Premium Essay

The Importance Of The NSA (NSA)

Submitted By
Words 653
Pages 3
Since 2001, the United States Government has been spying on your personal life - collecting and storing every email you send, every text message, and most specifically all of your phone calls. The Patriot Act, which was signed in 2001 by President George W. Bush, was a government surveillance act to combat terrorism. The bill was proposed just days after the September 11th, 2001 tragedy, but later officially became a law on October 26th of the same year. With this act, the United States government had control over and spied on too many things in people’s everyday lives. Since the somewhat recent leak by Robert Snowden of the NSA (National Security Agency) activities, many more things that the government has been doing has surfaced. In 2013, Intel CPUs (Central Processing Unit; “the brain” of the computer) were discovered to have a 3G radio on a separate processor built into the existing one. This secret chip was connected to the 3G network and could power on your computer remotely at any time. In addition, this secret chip has its own operating system, so even if the computer doesn’t have one, the chip can still function on its own and collect a plethora of data. The reason for the …show more content…
These planes are operated by the Federal Bureau of Investigation but are licensed to fake companies for the safety of the plane and the pilot. Additionally, it also makes sure suspects on the ground don’t know they’re being watched by the FBI. The aircraft are capable of recording video and cellphone surveillance as well. The plane can identify people on the ground by using technology similar to cell towers. Since June, there has been an account of planes circling in more than 30 cities. In one flight over a city, they can take an account of 40,000 or citizens. This practice of watching the residents is so uncalled for and since it is being done in secrecy makes it even

Similar Documents

Premium Essay

The Importance Of NSA Spying

...the Government. According to an article called the day we fight back, “I asked deputy general james cole how many criminal reasons have been filed as a result of this massive spying operation. His answer? maybe one. And he wasn’t even 100% sure of that.” The NSA has most technology today that most american citizens don't have. They have the government protecting them, but they still haven't captured multiple people, only one, but that is it. The police officer was not even sure if the NSA caught them or not. If the NSA is not producing the results they are over reaching their powers for no reason. If the NSA continues to do spy on the citizens,and not produce results the NSA will be shut down....

Words: 529 - Pages: 3

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...

Words: 2180 - Pages: 9

Premium Essay

Business Model and Stretgic Plan-Part I

...Business Model and Strategic Plan - Part I BUS/475 Business Model and Strategic Plan Part I Importance of innovation “It’s not that people hate change -- although some do, of course – it’s that innovation is so risky, so expensive and more often than not leads to failure, wasted investment and, for some people, a career cul de sac in special projects” (Milligan, & Smith, 2011). Tender Childcare is no different than any other business that needs innovation to prosper in the markets of today. This essay will give information concerning Tender’s vision, mission, and values and how each component is used to facilitate the day-to-day actions of Tender Childcare. The mission and vision statements serve as directions for a business, providing the blueprint for operations and keeping the organization focused on its goals. “These statements serve a dual purpose by helping employees to remain focused on the tasks at hand, as well as encouraging them to find innovative ways of moving towards an increasingly productive achievement of company goals” (Investopedia, 2015). The mission, vision, and value statements also serve as directives that detail what services or goods a company offers to its customers. The competitive advantage, prosperity, and seamless operation of an organization is guided by the mission, vision, and value statements, so creating, spreading, and adhering to these statements is imperative for Tender Childcare. Business Description with Mission Statement ...

Words: 1614 - Pages: 7

Premium Essay

Supreme Court Case Study

...United States, and all calls made to the United States from other countries. The data the NSA received, provided information on the phone number the call was made to and from, the call’s duration, the date of the call, and the time of day. No Financial data, nor content of the calls, were ever obtained by NSA. This action proceeded without a warrant for any of the information provided. In addition, there was no individual suspicion since this was considered “meta-data” or “bulk data collection” of phone records. The vast majority of the data was analyzed by computer programs and never looked at by NSA personnel. Before we delve into an analysis of the court’s decision in this case, it is prudent we first address an important point. Prior to the September 11, 2001 terror attacks, few American’s contemplated a threat to homeland security. Today, the fear of terrorism is ingrained in our daily thoughts. Following the events of 9/11, American’s sense of safety nearly vanished, and the direction, and scope of national security were forever changed. The National Security Administration (NSA), a key governmental counterterrorism agency, is responsible for ensuring national security. With this in mind, we believe that a reasonable person would consider the data obtained through these phone records to be of use to the NSA in stopping future terrorist attacks before they occur. Further, if the NSA were to obtain a warrant based on probable cause to wiretap a phone, the...

Words: 2770 - Pages: 12

Free Essay

Nsa: Surveillance Awareness Project Proposal

...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:​​Dr. Natasha Jones FROM:​Team Underachievers DATE:​​2014-10-7 SUBJECT:​Proposal PURPOSE:​To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses across...

Words: 3481 - Pages: 14

Premium Essay

Rainforest

...and provide an insightful response to each question writing no more than two paragraphs. 3. An example of an excellent response is given for you. | Save and Submit to Dropbox | 1. Save your work as a Microsoft Word 2010 (.docx) file that includes your name, course code, and title in the file name. For example: JaneSmith_MAN1030_Week2.docx. 2. To submit your assignment, go to the Dropbox and click "Submit Assignment." 3. Click on the drop-down menu to select the Week 2: Individual Work basket in the Dropbox. | Objective:Describe the importance of business ethics and social responsibility. EXAMPLE:Find a current article about ethics in business. After reading the article, write a response in which you summarize the article and, in your own words, assess the article. | Example answer:I found an article discussing NSA spying on Verizon, and whether it was ethical for Verizon to disclose that it was providing NSA with all phone records. If the government requests data, I believe that Verizon should be more transparent. Their contracts say they will not disclose your phone records unless subpoenaed and they did. However, I believe that any use of our private phone calls should be communicated to us. Verizon is obligated to protect their customers’ privacy. However, they must also comply with the law. | Example a.: What references, if any, were used to assist you in answering the question? |...

Words: 532 - Pages: 3

Free Essay

Global Economics and the Impact of Whistleblowing

...Table of Contents ESSAY Introduction The importance and understanding of whistleblowing The notion of whistleblowing Whistleblowing – an act of good will Whistleblowing – an act of revenge The role of the government Government whistleblowing How Snowden formed society Introduction Whistleblowing, an act of certain controversy, has provided material for many a discussion. It has filled our newspapers, televisions and radios on a daily basis, since Wikileaks went public with its first act of exposing illegal activity. ‘Whistleblowing’ is a dynamic process involving at least three social actors; the wrongdoer, the whistleblower and the recipient, each of whom takes actions in response to the other’ (Near et al., p 509, 1996), while accepting the associated dangers and risks. Current events relating to Edward Snowden, Julian Assange and Bradley Manning have sparked intense debate throughout the world regarding policy changes, creation of new laws and the conduct of government and corporations. It is widely agreed that whistleblowing exists and happens on a daily basis. Scholars have examined the topic over the years narrowing it down to ethnical divergences or even to how the act of wrongdoing can impact a whistleblower. The importance and understanding of whistleblowing Age has a significant impact on the way an individual perceives...

Words: 3369 - Pages: 14

Premium Essay

Cis 324

...STRAYER UNIVERSITY DR. MARK O AFOLABI RESEARCH PAPER WEEK 10 8/28/13 Explain computer ethics Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important. On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase "computer technology" because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves. A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and...

Words: 1695 - Pages: 7

Premium Essay

Edward Snowden Research Paper

...Following Edward Snowden’s leak about the NSA, or the National Security Agency, there have been questions after questions regarding the privacy of the things people do online. People are fearing that the government and their respective agencies are overreaching in their collection of citizens’ data. The whole topic on its own, raises quandaries; and at times even resentment due to America’s belief in securing their personal data from the government. In today’s highly technological society, surveillance and monitoring do not encroach upon privacy, but rather aid in promoting civil liberties and public security. The NSA’s actions do not infringe on the 4th amendment and stand to be legal in the eyes of the constitution and that of the judiciary....

Words: 959 - Pages: 4

Free Essay

Nsa Spy Programs

...Since the invention of radio, intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy. Overview of Echelon Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows. How it Works Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA...

Words: 5284 - Pages: 22

Premium Essay

Edward Snowden Argumentation Essay

...image of their own importance.” Additionally, author Gordon Chang (2014) has called Snowden a “dropbox,” a holder of information to serve as a “courier” (Chang, 2014). Diane Francis (2013), a writer with the Financial Post, as well as the post written by the editorial board of The New York Times (2014), both refer to Snowden as a “whistleblower” (These two varied written pieces are an enlightenment to the U.S. public, yet The New York Times makes Snowden appear as a “Hero of sorts.” (“Edward Snowden,” 2014) Snowden was not politically correct in his methods, however, as The New York Times reveals, he opened a major “can of worms” to showcase the...

Words: 896 - Pages: 4

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Premium Essay

Week 2 Individual

...NSA Surveillance Source Summaries Summary number one Authors Katyal and Caplan (2008) wrote an article for the Stanford Law Review that strengthens the idea that National Security Agency surveillance programs operating independently of external authorization or even knowledge of the Executive branch has a surprising level of legality based upon the precedence set by former president Franklin Delano Roosevelt. The divulgence of information obtained without authorization from either the sender or receiver was expressly prohibited via the telecommunications act of 1934. The FDR administration interpreted that wiretapping was legal as long as the information was not divulged. Subsequently, many legal battles began and congress as well as the Supreme Court began inhibiting surveillance by the government in favor of constitutional protections and rights. This led to emergence of secretive surveillance by the FDR administration. The Foreign intelligence and surveillance act of 1978 sought to legaly reintroduce surveillance but in most cases required judiciary authorization. There are some exceptions written into the act that allows surveillance but for limited periods of time and/or requiring congress to formally declare an act of war. Previous precedence of the FDR administration and loopholes within the FISA act was basis for the Bush administration to carry on the legacy of unauthorized and unknown surveillance. Likewise, during this administration...

Words: 812 - Pages: 4

Premium Essay

Edward Snowden Propaganda

...The story of Edward Snowden is perhaps the biggest and most famous intelligence breach in United States history. The 29-year-old computer programmer who made headlines in 2013 was working for the National Security Agency through subcontractor Booz Allen in the NSA’s office in Oahu, Hawaii when he became disturbed and uncomfortable with some of the NSA’s data. He began collecting top-secret documents regarding NSA domestic surveillance practices. These documents confirmed unsettling spy activity against American citizens. The story of how Snowden fled the U.S. and leaked the documents to the press is shocking and exciting, like something only seen in movies. After watching a Frontline report on the story, a TED Talk with one of the reporters...

Words: 1117 - Pages: 5

Premium Essay

Maritime Students

...Importance of Internet Access among NSA Batch 17 Onboard Trainees Intro Rationale why did you conduct this research? What purpose does it serve? What good could possibly come of it? Theoretical background (RRL) Statement of the problem Significance of the study Write down how this study will possibly help or benefit another person or persons. Researchers may find the findings useful as …………… This study will encourage them to …………… It will also serve as basis in the study of ………… This study will contribute to ………… The study will provide ……….. This study can help boost the ……….. Through this study, students will become aware of ………. The results of this study will provide some insights and information on how they….. Research methodology Research design True experimental design is regarded as the most accurate and used form of experimental research, it tries to prove or disprove a hypothesis mathematically , with statistical analysis. For some of the physical sciences, such as physics, chemistry and geology, they are standard and commonly used. For social sciences, psychology and biology, they can be a little more difficult to set up. For an experiment to be classed as a true experimental design, it must fit all of the following criteria. Groups must be assigned via random sampling. There must be a control group. Only one variable can be manipulated and tested. It is possible to test more than one, but such experiments and their statistical analysis...

Words: 275 - Pages: 2