premium Essay

Data Mning

...petabytes of data from various sources. Multi-channel retail data, customer profile data from loyalty programs, social media data, supply chain data, competitor data, sales and shipment data from bottling partners as well as transaction and merchandising data. Coca-cola collects vast amounts of data and they take a refreshing approach in exploiting that data and deriving value from it. Chief Big Data Insights Officer, Esat Sezer, explains that Coca-Cola takes a strategic approach instead of a tactical approach with big data. They use the vast amount of available data sets to change the way they approach IT. They have embraced big data technologies and as such were able to create a shared services centre for their financial transactional activities as well as an employee service centre for HR activities. They moved from a decentralized approach to a centralized approach, where the data is combined centrally and available via the shared platforms across the organization. In addition, Coca-Cola has almost 70 million Facebook followers and big data enables Coca-Cola to connect to these followers better and be able to grow the brand advocacy. Coca-Cola also leverages Point of Sales data from companies like Walmart (Walmart alone is responsible for $ 4 billion in Coca-Cola sales annually) to build customer profiles, create centralized iPad reporting across the company and enable Collaborative Planning, Forecasting and Replenishment process within their supply chain using all data at hand...

Words: 2706 - Pages: 11

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Free Essay

Military Law

...Military Law Seminar Fall, 2014 Article The Influence of Social Media on Homegrown Terrorists and Balancing Data-mining Between Civil Liberties and National Security Julianne Grim [Insert Abstract] [The focus of this article will be narrowly tailored to include the most popular social media sites in the western world, Facebook, Twitter and YouTube and how they are utilized by known terrorist organizations Al-Qaeda and Islamic State (ISIS/ISIL)] I. The Developing World of Social Media Social media activity accounts for over 22 percent of all time spent online in the United States, making it the number one activity people do on the internet. However, the world of social media extends beyond Facebook Twitter and YouTube. Social networking sites are developing faster than they can be analyzed and popping up all over the world. But social media is not a new phenomenon either, people have been seeking out like minded individuals in online communities for nearly two decades. During the infancy stages of social media people logged onto forums, blogs, chat rooms etc. Each social media platform varies slightly from the next - allowing for different types of content to be generated - but each platform seeks to accomplish two goals; generating content and engaging with other interested people. Modern terrorists are taking advantage of the fruits of globalization and modern technology, especially advanced online communication technologies that are used to plan...

Words: 5398 - Pages: 22