...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...
Words: 2180 - Pages: 9
...Snowden studied computers during his two short stints at a community college in Maryland. Soon after, he began working for the National Security Administration (NSA) as a security guard and then secured a high paying IT position with the Central Intelligence Agency (CIA) as a federal contractor. Eventually he landed a job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...
Words: 2005 - Pages: 9
...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...
Words: 1691 - Pages: 7
...Edward Snowden is a well-known and infamous NSA whistleblower who leaked several classified NSA documents, most notably PRISM. He revealed everyone around the world about the United States government’s mass surveillance program, and the public had a mixed reaction. On one side, they viewed Edward Snowden as a traitor to national security. On the other hand, others believe he is, like Martin Luther King Jr., a civil rights leader. In my opinion, Edward Snowden is a civil rights leader because like any civil rights leader, there will be those who fear and deny change. While many may think that Edward Snowden started out as a genius, he underwent a fairly rough education throughout his childhood. Born in June 21, 1983, Edward Snowden grew up...
Words: 1007 - Pages: 5
...or things to be seized.” The NSA’s surveillance programs violates the Fourth Amendment by collecting telecommunication data and storing it in a database. The US PATRIOT Act and the Foreign Intelligence Surveillance Act allows the NSA to continue to run these controversial surveillance program today. The United States should end or reform...
Words: 948 - Pages: 4
...As the world’s largest non-alcoholic beverage company, Coca-Cola generates petabytes of data from various sources. Multi-channel retail data, customer profile data from loyalty programs, social media data, supply chain data, competitor data, sales and shipment data from bottling partners as well as transaction and merchandising data. Coca-cola collects vast amounts of data and they take a refreshing approach in exploiting that data and deriving value from it. Chief Big Data Insights Officer, Esat Sezer, explains that Coca-Cola takes a strategic approach instead of a tactical approach with big data. They use the vast amount of available data sets to change the way they approach IT. They have embraced big data technologies and as such were able to create a shared services centre for their financial transactional activities as well as an employee service centre for HR activities. They moved from a decentralized approach to a centralized approach, where the data is combined centrally and available via the shared platforms across the organization. In addition, Coca-Cola has almost 70 million Facebook followers and big data enables Coca-Cola to connect to these followers better and be able to grow the brand advocacy. Coca-Cola also leverages Point of Sales data from companies like Walmart (Walmart alone is responsible for $ 4 billion in Coca-Cola sales annually) to build customer profiles, create centralized iPad reporting across the company and enable Collaborative Planning, Forecasting...
Words: 2706 - Pages: 11
...rather controversial surveillance organization - the NSA. The NSA stores information about everything an individual views that is connected to the Internet and can keep that information for decades for possible later review. “Americans place a high value on privacy. It is generally accepted that a certain core of one's individual and family affairs should be protected against interference, or even investigation, by outside forces—including...
Words: 2230 - Pages: 9
...NSA Surveillance Program Eric D. Reeves ITT Tech Online MG517 – Ethical and Regulatory Environment Dr. Carrie A. O'Hare June 9, 2013 Abstract/Executive Summary The American people are reaping what they sow. They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week. It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and...
Words: 2521 - Pages: 11
...discharged afterward and the only thing the army had to say about Snowden was that “He did not complete any training or receive any awards” (_) After Snowden was discharged he landed a job as a security guard at the national security agency (or better known as the NSA). He somehow moved from a security guard to an IT (information-technology) job at the NSA. As an IT, Snowden would go on to get a job with the CIA in Geneva and would later get land jobs with the companies Dell and Booze Allen Hamilton. With Dell, Snowden was eventually shipped off to Japan and worked as a subcontractor for the NSA and then moved to Hawaii where he worked for Booze Allen Hamilton, another subcontractor for the NSA. Three months into his job at Hawaii Snowden made the biggest decision of his entire life (biography). While working with the NSA at their office in Oaho, Hawaii, Snowden noticed the NSA spying on American citizens via phone calls, emails, and other forms of social media. Unable to handle what Snowden thought was morally wrong, he started copying top secret NSA documents while at work, building a dossier of practices that he thought were invasive on US citizens. Snowden acquired a vast array of damming documents on domestic surveillance practices, including such programs as “Prism” (). “Prism” is probably the biggest revelation about the government’s data collecting capabilities that has been leaked so far by Snowden via the Guardian. The guardian, which is where most of Snowmen’s documents...
Words: 703 - Pages: 3
...from people thinking it is okay to bend rules because they may know a person or are afraid to take a stand and confront someone. What most do not realize is that the rules are there to protect everyone and that it needs everyone to work together to be more efficient. People believe that rules do not apply to everyone all the time that the status of which they have earned gives them the right to skip past certain obligations. The company that Brittney is employed by has gone a step further, we have been provided with badges to get into the main door once we are in there is a receptionist desk. The receptionist is very familiar with the employees and she never hesitates to ask someone to sign in and show proper id. Everything is under video surveillance even the parking lots. In our parking lots and garages there are security guards riding around as long as the building is open for business. For example working in the Little Clinic there are strict HIPPA guidelines so even though employees are in the building a badge will still need to be scanned in to access the department that Brittney works. In this day, technology has expanded there's not very many punch time clocks anymore most...
Words: 1135 - Pages: 5
...News! 1. 6/6/2013 Doug Gross. * Barack Obama believes that there should be internet access in all schools. He wants to provide funds to around 99% of public schools for them to be able to have internet, even in libraries. He says that he wants all American students to be connected online in five years. Usually, adults don’t go for this type of thing they want children to not be so ‘connected’ to the internet. They want kids to not spend so much time on computers, but he almost wants just that to happen. People are becoming way too dependent on computers and the internet, which even libraries are eventually only going to be used just for that. Although Obama is more so moderate, this idea is clearly making him to be a liberal. He wants the change and wants to continue to further the change on technology. 2. 6/8/2013 Maureen Dowd * In this article, she quotes the book 1984. She is talking about how Bush felt about 9/11 and some of the after effects. It turns out that, for seven years the N.S.A was taking information from our phone calls. This all started while Bush was president through a program called prism. Prism would let the F.B.I. and N.S.A. into many social media websites and was able to access all of our information. These people were trying to spot out terrorists, and will go to any means necessary. According to Obama, they necessarily can’t hear the conversations; they are just able to learn about who we call. They also are saying that they don’t...
Words: 4728 - Pages: 19
...planet. The means available to control people’s behavior using financial and digital surveillance manipulation did not exist. These methods are not future science tech - this is a technological reality. The technology exists, standards are being developed and some of this technology is already in use; the NSA monitors electronic communications in the U.S. and elsewhere. Manipulation has already occurred to people, corporations and governments that did not perform as certain members the of U.S. Government preferred. Businesses and...
Words: 1763 - Pages: 8
...For many years, nation’s governments have been monitoring their citizens through the use of surveillance technologies. Initially, privacy concerns involving computer technology arose because citizens feared that a strong centralized government could easily collect and store data about them. For the last decade in the United States, the federal government drastically increased its ability to monitor its citizens due to both changes in its laws and due to advancements in surveillance technologies. Together, the unfolding revelations opened a window into the growth of government surveillance that began under the Bush administration after the terrorist attacks of Sept. 11, 2001, and has clearly been embraced and even expanded under the Obama administration. In 2007, the United States National Security Agency (NSA) even launched the PRISM program. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things. However, just because we are able to do something it is not always the best decision to do so. For instance, is it wise or even ethical for the government to use this level of surveillance on its citizens in its CHIAO 1 broad unrestricted searches for terrorists. Let examine the ethics governmental monitoring from the perspective of a variety of ethical models such...
Words: 1506 - Pages: 7
...and hunted by the NSA for his “crimes”. The biggest issue Snowden faces as a hacktivist is the ability and permission of the content he produces. Yet his goals includepublicity and controversy to draw influence and power of the many who areliberated by the information he shares.Snowden is a symbol to the liberation of social media. He may not realize this due to how people question the validity and how beneficial social media is to our society. Previous to the creation of his Twitter account Snowden was unable to reach his followers on a 1st person basis.Many supporters even took it upon themselves to create support pages and websites to free and lift the censorship Snowden faced. Overnight Snowden's twitter page received 1.1 million followers. This enormous fluctuation of followers goes to show the significance and notoriety he possesses. For Snowden I believe social media is used not to reach his followers, but simply to inspire them through social satire and publicity. Hissocial media serves as a living testimony to the rights he advocates for onebeing limited by government control over Internet content. Snowden's twitter liberates and serves as an active force supporting and helping the hacktivist community.Recently a pardon for Snowden was filed and sent to President Obama. USA today writes “The White House has rejected a petition to pardon NSA whistleblower Edward Snowden, dubbing the former contractor’s revelations about the US government’s surveillance apparatusas “dangerous”...
Words: 938 - Pages: 4
...Security Issues in Legal Context Discussion 5.1: Privacy in the Workplace The Children's Online Privacy Protection Act, which went into effect date, April 21, 2000, affects U. S. commercial Web sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001...
Words: 2799 - Pages: 12