SlideShare a Scribd company logo
1 of 38
Download to read offline
The Security Agency Nsa ( Nsa )
In early June of 2013, all the main broad casting channels broke the story that the National Security Agency (NSA) was "spying" on United States
citizens, and that communication in the U.S. was not private. Edward Snowden, formerly worked as a technical contractor for the NSA at the time,
gave the media the information for the story. At the time of the release of the story, Snowden was in Hong Kong. This trip was a deliberately planned
in order to keep himself from being immediately incarcerated in the United States. The NSA's surveillance efforts were increased after the 9/11 attacks,
and have allegedly kept growing since then (Gross, 2013). Whether the surveillance was in unconstitutional guidelines is something that is up for
discussion now that the leaks have uncovered the degree of the surveillance that is, and has been, taking place. Other NSA Contractors state that the
Constitution has been violated, but spokespeople from the NSA state that they are not "listening in" on conversations entered into by the average
American, nor are they reading emails or other correspondence (Gross, 2013). The argument in the media and society concerning the NSA security
leak is fixated on whether Edward Snowden is a hero or a traitor, but in order to make a judgement on that, one has to comprehend what Snowden
actually did and how it affects society and the government.
1
The National Security Agency is part of the United States Department of Defense. It is a cryptologic intelligence
... Get more on HelpWriting.net ...
Trial & Terrorism : The Implications Of Trying National...
Trial & Terrorism: The Implications of Trying National Security Cases in Article III Courts, Lewis A. Kaplan, 8 J.NAT'L SECURITY L.&POL'Y___
(forthcoming 2015) http://jnslp.com/2015/10/14/the–implications–of–trying–national–security–cases–in–article–iii–courts/ Explanation: This paper
summarizes the article written by The Honorable Lewis A. Kaplan, U.S. District Judge for the Southern District of New York, which addresses the
controversy between trying suspected terrorists in military tribunals verses Article III courts. He is in favor of trying terrorist cases in Article III
courts as it has been done successfully for more than 20 years. Case examples he gave for trials prior to 2009 included suspects from the first and
second World Trade Center attacks tried in 1993 and 1997. Other cases involved plots to blow up buildings, tunnels and bridges, and American
airliners. Those trials all took place before Usama bin Laden issued the fatwa for Muslims to kill military and civilian Americans. Since then we have
had multiple trials in Article III courts. There were several trials from the 1998 U.S. Embassy bombings and the trial of Bin Laden's son–in–law. All
the cases were tried without a circus atmosphere or security so intense that it shut down lower Manhattan. Trials for terrorists were non–events until the
government planned to try Khalid Sheikh Mohammed for the 9/11 attacks. The issues in contention are 1) the use of defendant's statements and how
they were obtained; 2)
... Get more on HelpWriting.net ...
Essay Freedom of information indonesia
LEGAL PROPOSITION ON THE PUBLIC FREEDOM OF INFORMATION OF INDONESIA
By: Adistra Kusuma Waligalit, Faculty of Law of Gadjah Mada University
This study identified several Legal defects regarding the Act on Public Freedom of Information of Indonesia. These legal defects will be explained
along with the reccomendations of remedy as below.
INTRODUCTION
After experiencing a difficult time in New Order era (1966–1998), when the civil rights to freely obtain information had been abused by the
government at that time, a glimmer of hope emerged when the government enact a new Act regarding Public Freedom of Information in 2008 (Act
number 14). But just as too good to be true, the hope was only short lived. It seemed that the government is ... Show more content on Helpwriting.net ...
One of the notable use of this rule is the "thirty year rule" by the law in United Kingdom, where the government will publicly release the cabinet
papers after thirty years they were created.
Executive Order 13526 imposed in United States is an example of a provision that handles classified informations.
SECOND: Unclear definition of public entity.
Public entity is a body that obliged to give the informations to the public. In article 1 of Act number 14 year 2008, it is mentioned that the definition of
public entity is an institution of executive, legislative, judicative, and other institutions with the function relating to the state administrative or
non–government institution of which receives budget from the state or from donation.
The definition of public entity given by the article is very broad and blur. It will only obscuring the purpose of the existence of public service. The act
itself does not regulate about the obligation of any private business entities that is under contract with public entity, considering many cases occured
because of private entities claim to acting on behalf of the government to obtain certain legal permit.
This is the fundamental weakness of the act where it does not clearly regulates the subjects of the law and still lacking further explanation regarding the
public entity. Without it, people will be very hard to obtain informations from the
... Get more on HelpWriting.net ...
Sensivite Items
Accountability What is accountability? An obligation imposed by law, lawful order, or regulation of an officer or other person of authority for
keeping accurate record of property, documents, or funds is the best answer I can think of. Now the person having this obligation may or may not have
actual possession of an item they are accountable for, sensitive item. Accountability is concerned primarily with records, while responsibility is
concerned primarily with custody, care, and safekeeping. What does accountability mean to the Army? Accountability is a very important part of an
enlisted soldier's job. An enlisted soldier is responsible for a lot of items issued to him/her whether it's a weapon, night vision goggles, clothing that...
Show more content on Helpwriting.net ...
If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and
classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by
being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves
and anyone involved with the mission and still maintains operational security. Operational security can be compromised through the loss of sensitive
items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being
classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld
from general circulation for reasons of national security) are CONFIDENTIAL (unauthorized disclosure could damage national security e.g.
compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized
disclosure could seriously damage national security) and TOP SECRET (again unauthorized disclosure could severely damage national security to a
more severe degree). With the release of information deemed classified by the government to persons unauthorized
... Get more on HelpWriting.net ...
Report On The Happenings Provided By Professor Slater 's...
Based on review of the happenings provided by Professor Slater's presentation, the largest data breach in US was caused by Snowden when he was a
contractor. He acquired classified information in terms of the NSA surveillance programs which he later on used to publish on the major newspapers
for awareness to media. Shortly after he was found that he disclosed information, he seeked refuge in Russia. But apparently upon reading of different
articles, it looks like there are
2.What he did? How he did it?
There were several multiple methods that he was able to use including social engineering as well as finding the weakness in certain control areas. There
was several communications with newspaper reporters from different methods such as ... Show more content on Helpwriting.net ...
If the information was to be in any relation to terrorism, any US citizen would understand the severity especially after the 9/11 event. But without any
relation to any terrorism, it basically means that the US government is spying. This is a controversial topic that brought confusion.
To those supporters of NSA, there has been much controversy since the fact that exposing what they believe in is being revealed, but the degree of
privacy exposed from innocent people is quite radical considering, there are even resumes and transcripts from children. Not to mention the fact that
perhaps if you have any children and had pictures of their cuteness taken in the bathtub, these photos can be leaked to anyone is quite horrific. Although
he used breaches to disclose information in regards to allowing the public to know the state of NSA, the information he has passed on to the public is
quite informative.
5.How will this affect the NSA and U.S. National Security?
Because of the severity and detail of the data breach in terms of surveillance programs, is it a fact to say that other countries will know how the US
National Security controls are run. The NSA & US National Security are left to redefine, redetermine, restructure and reimplement every security
program that they have since the secret is no longer a secret. Not only will they focus on re– establishing their controls externally but
... Get more on HelpWriting.net ...
Snowden And The United States
Unless you were hiding beneath a rock in 2014, you saw the nation's reaction to the release of classified NSA documents by the infamous whistleblower
Edward Snowden. Snowden, who worked as the lead technologist for Dell, managed their accounts with the Central Intelligence Agency. It was in this
position that Snowden began to notice some classified documents that didn't make sense. These documents contained information on the National
Security Agency illegally spying on their own citizens. It was at this time in 2012 that Snowden began downloading some of these files for himself. It is
estimated that he downloaded somewhere between 50,000 and 200,000 files on the espionage efforts of the United States (Borrough, Ellison, Andrews,
2014). Now, Snowden needed to get the files out to the people. He attempted to contact a few media outlets around the world who would not go
through the trouble to follow his strict encryption methods. Snowden eventually contacted documentarian Laura Poitras, who had recently written an
article on a separate whistleblower that caught Snowden's attention. Poitras states in an interview with Salon.com that, "...he'd contacted me because
my border harassment meant that I'd been a person who had been selected. To be selected –and he went through a whole litany of things – means that
everything you do, every friend you have, every purchase you make, every street you cross means you're being watched" (Carmon, 2013). This connect
lead to Snowden being
... Get more on HelpWriting.net ...
Identifying Requirements For High Level Policy Makers
Phase One – Identifying Requirements
1.High level policy makers are not only concerned with intelligence; they are constantly concerned with reelection. A policy maker who is
identifying requirements could decide to focus resources on an issue that is less vital to the nation's security in order to obtain information that will
get them reelected. High level threats could be pushed to the side in order to address an issue that is not necessarily as vital but is a hot topic in news
media, and public opinion. This would be followed down by the intelligence community and the more dangerous area or individual threat could be left
unmonitored.
2.Often briefings and communication between high level officials and analysts are hectic times and communication of requirements could not be
communicated clearly. Apolicy maker giving feedback on collection objectives or asking questions could be perceived by the intelligence official as
requesting more information when really that policy maker has enough information to make a decision. This is an issue when two people come from
different backgrounds and use different phrasing, objectives could be easily misunderstood. Time and resources would then be wasted to gather
intelligence on issues that are no longer relevant.
3.Officials in the intelligence community often faced with new policy makers or those with differing views from those in the intelligence community
could decide to ignore or alter requirements to suit their own
... Get more on HelpWriting.net ...
Essay on Government Secrecy
Ashley Simons "Secrecy and a free, democratic government don't mix," President Harry Truman once said. Harry Truman understood the importance of
an open government in a free society. Unfortunately, George W. Bush has a different outlook. From the first days of his administration, President Bush
has taken steps to tighten the government's hold on information and limit public scrutiny of its activities. Expansive assertions of executive privilege,
restrictive views of the Freedom of Information Act, increasing use of national security classification, stonewalling in response to congressional request
for information В– all these were evident even before the September 11 attacks (At Issue: Has the Bush administration misused government... Show
more content on Helpwriting.net ...
The В‘secret' designation referred to information in which its disclosure might endanger the national security, or cause serious injury to the interests of
the nation or be of great advantage to a foreign nation. Similarly, В‘confidential' could be applied to material of such a nature that is disclosure,
although not endangering the national security, might be harmful to the interests or prestige of the Nation. The term В‘restricted' is used in instances
where information is for official use only and should be denied access to the general public. According to an analysis released in August, 2005, by
OpenTheGovernment.org, more and more government information is becoming less and less publicly available. OpenTheGovernment.org is an
unprecedented coalition of journalists, consumer and government groups, environmentalists, labor and others united out of a concern for what U.S.
News and World Report called a "shroud ofsecrecy" descending over our local, state and federal governments (Gordon 35). This organization focuses
on making the federal government a more open place to make us safer and strengthen the public trust in the government. In its Secrecy Report Card,
OpenTheGovernment found that the government spent $7.2 billion last year creating 15.6 million new classified documents and securing accumulated
secrets В– more than it has for the past decade (1). The increasing secrecy is expensive to maintain. The U.S. government
... Get more on HelpWriting.net ...
The Freedom Of Speech : Yellow Journalism
Rome, which was one of the strongest ancient empires, worshipped a god, Janus. Romans believed that Janus protected their beginnings, gates and
time; in particular, Janus was the male with two faces (Martin, 2012). Similarly, freedom of speech is Janus with two faces reflecting freedom and
limit. According to Canadian Charter of Rights and Freedoms, Canadians are free to think their own thoughts, speak their own minds, to gather
peacefully into groups and to associate with whomever they wish, as long as they do not infringe valid regulations which protect the right and interests
of others (Canadian Charter of Rights and Freedom, 1982). Therefore, in a democratic society, the freedom of speech should be properly regulated to
prevent yellow journalism, to protect sensitive state secrets from abuse and to promote a high quality of speech based on responsibility.
The regulated freedom of speech prevents yellow journalism. Yellow journalism is the style of journalism which features scandals, sensationalism, and
unethical or unprofessional practices by news media or journalists without any regulations (Holtz–Bacha and Kaid, 2008). For instance, according to
Tom Conner (2014), the Dreyfus Affair of 1894 was an anti–Semitic political scandal in France; it involved the false accusation of a Jewish French
artillery officer named Alfred Dreyfus for leaking secrets to the German army. In particular, the usage of yellow journalism would inaccurately produce
powerful articles without any
... Get more on HelpWriting.net ...
Military Police Blotter Report
Abstract
A Blotter report is a daily chronological record that is maintained within the military facility. Activity will be maintained using Army Corrections
Information System. (ACIS). Facilities without ACIS will prepare the daily report using DA Form 3997 Military Police Desk. The facility blotter will
provide a record of activities at the facility including all incidents. Admissions and releases from confinement, to include temporary releases. Any other
information deemed of value by the facility commander. All actions inside the visitor's record of the prisoners at the facility will contain the date, name
of visitor, time in, time out, address or organization, Prisoner visited, Relationship of visitor to prisoner at the local ACIS.
Keywords: ... Show more content on Helpwriting.net ...
AR 380–67, the unit Security Manager will complete one of the following options: Send a copy of the offense along with the commander's
recommendation (suspend or not suspend access, informal or formal suspension, and the action the commander is taking) The Army Corrections
System. (2006). The Brigade S–2 will process the DA Form 5248–R and forward to the Central Clearance Facility through JPAS. Informal Suspension
is local suspension until the Commander can gain a resolution of issues and make a determination. However, if CCF determines that it is in the best
interest of national security to suspend the individual's eligibility for access to classified information pending adjudication by CCF, then the individual
clearance will be formally suspended. Formal Suspension is accomplished through formal recommendation to CCF through JPAS. Once this is done,
the commander may not restore access until a final favorable determination by the Commander of CCF. Subsequent to the submission of the initial DA
Form 5248–R, supplemental reporting is due to the Brigade S–2 at intervals not exceeding 60 days until all local actions have been resolved. The Army
Corrections System.
... Get more on HelpWriting.net ...
Edward Snowden
The Resonating Ring of A Whistle Blower Nathan Sharp COLL148 June 7, 2015 Julie Vanorny DeVry University The Resonating Ring of a Whistle
Blower I.Introduction A.Attention–Getter/Hook – Everywhere you go, everything you see, when you are surfing on the web you are being recorded,
every click is stored in a database, and that's only if your just using a search engine. When you are using a social networking site and you send
someone a chat message, it stores your IP address of where the message was sent from, essentially telling Facebook, marketers to whom your
information is sold, and the other person where you are. B.Background: The project that I have chosen is to make the viewer aware that they are
vulnerable on the... Show more content on Helpwriting.net ...
V.Your own leadership qualities and success traits A.Your personal strengths as a leader (based on assessments in course) * 1.What you learned about
yourself from these assessments 2.How these strengths can help you be successful 3.Your plan for employing these strengths B.Your areas of
weakness that may get in the way of your success * 1.The positive changes you need to make in order to resolve weaknesses 2.Your plan for resolving
these weaknesses VI.Conclusion A.Identify and re–state the main idea B.Wrap up your ideas C.Provide a specific action step you will take to continue
your journey to success References TOXEN, B. (2014). The NSA and Snowden: Securing the All–Seeing Eye. Communications Of The ACM, 57(5),
44–51. doi:10.1145/2594502 PREIBUSCH, S. (2015). Privacy Behaviors After Snowden. Communications Of The ACM, 58(5), 48–55. doi:10.1145
/2663341 MOORE, M. (2014). RIP RIPA? Snowden, Surveillance, and the Inadequacies of our Existing Legal Framework. Political Quarterly, 85(2),
125–132.
... Get more on HelpWriting.net ...
Wikileaks : A Project Of The Sunshine Press
In late 2009 and early 2010, a not for profit website called WikiLeaks posted classified US military documents showing all of the mistakes made by
the US military and its soldiers in Iraq and Afghanistan. WikiLeaks does so much more than just release classified documents about the US military;
they are no different from the New York Times in that "WikiLeaks is a project of the Sunshine Press" (Assange). WikiLeaks is an international online,
non–profit, journalistic organization that publishes leaks (documents the public is not supposed to see) to its website for other news agencies to use.
Some believe some that WikiLeaks is for the wellbeing of society: the resource exposes incidents that citizens have never seen. Examples of these
shocking stories include: "corruption in the government of Kenya, brutality at the US detention center at Guantanamo Bay, and systemic failures
behind Iceland 's massive bank collapse in 2009" (Berger). WikiLeaks has shown the world some of the corruption that is hidden from the public. On
the other hand, others say that WikiLeaks is a terrorist organization that should be shut down, for example, government officials and advocates who
believe in hiding information from the public. Terrorism has completely changed over the years and now it means "Terrorism does not only apply to
physical attacks, but also to cyber–attacks that intimidate and threaten by means of coercion" (Castaldy). The public most of the time believes that
anything that
... Get more on HelpWriting.net ...
Freedom Of Speech : The United States We Enjoy Many Freedoms
In the United States we enjoy many freedoms. There are many place throughout the world that don't allow you to live your life with the flexibilities
that a United States citizen may possess. These right are given by the Unites States constitution has made this country become pioneers of innovation,
and cultural development. Having a right to express yourself and your ideals have made this the home of immigrates with the ambition to develop
into major contributors in modern society. One freedom we enjoy, I would like to discuss in this paper is freedom of speech. Freedom of speech is
one the world's most sort after rights but as of lately it has been under attack stating it may cause national security issues. In this paper we will look at
the development of the First Amendment and how newly enacted laws that will cause the government to label people or groups enacting this rights as
extremist.
The founding fathers of this nation didn't always have this luxury of right. In the colonial era freedom of speech was a notable freedom granted that
many nations didn't have at that time. With Europe in the struggle for dominance and absolutism being overthrown with democracy, the populous
struggled to have their voice heard. The masses was censored in many cases with the threat of death or imprisonment. In the United States, it was an
inalienable right to be heard and offer differences of opinion. But during this time United States citizen had limitations on this freedom as well. It
... Get more on HelpWriting.net ...
Essay On Whistleblower Protection Act
Whistleblower Protection Enhancement Act of 2012
Introduction
Often the debate arises of whether human–beings are born with an innate sense of "right–from–wrong" and most often the consensus is, yes. The later
question might then be, what makes a person question doing the right thing? In the reality of someone who may be labeled a "whistleblower,"
apprehension to report wrongdoings may reasonably come from fear of retaliation. Particularly when the wrong–doing is occurring within the federal
government and/or secret intelligence community. Who will stand up to these powers and what protection can policy afford those that take the ultimate
risk in "doing the right thing" by unveiling the crimes of waste, fraud, and abuse within our government ... Show more content on Helpwriting.net ...
[R–IA], C. (2015, July 30). Text– S.Res.236 – 114th Congress (2015–2016): A resolution designating July 30, 2015, as "National Whistleblower
Appreciation Day". | Congress.gov | Library of Congress. Retrieved from https://www.congress.gov/bill/114th–congress/senate–resolution/236/text
Kasner, A. J. (2015). NATIONAL SECURITY LEAKS AND CONSTITUTIONAL DUTY. Stanford Law Review, 67(1), 241
–283. Retrieved from
https://nuls.idm.oclc.org/login?url=http://search.proquest.com.nuls.idm.oclc.org/docview/1661722557?accountid=25320
Lohman, A. (2015). SILENCE OF THE LAMBS: GIVING VOICE TO THE PROBLEM OF RAPE AND SEXUAL ASSAULT IN THE UNITED
STATES ARMED FORCES. Northwestern Journal of Law and Social Policy, 10(1), 230
–279. Retrieved from https://nuls.idm.oclc.org/login?url=http:/
/search.proquest.com.nuls.idm.oclc.org/docview/1667167592?accountid=25320
Lucas, G. R. (2014). NSA management directive #424: Secrecy and privacy in the aftermath of edward snowden. Ethics & International Affairs, 28(1),
29–38. doi:http://dx.doi.org.nuls.idm.oclc.org/10.1017/S0892679413000488
Meyer, D., & Berenbaum, D. (2015). THE WASP'S NEST: INTELLIGENCE COMMUNITY WHISTLEBLOWING & SOURCE PROTECTION.
Journal of National Security Law & Policy, 8(1), 1–49. Retrieved from
... Get more on HelpWriting.net ...
Information Sharing in the Army's Contemporary Operational...
The potential of providing information or sharing information with agencies or personnel without proper authorization can be detrimental to the
mission and the personnel involved. Working in a Joint/Combined nature of the Contemporary Operational Environment (COE) leads to numerous
considerations of security when it comes to information sharing and intelligence productions. COE is the combination or current and near term
operational environment variables with capabilities. It is based on the composite of potential adversaries in order to create a wide array of conditions
necessary for full spectrum training and leader development. Sea, land, air, and space make up the COE in both the physical and technological aspect
(Headquarters ... Show more content on Helpwriting.net ...
These differences lead to difficulties in interpretation of the information shared and the products that are disseminated.
The Army uses Army Regulation (AR) 380–5, Department of the Army Information Security Program, as the main information classification and
procedure guide. Tactics include training on a continuous basis, ensuring that personnel records are up to date, and keeping guidelines such as a
tactical standard operating procedure (TACSOP) and mission essential task list (METL) to follow. For example, the Army carries out a ground
mission (Combat Arms) and is structured in such a way that each Brigade is self–sufficient.
The Air Force is responsible for air assets, to include fighters, equipment/personnel transports, and Unmanned Arial Vehicles (UAV) to name a few.
They are also broken down into mission units and have their own support system and intelligence units. Their primary mission is to provide support to
the Army.
The Marines and Navy mission focus is the sea or ocean. They also work in support of the Army; however the Marines do have their own Infantry and
can conduct operations similar to the Army Infantry. Mission, structure, tactics, and security requirements receive a great portion of attention when
conducting information sharing operations in the Joint COE.
Commanders and Intelligence Officers, must have a good
... Get more on HelpWriting.net ...
The Reality Of Cyber Terrorism 2010 : How It Happened And...
Davis, M. in his Stuxnet: How It Happened and How Your Enterprise Can Avoid Similar Attacks, indicated that another case example of SCADA
systems being attacked was the cyber–attacks conducted in 2009 and 2010 when the worm referred to as Stuxnet was used. This worm was primarily
directed at Iran in their nuclear facilities and was mainly for disruption of their processing mechanism in their enriched uranium deposits industry.
Piggin, R. in his journal The Reality of Cyber Terrorism 2010, stated that the whole idea behind the Stuxnet worm was in reprogramming the systems
in a way that would result in the plant sabotage and somehow hide the changes that would be made from the users and programmers in Iran. As
explained earlier, one crucial flaw of these type of cyber–attacks is the potential that the government or company will be unable to detect the resultant
damages from such attacks therefore, will not be in a position to effectively counter the attack and the damage that results from it. Henry, W., Jacob, S.
and Eric, T. in their Pearl Harbor 2.0: When Cyber–Acts Lead to the Battlefield 2010, indicated that many of the U.S cyber–attacks seem to be
originating from China, however, a connection has never been proved as to whether these attacks are sponsored by the state but it is believed that
Chinese patriots could be behind the attacks being witnesses on most of the websites belonging to Americans for so long now. The motivation drivers
that influence China to conduct
... Get more on HelpWriting.net ...
Wikileaks : A Non Profit International Organization Essay
WikiLeaks, is a non–profit international organization. The objective of this organization is to publish private information and new to the public and
also categorize the information from anonymous origin. It has been over a decade now that the website WikiLeaks has published online a huge number
of classified documents and other materials and that have uncovered the internal information of the major country agencies like National Security
Agency, the U.S. military and State Department and even the Democratic National Committee. We all know that their founder, Julian Assange
WikiLeaks has possessed the capacity to keep posting classified material from U.S. and also the other countries ' diplomats and authorities regardless
of various cyber assaults against the Websites and the abandonment of key service providers is a touch of Internet cunning ordinarily conveyed by
legitimate and criminal online organizations to shield themselves from activity spikes and from being closed down. Such is the steadiness of
information in the Internet Age. 1. How does the First Amendment protect WikiLeaks from prosecution? With over 250,000 classified documents of
U.S diplomatic published on their site. Especially, diplomats used to gather individual data, for example, account number, email, charge card number
and it additionally publish lot of U.S armed force secrets. The U.S government attempted to indict WikiLeaks to stop news leak in future. But, the first
amendment law of United States is
... Get more on HelpWriting.net ...
Security Vs. Privacy : Should Edward Snowden Be Pardoned...
Security vs. Privacy
Should Edward Snowden be pardoned for leaking thousands of classified NSA documents?
An analysis of the merits of the Snowden leaks and the broader issue of security vs. privacy and mass surveillance from the perspective of at least two
ethical theories.
Following the terrorist attacks on 911, President George W. Bushsigned into law The USA PATRIOT Act
. Intended to enhance law enforcement
investigatory tools, The Patriot Act the made changes to surveillance laws that enabled the U.S government collection of computer information about
both American and foreign citizens. During the following years through a series of legislative changes and court decisions The United StatesNational
Security Agency was gradually granted the authority to collect information on a massive scale and to implement programs such as PRISM, which
collects internet communications from at least nine major US internet companies such as Google, Facebook Yahoo and Apple , XKEYSCORE which
gave the NSA the ability to secretly access databases containing emails, online chats and the browsing histories of millions of individuals, MYSTIC
which allows to collect the metadata as well as the content of phone calls from several entire countries, as well as many other programs with similar
mass surveillance capabilities . To put it in simple terms this, together programs essentially enables almost unlimited surveillance of anyone and
everyone anywhere in the world regardless of that
... Get more on HelpWriting.net ...
Why Should Your Government Keep Secrets?
Why should YOUR Government keep secrets?
In the United States of America, there are 318.9 million people living within the 50 states, and out of those 318.9 million, nearly 5 million have some
type of government security clearance. Some citizens of the United States believe the Federal government should release these classified documents to
the people; however, the government should not release them because it would cause pandemonium among the people of the United States, lead to
irrational thinking, and these documents would impede the order of the Federal government. The United States of America is one of the many
democracies around the world. Being a superpower, the United States has a lot of influence on nations worldwide; furthermore, all governments need to
keep certain documents out the hands of people who could potentially mutilate the government and what it stands for. For example, during the Michael
Brown trial, authorities televised the shooting which initiated complete anarchy throughout one small city in Missouri; imagine what a leaked
classified document could do to an entire nation? Potentially cause violent protests in many major cities such as New York, Atlanta, San Francisco, or
possibly in the heart of our nation, Washington D.C. One man by the name of Edward Snowed, who was at one time an Intelligence Contractor for the
Central Intelligence Agency, released classified information because he believes the people have the right to know what kind of
... Get more on HelpWriting.net ...
Snowden In Citizenfour Analysis
The picture painted of Snowden in Citizenfour is that of a calm and honest man whose actions were for public service. While this may very well
have been the case, the documentary doesn't speak much of the fact that Snowden disclosed highly classified information without any authorization,
which is criminal in nature. If Snowden selected said files that were illegal in nature to expose, the mass file dump that ensued could have been
avoided. Snowden stole well over a million intelligence files and provided complete access to Glenn Greenwald without knowing how he'd use the
information. In the end, Greenwald only decided to publish 4 of the 41 slides of a single relevant file to the general public. Even though he did
manage to expose illegal
... Get more on HelpWriting.net ...
Edward Snowden Hero
Edward Snowdeb is being called a traitor for bringing secret government programs of them spying on the American people and actively breaking the
American people's rights. Edward Snowden should be called an American hero because he brought to light government secret programs, acted
courageously, and caused the government to realize they cant do whatever they want. Snowden was a former CIA technical assistant, and more
recently worked for the NSA as a defense contractor at Booz Allen Hamilton (Rowen, 2014). Because this company had a contract with the NSA there
was always secrets flowing into this business 24/7. In June 2013 Mr. Snowden meet with two journalists at Hong Kong to talk about the information he
had on the NSA. What these classified... Show more content on Helpwriting.net ...
He gave up his personal freedoms to inform the American people about these policies and secret programs the NSA is operating. I feel that his
bravery truly shows how good of a person he is. He understood from the beginning when he leaked out the NSA revelations that he would have to
live scared, and always watching his back. He had a awesome career making $200,000 a year, living in Hawaii with his girlfriend, and a family that he
loves (Greenwald, 2013). "I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet
freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building"(Greenwald, 2013). Snowden
currently is in hiding in Russia with Russia's permission to be there, Snowden is facing criminal charges against him if he returns to the United States.
Federal prosecutors have charged him with three felonies; theft, "unauthorized communication of national defense information" and "willful
communication of classified communications intelligence information to an unauthorized person" (Finn, 2013). Which two of the felony charges fall
under the 1917 Espionage Act (Finn, 2013). When asked, "Even with all these heavy charges you still don't regret his decision"? he said, "Absolutely,
not" (Snowden at SXSW, 2014). Even though the Government has
... Get more on HelpWriting.net ...
Insider Threat
The purpose of this document/plan is to initiate an Insider Threat Program within ECI.(ECI has created this policy/ guide to provide employees as well
as the entire company with a solid directive on Insider Threat).
Overview
ECI was established in 1996. To date, ECI has no security violations within the company. The ECI headquarters is located in Frederick, MD and has
been since its conception. Currently, ECI does not house any classified material, documentation or networks. As a government contractor, ECI employs
its staff with work locations designated based on the contractual agreement. All of ECI's contractual work (classified) is completed on site within a
SCIF environment or within government spaces.
ECI Insider Threat Policy ... Show more content on Helpwriting.net ...
This information will be shared with internal workface, senior official, and internal staff to include, Security, HR, Information Systems Administrator.
The internal groups will meet to review documentation, interview key personnel, review processes and security issues. The team will focus on
prevention, detection and response strategies. Discussion and review practices will include the review of policies, procedures and technologies along
with potential vulnerabilities. ECI will understand the assessment and provide the outcome information to all Security offices as
... Get more on HelpWriting.net ...
Opposition to Leakers
Are government whistleblowers acting in the public interest, or do they endanger the public by exposing classified information? Just as government
transparency has waned in recent years, there have been several instances of very public national intelligence whistle–blowing. Large scale leaks such
as those published by The Guardian and WikiLeaks have prompted debate on issues of government secrecy, as well as the balance between security and
liberty. High profile whistleblowers like Bradley Manning, Julian Assange, and Edward Snowden have, at great personal risk, leakedclassified
information to the public in the interest of transparency. Leaked media and documents range from embarrassing, to potentially dangerous. Heightened
levels of ... Show more content on Helpwriting.net ...
New York Times reporters James Risen and Eric Lichtblau were awarded the Pulitzer Prize; Drake was indicted under the espionage act (Wise). The
NSA came under scrutiny again in 2013 when Edward Snowden revealed large scale data collection and surveillance programs.
As history can attest, government whistleblowers act honorably for the greater good despite threat of prosecution. Government transparency,
especially in acts of war, is important to a functioning democracy. J. William Leonard, former US classifications czar, In the documentary We Steal
Secrets: The Story of WikiLeaks, illustrates, "To have those types of decisions, those types of deliberations, done in secrecy is a tremendous disservice
to the American people – because these are things being done in their name – so, whether you agree with them or not, to have a free back–and–forth
airing of these is essential". In support of these concepts, those behind WikiLeaks and other government leaks have taken great risks. Birgitta
Jonsdottir, member of WikiLeaks and Icelandic parliament, stated, "We were working on something that we knew that could get us into serious trouble
and we were all willing to take that consequence" ("We Steal Secrets"). In We Steal Secrets, instant messages between Bradley Manning and the man
who eventually turned him in, hacker
... Get more on HelpWriting.net ...
Chelsea Manning Research Paper
There is perhaps no whistleblower in the United States more well–known than Chelsea Manning. A hero to some, her leaks have been credited as being
a catalyst for the Arab Spring, exposing the support of the US government for corrupt dictators all throughout the Middle East. She is also credited for
exposing the misdeeds of the US military in its campaigns in Iraq and Afghanistan. She also has a large number of detractors, many of whom claim her
leaks endangered the national security and foreign policy interests of the United States. Some go so far as to call her a traitor – an allegation so serious
that there have been calls for Manning to be executed. It is not surprising that the person responsible for the largest leak of classified intelligence in
the history of the United States would be a very controversial figure. This essay will explore the life of Chelsea Manning, the classified material that
was made public as a result of her leaks, and her eventual arrest and imprisonment. Upon close analysis, it can be shown that while Manning leaked
classified material in an improper manner, the American people have a ... Show more content on Helpwriting.net ...
Born the son of two alcoholics, Manning's older sister claims that their mother drank during her entire pregnancy with Chelsea. Manning says she
had a very difficult childhood, with two alcoholic parents who did little to care for her, and depression due to what she would later identify as gender
identity disorder. Her parents divorced in 2000, and in late 2001 she and her mother moved to Wales, where her mother was originally from. Manning
says she was bullied extensively while attending school in Wales. The other students teased her relentlessly for being overly feminine acting, as well as
being the only American in the school. In 2008, Manning graduated high school and returned to the United States and moved in with her father and
... Get more on HelpWriting.net ...
The NSA: The Pros And Cons Of The NSA
Many of the NSA's goals have been completely contradicted by the leaked files. Their first goal, to protect privacy rights, was a complete joke. The
Fourth amendment states that there should be no unreasonable searches or seizures. Collecting people's metadata that isn't public violates this right,
not achieving their first goal. Their second goal, protecting vital networks, is also ambiguous. Since the NSA uses the zero day exploits, and since the
companies they get the exploits from sell them, The NSA is letting the hacks be used. Another problem with this statement is that it says "vital
networks". How would US citizens know what the NSA considers vital. Were Hillary Clinton, the secretary of state's emails not vital enough to protect?
There... Show more content on Helpwriting.net ...
"It was maximally secretive from the start: President Truman created the NSA with the stroke of a pen at the bottom of a classified 7–page
memorandum. Even the name was initially classified. Decades later, the memorandum that acted as the agency's charter remained
secret."(Friedersdorf). Because of this, the NSA has been shrouded in secrecy, which people disapprove of. "Despite its size and power...no law has
ever been enacted prohibiting the NSA from engaging in any activity... In addition to being free of legal restrictions, the NSA has technological
capabilities for eavesdropping beyond imagination."(Friedersdorf). The NSA didn't want people to know about them or the illegal things they were
doing. When the snowden files were released, The NSA had a downfall. If they were doing everything that was legal, they wouldn't have to hide
everything that they are doing. While the NSA tries to support the US, many people still disapprove of their private records being
... Get more on HelpWriting.net ...
Whistle Blowing Controversy
In 2013, Edward Snowden, former technical contractor for the U.S. National Security Agency (NSA), released thousands of confidential documents to
The Guardian. Now considered the biggest government information leak in history, these documents contained classified information regarding
widespread government wiretappings, including the wiretapping of more than 35 world leaders and allies ("Right of Privacy Timeline"). With so many
people involved and the rising Computer Age, the topic of whistle–blowing has become more relevant than ever before. Whistle–blowing has become a
heavily disputed topic in America, with critics and supporters debating the ethics and consequences of whistling while one works.
To fully understand the issue of whistle–blowing, ... Show more content on Helpwriting.net ...
Some point out the concern that leaking classified government information is a breach of privacy and compromises national security. In addition,
supporters claim that leakers of military information are guilty of espionage because their actions are not in the best interest of the American military
("Should the Government"). Furthermore, they believe this to also be true for the organization, Wikileaks, stating that the site is dangerous because of
it's history of leaking information such as troop movements and names of Afghan and Iraqi informants ("Wikileaks: Is Wikileaks Justified"). Although
this is troubling to most supporters, many supporters are more troubled by the anarchist agenda that they claim whistle–blowers harbor. Protestors
states that Wikileaks is a criminal organization that aims to create chaos with their leaks. They criticize the organization, pointing out that it maintains
an aggressive
... Get more on HelpWriting.net ...
Assignment 1 : Free Speech During Wartime
Assignment 1: Free Speech During Wartime
Throughout history we have seen how the government can censor the media during a time of war, in despite of the first amendment. We are entitled
to our voices and opinions and by censoring what the media and citizens feel, not allowing them to express their concerns or ideas or concepts is an
atrocity. The government decides if we enter a war not the citizens. Are we are never allowed to speak out against a war? Does this mean we are
unpatriotic or unamerican? During the Civil War, the military often kept reporters off the battlefields. Years later, the U.S. entered the First World War
and took control of all radio communications and censored all photographs. Congress then passed the Espionage and ... Show more content on
Helpwriting.net ...
This law prohibited any speech that interfered with the drafting of men into the armed forces. The media is forced to silence, due to the fear of any
repercussions, from the government. Merely voicing an opinion in the media about any war is now so looked down upon that it takes away freedom
from the media to reach all types of audiences.
Assignment 3: The Press and Classified Documents As the Vietnam War dragged on, with more than 500,000 U.S. troops in Vietnam by 1968, military
analyst Daniel Ellsberg, came to oppose the war, and decided that the information contained in the Pentagon Papers should be available to the
American public. He photocopied the report and in March 1971 gave the copy to The New York Times, which in return published the Pentagon Papers
was the name given to a top–secret Department of Defense study of U.S. political and military involvement in Vietnam from 1945 to 1967. The Nixon
administration had Ellsberg indicted on criminal charges including conspiracy, espionage and stealing government property. The trial began in 1973,
but ended in a dismissal of the charges after prosecutors discovered that a secret White House team burglarized Ellsberg's psychiatrist's office to find
information that would discredit him. Edward Snowden and the PRISM leak: On June 6, 2013, The Guardian broke the news that the U.S. National
Security
... Get more on HelpWriting.net ...
Lifeboat Persuasive Speech
Scenario: There are a group of people on a lifeboat and the boat is sinking. There is also a 400 pound man on the boat. The problem is the boat can
only hold ten normal size people. Having said that, the group has to come up with a decision for their survival; so what should they do? Below are
the conversations among the passengers. Consequentialist: If this man is too heavy and he's going to make the lifeboat sink, we need to decide
what to do. Should we throw him overboard? We have to save ourselves. Morally we know that if we throw him overboard he will drown and we will
be responsible for his death. I've always believed that "Thou shall not kill" – one of the Ten Commandments. Let's suppose we do throw him overboard
and the boat... Show more content on Helpwriting.net ...
If so, when? If not, why not? I can't specifically say that it is justified, but I'm thinking of the war and the fact that soldiers have a job to perform.
They go out every day and kill innocent people. But it's either them or the innocents. Morally, I'm not saying it's right, I'm saying in the war it's all
about survival. If our soldiers have to bomb a village in order to capture enemies, then unfortunately some civilians will be killed. Even though
killing an innocent is not moral or ethical, in the ends our soldier's lives will be saved. Scenario: The soldiers have captured enemies that are aware
of dangerous weapons that could cause mass destruction and devastation to the United States. The only way we can get the information is to torture
them (cause bodily harm) but in the interim, we would be able to find the weapons, destroy them and save thousands of Americans. Another situation
that comes to mind is if we are not to commit murder, why do we put mass murders to death? Why not put them in solitary confinement for the rest of
their lives and make them suffer. That is why I do not believe in the death penalty because it gives them a way out. Or perhaps let's flip the script.
Suppose I work for the government, I have important information that was secret and confidential; and if it landed in the wrong hands could wreck
havoc on the whole country. Unfortunately, I was kidnapped and tortured but still I refused to give up the
... Get more on HelpWriting.net ...
U.s. National Security And Foreign Policy
Abstract: The theoretical and qualitative research findings discussed in this paper support the claim that the cases of Aldrich Ames and Edward
Snowden led to monumental changes in U.S. national security and foreign policy. The effects of these cases extend beyond domestic change and have
instigated international repercussions in both intelligence practices and diplomatic relations between the United States and multiple countries.
Moreover, research acquired from journals, academic books, congressional documents, and scholarly articles will be used to strengthen the argument
that the ramifications of whistleblowing and espionage in the Information Age have heightened the potential for damage to U.S. foreign relations and
national security.
The infamous cases of Aldrich Ames and Edward Snowden have been highly publicized and extensively researched by the intelligence community,
media, and academics alike. Consequently, a plethora of articles, biographies, and documentaries have been written and produced on the lives and
controversial actions of both Ames and Snowden. While leading experts on these cases have thoroughly analyzed the motivations behind Ames and
Snowden 's actions, and provided extensive details on their particular cases, few researchers have focused exclusively on the effects Ames and
Snowden's cases had on U.S. national security and foreign policy. Thus, the specific question that will be addressed in this thesis paper is "how have
the cases of Aldrich Ames
... Get more on HelpWriting.net ...
Barack Obama 's Presidential Debates
During the Democratic presidential debates on Tuesday, frontrunner Hillary Clinton was backed by her fellow Democratic contenders, most notably,
Sen. Bernie Sanders (I–VA), who remarked in response to Clinton 's e–mail flap, "Let me say something that may not be great politics, but I think the
secretary is right. The American people are sick and tired of hearing about your damn emails." http://www.reuters.com/article/2015/10/14
/us–usa–election–democrats–idUSKCN0S70B920151014
This was an early warm moment between the contenders, but the debate turned crisp at times while the contenders focused on an array of issues deeply
impacting Americans, including the economy, criminal justice, the environment, among other leading issues.
However, despite the pass that Clinton received in the presence of her political peers and media inquisitors, Clinton 's characterization of the e–mail
investigation as benign involving Clinton 's candidacy may be a red herring. In the matter of government whistleblowers, former NSA contractor
Edward Snowden and former NSA executive Thomas Drake faced charges of violations of theEspionage Act ("the Act").
Snowden, the former CIA employee and government contractor who in 2013 leaked classified information from the NSA, created the tempest during
this administration under the Espionage Act and fled the country and remains at large presumably residing in Russia..
Drake challenged the DOJ and faced his charges under the Espionage
... Get more on HelpWriting.net ...
The United States National Security Agency
With the ever–expanding enigma that is the internet and technology, there is the constant question of privacy; how does the US monitor its citizens or
foreign nations? Edward Snowden, a man who risked himself to bring details about the United States National Security Agency to light; the National
Security Agency (NSA) is the government agency responsible for surveillance on foreign countries as well as the US itself. How do these two tie
together? Or how did the NSA let Snowden, or others before him, get into through their security and publicize classified information? Snowden, the
whistle–blower of the NSA that revealed thousands of NSA secrets, started life as a normal child and into his teen years he never stood out. Edward
Snowden is known as s computer literate person of interest, yet when he was young and in high–school, he dropped out of school. Despite being a
high–school dropout, at the age of 16 Snowden attended a community college. While in his teens and late twenties Snowden was very interested in the
internet; it could be theorized that this interest in the internet would lead to what he would want to reveal. In his teens and early twenties, Snowden
was often found online in chat rooms about computers and other things involving the internet. He was known for contributing on a site know as Ars
Technica. As stated by Harding, Snowden first started on this site with the intention of setting up his own server.
In 2009, his active posting and discussions on Ars
... Get more on HelpWriting.net ...
Identification And Punishment For Mishandling Top Secret...
Identification and Punishment for Mishandling Top Secret Information
The handling and use of any information are critical to avoid legal and political implications that arise as a result of exposure of such information to
unlawful use. Federal statutes are explicit that those tasked with handling classified information should not have any unauthorized access or disclosure.
The law spells the implications that arise in a case of these violations (ODNI 2). However, it is important for us to understand what is meant by top
secret information, how to identify if it has been mishandled, and the legal implications or punishments for those involved once it has been proved that
indeed they disclosed such information. The essence of this report essay is to discuss the identification and punishment for mishandling top secret
information.
Top Secret information
According to the Directorate of National Intelligence Office, information is classified as "Top Secret" if any unauthorized disclosure can reasonably
result to or cause exceptionally grievous damage to national security. Top secret information is the highest classification level of classified information
under the federal security laws (ODNI 3). Keeping and retaining top secret information has nothing to do with the heading on the document containing
the information, but the information itself. Therefore, unauthorized disclosure may be considered as an act of mishandling such confidential
information by individuals working in
... Get more on HelpWriting.net ...
Analysis Of Thomas Andrew Drake 's A Man Who Was A Former...
Introduction: Thomas Andrew Drake, a man who was a former senior executive of U.S. NSA (National Security Agency), a decorated United States
Air Force And Navy veteran and a whistleblower. In 2010, Thomas Andrew Drake was alleged with mishandling of documents, rarest of the Espionage
act in the history of United States. Defenders of Drake claim that he was instead being prosecuted for challenging the trailblazer project. In 2001,
exactly on the day of 9/11 he was appointed as the Signals Intelligence Directorate in Fort Meade, Maryland when he joined the NSA as a full–time
employee. He later progressed to higher levels in the organization to a level where he held a top security clearance. During the investigation which
was dwelled into the 9/11 by congress, he was testified NSA failure. In 2011, he was awarded Ridenhour Prize for TruthTelling and was co
–recipient of
Sam Adams Associates for Integrity in Intelligence (SAAII) award. As we progress into this paper, we will discuss various stages of this crime such as
what were his actions in NSA, NSA inquiry and acknowledgement, Inevitable Whistleblowing, FBI raids, Indictment, Court proceedings, Government
arguments, final disposition, what happened since 2012. In this paper we will also discuss the Espionage act and Whistleblowing, what is a part of the
McCarran Internal Security Act and what was the Nation Defense information, classified information which was mishandled by Thomas Andrew Drake.
Espionage Act and
... Get more on HelpWriting.net ...
Contemporary Outlaws : Today 's Modern Outlaws
Brandon Plascencia Professor Carrie Morrow English 20530 November 2014 Contemporary Outlaws Today's modern outlaws are closely similar
to the outlaws in western movies. They take from the powerful groups in the community and give to the needy. Today's outlaws are following in
the similar steps but, in a digital world. The digital world is now the modern Wild West because it's a new frontier that keeps growing without
control, and laws are still being set in place so everyone online is free to do as they wish until a law has been set in place. The modern outlaws I
will be writing about are Edward Snowden, Julian Assange and the hacker group of Anonymous. Each out law has provide some type of service or
information to the public that was secret and important to the world community, but was being withheld from the public eye because of powerful
people and entities. By releasing this information the outlaws knew of the consequences this would bring to their lives. With today's technology you
can't hide or run away, everything is tracked unless you know how to hide your steps. But for the most part the powerful governments are able to
track down the outlaws. Today's outlaws must be ready fight not just a digital or information battle but a legal battle as well. Today's outlaws don't
have any empty fields to run off to any more, the closest thing to an open field is a 3rd world country or an enemy of the government of who they are
fighting. The globe is the new open field and
... Get more on HelpWriting.net ...
The Army's Current Network Defense System
While working as the Chief Information Security Officer (CISO) at the Army Materiel Command, the command was under constant attack by
hackers. The Army's current network defense system was woefully inadequate for protecting the commands 140 locations worldwide. After
sustaining a couple of very high profile attacks using these tools, it became evident that something else was needed. One of the command's
subordinate commands was the Army Research Labs and is on one the foremost research labs in the world. One of the labs mission was Cyber
Defense and came under my preview as it program manager. The lab had developed several cyber security tools and had been testing them very
successfully on a several platforms. The power of this tool ... Show more content on Helpwriting.net ...
Once we got the system user friendly and developed a training program, I was able to defer the cost of the tools over several agencies. Once we
deployed and the agencies began using it, and cut their incidents to almost none, I was able to partner with them to secure more funding. My cost
model, after startup cost, was cheaper to deploy and maintain than commercial off the shelf software, due to the custom code developed internally.
Since I provided better and cheaper tools I was able to negotiate maintenance contracts with them and use that funding to further develop my tools. I
was also able to politically influence agency standards when it came to cyber defense. Since the tools were developed by the government for the
government, agencies was more willing to spend more money than on private tools because the code was more secure.
Earlier in my career, while working for the Coast Guard assigned as an intelligence officer and program manager, I was assigned to develop an
information sharing system to support the Coast Guard Intelligence activities. In evaluating the situation, it was easy to see that the Coast Guard was
technically disadvantaged. At this time, the Coast Guard IT infrastructure consisted of a custom designed workstation, sever and network. It was a
head of its time and offered the capability of unclassified agency wide e–mail and file sharing, and in the early 90s this was far beyond other services.
The Coast Guard did not
... Get more on HelpWriting.net ...
Papers On Jay Martin
We all have heard the phrase loose lips sink ships. On 19 May 2011, the Federal Bureau of Investigations (FBI) painted another picture in our mind
regarding this phrase. The in–depth investigation of Bryan Minkyu Martin revealed the real reasons why he betrayed the country for his own benefit.
This is a classic example to prove cyber espionage cases can be alarming to our nation's national security.
Bryan Minkyu Martin was born in Seoul, Korea in 1988. Peter and Barbara Martin, a psychologist and an intelligence specialist, adopted Martin at
the age of two. His parents raised him in the small town of Mexico in upstate New York. Eventually Martin graduated from Mexico High School in the
year 2006. "As a high school student in Mexico, ... Show more content on Helpwriting.net ...
Members of the military services should be aware of any insider threat indicators presented by others to ensure the proper steps are implemented in the
early stages and safeguard classified information. At this point, we should understand desperate people in desperate situations mainly derive espionage
cases. Following this, it is essential for all soldiers recognize any form of threats to our nation's national security and report these incidents immediately
before they can harm our country. In addition to Martin's espionage case, we can further understand the importance of securing classified information
because it can seriously destroy relationships between countries. As a result, Martin deserved the punishment given to him because he knew the
consequences of betraying his country. This case clearly indicates the reasons why we should have good communications at work and recognize
individuals that may have issues that could possibly become an insider threat. Finally, we must be the change we wish to see among others, because
every single person in this world can make the slightest perfection in another person's
... Get more on HelpWriting.net ...
The Importance of Securing Sensitive Items Essay example
Sensitive items are anything that is considered classified or a mission essential item. These items can include protective gear, maps, or a piece of
paper designating patrol routes. The importance of securing sensitive items comes down to maintaining accountability for operation security, mission
success and a soldiers over all readiness. The habits of exercising security and accountability of a soldiers items allow the soldier and their team to
operate to the highest standards or have items be accessed by an opposing adversary creating loss of overall mission success. Operational security is a
process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly... Show more
content on Helpwriting.net ...
Although sensitive items of restricted nature may not disclose information of high value, items and information obtained from being unsecured can
cause adverse effects impacting mission success to include compromised routes, vehicle information or sensitive items used for personal protection.
Any and all information obtained by any means can be used to put together a larger pictures of a units operations. Leaving the units operational
security compromised. Each person themselves are responsible for exercising reasonable and effective actions to properly care, store, safeguard and
use any and all items presented to them whether it be issued or acquired through personal expense. Taking the time to either store items in a secure
location such as a locker or independent room that is secured and solely accessed by the owner of the stored items. Placing care of items to trusted
members of your unit is also considered safeguarding items of value but trust should not always be put into everyone with in a unit for storage. In the
case of Aldrich Ames we can see that some people can't be trusted no matter what profession they may hold. Ames was convicted of spying for the
Soviet Union/Russia, betraying many persons within the U.S. Government on operations
... Get more on HelpWriting.net ...
The Issue Of Whistleblowing Is Becoming More Popular As...
Whistleblowing is becoming more popular as the world becomes more obsessed with secrecy. Some people advocate secrecy and some believe that
secrets can't keep us safe. At least, this is what Bradley Manning and Edward Snowden thought. The public is obsessed with the idea of knowing what
the government is hiding from us and internet connectivity, the growth of the Intelligence Community, and the encouragement of the public
perpetuates this. Two major leaks of classified information happened in 2010 and 2013 by Bradley Manning and Edward Snowden and caused lots of
debate in their wake. How should the U.S. government deal with whistleblowers and is there a specific way they can be dealt with. In the cases of
Manning and Snowden, the U.S. ... Show more content on Helpwriting.net ...
But one thing secrecy definitely does is facilitate the creation of whistleblowers like Bradley Manning and Edward Snowden. Bradley Manning is
27 years old in prison for leaking over 700,000 documents to WikiLeaks, the largest leak of classified documents in history. In 2010, he was a low
level military intelligence analyst in Iraq when he was detained under suspicion of stealing classified information. He came to trial three years
later on twenty charges of espionage and theft. Manning was sentenced to 35 years in prison and will most likely serve about eight years of that.
Edward Snowden is a 31 year old American citizen living under asylum in Russia. He was an NSA contractor for Booz Allen Hamilton that
gradually grew disillusioned with the NSA and the blatant hypocrisy going on in the NSA. He leaked 200,000 documents to journalists, and no one
really knows the actual number of documents he took, but estimates have been said to be close to 2 million documents. Snowden hasn't faced his
charges because he fled outside the country even though he is aware of the consequences that face him and stated, "I told the government I'd
volunteer for prison, as long as it served the right purpose, I care more about the country than what happens to me. But we can't allow the law to
become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal.
... Get more on HelpWriting.net ...

More Related Content

More from Connie Ripp

How To Write A Good Hook Sentence For An Essay. Ho
How To Write A Good Hook Sentence For An Essay. HoHow To Write A Good Hook Sentence For An Essay. Ho
How To Write A Good Hook Sentence For An Essay. HoConnie Ripp
 
Heartwarming How To Write
Heartwarming How To WriteHeartwarming How To Write
Heartwarming How To WriteConnie Ripp
 
The Essential Guide To Fount
The Essential Guide To FountThe Essential Guide To Fount
The Essential Guide To FountConnie Ripp
 
Cheapest Research Paper Writing Service
Cheapest Research Paper Writing ServiceCheapest Research Paper Writing Service
Cheapest Research Paper Writing ServiceConnie Ripp
 
Essay Writer For All Kinds Of Papers - How To Start Off A
Essay Writer For All Kinds Of Papers - How To Start Off AEssay Writer For All Kinds Of Papers - How To Start Off A
Essay Writer For All Kinds Of Papers - How To Start Off AConnie Ripp
 
How To Write A Theoretical Paper In Psychology. Rese
How To Write A Theoretical Paper In Psychology. ReseHow To Write A Theoretical Paper In Psychology. Rese
How To Write A Theoretical Paper In Psychology. ReseConnie Ripp
 
Marketing Essay (MBA)
Marketing Essay (MBA)Marketing Essay (MBA)
Marketing Essay (MBA)Connie Ripp
 
Should College Athletes Be Paid Essay Free Essay E
Should College Athletes Be Paid Essay Free Essay EShould College Athletes Be Paid Essay Free Essay E
Should College Athletes Be Paid Essay Free Essay EConnie Ripp
 
Weather Writing Paper And Prompts Differentiated W
Weather Writing Paper And Prompts  Differentiated WWeather Writing Paper And Prompts  Differentiated W
Weather Writing Paper And Prompts Differentiated WConnie Ripp
 
Grand Old American Flag Paper - Your Paper Stop
Grand Old American Flag Paper - Your Paper StopGrand Old American Flag Paper - Your Paper Stop
Grand Old American Flag Paper - Your Paper StopConnie Ripp
 
How To Write Compare And Contrast Essay With Examples Block Method ...
How To Write Compare And Contrast Essay With Examples Block Method ...How To Write Compare And Contrast Essay With Examples Block Method ...
How To Write Compare And Contrast Essay With Examples Block Method ...Connie Ripp
 

More from Connie Ripp (11)

How To Write A Good Hook Sentence For An Essay. Ho
How To Write A Good Hook Sentence For An Essay. HoHow To Write A Good Hook Sentence For An Essay. Ho
How To Write A Good Hook Sentence For An Essay. Ho
 
Heartwarming How To Write
Heartwarming How To WriteHeartwarming How To Write
Heartwarming How To Write
 
The Essential Guide To Fount
The Essential Guide To FountThe Essential Guide To Fount
The Essential Guide To Fount
 
Cheapest Research Paper Writing Service
Cheapest Research Paper Writing ServiceCheapest Research Paper Writing Service
Cheapest Research Paper Writing Service
 
Essay Writer For All Kinds Of Papers - How To Start Off A
Essay Writer For All Kinds Of Papers - How To Start Off AEssay Writer For All Kinds Of Papers - How To Start Off A
Essay Writer For All Kinds Of Papers - How To Start Off A
 
How To Write A Theoretical Paper In Psychology. Rese
How To Write A Theoretical Paper In Psychology. ReseHow To Write A Theoretical Paper In Psychology. Rese
How To Write A Theoretical Paper In Psychology. Rese
 
Marketing Essay (MBA)
Marketing Essay (MBA)Marketing Essay (MBA)
Marketing Essay (MBA)
 
Should College Athletes Be Paid Essay Free Essay E
Should College Athletes Be Paid Essay Free Essay EShould College Athletes Be Paid Essay Free Essay E
Should College Athletes Be Paid Essay Free Essay E
 
Weather Writing Paper And Prompts Differentiated W
Weather Writing Paper And Prompts  Differentiated WWeather Writing Paper And Prompts  Differentiated W
Weather Writing Paper And Prompts Differentiated W
 
Grand Old American Flag Paper - Your Paper Stop
Grand Old American Flag Paper - Your Paper StopGrand Old American Flag Paper - Your Paper Stop
Grand Old American Flag Paper - Your Paper Stop
 
How To Write Compare And Contrast Essay With Examples Block Method ...
How To Write Compare And Contrast Essay With Examples Block Method ...How To Write Compare And Contrast Essay With Examples Block Method ...
How To Write Compare And Contrast Essay With Examples Block Method ...
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

The Security Agency Nsa ( Nsa )

  • 1. The Security Agency Nsa ( Nsa ) In early June of 2013, all the main broad casting channels broke the story that the National Security Agency (NSA) was "spying" on United States citizens, and that communication in the U.S. was not private. Edward Snowden, formerly worked as a technical contractor for the NSA at the time, gave the media the information for the story. At the time of the release of the story, Snowden was in Hong Kong. This trip was a deliberately planned in order to keep himself from being immediately incarcerated in the United States. The NSA's surveillance efforts were increased after the 9/11 attacks, and have allegedly kept growing since then (Gross, 2013). Whether the surveillance was in unconstitutional guidelines is something that is up for discussion now that the leaks have uncovered the degree of the surveillance that is, and has been, taking place. Other NSA Contractors state that the Constitution has been violated, but spokespeople from the NSA state that they are not "listening in" on conversations entered into by the average American, nor are they reading emails or other correspondence (Gross, 2013). The argument in the media and society concerning the NSA security leak is fixated on whether Edward Snowden is a hero or a traitor, but in order to make a judgement on that, one has to comprehend what Snowden actually did and how it affects society and the government. 1 The National Security Agency is part of the United States Department of Defense. It is a cryptologic intelligence ... Get more on HelpWriting.net ...
  • 2. Trial & Terrorism : The Implications Of Trying National... Trial & Terrorism: The Implications of Trying National Security Cases in Article III Courts, Lewis A. Kaplan, 8 J.NAT'L SECURITY L.&POL'Y___ (forthcoming 2015) http://jnslp.com/2015/10/14/the–implications–of–trying–national–security–cases–in–article–iii–courts/ Explanation: This paper summarizes the article written by The Honorable Lewis A. Kaplan, U.S. District Judge for the Southern District of New York, which addresses the controversy between trying suspected terrorists in military tribunals verses Article III courts. He is in favor of trying terrorist cases in Article III courts as it has been done successfully for more than 20 years. Case examples he gave for trials prior to 2009 included suspects from the first and second World Trade Center attacks tried in 1993 and 1997. Other cases involved plots to blow up buildings, tunnels and bridges, and American airliners. Those trials all took place before Usama bin Laden issued the fatwa for Muslims to kill military and civilian Americans. Since then we have had multiple trials in Article III courts. There were several trials from the 1998 U.S. Embassy bombings and the trial of Bin Laden's son–in–law. All the cases were tried without a circus atmosphere or security so intense that it shut down lower Manhattan. Trials for terrorists were non–events until the government planned to try Khalid Sheikh Mohammed for the 9/11 attacks. The issues in contention are 1) the use of defendant's statements and how they were obtained; 2) ... Get more on HelpWriting.net ...
  • 3. Essay Freedom of information indonesia LEGAL PROPOSITION ON THE PUBLIC FREEDOM OF INFORMATION OF INDONESIA By: Adistra Kusuma Waligalit, Faculty of Law of Gadjah Mada University This study identified several Legal defects regarding the Act on Public Freedom of Information of Indonesia. These legal defects will be explained along with the reccomendations of remedy as below. INTRODUCTION After experiencing a difficult time in New Order era (1966–1998), when the civil rights to freely obtain information had been abused by the government at that time, a glimmer of hope emerged when the government enact a new Act regarding Public Freedom of Information in 2008 (Act number 14). But just as too good to be true, the hope was only short lived. It seemed that the government is ... Show more content on Helpwriting.net ... One of the notable use of this rule is the "thirty year rule" by the law in United Kingdom, where the government will publicly release the cabinet papers after thirty years they were created. Executive Order 13526 imposed in United States is an example of a provision that handles classified informations. SECOND: Unclear definition of public entity. Public entity is a body that obliged to give the informations to the public. In article 1 of Act number 14 year 2008, it is mentioned that the definition of public entity is an institution of executive, legislative, judicative, and other institutions with the function relating to the state administrative or non–government institution of which receives budget from the state or from donation. The definition of public entity given by the article is very broad and blur. It will only obscuring the purpose of the existence of public service. The act itself does not regulate about the obligation of any private business entities that is under contract with public entity, considering many cases occured because of private entities claim to acting on behalf of the government to obtain certain legal permit. This is the fundamental weakness of the act where it does not clearly regulates the subjects of the law and still lacking further explanation regarding the public entity. Without it, people will be very hard to obtain informations from the ... Get more on HelpWriting.net ...
  • 4. Sensivite Items Accountability What is accountability? An obligation imposed by law, lawful order, or regulation of an officer or other person of authority for keeping accurate record of property, documents, or funds is the best answer I can think of. Now the person having this obligation may or may not have actual possession of an item they are accountable for, sensitive item. Accountability is concerned primarily with records, while responsibility is concerned primarily with custody, care, and safekeeping. What does accountability mean to the Army? Accountability is a very important part of an enlisted soldier's job. An enlisted soldier is responsible for a lot of items issued to him/her whether it's a weapon, night vision goggles, clothing that... Show more content on Helpwriting.net ... If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintains operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP SECRET (again unauthorized disclosure could severely damage national security to a more severe degree). With the release of information deemed classified by the government to persons unauthorized ... Get more on HelpWriting.net ...
  • 5. Report On The Happenings Provided By Professor Slater 's... Based on review of the happenings provided by Professor Slater's presentation, the largest data breach in US was caused by Snowden when he was a contractor. He acquired classified information in terms of the NSA surveillance programs which he later on used to publish on the major newspapers for awareness to media. Shortly after he was found that he disclosed information, he seeked refuge in Russia. But apparently upon reading of different articles, it looks like there are 2.What he did? How he did it? There were several multiple methods that he was able to use including social engineering as well as finding the weakness in certain control areas. There was several communications with newspaper reporters from different methods such as ... Show more content on Helpwriting.net ... If the information was to be in any relation to terrorism, any US citizen would understand the severity especially after the 9/11 event. But without any relation to any terrorism, it basically means that the US government is spying. This is a controversial topic that brought confusion. To those supporters of NSA, there has been much controversy since the fact that exposing what they believe in is being revealed, but the degree of privacy exposed from innocent people is quite radical considering, there are even resumes and transcripts from children. Not to mention the fact that perhaps if you have any children and had pictures of their cuteness taken in the bathtub, these photos can be leaked to anyone is quite horrific. Although he used breaches to disclose information in regards to allowing the public to know the state of NSA, the information he has passed on to the public is quite informative. 5.How will this affect the NSA and U.S. National Security? Because of the severity and detail of the data breach in terms of surveillance programs, is it a fact to say that other countries will know how the US National Security controls are run. The NSA & US National Security are left to redefine, redetermine, restructure and reimplement every security program that they have since the secret is no longer a secret. Not only will they focus on re– establishing their controls externally but ... Get more on HelpWriting.net ...
  • 6. Snowden And The United States Unless you were hiding beneath a rock in 2014, you saw the nation's reaction to the release of classified NSA documents by the infamous whistleblower Edward Snowden. Snowden, who worked as the lead technologist for Dell, managed their accounts with the Central Intelligence Agency. It was in this position that Snowden began to notice some classified documents that didn't make sense. These documents contained information on the National Security Agency illegally spying on their own citizens. It was at this time in 2012 that Snowden began downloading some of these files for himself. It is estimated that he downloaded somewhere between 50,000 and 200,000 files on the espionage efforts of the United States (Borrough, Ellison, Andrews, 2014). Now, Snowden needed to get the files out to the people. He attempted to contact a few media outlets around the world who would not go through the trouble to follow his strict encryption methods. Snowden eventually contacted documentarian Laura Poitras, who had recently written an article on a separate whistleblower that caught Snowden's attention. Poitras states in an interview with Salon.com that, "...he'd contacted me because my border harassment meant that I'd been a person who had been selected. To be selected –and he went through a whole litany of things – means that everything you do, every friend you have, every purchase you make, every street you cross means you're being watched" (Carmon, 2013). This connect lead to Snowden being ... Get more on HelpWriting.net ...
  • 7. Identifying Requirements For High Level Policy Makers Phase One – Identifying Requirements 1.High level policy makers are not only concerned with intelligence; they are constantly concerned with reelection. A policy maker who is identifying requirements could decide to focus resources on an issue that is less vital to the nation's security in order to obtain information that will get them reelected. High level threats could be pushed to the side in order to address an issue that is not necessarily as vital but is a hot topic in news media, and public opinion. This would be followed down by the intelligence community and the more dangerous area or individual threat could be left unmonitored. 2.Often briefings and communication between high level officials and analysts are hectic times and communication of requirements could not be communicated clearly. Apolicy maker giving feedback on collection objectives or asking questions could be perceived by the intelligence official as requesting more information when really that policy maker has enough information to make a decision. This is an issue when two people come from different backgrounds and use different phrasing, objectives could be easily misunderstood. Time and resources would then be wasted to gather intelligence on issues that are no longer relevant. 3.Officials in the intelligence community often faced with new policy makers or those with differing views from those in the intelligence community could decide to ignore or alter requirements to suit their own ... Get more on HelpWriting.net ...
  • 8. Essay on Government Secrecy Ashley Simons "Secrecy and a free, democratic government don't mix," President Harry Truman once said. Harry Truman understood the importance of an open government in a free society. Unfortunately, George W. Bush has a different outlook. From the first days of his administration, President Bush has taken steps to tighten the government's hold on information and limit public scrutiny of its activities. Expansive assertions of executive privilege, restrictive views of the Freedom of Information Act, increasing use of national security classification, stonewalling in response to congressional request for information В– all these were evident even before the September 11 attacks (At Issue: Has the Bush administration misused government... Show more content on Helpwriting.net ... The В‘secret' designation referred to information in which its disclosure might endanger the national security, or cause serious injury to the interests of the nation or be of great advantage to a foreign nation. Similarly, В‘confidential' could be applied to material of such a nature that is disclosure, although not endangering the national security, might be harmful to the interests or prestige of the Nation. The term В‘restricted' is used in instances where information is for official use only and should be denied access to the general public. According to an analysis released in August, 2005, by OpenTheGovernment.org, more and more government information is becoming less and less publicly available. OpenTheGovernment.org is an unprecedented coalition of journalists, consumer and government groups, environmentalists, labor and others united out of a concern for what U.S. News and World Report called a "shroud ofsecrecy" descending over our local, state and federal governments (Gordon 35). This organization focuses on making the federal government a more open place to make us safer and strengthen the public trust in the government. In its Secrecy Report Card, OpenTheGovernment found that the government spent $7.2 billion last year creating 15.6 million new classified documents and securing accumulated secrets В– more than it has for the past decade (1). The increasing secrecy is expensive to maintain. The U.S. government ... Get more on HelpWriting.net ...
  • 9. The Freedom Of Speech : Yellow Journalism Rome, which was one of the strongest ancient empires, worshipped a god, Janus. Romans believed that Janus protected their beginnings, gates and time; in particular, Janus was the male with two faces (Martin, 2012). Similarly, freedom of speech is Janus with two faces reflecting freedom and limit. According to Canadian Charter of Rights and Freedoms, Canadians are free to think their own thoughts, speak their own minds, to gather peacefully into groups and to associate with whomever they wish, as long as they do not infringe valid regulations which protect the right and interests of others (Canadian Charter of Rights and Freedom, 1982). Therefore, in a democratic society, the freedom of speech should be properly regulated to prevent yellow journalism, to protect sensitive state secrets from abuse and to promote a high quality of speech based on responsibility. The regulated freedom of speech prevents yellow journalism. Yellow journalism is the style of journalism which features scandals, sensationalism, and unethical or unprofessional practices by news media or journalists without any regulations (Holtz–Bacha and Kaid, 2008). For instance, according to Tom Conner (2014), the Dreyfus Affair of 1894 was an anti–Semitic political scandal in France; it involved the false accusation of a Jewish French artillery officer named Alfred Dreyfus for leaking secrets to the German army. In particular, the usage of yellow journalism would inaccurately produce powerful articles without any ... Get more on HelpWriting.net ...
  • 10. Military Police Blotter Report Abstract A Blotter report is a daily chronological record that is maintained within the military facility. Activity will be maintained using Army Corrections Information System. (ACIS). Facilities without ACIS will prepare the daily report using DA Form 3997 Military Police Desk. The facility blotter will provide a record of activities at the facility including all incidents. Admissions and releases from confinement, to include temporary releases. Any other information deemed of value by the facility commander. All actions inside the visitor's record of the prisoners at the facility will contain the date, name of visitor, time in, time out, address or organization, Prisoner visited, Relationship of visitor to prisoner at the local ACIS. Keywords: ... Show more content on Helpwriting.net ... AR 380–67, the unit Security Manager will complete one of the following options: Send a copy of the offense along with the commander's recommendation (suspend or not suspend access, informal or formal suspension, and the action the commander is taking) The Army Corrections System. (2006). The Brigade S–2 will process the DA Form 5248–R and forward to the Central Clearance Facility through JPAS. Informal Suspension is local suspension until the Commander can gain a resolution of issues and make a determination. However, if CCF determines that it is in the best interest of national security to suspend the individual's eligibility for access to classified information pending adjudication by CCF, then the individual clearance will be formally suspended. Formal Suspension is accomplished through formal recommendation to CCF through JPAS. Once this is done, the commander may not restore access until a final favorable determination by the Commander of CCF. Subsequent to the submission of the initial DA Form 5248–R, supplemental reporting is due to the Brigade S–2 at intervals not exceeding 60 days until all local actions have been resolved. The Army Corrections System. ... Get more on HelpWriting.net ...
  • 11. Edward Snowden The Resonating Ring of A Whistle Blower Nathan Sharp COLL148 June 7, 2015 Julie Vanorny DeVry University The Resonating Ring of a Whistle Blower I.Introduction A.Attention–Getter/Hook – Everywhere you go, everything you see, when you are surfing on the web you are being recorded, every click is stored in a database, and that's only if your just using a search engine. When you are using a social networking site and you send someone a chat message, it stores your IP address of where the message was sent from, essentially telling Facebook, marketers to whom your information is sold, and the other person where you are. B.Background: The project that I have chosen is to make the viewer aware that they are vulnerable on the... Show more content on Helpwriting.net ... V.Your own leadership qualities and success traits A.Your personal strengths as a leader (based on assessments in course) * 1.What you learned about yourself from these assessments 2.How these strengths can help you be successful 3.Your plan for employing these strengths B.Your areas of weakness that may get in the way of your success * 1.The positive changes you need to make in order to resolve weaknesses 2.Your plan for resolving these weaknesses VI.Conclusion A.Identify and re–state the main idea B.Wrap up your ideas C.Provide a specific action step you will take to continue your journey to success References TOXEN, B. (2014). The NSA and Snowden: Securing the All–Seeing Eye. Communications Of The ACM, 57(5), 44–51. doi:10.1145/2594502 PREIBUSCH, S. (2015). Privacy Behaviors After Snowden. Communications Of The ACM, 58(5), 48–55. doi:10.1145 /2663341 MOORE, M. (2014). RIP RIPA? Snowden, Surveillance, and the Inadequacies of our Existing Legal Framework. Political Quarterly, 85(2), 125–132. ... Get more on HelpWriting.net ...
  • 12. Wikileaks : A Project Of The Sunshine Press In late 2009 and early 2010, a not for profit website called WikiLeaks posted classified US military documents showing all of the mistakes made by the US military and its soldiers in Iraq and Afghanistan. WikiLeaks does so much more than just release classified documents about the US military; they are no different from the New York Times in that "WikiLeaks is a project of the Sunshine Press" (Assange). WikiLeaks is an international online, non–profit, journalistic organization that publishes leaks (documents the public is not supposed to see) to its website for other news agencies to use. Some believe some that WikiLeaks is for the wellbeing of society: the resource exposes incidents that citizens have never seen. Examples of these shocking stories include: "corruption in the government of Kenya, brutality at the US detention center at Guantanamo Bay, and systemic failures behind Iceland 's massive bank collapse in 2009" (Berger). WikiLeaks has shown the world some of the corruption that is hidden from the public. On the other hand, others say that WikiLeaks is a terrorist organization that should be shut down, for example, government officials and advocates who believe in hiding information from the public. Terrorism has completely changed over the years and now it means "Terrorism does not only apply to physical attacks, but also to cyber–attacks that intimidate and threaten by means of coercion" (Castaldy). The public most of the time believes that anything that ... Get more on HelpWriting.net ...
  • 13. Freedom Of Speech : The United States We Enjoy Many Freedoms In the United States we enjoy many freedoms. There are many place throughout the world that don't allow you to live your life with the flexibilities that a United States citizen may possess. These right are given by the Unites States constitution has made this country become pioneers of innovation, and cultural development. Having a right to express yourself and your ideals have made this the home of immigrates with the ambition to develop into major contributors in modern society. One freedom we enjoy, I would like to discuss in this paper is freedom of speech. Freedom of speech is one the world's most sort after rights but as of lately it has been under attack stating it may cause national security issues. In this paper we will look at the development of the First Amendment and how newly enacted laws that will cause the government to label people or groups enacting this rights as extremist. The founding fathers of this nation didn't always have this luxury of right. In the colonial era freedom of speech was a notable freedom granted that many nations didn't have at that time. With Europe in the struggle for dominance and absolutism being overthrown with democracy, the populous struggled to have their voice heard. The masses was censored in many cases with the threat of death or imprisonment. In the United States, it was an inalienable right to be heard and offer differences of opinion. But during this time United States citizen had limitations on this freedom as well. It ... Get more on HelpWriting.net ...
  • 14. Essay On Whistleblower Protection Act Whistleblower Protection Enhancement Act of 2012 Introduction Often the debate arises of whether human–beings are born with an innate sense of "right–from–wrong" and most often the consensus is, yes. The later question might then be, what makes a person question doing the right thing? In the reality of someone who may be labeled a "whistleblower," apprehension to report wrongdoings may reasonably come from fear of retaliation. Particularly when the wrong–doing is occurring within the federal government and/or secret intelligence community. Who will stand up to these powers and what protection can policy afford those that take the ultimate risk in "doing the right thing" by unveiling the crimes of waste, fraud, and abuse within our government ... Show more content on Helpwriting.net ... [R–IA], C. (2015, July 30). Text– S.Res.236 – 114th Congress (2015–2016): A resolution designating July 30, 2015, as "National Whistleblower Appreciation Day". | Congress.gov | Library of Congress. Retrieved from https://www.congress.gov/bill/114th–congress/senate–resolution/236/text Kasner, A. J. (2015). NATIONAL SECURITY LEAKS AND CONSTITUTIONAL DUTY. Stanford Law Review, 67(1), 241 –283. Retrieved from https://nuls.idm.oclc.org/login?url=http://search.proquest.com.nuls.idm.oclc.org/docview/1661722557?accountid=25320 Lohman, A. (2015). SILENCE OF THE LAMBS: GIVING VOICE TO THE PROBLEM OF RAPE AND SEXUAL ASSAULT IN THE UNITED STATES ARMED FORCES. Northwestern Journal of Law and Social Policy, 10(1), 230 –279. Retrieved from https://nuls.idm.oclc.org/login?url=http:/ /search.proquest.com.nuls.idm.oclc.org/docview/1667167592?accountid=25320 Lucas, G. R. (2014). NSA management directive #424: Secrecy and privacy in the aftermath of edward snowden. Ethics & International Affairs, 28(1), 29–38. doi:http://dx.doi.org.nuls.idm.oclc.org/10.1017/S0892679413000488 Meyer, D., & Berenbaum, D. (2015). THE WASP'S NEST: INTELLIGENCE COMMUNITY WHISTLEBLOWING & SOURCE PROTECTION. Journal of National Security Law & Policy, 8(1), 1–49. Retrieved from ... Get more on HelpWriting.net ...
  • 15. Information Sharing in the Army's Contemporary Operational... The potential of providing information or sharing information with agencies or personnel without proper authorization can be detrimental to the mission and the personnel involved. Working in a Joint/Combined nature of the Contemporary Operational Environment (COE) leads to numerous considerations of security when it comes to information sharing and intelligence productions. COE is the combination or current and near term operational environment variables with capabilities. It is based on the composite of potential adversaries in order to create a wide array of conditions necessary for full spectrum training and leader development. Sea, land, air, and space make up the COE in both the physical and technological aspect (Headquarters ... Show more content on Helpwriting.net ... These differences lead to difficulties in interpretation of the information shared and the products that are disseminated. The Army uses Army Regulation (AR) 380–5, Department of the Army Information Security Program, as the main information classification and procedure guide. Tactics include training on a continuous basis, ensuring that personnel records are up to date, and keeping guidelines such as a tactical standard operating procedure (TACSOP) and mission essential task list (METL) to follow. For example, the Army carries out a ground mission (Combat Arms) and is structured in such a way that each Brigade is self–sufficient. The Air Force is responsible for air assets, to include fighters, equipment/personnel transports, and Unmanned Arial Vehicles (UAV) to name a few. They are also broken down into mission units and have their own support system and intelligence units. Their primary mission is to provide support to the Army. The Marines and Navy mission focus is the sea or ocean. They also work in support of the Army; however the Marines do have their own Infantry and can conduct operations similar to the Army Infantry. Mission, structure, tactics, and security requirements receive a great portion of attention when conducting information sharing operations in the Joint COE. Commanders and Intelligence Officers, must have a good ... Get more on HelpWriting.net ...
  • 16. The Reality Of Cyber Terrorism 2010 : How It Happened And... Davis, M. in his Stuxnet: How It Happened and How Your Enterprise Can Avoid Similar Attacks, indicated that another case example of SCADA systems being attacked was the cyber–attacks conducted in 2009 and 2010 when the worm referred to as Stuxnet was used. This worm was primarily directed at Iran in their nuclear facilities and was mainly for disruption of their processing mechanism in their enriched uranium deposits industry. Piggin, R. in his journal The Reality of Cyber Terrorism 2010, stated that the whole idea behind the Stuxnet worm was in reprogramming the systems in a way that would result in the plant sabotage and somehow hide the changes that would be made from the users and programmers in Iran. As explained earlier, one crucial flaw of these type of cyber–attacks is the potential that the government or company will be unable to detect the resultant damages from such attacks therefore, will not be in a position to effectively counter the attack and the damage that results from it. Henry, W., Jacob, S. and Eric, T. in their Pearl Harbor 2.0: When Cyber–Acts Lead to the Battlefield 2010, indicated that many of the U.S cyber–attacks seem to be originating from China, however, a connection has never been proved as to whether these attacks are sponsored by the state but it is believed that Chinese patriots could be behind the attacks being witnesses on most of the websites belonging to Americans for so long now. The motivation drivers that influence China to conduct ... Get more on HelpWriting.net ...
  • 17. Wikileaks : A Non Profit International Organization Essay WikiLeaks, is a non–profit international organization. The objective of this organization is to publish private information and new to the public and also categorize the information from anonymous origin. It has been over a decade now that the website WikiLeaks has published online a huge number of classified documents and other materials and that have uncovered the internal information of the major country agencies like National Security Agency, the U.S. military and State Department and even the Democratic National Committee. We all know that their founder, Julian Assange WikiLeaks has possessed the capacity to keep posting classified material from U.S. and also the other countries ' diplomats and authorities regardless of various cyber assaults against the Websites and the abandonment of key service providers is a touch of Internet cunning ordinarily conveyed by legitimate and criminal online organizations to shield themselves from activity spikes and from being closed down. Such is the steadiness of information in the Internet Age. 1. How does the First Amendment protect WikiLeaks from prosecution? With over 250,000 classified documents of U.S diplomatic published on their site. Especially, diplomats used to gather individual data, for example, account number, email, charge card number and it additionally publish lot of U.S armed force secrets. The U.S government attempted to indict WikiLeaks to stop news leak in future. But, the first amendment law of United States is ... Get more on HelpWriting.net ...
  • 18. Security Vs. Privacy : Should Edward Snowden Be Pardoned... Security vs. Privacy Should Edward Snowden be pardoned for leaking thousands of classified NSA documents? An analysis of the merits of the Snowden leaks and the broader issue of security vs. privacy and mass surveillance from the perspective of at least two ethical theories. Following the terrorist attacks on 911, President George W. Bushsigned into law The USA PATRIOT Act . Intended to enhance law enforcement investigatory tools, The Patriot Act the made changes to surveillance laws that enabled the U.S government collection of computer information about both American and foreign citizens. During the following years through a series of legislative changes and court decisions The United StatesNational Security Agency was gradually granted the authority to collect information on a massive scale and to implement programs such as PRISM, which collects internet communications from at least nine major US internet companies such as Google, Facebook Yahoo and Apple , XKEYSCORE which gave the NSA the ability to secretly access databases containing emails, online chats and the browsing histories of millions of individuals, MYSTIC which allows to collect the metadata as well as the content of phone calls from several entire countries, as well as many other programs with similar mass surveillance capabilities . To put it in simple terms this, together programs essentially enables almost unlimited surveillance of anyone and everyone anywhere in the world regardless of that ... Get more on HelpWriting.net ...
  • 19. Why Should Your Government Keep Secrets? Why should YOUR Government keep secrets? In the United States of America, there are 318.9 million people living within the 50 states, and out of those 318.9 million, nearly 5 million have some type of government security clearance. Some citizens of the United States believe the Federal government should release these classified documents to the people; however, the government should not release them because it would cause pandemonium among the people of the United States, lead to irrational thinking, and these documents would impede the order of the Federal government. The United States of America is one of the many democracies around the world. Being a superpower, the United States has a lot of influence on nations worldwide; furthermore, all governments need to keep certain documents out the hands of people who could potentially mutilate the government and what it stands for. For example, during the Michael Brown trial, authorities televised the shooting which initiated complete anarchy throughout one small city in Missouri; imagine what a leaked classified document could do to an entire nation? Potentially cause violent protests in many major cities such as New York, Atlanta, San Francisco, or possibly in the heart of our nation, Washington D.C. One man by the name of Edward Snowed, who was at one time an Intelligence Contractor for the Central Intelligence Agency, released classified information because he believes the people have the right to know what kind of ... Get more on HelpWriting.net ...
  • 20. Snowden In Citizenfour Analysis The picture painted of Snowden in Citizenfour is that of a calm and honest man whose actions were for public service. While this may very well have been the case, the documentary doesn't speak much of the fact that Snowden disclosed highly classified information without any authorization, which is criminal in nature. If Snowden selected said files that were illegal in nature to expose, the mass file dump that ensued could have been avoided. Snowden stole well over a million intelligence files and provided complete access to Glenn Greenwald without knowing how he'd use the information. In the end, Greenwald only decided to publish 4 of the 41 slides of a single relevant file to the general public. Even though he did manage to expose illegal ... Get more on HelpWriting.net ...
  • 21. Edward Snowden Hero Edward Snowdeb is being called a traitor for bringing secret government programs of them spying on the American people and actively breaking the American people's rights. Edward Snowden should be called an American hero because he brought to light government secret programs, acted courageously, and caused the government to realize they cant do whatever they want. Snowden was a former CIA technical assistant, and more recently worked for the NSA as a defense contractor at Booz Allen Hamilton (Rowen, 2014). Because this company had a contract with the NSA there was always secrets flowing into this business 24/7. In June 2013 Mr. Snowden meet with two journalists at Hong Kong to talk about the information he had on the NSA. What these classified... Show more content on Helpwriting.net ... He gave up his personal freedoms to inform the American people about these policies and secret programs the NSA is operating. I feel that his bravery truly shows how good of a person he is. He understood from the beginning when he leaked out the NSA revelations that he would have to live scared, and always watching his back. He had a awesome career making $200,000 a year, living in Hawaii with his girlfriend, and a family that he loves (Greenwald, 2013). "I'm willing to sacrifice all of that because I can't in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building"(Greenwald, 2013). Snowden currently is in hiding in Russia with Russia's permission to be there, Snowden is facing criminal charges against him if he returns to the United States. Federal prosecutors have charged him with three felonies; theft, "unauthorized communication of national defense information" and "willful communication of classified communications intelligence information to an unauthorized person" (Finn, 2013). Which two of the felony charges fall under the 1917 Espionage Act (Finn, 2013). When asked, "Even with all these heavy charges you still don't regret his decision"? he said, "Absolutely, not" (Snowden at SXSW, 2014). Even though the Government has ... Get more on HelpWriting.net ...
  • 22. Insider Threat The purpose of this document/plan is to initiate an Insider Threat Program within ECI.(ECI has created this policy/ guide to provide employees as well as the entire company with a solid directive on Insider Threat). Overview ECI was established in 1996. To date, ECI has no security violations within the company. The ECI headquarters is located in Frederick, MD and has been since its conception. Currently, ECI does not house any classified material, documentation or networks. As a government contractor, ECI employs its staff with work locations designated based on the contractual agreement. All of ECI's contractual work (classified) is completed on site within a SCIF environment or within government spaces. ECI Insider Threat Policy ... Show more content on Helpwriting.net ... This information will be shared with internal workface, senior official, and internal staff to include, Security, HR, Information Systems Administrator. The internal groups will meet to review documentation, interview key personnel, review processes and security issues. The team will focus on prevention, detection and response strategies. Discussion and review practices will include the review of policies, procedures and technologies along with potential vulnerabilities. ECI will understand the assessment and provide the outcome information to all Security offices as ... Get more on HelpWriting.net ...
  • 23. Opposition to Leakers Are government whistleblowers acting in the public interest, or do they endanger the public by exposing classified information? Just as government transparency has waned in recent years, there have been several instances of very public national intelligence whistle–blowing. Large scale leaks such as those published by The Guardian and WikiLeaks have prompted debate on issues of government secrecy, as well as the balance between security and liberty. High profile whistleblowers like Bradley Manning, Julian Assange, and Edward Snowden have, at great personal risk, leakedclassified information to the public in the interest of transparency. Leaked media and documents range from embarrassing, to potentially dangerous. Heightened levels of ... Show more content on Helpwriting.net ... New York Times reporters James Risen and Eric Lichtblau were awarded the Pulitzer Prize; Drake was indicted under the espionage act (Wise). The NSA came under scrutiny again in 2013 when Edward Snowden revealed large scale data collection and surveillance programs. As history can attest, government whistleblowers act honorably for the greater good despite threat of prosecution. Government transparency, especially in acts of war, is important to a functioning democracy. J. William Leonard, former US classifications czar, In the documentary We Steal Secrets: The Story of WikiLeaks, illustrates, "To have those types of decisions, those types of deliberations, done in secrecy is a tremendous disservice to the American people – because these are things being done in their name – so, whether you agree with them or not, to have a free back–and–forth airing of these is essential". In support of these concepts, those behind WikiLeaks and other government leaks have taken great risks. Birgitta Jonsdottir, member of WikiLeaks and Icelandic parliament, stated, "We were working on something that we knew that could get us into serious trouble and we were all willing to take that consequence" ("We Steal Secrets"). In We Steal Secrets, instant messages between Bradley Manning and the man who eventually turned him in, hacker ... Get more on HelpWriting.net ...
  • 24. Chelsea Manning Research Paper There is perhaps no whistleblower in the United States more well–known than Chelsea Manning. A hero to some, her leaks have been credited as being a catalyst for the Arab Spring, exposing the support of the US government for corrupt dictators all throughout the Middle East. She is also credited for exposing the misdeeds of the US military in its campaigns in Iraq and Afghanistan. She also has a large number of detractors, many of whom claim her leaks endangered the national security and foreign policy interests of the United States. Some go so far as to call her a traitor – an allegation so serious that there have been calls for Manning to be executed. It is not surprising that the person responsible for the largest leak of classified intelligence in the history of the United States would be a very controversial figure. This essay will explore the life of Chelsea Manning, the classified material that was made public as a result of her leaks, and her eventual arrest and imprisonment. Upon close analysis, it can be shown that while Manning leaked classified material in an improper manner, the American people have a ... Show more content on Helpwriting.net ... Born the son of two alcoholics, Manning's older sister claims that their mother drank during her entire pregnancy with Chelsea. Manning says she had a very difficult childhood, with two alcoholic parents who did little to care for her, and depression due to what she would later identify as gender identity disorder. Her parents divorced in 2000, and in late 2001 she and her mother moved to Wales, where her mother was originally from. Manning says she was bullied extensively while attending school in Wales. The other students teased her relentlessly for being overly feminine acting, as well as being the only American in the school. In 2008, Manning graduated high school and returned to the United States and moved in with her father and ... Get more on HelpWriting.net ...
  • 25. The NSA: The Pros And Cons Of The NSA Many of the NSA's goals have been completely contradicted by the leaked files. Their first goal, to protect privacy rights, was a complete joke. The Fourth amendment states that there should be no unreasonable searches or seizures. Collecting people's metadata that isn't public violates this right, not achieving their first goal. Their second goal, protecting vital networks, is also ambiguous. Since the NSA uses the zero day exploits, and since the companies they get the exploits from sell them, The NSA is letting the hacks be used. Another problem with this statement is that it says "vital networks". How would US citizens know what the NSA considers vital. Were Hillary Clinton, the secretary of state's emails not vital enough to protect? There... Show more content on Helpwriting.net ... "It was maximally secretive from the start: President Truman created the NSA with the stroke of a pen at the bottom of a classified 7–page memorandum. Even the name was initially classified. Decades later, the memorandum that acted as the agency's charter remained secret."(Friedersdorf). Because of this, the NSA has been shrouded in secrecy, which people disapprove of. "Despite its size and power...no law has ever been enacted prohibiting the NSA from engaging in any activity... In addition to being free of legal restrictions, the NSA has technological capabilities for eavesdropping beyond imagination."(Friedersdorf). The NSA didn't want people to know about them or the illegal things they were doing. When the snowden files were released, The NSA had a downfall. If they were doing everything that was legal, they wouldn't have to hide everything that they are doing. While the NSA tries to support the US, many people still disapprove of their private records being ... Get more on HelpWriting.net ...
  • 26. Whistle Blowing Controversy In 2013, Edward Snowden, former technical contractor for the U.S. National Security Agency (NSA), released thousands of confidential documents to The Guardian. Now considered the biggest government information leak in history, these documents contained classified information regarding widespread government wiretappings, including the wiretapping of more than 35 world leaders and allies ("Right of Privacy Timeline"). With so many people involved and the rising Computer Age, the topic of whistle–blowing has become more relevant than ever before. Whistle–blowing has become a heavily disputed topic in America, with critics and supporters debating the ethics and consequences of whistling while one works. To fully understand the issue of whistle–blowing, ... Show more content on Helpwriting.net ... Some point out the concern that leaking classified government information is a breach of privacy and compromises national security. In addition, supporters claim that leakers of military information are guilty of espionage because their actions are not in the best interest of the American military ("Should the Government"). Furthermore, they believe this to also be true for the organization, Wikileaks, stating that the site is dangerous because of it's history of leaking information such as troop movements and names of Afghan and Iraqi informants ("Wikileaks: Is Wikileaks Justified"). Although this is troubling to most supporters, many supporters are more troubled by the anarchist agenda that they claim whistle–blowers harbor. Protestors states that Wikileaks is a criminal organization that aims to create chaos with their leaks. They criticize the organization, pointing out that it maintains an aggressive ... Get more on HelpWriting.net ...
  • 27. Assignment 1 : Free Speech During Wartime Assignment 1: Free Speech During Wartime Throughout history we have seen how the government can censor the media during a time of war, in despite of the first amendment. We are entitled to our voices and opinions and by censoring what the media and citizens feel, not allowing them to express their concerns or ideas or concepts is an atrocity. The government decides if we enter a war not the citizens. Are we are never allowed to speak out against a war? Does this mean we are unpatriotic or unamerican? During the Civil War, the military often kept reporters off the battlefields. Years later, the U.S. entered the First World War and took control of all radio communications and censored all photographs. Congress then passed the Espionage and ... Show more content on Helpwriting.net ... This law prohibited any speech that interfered with the drafting of men into the armed forces. The media is forced to silence, due to the fear of any repercussions, from the government. Merely voicing an opinion in the media about any war is now so looked down upon that it takes away freedom from the media to reach all types of audiences. Assignment 3: The Press and Classified Documents As the Vietnam War dragged on, with more than 500,000 U.S. troops in Vietnam by 1968, military analyst Daniel Ellsberg, came to oppose the war, and decided that the information contained in the Pentagon Papers should be available to the American public. He photocopied the report and in March 1971 gave the copy to The New York Times, which in return published the Pentagon Papers was the name given to a top–secret Department of Defense study of U.S. political and military involvement in Vietnam from 1945 to 1967. The Nixon administration had Ellsberg indicted on criminal charges including conspiracy, espionage and stealing government property. The trial began in 1973, but ended in a dismissal of the charges after prosecutors discovered that a secret White House team burglarized Ellsberg's psychiatrist's office to find information that would discredit him. Edward Snowden and the PRISM leak: On June 6, 2013, The Guardian broke the news that the U.S. National Security ... Get more on HelpWriting.net ...
  • 28. Lifeboat Persuasive Speech Scenario: There are a group of people on a lifeboat and the boat is sinking. There is also a 400 pound man on the boat. The problem is the boat can only hold ten normal size people. Having said that, the group has to come up with a decision for their survival; so what should they do? Below are the conversations among the passengers. Consequentialist: If this man is too heavy and he's going to make the lifeboat sink, we need to decide what to do. Should we throw him overboard? We have to save ourselves. Morally we know that if we throw him overboard he will drown and we will be responsible for his death. I've always believed that "Thou shall not kill" – one of the Ten Commandments. Let's suppose we do throw him overboard and the boat... Show more content on Helpwriting.net ... If so, when? If not, why not? I can't specifically say that it is justified, but I'm thinking of the war and the fact that soldiers have a job to perform. They go out every day and kill innocent people. But it's either them or the innocents. Morally, I'm not saying it's right, I'm saying in the war it's all about survival. If our soldiers have to bomb a village in order to capture enemies, then unfortunately some civilians will be killed. Even though killing an innocent is not moral or ethical, in the ends our soldier's lives will be saved. Scenario: The soldiers have captured enemies that are aware of dangerous weapons that could cause mass destruction and devastation to the United States. The only way we can get the information is to torture them (cause bodily harm) but in the interim, we would be able to find the weapons, destroy them and save thousands of Americans. Another situation that comes to mind is if we are not to commit murder, why do we put mass murders to death? Why not put them in solitary confinement for the rest of their lives and make them suffer. That is why I do not believe in the death penalty because it gives them a way out. Or perhaps let's flip the script. Suppose I work for the government, I have important information that was secret and confidential; and if it landed in the wrong hands could wreck havoc on the whole country. Unfortunately, I was kidnapped and tortured but still I refused to give up the ... Get more on HelpWriting.net ...
  • 29. U.s. National Security And Foreign Policy Abstract: The theoretical and qualitative research findings discussed in this paper support the claim that the cases of Aldrich Ames and Edward Snowden led to monumental changes in U.S. national security and foreign policy. The effects of these cases extend beyond domestic change and have instigated international repercussions in both intelligence practices and diplomatic relations between the United States and multiple countries. Moreover, research acquired from journals, academic books, congressional documents, and scholarly articles will be used to strengthen the argument that the ramifications of whistleblowing and espionage in the Information Age have heightened the potential for damage to U.S. foreign relations and national security. The infamous cases of Aldrich Ames and Edward Snowden have been highly publicized and extensively researched by the intelligence community, media, and academics alike. Consequently, a plethora of articles, biographies, and documentaries have been written and produced on the lives and controversial actions of both Ames and Snowden. While leading experts on these cases have thoroughly analyzed the motivations behind Ames and Snowden 's actions, and provided extensive details on their particular cases, few researchers have focused exclusively on the effects Ames and Snowden's cases had on U.S. national security and foreign policy. Thus, the specific question that will be addressed in this thesis paper is "how have the cases of Aldrich Ames ... Get more on HelpWriting.net ...
  • 30. Barack Obama 's Presidential Debates During the Democratic presidential debates on Tuesday, frontrunner Hillary Clinton was backed by her fellow Democratic contenders, most notably, Sen. Bernie Sanders (I–VA), who remarked in response to Clinton 's e–mail flap, "Let me say something that may not be great politics, but I think the secretary is right. The American people are sick and tired of hearing about your damn emails." http://www.reuters.com/article/2015/10/14 /us–usa–election–democrats–idUSKCN0S70B920151014 This was an early warm moment between the contenders, but the debate turned crisp at times while the contenders focused on an array of issues deeply impacting Americans, including the economy, criminal justice, the environment, among other leading issues. However, despite the pass that Clinton received in the presence of her political peers and media inquisitors, Clinton 's characterization of the e–mail investigation as benign involving Clinton 's candidacy may be a red herring. In the matter of government whistleblowers, former NSA contractor Edward Snowden and former NSA executive Thomas Drake faced charges of violations of theEspionage Act ("the Act"). Snowden, the former CIA employee and government contractor who in 2013 leaked classified information from the NSA, created the tempest during this administration under the Espionage Act and fled the country and remains at large presumably residing in Russia.. Drake challenged the DOJ and faced his charges under the Espionage ... Get more on HelpWriting.net ...
  • 31. The United States National Security Agency With the ever–expanding enigma that is the internet and technology, there is the constant question of privacy; how does the US monitor its citizens or foreign nations? Edward Snowden, a man who risked himself to bring details about the United States National Security Agency to light; the National Security Agency (NSA) is the government agency responsible for surveillance on foreign countries as well as the US itself. How do these two tie together? Or how did the NSA let Snowden, or others before him, get into through their security and publicize classified information? Snowden, the whistle–blower of the NSA that revealed thousands of NSA secrets, started life as a normal child and into his teen years he never stood out. Edward Snowden is known as s computer literate person of interest, yet when he was young and in high–school, he dropped out of school. Despite being a high–school dropout, at the age of 16 Snowden attended a community college. While in his teens and late twenties Snowden was very interested in the internet; it could be theorized that this interest in the internet would lead to what he would want to reveal. In his teens and early twenties, Snowden was often found online in chat rooms about computers and other things involving the internet. He was known for contributing on a site know as Ars Technica. As stated by Harding, Snowden first started on this site with the intention of setting up his own server. In 2009, his active posting and discussions on Ars ... Get more on HelpWriting.net ...
  • 32. Identification And Punishment For Mishandling Top Secret... Identification and Punishment for Mishandling Top Secret Information The handling and use of any information are critical to avoid legal and political implications that arise as a result of exposure of such information to unlawful use. Federal statutes are explicit that those tasked with handling classified information should not have any unauthorized access or disclosure. The law spells the implications that arise in a case of these violations (ODNI 2). However, it is important for us to understand what is meant by top secret information, how to identify if it has been mishandled, and the legal implications or punishments for those involved once it has been proved that indeed they disclosed such information. The essence of this report essay is to discuss the identification and punishment for mishandling top secret information. Top Secret information According to the Directorate of National Intelligence Office, information is classified as "Top Secret" if any unauthorized disclosure can reasonably result to or cause exceptionally grievous damage to national security. Top secret information is the highest classification level of classified information under the federal security laws (ODNI 3). Keeping and retaining top secret information has nothing to do with the heading on the document containing the information, but the information itself. Therefore, unauthorized disclosure may be considered as an act of mishandling such confidential information by individuals working in ... Get more on HelpWriting.net ...
  • 33. Analysis Of Thomas Andrew Drake 's A Man Who Was A Former... Introduction: Thomas Andrew Drake, a man who was a former senior executive of U.S. NSA (National Security Agency), a decorated United States Air Force And Navy veteran and a whistleblower. In 2010, Thomas Andrew Drake was alleged with mishandling of documents, rarest of the Espionage act in the history of United States. Defenders of Drake claim that he was instead being prosecuted for challenging the trailblazer project. In 2001, exactly on the day of 9/11 he was appointed as the Signals Intelligence Directorate in Fort Meade, Maryland when he joined the NSA as a full–time employee. He later progressed to higher levels in the organization to a level where he held a top security clearance. During the investigation which was dwelled into the 9/11 by congress, he was testified NSA failure. In 2011, he was awarded Ridenhour Prize for TruthTelling and was co –recipient of Sam Adams Associates for Integrity in Intelligence (SAAII) award. As we progress into this paper, we will discuss various stages of this crime such as what were his actions in NSA, NSA inquiry and acknowledgement, Inevitable Whistleblowing, FBI raids, Indictment, Court proceedings, Government arguments, final disposition, what happened since 2012. In this paper we will also discuss the Espionage act and Whistleblowing, what is a part of the McCarran Internal Security Act and what was the Nation Defense information, classified information which was mishandled by Thomas Andrew Drake. Espionage Act and ... Get more on HelpWriting.net ...
  • 34. Contemporary Outlaws : Today 's Modern Outlaws Brandon Plascencia Professor Carrie Morrow English 20530 November 2014 Contemporary Outlaws Today's modern outlaws are closely similar to the outlaws in western movies. They take from the powerful groups in the community and give to the needy. Today's outlaws are following in the similar steps but, in a digital world. The digital world is now the modern Wild West because it's a new frontier that keeps growing without control, and laws are still being set in place so everyone online is free to do as they wish until a law has been set in place. The modern outlaws I will be writing about are Edward Snowden, Julian Assange and the hacker group of Anonymous. Each out law has provide some type of service or information to the public that was secret and important to the world community, but was being withheld from the public eye because of powerful people and entities. By releasing this information the outlaws knew of the consequences this would bring to their lives. With today's technology you can't hide or run away, everything is tracked unless you know how to hide your steps. But for the most part the powerful governments are able to track down the outlaws. Today's outlaws must be ready fight not just a digital or information battle but a legal battle as well. Today's outlaws don't have any empty fields to run off to any more, the closest thing to an open field is a 3rd world country or an enemy of the government of who they are fighting. The globe is the new open field and ... Get more on HelpWriting.net ...
  • 35. The Army's Current Network Defense System While working as the Chief Information Security Officer (CISO) at the Army Materiel Command, the command was under constant attack by hackers. The Army's current network defense system was woefully inadequate for protecting the commands 140 locations worldwide. After sustaining a couple of very high profile attacks using these tools, it became evident that something else was needed. One of the command's subordinate commands was the Army Research Labs and is on one the foremost research labs in the world. One of the labs mission was Cyber Defense and came under my preview as it program manager. The lab had developed several cyber security tools and had been testing them very successfully on a several platforms. The power of this tool ... Show more content on Helpwriting.net ... Once we got the system user friendly and developed a training program, I was able to defer the cost of the tools over several agencies. Once we deployed and the agencies began using it, and cut their incidents to almost none, I was able to partner with them to secure more funding. My cost model, after startup cost, was cheaper to deploy and maintain than commercial off the shelf software, due to the custom code developed internally. Since I provided better and cheaper tools I was able to negotiate maintenance contracts with them and use that funding to further develop my tools. I was also able to politically influence agency standards when it came to cyber defense. Since the tools were developed by the government for the government, agencies was more willing to spend more money than on private tools because the code was more secure. Earlier in my career, while working for the Coast Guard assigned as an intelligence officer and program manager, I was assigned to develop an information sharing system to support the Coast Guard Intelligence activities. In evaluating the situation, it was easy to see that the Coast Guard was technically disadvantaged. At this time, the Coast Guard IT infrastructure consisted of a custom designed workstation, sever and network. It was a head of its time and offered the capability of unclassified agency wide e–mail and file sharing, and in the early 90s this was far beyond other services. The Coast Guard did not ... Get more on HelpWriting.net ...
  • 36. Papers On Jay Martin We all have heard the phrase loose lips sink ships. On 19 May 2011, the Federal Bureau of Investigations (FBI) painted another picture in our mind regarding this phrase. The in–depth investigation of Bryan Minkyu Martin revealed the real reasons why he betrayed the country for his own benefit. This is a classic example to prove cyber espionage cases can be alarming to our nation's national security. Bryan Minkyu Martin was born in Seoul, Korea in 1988. Peter and Barbara Martin, a psychologist and an intelligence specialist, adopted Martin at the age of two. His parents raised him in the small town of Mexico in upstate New York. Eventually Martin graduated from Mexico High School in the year 2006. "As a high school student in Mexico, ... Show more content on Helpwriting.net ... Members of the military services should be aware of any insider threat indicators presented by others to ensure the proper steps are implemented in the early stages and safeguard classified information. At this point, we should understand desperate people in desperate situations mainly derive espionage cases. Following this, it is essential for all soldiers recognize any form of threats to our nation's national security and report these incidents immediately before they can harm our country. In addition to Martin's espionage case, we can further understand the importance of securing classified information because it can seriously destroy relationships between countries. As a result, Martin deserved the punishment given to him because he knew the consequences of betraying his country. This case clearly indicates the reasons why we should have good communications at work and recognize individuals that may have issues that could possibly become an insider threat. Finally, we must be the change we wish to see among others, because every single person in this world can make the slightest perfection in another person's ... Get more on HelpWriting.net ...
  • 37. The Importance of Securing Sensitive Items Essay example Sensitive items are anything that is considered classified or a mission essential item. These items can include protective gear, maps, or a piece of paper designating patrol routes. The importance of securing sensitive items comes down to maintaining accountability for operation security, mission success and a soldiers over all readiness. The habits of exercising security and accountability of a soldiers items allow the soldier and their team to operate to the highest standards or have items be accessed by an opposing adversary creating loss of overall mission success. Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly... Show more content on Helpwriting.net ... Although sensitive items of restricted nature may not disclose information of high value, items and information obtained from being unsecured can cause adverse effects impacting mission success to include compromised routes, vehicle information or sensitive items used for personal protection. Any and all information obtained by any means can be used to put together a larger pictures of a units operations. Leaving the units operational security compromised. Each person themselves are responsible for exercising reasonable and effective actions to properly care, store, safeguard and use any and all items presented to them whether it be issued or acquired through personal expense. Taking the time to either store items in a secure location such as a locker or independent room that is secured and solely accessed by the owner of the stored items. Placing care of items to trusted members of your unit is also considered safeguarding items of value but trust should not always be put into everyone with in a unit for storage. In the case of Aldrich Ames we can see that some people can't be trusted no matter what profession they may hold. Ames was convicted of spying for the Soviet Union/Russia, betraying many persons within the U.S. Government on operations ... Get more on HelpWriting.net ...
  • 38. The Issue Of Whistleblowing Is Becoming More Popular As... Whistleblowing is becoming more popular as the world becomes more obsessed with secrecy. Some people advocate secrecy and some believe that secrets can't keep us safe. At least, this is what Bradley Manning and Edward Snowden thought. The public is obsessed with the idea of knowing what the government is hiding from us and internet connectivity, the growth of the Intelligence Community, and the encouragement of the public perpetuates this. Two major leaks of classified information happened in 2010 and 2013 by Bradley Manning and Edward Snowden and caused lots of debate in their wake. How should the U.S. government deal with whistleblowers and is there a specific way they can be dealt with. In the cases of Manning and Snowden, the U.S. ... Show more content on Helpwriting.net ... But one thing secrecy definitely does is facilitate the creation of whistleblowers like Bradley Manning and Edward Snowden. Bradley Manning is 27 years old in prison for leaking over 700,000 documents to WikiLeaks, the largest leak of classified documents in history. In 2010, he was a low level military intelligence analyst in Iraq when he was detained under suspicion of stealing classified information. He came to trial three years later on twenty charges of espionage and theft. Manning was sentenced to 35 years in prison and will most likely serve about eight years of that. Edward Snowden is a 31 year old American citizen living under asylum in Russia. He was an NSA contractor for Booz Allen Hamilton that gradually grew disillusioned with the NSA and the blatant hypocrisy going on in the NSA. He leaked 200,000 documents to journalists, and no one really knows the actual number of documents he took, but estimates have been said to be close to 2 million documents. Snowden hasn't faced his charges because he fled outside the country even though he is aware of the consequences that face him and stated, "I told the government I'd volunteer for prison, as long as it served the right purpose, I care more about the country than what happens to me. But we can't allow the law to become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal. ... Get more on HelpWriting.net ...