...Ethics in the Government and Public Sector in Electronic Surveillance “Can you hear me now, Yes I can even see you” Embry-Riddle Aeronautical University Abstract In todays society the number of computers, tablets, mobile devices will rise to about 65 billion devices connecting to the internet. That not counting vehicles, household applicances, gaming devices. However, with all of these deveices there is a significant benfit that will make our lives easier and one potential theat that invades our privacy called Geolocational Privacy and Surveillance (GPS). This sometimes hidden or masked feature is colleting our personal information, location and sometimes converstation. Laws have have enmpowered government and companies to collect databases of consumers without our consent. With ongoing technology where does the protection beging and the surveillance stop. Ethics in the Government and Public Sector in Electronic Surveillance In the movie Enemy of the State the lawyer played by Will Smith becomes a target by a corrupt politican who kills a congressman for his unwillingness to help with a new surveillance system with satellites. The politican with the help of National Security Aministration agents to destroy the lawyers life by manipulation thru the internet and surveillance. This movie was produced in 1998 and then the technological devices we have now were not that advanced. Little did we know that would become the norm of everyday life of those who possess...
Words: 1919 - Pages: 8
...Spying of the NSA The past year we all have heard of the NSA spying through social media, phones and all sorts of stuff, we heard of this because of Edward Snowden, an ex CIA- system analyst. He exposed their spying and this has resulted in to a global issue. Because the spying is wrong on so many levels we are here to convince you that what the NSA is doing is wrong. *attention grabber* So now that I have your attention I will continue. Main Point 1: How is it possible that the NSA is spying on civilians? Sub Point 1: What is the NSA; I’m going to begin by telling you a little about what the NSA is. The NSA better known as the National Security Agency is the main producer and manager of the signals intelligence for the United States. The NSA is responsible for the protection of U.S. government. The NSA is tasked with monitoring on targeted individuals in the U.S. But the NSA doesn’t just spy on targeted individuals; they spy on every U.S. citizen, they even spy on world leaders. They can spy on anyone around the world, and they can do this through social media, the internet and phones. I will explain this in more detail later. Ok so now that I’ve talked about what the NSA is, I will tell you guys how it is possible that the NSA is spying on us. Well to begin, the NSA spying program started back when George Bush was the president of the United States, the spying started right after nine eleven, this was in 2001 and that is 13 years ago so consider how long they have...
Words: 1852 - Pages: 8
...Assignment on NSA Edward Snowden Revelations and Congress reaction By ABC Date; NSA Edward Snowden Revelations and Congress reaction 1. NSA Edward Snowden Revelations The first bombs hell story was published on the basis of the top secret documents. This was related to the national security agency who spy on the American citizen. When the story was leaked, it was not mentioned that the treasure trove is based on NSA documents and source was not come in front. After three days, the person has leaked his identity. When the identity was leaked, it is revealed that he is “Edward Snowden”. Some of revelations were in queue and in coming years, explosive stories started to trickle the documents. Some of revelations are following: 1. Sweeping...
Words: 1501 - Pages: 7
...Due to Government’s spying program, more secrets are being held from the citizens. The Government is spying on citizens only to protect them, but really it has not been doing any good to the citizens. And with the spying program that the Government has started, they have begun to overreach its powers and have not stop it. With all, the technology that the Government has for spying the American community expects results, and they are not getting that from the Government. According to an article called the day we fight back, “I asked deputy general james cole how many criminal reasons have been filed as a result of this massive spying operation. His answer? maybe one. And he wasn’t even 100% sure of that.” The NSA has most technology today that most american citizens don't have. They have the government protecting them, but they still haven't captured multiple people, only one, but that is it. The police officer was not even sure if the NSA caught them or not. If the NSA is not producing the results they are over reaching their powers for no reason. If the NSA continues to do spy on the citizens,and not produce results the NSA will be shut down....
Words: 529 - Pages: 3
...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...
Words: 2180 - Pages: 9
...PRISM: NSA’s Loophole As Americans, most are aware to some extent that the government spies on us. Edward Snowden, though he was a criminal, released information about the National Security Agency tracking our every move, giving us a glimpse of the government’s secrets. The NSA reassures us: only high risk citizens have their information collected. But what lies between the lines is the definition of collect. NSA defines collect as having workers physically review the information, not gather the files. Each and every one of our conversations are housed in a database organized by the NSA called PRISM. That conversation with your mom earlier today—recorded. And the email from your boss saying you being laid off, also recorded. Any communication...
Words: 1223 - Pages: 5
...by Dell to work in the NSA (National Security Agency). He started to work in NSA as a contractor with top-secret clearance working for the general government. After that he moved to Hawaii to work at a NSA facility as a Dell employee. In December 2012, He knew Glenn Greenwald, a lawyer and columnist for The Guardian, and in January 2013, he knew the documentary filmmaker, Laura Poitras (Cole & Brunker, 2014). When he knew these people, he began sending them information and he also tried to get a better job in which he had access to more classified information, so he could leak more information. In June 2, 2013, the Guardian published the article about the NSA’s collection of domestic email and telephone metadata provided by Snowden. In June 6 and 8, 2013, the Guardian and the Washington Post published more information about NSA. A final cause is the disclosures made by Snowden to the Guardian. The first one is the most choking since he revealed that Verizon and all the telephone companies in the U.S.A. provided the NSA with phone records of all their costumers. A second disclosure is PRIM, which means that the NSA can ask for user data from companies like Google, Facebook, Microsoft, Apple, etc. A third disclosure is about the British spy agency’s fiber optic cables which are tapped all over the world and intercept data on Internet and the program Tempora which is a name code to call the exchange and sharing of data between the NSA and the British spy agency with the collaboration...
Words: 959 - Pages: 4
...Contrary to what many people may think, online private data and cellphone meta-data is susceptible to snooping by not only government agencies and corporations, but also hackers willing to risk a prison sentence. In 2013, NSA whistle blower Edward Snowden revealed previously unknown details of global surveillance programs run by the United States' NSA in close cooperation with three partners: Australia, the United Kingdom, and Canada. The documents leaked by Mr. Snowden revealed details about the NSA secretly tapping into Yahoo and Google data centers to collect information from millions of accounts worldwide. The shocking evidenced released by Mr. Snowden reveals that lawmakers and politicians should take greater control over how and why they are using their surveillance technologies, and question whether or not the fight against terrorism justifies the use of these surveillance programs on citizens as well. Furthermore, it is important to ensure that there be continued innovation in internet security in order to create services and products which can counter-act the use of these programs on ordinary citizens who don’t want their data accessible to anyone but themselves. Spying agencies are able to cripple the civil liberties and the right to privacy of citizens, therefore it is imperative that the government protect the rights of citizens through reforms on Surveillance Acts, but it is also equally pertinent for citizens take initiative and push for new reforms and innovation...
Words: 1527 - Pages: 7
...NSA Surveillance Program Eric D. Reeves ITT Tech Online MG517 – Ethical and Regulatory Environment Dr. Carrie A. O'Hare June 9, 2013 Abstract/Executive Summary The American people are reaping what they sow. They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week. It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and...
Words: 2521 - Pages: 11
...government that constantly spys on citizens, presents misleading media, and is constantly fighting a foreign enemy. Today in 2016, the United States government spies on citizens through technology, allows a media oligarchy, and is constantly in the midst of a never ending war. The unacceptable actions of the government in Orwell’s 1984 and today are eerily similar, and the...
Words: 1015 - Pages: 5
...Introduction Edward Snowden was born on June 21, 1983 in North Carolina. He was a high school and a community college dropout, who eventually obtained a GED. He was medically discharged from the Army Reserves after breaking both legs in an accident. Snowden studied computers during his two short stints at a community college in Maryland. Soon after, he began working for the National Security Administration (NSA) as a security guard and then secured a high paying IT position with the Central Intelligence Agency (CIA) as a federal contractor. Eventually he landed a job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...
Words: 2005 - Pages: 9
...technology is already in use; the NSA monitors electronic communications in the U.S. and elsewhere. Manipulation has already occurred to people, corporations and governments that did not perform as certain members the of U.S. Government preferred. Businesses and...
Words: 1763 - Pages: 8
...NSA Eavesdropping and Data Mining Table of Contents Abstract..........................................................................................................3 Introduction....................................................................................................4 Literature Review............................................................................................6 Discussion.......................................................................................................13 Conclusion......................................................................................................15 References.......................................................................................................17 Abstract Technology is constantly around us and from this point forward it is never going away not that most of us can remember a time without cell phones but for some of us we can still recall a time when it didn’t exist. Eavesdropping has been a complex endeavor and has been evolving over the years from placing a listening device which had a built in microphone and a short distance transmitter. Now it is complex algorithms that can when completely decrypted give a person or an organization complete information on a person and allow them access into a private life. I say private life when in all actuality we seem to be more responsive to sharing everything with everyone in fact it is a lack of anonymity and of a global pandemic...
Words: 4920 - Pages: 20
...significance of ethics has been expanding quickly. The ethics are morals, qualities and standards utilized by a person to perform one’s own decisions. These qualities are considered by the people for their basic leadership. This paper represents the case study of Edward Snowden who is a defense contractor Booz Allen Hamilton, leaked very confidential information about the activities of USA’s National Security Agency (NSA). In June 2013, Snowden confessed to passing characterized records to columnists at The Guardian and The Washington Post—revealing the details of NSA observation programs that gather and perform information mining on a huge number of U.S. telephone calls and Internet...
Words: 1308 - Pages: 6
...editorial from The Washington Post titled “The NSA must disclose more to make it case”. This article touches on a sensitive topic which has spark out a debate across the country. The article says “the bulk collection of phone ‘metadata’ and call records is a potentially powerful tool that could reveal sensitive facts about nearly every American’s life if abused, and according to the article this practice was disclosed by the NSA’s former contractor Edward Snowden who demands extensive checks to guard against misuse (Washington Post, 2013). According to the article, a taskforce was formed and was to submit a report to President Obama, in their report they would like to see a higher legal standard applied in accessing phone records by government. The report proposed an end to the bulk collection of records, calling on the NSA to approach phone companies and ask for records as when investigators need them on a case-by-case basis. Government officials seemed to open in considering this arrangement but voiced concern that investigative speed may be lost in the interest of privacy protection (Washington Post, 2013) The article argued that for the NSA to make a strong case, it must demonstrate the national security benefit to the program. It further did mentioned of the U.S. District Judge Richard J. Leon who issued an injunction to prevent the bulk collection of the data. His actions gives the government a chance to appeal and he ruled that the NSA phone-records database collection is likely...
Words: 900 - Pages: 4