Free Essay

Nsa Eavesdropping and Data Mining

In:

Submitted By mrsarcastic
Words 4920
Pages 20
NSA Eavesdropping and
Data Mining

Table of Contents
Abstract..........................................................................................................3

Introduction....................................................................................................4

Literature Review............................................................................................6

Discussion.......................................................................................................13

Conclusion......................................................................................................15

References.......................................................................................................17

Abstract Technology is constantly around us and from this point forward it is never going away not that most of us can remember a time without cell phones but for some of us we can still recall a time when it didn’t exist. Eavesdropping has been a complex endeavor and has been evolving over the years from placing a listening device which had a built in microphone and a short distance transmitter. Now it is complex algorithms that can when completely decrypted give a person or an organization complete information on a person and allow them access into a private life. I say private life when in all actuality we seem to be more responsive to sharing everything with everyone in fact it is a lack of anonymity and of a global pandemic of sharing information that when dissected may not or maybe should not be shared. The prospect of this paper is to look at the intrusiveness from not just companies but government organizations into our lives. Now in a couple of instances I can see how and why these organizations are conducting their business and intrigue into our lives. Now some will claim that this is all for the greater good as they like to call it but no matter how you paint the picture or what veil you put over it; it is still considered and viewed as an invasion of privacy and needs to be handled very carefully. This paper will go into depth on the different tactics and applications used to obtain said private information about our lives. We will also look at the factors in which the National Security Agency operates and the information that is shared between our cousins across the pond as it were; the Government Communications Headquarters in England and the type of tactics they are using for this collection of information.

Introduction Over the past couple of years it has become an ever apparent issue that our lives and our information are being collected and compiled. Now initially people are and were wary of businesses or other internet sites monitoring traffic and navigation. The Big issue is what our government is doing and the means in which they are collecting and monitoring our lives. In the interest of keeping the American citizen safe are they doing so even at the cost of our privacy and if so where do you draw the line of protection and privacy? Information is very valuable some more than others but none of the less it is very important to someone. After a key day in Americans lives it became ever apparent that the government needs to do more to help keep us safe. There was almost a unanimous cry out for help and what can you do to keep and protect our way of life. Now that is the tricky part, I mean how far should the government go to up hold our way of life and to try and maintain piece; that of course is the big question at hand and is of recently getting a lot of scrutiny because of the actions taken. Having a little bit of a background in security because of working in intelligence in the U.S. Navy I completely understand how important information can be. Today people are trying or should I say attempting to be a little more cautious in the information that is accessible about them or that they post on a social media. On the other hand some people are completely oblivious to how much of their lives are being put on display for almost everyone to see and observe. For instance there is an insurance commercial that comes to mind about a lady at the airport posting online that she is getting ready to go on vacation and in reply to that a burglar states have a good trip. That commercial gets me every time because I see family and friends doing that very thing, letting their facebook app use their phones GPS to post their present location. Now of course there are some other issues with apps that people are just now finding out about, I’d like to think that people were already investigating what these apps do behind the scene but I think a lot of it happened because of Snowden.
What if through using one of many apps on your phone that you find out that it basically made a secure tunnel for your phone and accessing it. You might be saying to yourself this isn’t a sci-fi movie, you are correct it isn’t but it is really happening. While slinging birds through the air you give a lot of information that you may or may not think is relevant but it is your private information. This could definitely cause some alarm and curiosity on what else is constantly accessing your phone without your knowledge.
I will learn a lot about the different technologies that are being used to collect and harvest personal information about us. I am collecting all the pertinent information that I can find to help represent both sides of the invasion of privacy, the good and noble reasons and the ethical reasons why it shouldn’t be allowed and some of the consequences involved. There will also be information about some of the services that we as U.S. citizens use that are also looking out for our well being and what they are trying to do about digital snooping. I plan to equally represent the information from both sides of the issue and being as impartial as possible while listing all credible information. Though when it comes to protecting civil rights and liberties things can quickly become heated and one sided. After reading a lot of the articles pertaining to digital snooping of our cell phones I do have my own opinion which I will list at the very end in my conclusion of the issue.
For this project I will be looking at both sides of the privacy issues and how they can possibly affect our lives as private citizens. Some professionals have stated that if the American citizen has nothing to hide then there will be no issues, but honestly our privacy is still a right that we have and cherish. As a ten year veteran I can honestly say that I spent a decent portion of my life helping to protect our rights but on the other hand I completely understand the government doing what they can to protect their citizens. I have seen firsthand the kinds of things that can happen when a government doesn’t do anything and sits idly bye and allows things to happen to innocent people. I will also be looking at the possibilities of cell phone providers giving unrestricted access to the NSA for their endeavor. I will also help bring to light some of the companies out there that understand and appreciate the privacy of their customers and what they are doing to help protect those rights from the snooping eyes of the government.
Literature Review One of the more pressing and troubling issues is when information from Edward Snowden was leaked or to use a less abrasive term shared with news organizations was what the NSA did with a select few world leaders. The National Security Agency wiretapped 35 different world leaders according to a classified document provided by Edward Snowden. The memo revealed that the NSA would persuade officials to divulge phone numbers of foreign politicians. (A&P Staff's Access Interface Portfolio, 2006) Now if this was an isolated incident then that would be one thing but the German chancellor Angela Merkel while attending an EU conference also accused the U.S. of tapping her phone.
The White House Press Secretary exclaimed after this information broke to the media that the U.S. is not and will not monitor her cell phone, eluding but not denying that they didn’t in the past. She went on to say, "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany." (A&P Staff's Access Interface Portfolio, 2006) There is in fact a document that The Guardian was able to attain that states, “Customers Can Help SID Obtain Targetable Phone Numbers.” Now if you have never heard of SID then you are in the same boat as I am, SID stands for Signals Intelligence Directorate. Now the personnel working in this organization received the memo encouraging their staff to help obtain these targetable phone numbers. I understand that secrecy is a big part on how the National Security Agency operates but the more that the public finds out the more we push back and try and keep them at arms distance so to speak. Now this memo that originally was thought to have been a good idea has actually turned up little usable information that can help with keeping our country safer. In fact The Guardian states “In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.” (A&P Staff's Access Interface Portfolio, 2006) After this debacle there is a new practice which actually seems to a better way of obtaining the information that they require. Signals Intelligence takes things a step in a different direction and is open and upfront with what they want from their liaisons. They ask if the customers that their liaisons work with would be willing to hand over certain information like contact names and numbers instead of trying to be all cloak and dagger. This may seem to be very direct compared to those actions that have been taking thus far but it seems to have been received a lot better response. It seems that even U.S. customers are giving information to the NSA pertaining to their client list within the Continental United States and overseas. "From time to time, SID is offered access to the personal contact databases of US officials," it states. "Such 'Rolodexes' may contain contact information for foreign political or military leaders, to include direct line, fax, residence and cellular numbers." (A&P Staff's Access Interface Portfolio, 2006) Edward Snowden also released information that the NSA and their British counterpart are using popular Smartphone apps including Angry Birds and Google Maps to allow access into the enormous amount of information collected by apps like these. (FoxNews.com, 2014) When Rovio creators of Angry Birds had no knowledge of the possibility of the NSA or GCHQ having the capability to intrude users Smartphone’s through their app. Apparently in one instance the intrusion came from a third party advertisement which allowed the agencies into the device. Some of the information being collected while slinging birds at pigs would be the player’s age, sex, and tons of other personal information. As Smartphone’s continue to become more complex it seems the more information that is released out into the world and the possibility of this information being harvested and filed away. (JAMES GLANZ, 2014) If you happen to be one of millions that happen to use Google Maps then you are unknowingly allowing the possibility of either two of these agencies to use your phone as a locator which is accurate up to a couple of yards away. “It effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system,” reads a secret 2008 report by the NSA's sister spy agency, according to the New York Times. (FoxNews.com, 2014) Though it seems as if the focus on the apps being able to collect information were on Androids but it is safe to assume because of it being an application that it can give the same information on another device such as an iPhone. The GCHQ even has a list of which apps will give what information; apparently based on the type of app it may have extra information compared to others. Jay Carney during a White House press conference stated, "As the president said in his Jan. 17 speech, to the extent data is collected by the NSA, through whatever means, we are not interested in the communications of people who are not valid foreign intelligence targets and we are not after the information of ordinary Americans," he said.” (FoxNews.com, 2014) While military and law enforcement agencies are able to hack individuals’ cell phones, the NSA in fact is far more advanced than that. The NSA has the ability to decode encryption used by the majority of cell phones in the world. What is concerning people is if the NSA has this capability how long before someone else will be able to do the same thing. (Soltani, 2013) The good thing is that it is not lawful for the NSA to collect the content of a conversation of American citizens without a court order, not to say that it couldn’t still happen but there are laws in place to help protect privacy. “Encryption experts have complained for years that the most commonly used technology, known as A5/1, is vulnerable and have urged providers to upgrade to newer systems that are much harder to crack.” (Soltani, 2013) Truthfully though most companies have taken this information and disregarded it because many different reasons but other than it being reliable doesn’t seem to be justified to dismiss. There are experts that say that even with some of the newer technologies that it will take an organization like the NSA a longer amount of time and computing power to actually achieve the same results. I have a big problem with that statement especially when I had read a story about a group of people that used four Nvidia graphics cards on a desktop to make it a simplified version of a supercomputer. Now with these graphics cards being tasked to run say mathematical sequencing or many other various programs it would be the equivalent of 350 pc’s doping the same work. Now that is impressive computing on a budget and who’s to say that a similar technique is used to crack and decrypt information. Now the funny thing about technology is that it may be the new kid on the block but sometimes can still rely on old technologies. For instance we have phones that run on 3G and or 4G networks but were you aware that more often than not that when you make a simple call your high tech phone may be using an older technology to complete the task referred to as 2G which has little to no encryption at all and can leave your conversation open to people eavesdropping. (Soltani, 2013) Being as tech savvy as I thought I was I was dumbfounded at learning about this, part of me though was not as surprised because of how reliable that particular piece of technology is. Then there is also the regions of the world that aren’t considered wealthy and they still rely on that same 2G technology for their phones so as to no surprise to why most companies have not taken giant leaps forward to update systems. That would be an expensive venture and to be totally honest I truly believe that something like that would only happen if as a world we are more interconnected and are running on the same network. The downfall then is when someone gains access to one type of technology it can affect all of us as a whole and cause world wide damage.
Security is an ever-growing issue throughout the world but it is very disconcerting on whether or not improvements will be made before anyone else has the capability to exploit these devices. NSA has technology to turn your Smartphone into an eavesdropping device as well as being able to use radar wave devices to collect information from computers even while they are not online. (Reporter, 2013) That is very troubling to know that the NSA has some much access without the repercussions of doing such without a warrant or even a reason other than the blanket term used “For the greater good.”
There has been a new development into surveillance of a person phone and now including email and text messages. You would think just like anything that there would be some sort of court order when in fact no, all the NSA requires is based on an analyst’s decision which is sufficient to them to continue snooping. (McCullagh, 2013) Based on the information given about the parameters in which the NSA deems viable to continue digging through personal information I feel that it should be made clear the parameters in which they operate so that the justification is explained.
Even our President is taking steps to remove the NSA out of storing phone records. The problem is that initially it was stated that the President wants either the phone company to continue holding this information or the possibility the creation of a separate entity to do so. (CBS/AP, 2014) That is a very reasonable request put forth by our leader to limit how much information one government agency posses and retain for their use. There definitely should be some sort of limit put on the NSA to bind the agency of appearing to be without anyone to report to outside of their agency. I know that there is a chain of command of who answers to whom and who over sees who but most recently doesn’t appear that way. “"Both of these options pose difficult problems," Mr. Obama said in January.”Relying solely on the records of multiple providers, for example, could require companies to alter their procedures in ways that raise new privacy concerns.” (CBS/AP, 2014) The phone companies have concerns about the shift of information being put back into their hands. One of the issues is the cost of retaining the information which they didn’t have to worry about before. It has been made evident that the telecom companies are not going to support this transition willingly in fact the only way they are going to support it is if it is brought into legislation and they are legally required to do it. Second is that they are worried about the possibility of being sued by individuals for giving their customers information and phone data to intelligence or law enforcement agencies.
Now if you think that the NSA is the only real government agency that you have to worry about snooping, you would be wrong. In fact it seems that local police are starting to gain ground in collecting information from people cell phones. Now there are claims that this is in the name of doing the right thing such as finding criminals and or abducted children but what if that information were to get into the wrong hands. (Kelly, 2013) Law enforcement agencies have a couple of different tactics that they have at their disposal to gain information about cell phones.
The first thing that they can utilize is what is called a tower dump which allows an agency to view a log of cell phones that connected to a cell tower and the location it was and the movement during a selected span of time. Second the police can acquire a piece of equipment that costs around $400,000 that is roughly the size of a suitcase so it is very mobile and it pretends that it is a cell tower so devices automatically connect with it. “Thirty-six more police agencies refused to say whether they've used either tactic. Most denied public records requests, arguing that criminals or terrorists could use the information to thwart important crime-fighting and surveillance techniques.” (Kelly, 2013) Now you would think that with all these police dramas that are on TV. that they would utilize some sort of technology that isn’t real or is so far advanced towards cell phone tracking. In this instance it appears that real life and real technology has the upper hand in which the police operate. To think that a covert item like this is put into a vehicle and driven around to collect data for the police or any other law enforcement agency is a tad bit worrisome and it coincidentally has an appropriate covert name “Stingray.”
Now there is some good news about the sharing of personal information with the Intelligence communities. Yahoo has taken security for their customers seriously by adding more layers of security to help protect people’s online travel. Part of the measure undertaken by Yahoo is a system that encrypts information that is being transmitted from one data center to another. (AP, 2014) Yahoo is also advancing their encryption to video chatting and search requests on their home page all to help their customers from the prying eyes. The reasoning for this is part of an initiative to prevent snooping especially after all this information has come to light about invading personal privacy.
They even hired a security consultant as part of this act to help them with their endeavor to keep information as safe as possible. “"Whether or not our users understand it, I feel it's our responsibility to keep them safe," Alex Stamos, Yahoo's recently hired chief information of security, told a small group of reporters.” (AP, 2014) With the strides yahoo is taking they are not as far as they want to be nor are they even caught up to the measure deployed by Google. The reason for this is a lot of Yahoos revenue is from the ads posted on their pages, though it seems that most of the companies that provide ads and content understand the direction of things but some are still not convinced.
Discussion
After reading several different articles discussing that the NSA has no grounds for what they are doing and the invasion of personal information that they are collecting. Now as I stated before I am a veteran and I do understand to gain more protection the government has to take certain precautions to gain some ground. I’m not saying that you have to give up all your civil rights but there has to be some sort of justifiable balance. Now I do understand the civil rights organization being involved with the issues unveiled by Edward Snowden but as soon as some random terrorist act is undertaken or foiled the masses exclaim why the government doesn’t do more.
All in all I would have to side with civil liberties because when you give up one thing it doesn’t seem that bad especially when it is cloaked in a veil of “The greater good.” Soon after another liberty will be infringed on and then another and then another, where will it stop and again the veil will be thrown over it and will be defended for the reasons the intelligence community sees fit to mention. I have a feeling that all it will take is a certain level of an act of terrorism which will shove us over the precipice in which we will give total control over to the government to help keep us safe. The problem is we most likely will have no way to gain our rights back after this happens and then it would seem to play out like so many movies have displayed about governmental control.
Now I am not a person that believes in government conspiracies but I do believe we as U.S. citizens need to be very careful on the choices that we make about giving up our rights. It is also the right of every U.S. Citizen to question our leaders and our government. I think that if these heightened circumstances were met there may need to be some sort of declaration that states the response to an act of terrorism and the length in which the government would be allowed that kind of access. You don’t want to give any one specific entity complete and utter control of your life without some sort of checks and balance in play to help keep them as honest and honorable. I am not saying something like that will be easy to accomplish because with an endeavor like that will definitely spark some controversy and get some people all riled up. All of a sudden you will have activists coming out of the wood work so to say because of these possible infringements. I think that it is very necessary and decide what benefits all of us especially when comes to protecting U.S. citizen rights and keeping them safe.

Conclusion Data mining and eavesdropping is a definite and relevant concern and not just if you’re a U.S. citizen and it can affect everyone. Honestly who is to say that other countries are doing or attempting the same thing to collect information? As reported by the Gaurdian in England The Government Communications Headquarters is participating in using Smartphone apps to tunnel into phones to collect information. The bad thing whether your pro NSA eavesdropping and data collection or pro civil liberties there isn’t a clear cut way to make everyone happy.
There are viable reasons why steps like data collection are being taken with the constant threat of Cyber Terrorism. Especially with the ever growing news about credit cards being stolen or the criminal ring from Eastern Europe or finding out that Chinese Nationals are hacking companies looking and collecting information. If there were a better system of checks and balances put in place so no one intelligence agency is holding all of the information, which would be a good start towards not misusing power and accountability. United States citizens increasingly over the past few years are becoming more and more skeptical towards the government and the power that they wield especially with the implementation of the National Defense Authorization Act (NDAA) which is an amended part of the Patriot Act.
When the FBI, NSA or some other eye chart demands personal information from telecommunication companies without warrants that has a tendency to throw a lot of red flags which causes unnecessary attention. Actually I shouldn’t say unnecessary attention because it is very important for people to be aware of the issues at hand. Now supposedly the eavesdropping program is reviewed periodically by a team of lawyers to determine if the program is effective and lawful, now that would be a step in the right direction and should help to hinder people’s perspectives.
Just because a blanket term “for the greater good” is thrown over the un supervised infringement on U.S. citizens doesn’t allow them to have an unwavering free pass to do whatever they want doesn’t make it legal. Even though some may see a scenario like that impossible and could never happen but you have to be concerned that it could happen. The root of all of this whether you’re for or against comes down to this simple question; how much are you willing to give up to be safe or should I say feel safe?

References
A&P Staff's Access Interface Portfolio. (2006, OCT 27). nsa-surveillance-world-leaders-calls. aaaRetrieved APR 18, 2014, from www.theguardian.com: aaahttp://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
AP. (2014, APR 03). yahoo-adds-more-security-to-thwart-surveillance. Retrieved APR 18, aaa2014, from www.cbsnews.com: http://www.cbsnews.com/news/yahoo-adds-more-security-aaato-thwart-surveillance/
CBS/AP. (2014, MAR 25). white-house-to-propose-nsa-stop-collecting-keeping-data-on-aaaamericans-calls. Retrieved APR 18, 2014, from www.cbsnews.com: aaahttp://www.cbsnews.com/news/white-house-to-propose-nsa-stop-collecting-keeping-data-on-aaaamericans-calls/
FoxNews.com. (2014, JAN 27). nsa-spying-through-angry-birds-google-maps. Retrieved APR aaa18, 2014, from www.foxnews.com: http://www.foxnews.com/tech/2014/01/27/nsa-spying-aaathrough-angry-birds-google-maps/
JAMES GLANZ, J. L. (2014, JAN 27). spy-agencies-scour-phone-apps-for-personal-data. aaaRetrieved APR 18, 2014, from www.nytimes.com: aaahttp://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-aaadata.html?_r=0
Kelly, J. (2013, DEC 08). cellphone-data-spying-nsa-police. Retrieved APR 18, 2014, from aaawww.usatoday.com: http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-aaaspying-nsa-police/3902809/
McCullagh, D. (2013, JUN 15). nsa-spying-flap-extends-to-contents-of-u-s-phone-calls. aaaRetrieved APR 18, 2014, from www.cnet.com: http://www.cnet.com/news/nsa-spying-flap-aaaextends-to-contents-of-u-s-phone-calls/
Reporter, D. M. (2013, DEC 31). Even-worse-worst-nightmares-How-NSA-use-iPhone-spy-you. aaaRetrieved APR 18, 2014, from www.dailymail.co.uk: aaahttp://www.dailymail.co.uk/news/article-2531941/Even-worse-worst-nightmares-How-NSA-aaause-iPhone-spy-you.html
Soltani, C. T. (2013, DEC 13). by-cracking-cellphone-code-nsa-has-capacity-for-decoding-aaaprivate-conversations. Retrieved APR 18, 2014, from www.washingtonpost.com: aaahttp://www.washingtonpost.com/business/technology/by-cracking-cellphone-code-nsa-has-aaacapacity-for-decoding-private-conversations/2013/12/13/e119b598-612f-11e3-bf45-aaa61f69f54fc5f_story.html

Similar Documents

Premium Essay

Management and Information Systems

...TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using Internet Newsgroups for Online Market Research 4.2 4.3 4.4 Interactive Sessions: Data for Sale The Internet: Friend or Foe to Children? LEARNING TRACK MODULE Developing a Corporate Code of Ethics for Information Systems DOES LOCATION TRACKING THREATEN PRIVACY? F or many years, parents of District of Columbia public school children complained about buses running late or not showing...

Words: 20079 - Pages: 81

Free Essay

Protecting Civil Liberties in the Age of Terrorism

...liberties and fighting terrorism is a delicate task that is affecting the Department of Homeland Security (DHS). It is evident that most Americans want the government to fight terrorism and at the same time, efforts against terrorism should not infringe on their civil liberties that are enshrined in the constitution. Polls conducted in the United States reveal that Americans are divided on the issue. Some feel that it is important for the government to safeguard civil rights and liberties than to protect citizens against terrorism, while others feel that it is important for Americans to sacrifice certain liberties in order to fight terrorism. The revelations by Edward Snowden that the government engages in massive surveillance through the NSA (National Security Agency) bring out the urgency of this topic. The passage of the Patriotic Act was the milestone in the fight against terrorism, but it has been controversial from the start. Proponents of this law argue that it is important if the fight against terrorism is to succeed. It is argued that the provisions of the Act empower law enforcement agencies to gather evidence and diffuse terrorism threats. On the other hand, opponents of the legislation view that it gives law enforcement agencies excessive powers and without the lack of restrictions, individual rights will be violated. Sections of the article have touched on the basic values of the American society. In the minds of many Americans, civil liberties are the foundation...

Words: 1711 - Pages: 7

Free Essay

Android

...------------------------------------------------- ------------------------------------------------- COLLOQUIUM REPORT ------------------------------------------------- ------------------------------------------------- ON ------------------------------------------------- ------------------------------------------------- Data Mining ------------------------------------------------- ------------------------------------------------- Submitted as partial fulfillment for the award of ------------------------------------------------- ------------------------------------------------- MASTER OF COMPUTER APPLICATIONS ------------------------------------------------- ------------------------------------------------- DEGREE ------------------------------------------------- ------------------------------------------------- Session 2012-13 ------------------------------------------------- By + ------------------------------------------------- Jeetendra Kumar Maurya ------------------------------------------------- 1045914041 ------------------------------------------------- ------------------------------------------------- Under the guidance of ------------------------------------------------- MR. Vinod Kumar (Sr. Asst. Professor) ------------------------------------------------- ------------------------------------------------- ACADEMY...

Words: 6401 - Pages: 26

Premium Essay

Contemplating Realities and Paradoxes in the Global War on Terror

...Contemplating Realities and Paradoxes in the Global War on Terror John B. Alexander, Ph.D. Introduction The approach of this monograph is to examine paradoxes encountered in the Global War on Terror (GWOT). The intent is to spark debate on disputatious issues. Clearly, many of the existing situations appear intractable given the emotional investment that has been made by the public, and exacerbated by political manipulation of elected officials. Also unavoidable are the fiscal constraints that are becoming increasingly binding. Examined in Section One are problematic premises related to the four fundamental approaches to countering terrorism; increased security, eliminating the terrorists, attacking the support infrastructure, and altering conditions that breed discontent. Despite trite, albeit politically popular, commentary proposing those methods, execution of those concepts is extremely difficult, often controversial, and sometimes counterproductive. Section Two of this monograph addresses several other policy decisions that generate problems that are difficult to resolve, but directly impact the forces involved. Among those topics are; roles of contractors, individual loyalties versus national interests, alliances of convenience, foreign response to our policy on preemption of weapons of mass destruction (WMDs), the consequences of our stated objective of spreading democracy, the impact of U.S. presence in the Gulf region, and quandary associated with defining...

Words: 28095 - Pages: 113

Premium Essay

Prime Minister

...THE ACCIDENTAL PRIME MINISTER THE ACCIDENTAL PRIME MINISTER THE MAKING AND UNMAKING OF MANMOHAN SINGH SANJAYA BARU VIKING Published by the Penguin Group Penguin Books India Pvt. Ltd, 11 Community Centre, Panchsheel Park, New Delhi 110 017, India Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, USA Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, M4P 2Y3, Canada (a division of Pearson Penguin Canada Inc.) Penguin Books Ltd, 80 Strand, London WC2R 0RL, England Penguin Ireland, 25 St Stephen’s Green, Dublin 2, Ireland (a division of Penguin Books Ltd) Penguin Group (Australia), 707 Collins Street, Melbourne, Victoria 3008, Australia (a division of Pearson Australia Group Pty Ltd) Penguin Group (NZ), 67 Apollo Drive, Rosedale, Auckland 0632, New Zealand (a division of Pearson New Zealand Ltd) Penguin Group (South Africa) (Pty) Ltd, Block D, Rosebank Office Park, 181 Jan Smuts Avenue, Parktown North, Johannesburg 2193, South Africa Penguin Books Ltd, Registered Offices: 80 Strand, London WC2R 0RL, England First published in Viking by Penguin Books India 2014 Copyright © Sanjaya Baru 2014 All rights reserved 10 9 8 7 6 5 4 3 2 1 The views and opinions expressed in this book are the author’s own and the facts are as reported by him which have been verified to the extent possible, and the publishers are not in any way liable for the same. ISBN 9780670086740 Typeset in Bembo by R. Ajith Kumar, New Delhi Printed at Thomson Press India...

Words: 114823 - Pages: 460

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762