Free Essay

Nsa Ethics of Mass Surveillance

In:

Submitted By safiron1995
Words 1335
Pages 6
The Ethics of the NSA Mass-Surveillance Program
University Name
Student Name
Course Number/Name
Professor Name
Date

Introduction One of the most explosive scandals of the 21st century was involved the National Security Agency (NSA), and the revelations that the agency had set up a robust, warrantless mass surveillance program in the years after the 9/11 attacks. Designed to pick up bits of intelligence that could be used in order to thwart future 9/11 attacks, critics of the program argued that not only was it unconstitutional given the lack of warrants obtained prior to engaging in the program, but that it was ineffective at stopping any kind of real terrorism. Supporters pushed back that the program was an essential tool for fighting terrorists who had become more advanced digitally, often using the internet in order to communicate with each other. Much of the discussion on the program related to the ethical appropriateness of the NSA’s activities. This paper will summarize the NSA’s surveillance program and discuss it from the perspective of utilitarianism and Kantian ethics; in addition, the paper will discuss the author’s personal viewpoint of the program.
Summary of the Program The NSA spying program, named the “Terrorist Surveillance Program” by the New York Times, focused on monitoring the communications of between 500 and 1000 people within the United States with suspected ties to Al-Qaeda (Dunn, 2015). Many of these individuals were American citizens, and no warrants were obtained prior to spying on them. The method of spying was to use technology in order to gain access to metadata which could then be keyword searched by NSA analysts in order to find suspect topics. The NSA installed fiber optic splitters in key data junctions throughout the United States, totaling between 10 and 20 data junctions (Lawson, 2008). These fiber optic splitters gave the NSA access to billions of emails without the knowledge of the senders. Similarly, the data splitters could gain access to phone calls and phone numbers of millions of unsuspecting Americans. This data was subsequently analyzed using the Naurus Semantic Traffic Analyzer, which essentially key word searched metadata in order to find terrorist related patterns and topics which could then be used as evidence to focus on individuals more closely (Dunn, 2015). This data gathering and analysis was conducted with no oversight, with no warrants provided.
Applying Utilitarianism A first ethical theory that is pertinent to this case is utilitarianism. This ethical perspective argues that the ethical nature of a decision is based on the ultimate outcome associated with the choices made, rather than the choices themselves (Shaw, 2016). In essence, utilitarianism can be summed up by the phrase “the ends justify the means”. Proponents of this theory argue that if an action is taken that appears unethical in the process, this does not necessarily mean that the actions are unethical; it can only be judged based on the outcome. A simple example of utilitarianism is seen in harvesting an organ from a criminal in order to save a person who then goes on to cure cancer. On the surface, stealing an organ from anyone would appear unethical, but in this case the ultimate outcome saves millions, thus making the action ethical. Utilitarianism is the ethical theory that tends to be preferred by proponents of the NSA’s Terrorist Surveillance Program. The belief is that if the surveillance program is able to stop a terrorist attack before it occurs, it will save lives. As such, the outcome of the surveillance program is ethical, even though the process of mass surveillance tramples on the Constitution of the United States, and the concept that the government needs to seek a warrant prior to beginning to conduct surveillance on an American citizen. This is a sacred duty that the American government has to its citizens, something that is enshrined in the Fourth Amendment which bars the government from engaging in illegal searches and seizures in pursuit of a criminal investigation (Dunn, 2015). A believer in utilitarianism would argue that the lives of American citizens are more important than adhering to a legal principle which demands a specific process be followed. Saving lives is seen as the ethical choice, superior to following the Constitution.
Applying Kantian Ethics Traditionally, the ethical theory that is the diametric opposite of utilitarianism is Kantian ethics. Developed by Emmanuel Kant, this ethical theory holds that ethical rightness or wrongness is not determined by the outcome of actions, but by the ability of the decision maker to adhere to their duty (Shaw, 2016). The foundation of this theory is that it is virtually impossible to control the ultimate outcome of events, and a person should always be in control of whether or not they are making ethical choices. In this way, the theory holds that a person can always adhere to their duty, as long as they are aware of their duty and have the moral fiber to follow that duty no matter what. In this way, the means are what determines the ethical nature of a choice, rather than the ends. Just as the proponents of the Terrorist Surveillance Program use utilitarianism as their ethical theory to support moving forward with the mass surveillance tactics, critics of the program ground their ethical disapproval in Kantian ethics. In the perspective of critics of the program, the government’s main duty is to uphold the Constitution of the United States. As the supreme law of the land, the Constitution is the guiding document which the entire American legal and political systems are based on. Many top government officials, including the President of the United States (who signed off on the NSA’s surveillance programs), swear an oath to uphold the Constitution (Dunn, 2015). It is very clear that the primary duty that the federal government and its agents have is to upholding the Constitution, and the argument follows that failing to obtain a warrant prior to gathering surveillance on American citizens (as the NSA program does to an enormous degree) is a violation of that duty, and is therefore an unethical choice under Kantian ethics.
My Perspective My position is that the NSA surveillance program is flagrantly unethical as it completely tears up the Fourth Amendment to the Constitution, one of the federal government’s most sacred duties and obligations to its citizens. The semantic gymnastics aside, the NSA is quite clearly engaging in illegal searches against American citizens, since they have not obtained warrants prior to beginning the program. Perhaps as importantly, I object to the NSA spying program on a pragmatic basis. So far, there has been little evidence that the program has been successful in stopping any terrorist attacks, despite being in place for over a decade. The 9/11 attacks were not successful because the federal government did not have enough information; the 9/11 Commission noted that there was tremendous amounts of information about each of the terrorists, but the pieces were not put together by authorities (Dunn, 2015). The NSA surveillance program is a perfect example of the federal government using a legitimate crisis in order to expand its power through illegitimate means.
Conclusion
The NSA’s Terrorist Surveillance Program uses technology to suck up metadata, which is analyzed to find patterns with regard to terrorism. A perspective based in utilitarianism would hold that this is ethical, since it helps save lives. A perspective rooted in Kantian ethics argues that this is unethical, as it violates the American government’s duty to the Constitution. For my part, I do not believe that this program is either ethical or particularly useful, and I think it should be eliminated immediately.

References
Dunn, W. J. (2015). The Constitutional Infirmity of Warrantless NSA Surveillance: The Abuse of Presidential Power and the Injury to the Fourth Amendment. William & Mary Bill of Rights Journal, 15, 147-202.
Lawson, G. (2008). What Lurks Beneath: NSA Surveillance and Executive Power. BUL Rev., 88, 375.
Shaw, W. (2016). Business ethics: A textbook with cases. Cengage Learning.

Similar Documents

Free Essay

Global Economics and the Impact of Whistleblowing

...Whistleblowing and the global impact. Table of Contents ESSAY Introduction The importance and understanding of whistleblowing The notion of whistleblowing Whistleblowing – an act of good will Whistleblowing – an act of revenge The role of the government Government whistleblowing How Snowden formed society Introduction Whistleblowing, an act of certain controversy, has provided material for many a discussion. It has filled our newspapers, televisions and radios on a daily basis, since Wikileaks went public with its first act of exposing illegal activity. ‘Whistleblowing’ is a dynamic process involving at least three social actors; the wrongdoer, the whistleblower and the recipient, each of whom takes actions in response to the other’ (Near et al., p 509, 1996), while accepting the associated dangers and risks. Current events relating to Edward Snowden, Julian Assange and Bradley Manning have sparked intense debate throughout the world regarding policy changes, creation of new laws and the conduct of government and corporations. It is widely agreed that whistleblowing exists and happens on a daily basis. Scholars have examined the topic over the years narrowing it down to ethnical divergences or even to how the act of wrongdoing can impact a whistleblower. The importance and understanding of whistleblowing Age has a significant impact...

Words: 3369 - Pages: 14

Premium Essay

Patriot Act Pros And Cons

...allows agencies to conduct surveillance by intercepting, sharing, and using electronic communications for criminal investigations without consent (Patriot Act). These procedures are set forth in hopes of intercepting on foreign powers and communications related to terrorist activity. This act violates the rights set forth in Constitution. Although the U.S. Constitution contains...

Words: 1219 - Pages: 5

Premium Essay

Iran Economic Swot

...Geopolitics, International Environment and Business International risk management 1 Geopolitics, International Environment and Business Risks identification Are we leading towards economic war? 2 Geopolitics, International Environment and Business Several agencies seem to reinforce this idea, particularly regarding international trade 3 “Public economic warfare”  Japan JETRO, Japan External Trade Organization (www.jetro.go.jp) Created in 1958 to promote Japanese exports From the 80s it expands to developing countries. 21st century: To promote FDI into Japan To help small & medium sized companies to export. 4  USA (1992, 1993): Bill Clinton Policy  "Putting People First, A National Economic Strategy For America" Governor Bill Clinton June 21, 1992  Opening up world markets. […] we will move aggressively to open foreign markets to quality American goods and services (for instance, NAFTA)  Economic security council / Advocacy Center / CIA / FBI –Economic Counterintelligence Program The stakes in this game are high! 5 FRANCE: UBIFRANCE -Offices in France (partnership with chambers of trade) -80 offices in 60 different countries (156 in 120 countries if Economic Missions considered) -More than 1,400 collaborators MISSION: to make French exports easier, to support and to monitor French companies abroad. 6 7 “Private economic war”  International competition   Is it replacing military conflicts? Competitive...

Words: 1787 - Pages: 8

Premium Essay

Management and Information Systems

...intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using Internet Newsgroups for Online Market Research 4.2 4.3 4.4 Interactive Sessions: Data for Sale The Internet: Friend or Foe to Children? LEARNING TRACK MODULE Developing a Corporate Code of Ethics for Information Systems DOES LOCATION TRACKING THREATEN PRIVACY? F or many years, parents of District of Columbia public school children complained about buses running late or not showing...

Words: 20079 - Pages: 81

Free Essay

Law Report

...Contemporary Privacy Issues Report Introduction Privacy is one of the fundamental human rights, every individual should have full control over their personal information. However due to the continuous evolution of society and technology, the importance of a person's right to privacy has been eroded. This report discusses the contemporary privacy issues on different levels and areas, with specific focus on credit reporting, protection of customer’s private information by businesses, health records, internet data and government intelligence access to information. Sections of the current Privacy Act 1988, the new Australian Privacy Principles 2014, and legislations related to the topic areas mentioned above will also be discussed in detail, and the effectiveness of these laws will be analysed. A person's credit history contains a vast amount of personally sensitive information which have a high commercial value, therefore it is extremely important to ensure businesses adhere to the privacy act to prevent the unauthorised use of these information. Any misuse of information can cause great personal and financial harm to the victim. Privacy of health information is fundamental principle in health care. Lack of privacy information might result in people not seeking the health care they need which might be very risky to their own health and the health of others. The rate of technological development is accelerating too quickly and current laws are becoming irrelevant...

Words: 11809 - Pages: 48

Premium Essay

Contemplating Realities and Paradoxes in the Global War on Terror

...problematic premises related to the four fundamental approaches to countering terrorism; increased security, eliminating the terrorists, attacking the support infrastructure, and altering conditions that breed discontent. Despite trite, albeit politically popular, commentary proposing those methods, execution of those concepts is extremely difficult, often controversial, and sometimes counterproductive. Section Two of this monograph addresses several other policy decisions that generate problems that are difficult to resolve, but directly impact the forces involved. Among those topics are; roles of contractors, individual loyalties versus national interests, alliances of convenience, foreign response to our policy on preemption of weapons of mass destruction (WMDs), the consequences of our stated objective of spreading democracy, the impact of U.S. presence in the Gulf region, and quandary associated with defining winning. Section Three will offer a few solutions to extremely contentious, often emotional, issues that are strategic in scope. This includes the development of an organization that can predict threat objectives and evolution, thus reducing the probability of continued unanticipated consequences from U.S. actions. Additionally, means of extraction of information from prisoners without...

Words: 28095 - Pages: 113

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Obama

...       Barack Obama Barack Obama Biography U.S. Representative, U.S. President, Lawyer (1961–) Early Life Barack Hussein Obama was born on August 4, 1961, in Honolulu, Hawaii. His mother, Ann Dunham, grew up in Wichita, Kansas, where her father worked on oil rigs during the Great Depression. After the Japanese attack on Pearl Harbor, Dunham's father, Stanley, enlisted in the service and marched across Europe in Patton's army. Dunham's mother, Madelyn, went to work on a bomber assembly line. After the war, the couple studied on the G.I. Bill, bought a house through the Federal Housing Program and, after several moves, landed in Hawaii. Barack Obama's father, Barack Obama Sr., was born of Luo ethnicity in Nyanza Province, Kenya. Obama Sr. grew up herding goats in Africa, eventually earning a scholarship that allowed him to leave Kenya and pursue his dreams of college in Hawaii. While studying at the University of Hawaii in Manoa, Obama Sr. met fellow student Ann Dunham, and they married on February 2, 1961. Barack was born six months later. Obama did not have a relationship with his father as a child. When his son was still an infant, Obama Sr. relocated to Massachusetts to attend Harvard University, pursuing a Ph.D. Barack's parents officially separated several months later and ultimately divorced in March 1964, when their son was 2. In 1965, Obama Sr. returned to Kenya...

Words: 5520 - Pages: 23

Free Essay

Computer Crime

...computer crime usually threatens economic interests more than physical 2. computer crime much more likely to cross state boundaries; most traditional crime is dealt with by the states II. COMPUTER MISUSE CRIMES A. 2 ways they can occur 1. user exceeds his own privileges a. “insider”: has some privileges/rights 2. user denies privileges to others b. may be an “outsider”: no access rights B. Most Common Statutes 1. unauthorized access statutes 2. computer fraud statutes 3. computer damage statutes C. Why Punish? 1. utilitarian: deterrence of harmful conduct, incapacitation, rehabilitation (looks forward) 2. retribution: just deserts; restore moral order (looks back) D. The Hacker Ethic: an open and free approach to using and exploring computers; any computer user has the right to tinker with and improve any computer; rules governing access should NOT be followed 1. misuse can improve security E. How or When to Punish 1. Property-based view: the computer is not yours, so if you break in you should be punished; if you want access, you need permission 2. Harm-based view: the mere fact of breaking in does not create harm; need to have some financial losses a. financial losses usually relate to security measures taken after the fact to prevent future hacking F. PROPERTY-BASED APPROACH 1. traditional property crimes: trespass, burglary, theft a. not a...

Words: 16552 - Pages: 67

Premium Essay

Unesco

...Freedom of Connection – Freedom of Expression: The Changing Legal and Regulatory Ecology Shaping the Internet     by       William H. Dutton   Anna Dopatka   Michael Hills   Ginette Law   and   Victoria Nash       Oxford Internet Institute   University of Oxford   1 St Giles Oxford OX1 3JS   United Kingdom                                     19 August 2010         A report prepared for UNESCO’s Division for Freedom of Expression, Democracy and Peace. The opinions expressed in this report are those of the authors and do not necessarily reflect the views of UNESCO or its Division for Freedom of Expression, Democracy and Peace.   Preface As stated in its Constitution, UNESCO is dedicated to “Promoting the free flow of ideas by word and image”. Part of this mission, therefore, is to promote freedom of expression and freedom of the press through sensitization and monitoring activities, as a central element in building strong democracies, contributing to good governance, promoting civic participation and the rule of law, and encouraging human development and security. Media independence and pluralism are fostered by the Organization, providing advisory services on media legislation and sensitizing governments and parliamentarians, as well as civil society and relevant professional associations. However, UNESCO recognizes that the principle of freedom of expression must apply not only to traditional media, but also...

Words: 39228 - Pages: 157

Free Essay

Budget

...OVERVIEW UNITED STATES DEPARTMENT OF DEFENSE FISCAL YEAR 2014 BUDGET REQUEST APRIL 2013 OFFICE OF THE UNDER SECRETARY OF DEFENSE (COMPTROLLER) / CHIEF FINANCIAL OFFICER Preface The Overview Book has been published as part of the President’s Annual Defense Budget for the past few years. This continues for FY 2014, but with modifications as proposed by congressional staff. From FY 1969 to FY 2005 OSD published the “Annual Defense Report” (ADR) to meet 10 USC Section 113 requirements. Starting with the President’s FY 2006 Budget, this report was no longer produced. Subsequently, the Overview began to fill this role. This year to ensure compliance with Section 113, new chapters are added to include reports from each Military Department on their respective funding, military mission accomplishments, core functions, and force structure. Key initiatives incorporated in the FY 2014 Defense budget. Our budget is formulated based on aligning program priorities and resources based on the President’s strategic guidance. This year’s budget involves key themes to: achieve a deeper program alignment of our future force structure with resource availability; maintain a mission ready force; continue to emphasize efficiencies by being even better stewards of taxpayer dollars; and continue to take care of our people and their families. Implementing Defense Strategic Guidance. The FY 2014 budget request continues the force structure reductions made in the FY 2013 budget request. Following...

Words: 74297 - Pages: 298

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762

Premium Essay

About Google

...Juliani Kalangi | Ida Ayu Kartika | international management | “The nonmarket environment and Issues in the google inc.” | DAFTAR ISI Daftar Isi 02 Executive Summary 04 History of Google 04 Google Timeline 05 The vision, Mission and Focus of Google 19 Google Management 19 Uses of Google 28 Market Share 29 Usage Application of Google 29 Share of Advertiser 30 Google For Education 30 Google and User 31 The Google Culture 31 About Google Office 32 Google Workspace 32 Top 10 Reasons to Work at Google 33 SWOT Analysis 33 * Strengths 33 * Weaknesses 34 * Opportunities 35 * Threats 35 * Recommendations 36 Google Product Development Process 37 Google Ethics 37 Criticism of Google 39 Issues in Google life cycle 39 Another Issues in Google 40 Copyright Issues 40 Privacy Issues 41 Why won’t Google be affected by the crisis? 42 How do Google measure success of a new product? 42 Google deal with the host of privacy issues associated with its application 43 Antitrust 44 Google and Antitrust 44 Some spesific activities have been made for anti trust claims 45 The Issues are associated with the launch of Google Health 45 * The look of Google Health 46 * Screen shot deeper on the application 46 * The Issues of google health 46 * Google Response 47 The issues might arise in Google’s ownership of Tianya.cn 47 * What is Tianya.cn? 47 ...

Words: 12601 - Pages: 51

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741