SlideShare a Scribd company logo
1 of 77
Download to read offline
Nsa Is The Spying Ofu.s Citizens
The National Security Agency (NSA) has been an information gathering arm of the Executive
branch since the Cold War and continues to be an essential part of ensuring the security of the
United States. The public issue that involves the NSA is the spying of U.S citizens which can be
seen as a violation of the Fourth Amendment of the United States Constitution. This was revealed to
the public by the whistleblower Edward Snowden who released classified documents of activities
that the NSA had been conducting in conjuncture with telecommunication companies, which
angered many U.S citizens and received media coverage with a call for the U.S Government to
restrict the NSA's activities or at least for there to be Congressional oversight. This debate revolves
around how much the NSA's surveillance activities are actually used for national security as well as
the constitutionality of the NSA's surveillance. This all began after the terrorist attacks on
September 11, 2001 when there was a call for the attacks to never happen again and the adoption of
the Patriot Act in that same year which increased the power of the NSA.
The National Security Agency over the past few years was revealed to have spied on American
citizens under what can be considered illegal or unconstitutional circumstances which sparked
concern and outrage across most of America. This was first recognized in 2013 when the
whistleblower Edward Snowden or traitor as the United States government considers him, leaked
... Get more on HelpWriting.net ...
Pros And Cons Of Surveillance
"The consciousness of being at war, and therefore in danger, makes the handing–over of all power to
a small caste seem the natural, unavoidable condition of survival" (Orwell). The world today is full
of many dangers domestic and abroad. It has become a routine in the news to report on the daily
mass shooting or update with the war on terror. We live in a world where being worried is justified;
however, we should not give up our constitutional rights in the face of fear. The NSA's dragnet
surveillance programs, such as PRISM, are both ineffective and are surpassed by less questionable
national security programs. The FISA court's' approval of NSA actions are not only illegal, but exist
as an embarrassing formality. Surveillance is a necessary ... Show more content on Helpwriting.net
...
In practice, the FISC system curtails the constitution, is appointed by a single person, and acts a
simple bureaucratic box to tick. The judges of the FISC are appointed solely, without any approval,
by the Chief Justice of the Supreme Court. Justice John Roberts and the chief justices before him
alone dictate the interpretation of the fourth amendment, a largely republican bias, "[John Roberts]
appoints all FISA judges, drawn from the federal bench, and right now 10 of 12 were originally
appointed by Republican presidents" (Walsh). Likewise, the warrants issued by FISC are not
specific to individuals, organizations, or specific items to be found. They lack essential principles of
law, such as probable cause and particularity, "indiscriminate searches and seizures conducted under
the authority of 'general warrants' were the immediate evils that motivated the framing and adoption
of the Fourth Amendment" (Payton). Moreover, the government effectively provides no contest to
any NSA search or spying. According to statistics of court rulings, warrants and records requests
over the court's history were denied 0.03% of the time (Center). The current situation of surveillance
oversight in the United States is dismal, reckless, and
... Get more on HelpWriting.net ...
The National Security Agency ( Nsa ) Is An Intelligence...
Security is key for the advancement and stability of the United States, and spying is nothing new to
the world. With the advancement of technology, we are now able to stay connected with each other,
while having a plethora of information at our fingertips. This is phenomenal, but dangerous. With
the increasing amount of stored data online and the speed at which said data can be transferred, one
can only worry that maybe were sharing a little TOO much information. The National Security
Agency (NSA) is an intelligence organization created by the United States government. The NSA is
responsible for global monitoring, collection, and processing of information and data for foreign
intelligence and counterintelligence. Today, the NSA states that ... Show more content on
Helpwriting.net ...
These countries were pretty successful at obtaining sensitive Intel. However, in the 21st century
surveillance is used in a different and more complicated way. Due to the drastic increase in crime
rates and recent terrorist attacks, governments around the world were forced to use electronic
surveillance to protect their own people. The electronic surveillance that each government conducts
is so complex and covert that you don't even know that you are the target. The US government has
become one of the biggest cases of this kind of surveillance. The US government has been
employing several forms of high level surveillance such as wiretapping, CCTV cameras (Closed
Circuit Televisions, aka street cameras) and now internet data by looking at the information
transferred between devices. The thought that the government was secretly watching their citizens
every move has been talked about for some time now. Although this talk was widespread and sort of
heard of, there was no definitive proof. However, suspicions were confirmed in 2013 due to a man
by the name of Edward Snowden leaking classified information from the NSA's archives. Amongst
the leaked information, evidence showed that the NSA had been spying on millions of innocent
people, and said monitoring is still being conducted. This shocking level of spying was without
warrant, making it illegal. Now, the US government has taken its bad
... Get more on HelpWriting.net ...
NSA Persuasive Essay
Since the Edward Snowden leak in 2013, the controversy over NSA surveillance has focused on the
invasion of privacy of United States citizens. Specifically the bulk collection programs that have
picked up American phone data, even of those who haven't done anything wrong. This invasion of
privacy has been deemed unconstitutional by many and for good reason.
In recent years, the NSA controversy has become more eminent, mostly due to the Edward Snowden
Leak in 2013. This leak revealed sensitive information about the NSA tracking the movements of
millions of people using cell phone metadata and the action of the NSA intercepting and storing data
on billions of people all over the world. More recently, in 2015, key provisions of the Patriot Act, a
law intended to help the United States government detect and prevent acts of terrorism or the
sponsorship of terrorist organizations, were debated over whether or not they should be allowed to
expire. Due to their mass cellphone data collection program, other programs involving the
wiretapping of suspects, and more that were possible threats to the privacy of U.S. citizen's, there
was substantial discourse about what to do with these key provisions. These key provisions,
specifically, Section 215, were renewed until 2019, with the exception of the mass collection of
phone data, which was revised with more restrictions because it was the most controversial.
With the opportunity to track terrorists comes the opportunity to invade
... Get more on HelpWriting.net ...
Domestic Surveillance During The United States
Domestic Surveillance in the Unites States has been going on for decades without the public 's
knowledge. Domestic Surveillance didn 't seem important in the eye of the American government.
After the September attacks (9/11) congress started to treat Domestic Surveillance as a number one
priority. After September 11th Congress passed a law to use military force for those responsible for
the attacks in New York, NY. The go ahead with using military force did not give the President to
use surveillance without a warrant. Congress started to pass legislation against counterterrorism
efforts. The most controversial measures, including the 2001 USA Patriot Act that gave the US
federal government the ability to collect and analyze private information that has identified itself
with the United States of America.
With new found ways of viewing American citizens personal information the federal government
had to learn how not to get caught. American citizens have right to their privacy and with all the new
Domestic Surveillance programs many were warrantless. In 2002 Bush signed a presidential order
allowing the National Security Agency to monitor without a warrant. This presidential order applied
to international telephone calls and e–mail messages of thousands of citizens and legal residents
inside the United States. This program never had the requirements to obtain or produce a warrant
from the Foreign Intelligence Surveillance Court but, as the 4th Amendment to the Constitution
... Get more on HelpWriting.net ...
A Study of the Foreign Intelligence Surveillance Act
FOREIGN INTELLIGENCE SURVILLANCE ACT This act was created in 1978. It proposes
methods for gaining judicial permission in order to carry out physical and technological search for a
person, who might be a terrorist threat for USA, on behalf of a foreign power. In 1970, a man named
Christopher H. Pyle discovered that the US army intelligence had hired 1500 officers whose job was
to spy on protest or public demonstration that involved more than 20 people. This shocking news
immediately captured the attention of Senator Sam Ervin, who was the chairman of a sub–
committee of senate related to constitutional rights. Though Sam Ervin strongly condemned this act
of US intelligence but he had very little authority to take a step against it. It was due to brave men
like Christopher H. Pyle and Senator Sam Ervin that people came to know that how the government
was ignoring and violating the provisions to the constitution. This violation of rules and laws by the
government led towards the formulation of foreign intelligence surveillance act. The primary feature
of this act was as follows; "the creation of the Foreign Intelligence Surveillance Court ("FISA
Court") which allows the executive branch to secretly obtain warrants for electronic surveillance but
only with strict judicial review" Previously there were seven members of foreign intelligence
surveillance act court but now the number has been extended to eleven. All of these members are
appointed by the chief justice of
... Get more on HelpWriting.net ...
The Pros And Cons Of Verizon Wireless
Verizon Wireless is known for their famous slogan, "Can you hear me now?" The National Security
Agency (NSA) took the meaning to the slogan "Can you hear me now?" to a differently level. One
may speculate that the NSA has brought a new meaning to the slogan putting Verizon in the
spotlight of an ethical dilemma. Verizon Wireless was founded April 4, 2000 and not long after, they
were considered the largest mobile network companies in the United Stated.
Verizon was ordered under the Patriots Act Section 215 by the Foreign Intelligence Surveillance
Court to supply individual and business cell phone data. The court was created by the Foreign
Intelligence Surveillance Act of 1978 and provides judges appointed by the president. The review ...
Show more content on Helpwriting.net ...
However, they did know it would maximize their profits by selling the selling a portion of their
business and other monies received. The loss of customer loyalty at the end of the day would not be
worth the money they received. This scandal has now been seen as unethical and invasion of
privacy. Before this chain of events Verizon was seen as one of the largest and best mobile company
with 119.4 million subscribers as of 2013, now they face unsure customers who are not sure of this
company and may switch to another provider. Although they were court ordered they did not fight
this request and seen only their best
... Get more on HelpWriting.net ...
America 's Justification For Surveillance And Spy Activity
The National Security Agency of the United States has created a confidential surveillance program
named PRISM, operating as the world's largest "Planning Tool for Resource Integration,
Synchronization, and Management". This program is designed to gather and process "foreign
intelligence" that travels through the United States, by extracting data from some of the world's
largest tech companies and its users. The United States describes itself as the "Worlds
telecommunications backbone", which was explicitly listed in the leaked PowerPoint presentation of
PRISM's operation. By going undercover and secretively accessing file transfers, e–mails, videos,
call logs and numerous other types of data, the United States government is enabling a watch dog on
its citizens and creating the largest terrorist regime. These PowerPoint slides behold some very
disturbing information in how U.S citizens are being deprived of privacy, leading to loss of agency.
Restricting individuals to be watched all the time turns the human race into robots, as individuality
is lost, and liberty and freedom begins to diminish. America's justification for surveillance and spy
activity since 9/11 was to fight terrorism and protect the population, but these documents have
nothing to do with capturing foreign terrorists or improving national security. They are a means of
control, and instead of indicating those as the elected and the elector, meaning that congress and this
government was only created through the
... Get more on HelpWriting.net ...
Finding the Balance Between Privacy and Security Essay
Clearly, the United States is in unfamiliar territory when it comes to combat– ing counter–terrorism
with technology. The founding fathers could not foresee the technological advances, and the
complications that arose from them. Under– standably, the United States law enforcement is having
a rough time reconciling the constitutional rights a orded to its citizens, while protecting them from
a terrorist threat.
Initially, the government struggled with this balance. What brought these laws on in the rst place
was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable
point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was
built on over
decades, ... Show more content on Helpwriting.net ...
The PATRIOT Act was passed almost instantaneously, trading American freedoms for the sake of
national security. The controversial act was a response for the panic–stricken
Americans, and was the government's way of assuring another attack would not happen. Across the
ocean, western Europe was also caught up in the turmoil. How– ever, wiretapping was already
commonplace, and did not need an act like the
PATRIOT Act to grant the necessary permissions. Instead, the European Union took a di erent
approach. They began to record and keep track of the comings and goings of their citizens, storing
all the data, in the event that it might prove useful in the future.
However, the fear did not last forever. As time went on, the immediate threat began to fade. With the
diminishing threat, the need to sacri ce privacy for protection ebbed as well, leaving only public
backlash in its wake. The
European Union's Data Retention Directive has come under re for it, as well at the PATRIOT Act
in the United States.
So the government tried again, with the Protect America Act. Designed to modernize FISA, it most
likely was not as successful as its creators had hoped, and was allowed to sunset roughly a year after
its passage. However, out of it came the FISAAmendments Act.
The most recent act is
... Get more on HelpWriting.net ...
The Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act (FISA) of 1978 was a result of "congressional
investigations into Federal surveillance activities conducted in the name of national security"
(Intelligence Surveillance Act, n.d.). FISA allows for judicial and congressional supervision of
foreign surveillance, while maintaining the "secrecy necessary to effectively monitor national
security threats", and outlines the procedures for the physical and electronic surveillance and
collection of foreign intelligence information (Intelligence Surveillance Act, n.d.). Under FISA, to
obtain a warrant for electronic surveillance, agents need to show probable cause that the person in
question is a foreign power or its agent, and the purpose of the surveillance
... Get more on HelpWriting.net ...
Citizenfour: Global Surveillance
Terrorism has become a plague for many nations, and surveillance has become an emerging cure.
However, this cure is extremely controversial and was classified as top secret until very recently. In
September of 2016, a drama/thriller movie was published on an individual who revealed this
classified information called Snowden. Snowden is the Hollywood edition of Edward Snowden's
story. Meanwhile, Citizenfour, a documentary published in October of 2014, is the historical version
of the story.
Citizenfour is a film on Edward Snowden, alias Citizenfour, and his undertaking in exposing the
controversial and intrusive surveillance systems used by the National Security Agency (NSA) and
other agencies across the globe. The documentary is directed by ... Show more content on
Helpwriting.net ...
Indeed you'll never be aware of all the things those agencies are doing to stop your identity being
stolen and stop a terrorist blowing you up (Watts)." First of all, ask yourself the following: would
you be willing to give a journalist the passwords to all of your social media accounts allowing them
to scroll through all of your online activities and publish whatever they find interesting? Greenwald
has asked this question to every person that has said a version of the saying but no one has ever
replied to him ("Why Privacy Matters."). The reality is that even those that disclaim the importance
of privacy, instinctively understand and value it. The ability to be "free of the judgmental eyes of
other people" is just as important as having liberty because everyone has something to hide, even the
government officials managing the surveillance ("Why Privacy Matters."). Furthermore, some
individuals require privacy
... Get more on HelpWriting.net ...
Essay on President Bush and FISA
The Foreign Intelligence Surveillance Act of 1978 was a necessary measure signed by President
Jimmy Carter in an effort to stop the CIA, FBI, NSA, and other executive powers from conducting
warrantless wiretaps of domestic groups for so–called national security purposes. This was
necessary because findings by the Church Committee in the early 1970s suggested that warrantless
wiretapping had been going on for quite some time by these government entities and was
exacerbated by President Nixon and the Watergate scandal. This bill not only set a future precedent
for how surveillance should be conducted, but also attempted to set a standard for what "good" and
"bad" surveillance were defined as. FISA did not face any substantial challenges ... Show more
content on Helpwriting.net ...
These problems that President Bush encountered where in fact very similar to the problems that the
Carter administration predicted would surface when they were drawing up the bill in the late 1970s.
Carter and other executive members brought up many valid concerns that included physical
searches, overseas surveillance, communications intelligence, and how much power to give to the
president (Carter Memo 2). The version of FISA proposed in 1978 was in itself a solid piece of
legislature. Over the years, many amendments have been made to it that have slowly surrendered its
power and allowed to the executive branch to create loopholes in which to continue warrantless
surveillance where and when they see it fit. For this reason, the FISA process of requiring review by
a special court is still viable, but does need some adjustments that allow it to stand similarly to its
original form. Since the passing of FISA came after a widespread finding of warrantless wiretapping
by a number of different government entities, Congress along with the Carter administration, needed
to carefully craft a bill that not only reconciled national security needs to conduct domestic
surveillance, but also continued to protect individual liberties such as that of the first and fourth
amendments. The once top–secret Carter administration memos regarding FISA offer a first–hand
glimpse at the thinking that went into
... Get more on HelpWriting.net ...
Government Surveillance
Government Surveillance
Imagine a world where your every move was being monitored. A dark world where it is no secret
who you are, where you have been and who you associate with; now include who you love, who you
pray to and what you just ate for dinner. The word privacy doesn't exist in such world and it is such
world that we are heading to."Big Brother is watching you!" This quote by George Orwell couldn't
have been truer. Every aspect of our lives is being sorted through as Big Data this very moment.
Government surveillance has prevailed by the name of security. But, is government surveillance of
internet digital communications like social networks, cell phone calls, text messages, and emails
really a public service of security? Or ... Show more content on Helpwriting.net ...
Government surveillance in the past was not a big threat due to the limitations on technology;
however, in the current day, it has become an immense power for the government. Taylor, author of
a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on
paper in manila folders, there was some assurance that such information wouldn 't be spread
everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With
more and more Americans logging into social media cites and using text–messaging devices, the
more providers of metadata the government has. In her journal "The Virtuous Spy: Privacy as an
Ethical Limit", Anita L. Allen, an expert on privacy law, writes, "Contemporary technologies of data
collection make secret, privacy invading surveillance easy and nearly irresistible. For every
technology of confidential personal communication...there are one or more counter–technologies of
eavesdropping" (Allen 1). Being in the middle of the Digital Age, we have to be much more careful
of the kinds of information we put in our digital devices.
Some Americans may argue that the government surveillance programs target only foreigners, that
we, as Americans, are exempted from this type of scrutiny. They are even reassured by President
Barrack Obama in an interview on Charlie Rose: "If you are
... Get more on HelpWriting.net ...
The Foreign Intelligence Surveillance Act: Analysis, Pros...
THE FOREIGN INTELLIGENCE SURVEILLANCE ACT: ANALYSIS, PROS AND CONS
INTRODUCTION
The Foreign Intelligence Surveillance Act (FISA) is an Act of Congress passed in 1978 and signed
by the then President Jimmy Carter. The Act stipulates the procedures to be followed when
obtaining intelligence from foreign powers and agents of foreign powers both physically and
electronically. The Act has been amended severally. In 2001, it was amended to involve groups and
terrorist organizations not supported by foreign governments in an Act called the USA PATRIOT
Act. A further amendment was done in 2007 to overhaul most of the provisions, in the Act called
Protect America Act. A final amendment was done in 2008 called the FISAAmendments Act of
2008 ... Show more content on Helpwriting.net ...
A third provision by the FISA is the "Sneak and Peak" provision provided under section 213. This
provision grants the security agencies the power to enter into the office, home or premise of a
suspected terrorist or spy without informing the target. In the process of such undisclosed intrusions,
the agencies are allowed to take photographs, examine data in the computers as well as planting
devices that monitor or mirror the operation of the suspect on the computer. These devices should
also be able to monitor the internet usage and transmissions of the suspect. In suggesting this
provision, the Justice Department asserted that this unexplained intrusion had been used against
drug dealers. But now that terrorism was of more danger to the homeland, then there was need to
take terrorists as the most dangerous persons on US soil (Larry and Godoy 2006).
A very controversial provision in the amendment to the FISA is the "Libraries Provision". This
provision allows the government security agencies to access any tangible or written information
regarding the suspects, be they documents, books, records or papers. The provision further does not
obligate the agency to inform the suspect that it is accessing the vital information. The FBI is
expected to get a court authority secretly by simply proving that the suspects could be involved in
espionage or terrorism. This will
... Get more on HelpWriting.net ...
The Pros And Cons Of Edward Snowden
The United States of America has attracted immigrants for generations with promises of freedom
from an interfering government. Despite the country's guarantee, security administrations have been
secretly gathering private information belonging to U.S. citizen's. Disgraced by the National
Security Agency's lack of preservation of the American public's personal messages, Edward
Snowden, a former Central Intelligence Agency recruit NSA contractor, revealed documents that
confirmed the government's protruding practices. Some consider Snowden to be a traitor for
publishing secret government information. In contrast to these allegations, Edward Snowden is
widely known as a hero because he exposed the invasive surveillance by NSA, led to major reform
in previously flawed agencies, and has been celebrated by many journalists and reform committees.
Edward Snowden is a hero for unveiling the unknown, invasive nature of government supervision
over American civilians. In 2013, Edward Snowden leaked documents from the National Security
Agency that revealed the agency's invasive tactics of collecting and storing personal information
owned by Americans. The surveillance was authorized under Section 702 of the Foreign Intelligence
Surveillance Act of 2008 (FISA), an act intended to allow foreign threats to be investigated through
their internet usage. If agencies such as the FBI or the NSA desired personal customer information
from private companies, they can easily issue a "National Security Letter." The letter would involve
a gag order, or a document that demands complete disclosure surrounding a business deal.
Commonweal Magazine informed Americans that an astounding "fifteen thousand such letters were
issued in 2012."(Source #2) AT&T and Verizon were among the telecommunication companies to be
convinced to give the NSA copies of their customer's internet messages. The government allowed
the NSA to seize citizen's personal information with a simple processes. Considering how easy it
was to access American's private documents, privacy advocates believe Section 702 encouraged
invasive surveillance. The NSA was also capable of searching through international and American
data by conducting "upstream" and "downstream
... Get more on HelpWriting.net ...
Case Of 1928-Olmstead V. United States
1928– Olmstead v.United States Supreme court rules federal investigators can wiretap into suspects
phones legally, and use those conversations as evidence. Roy Olmstead, a suspected bootlegger, was
bugged in the basement of his office, and also in the streets surrounding his home. He was later
convicted based on that evidence. An appeal was raised on the grounds that the wiretapped data
violated the defendant 's Fourth and Fifth Amendment. It was decided that the wiretapped data did
not violate the Fifth Amendment, because he was not forced to say anything incriminating, and did
not violate the Fourth Amendment because wiretapping is not considered search and seizure (which
would require a physical search of a person's belongings or possessions.) This event is important
because it decided that wiretapping was legal and did not infringe on the Fourth or Fifth Amendment
rights of criminals, effectively allowing wiretapping to be used in investigation and trial as evidence.
In addition, it defined your Fourth Amendment rights to only apply to physical materials or
properties of yours, not conversations or other non tangible things, and said that since wiretapped
individuals were not forced to discuss incriminating information, the Fifth Amendment protection
against self–incrimination did not apply. It set a major precedent that would stand for nearly forty
years, when it was overturned in Katz v. United States. 1945– The predecessor to the NSA receives
copies of every
... Get more on HelpWriting.net ...
Section 702 Pros And Cons
1. Since the release of NSA's classified documents by the NSA ex–contractor Edward Snowden, the
controversy of morality and legitimacy of FISA (Foreign Intelligence Surveillance Act), and, in
particular, section 702, has become a major issue of public debate in the context of national security
and privacy rights. To understand the underlying controversy, it is important to understand what
powers section 702 gives to the US intelligence agencies. Section 702 of the Federal Intelligence
and Surveillance Act (FISA) is the section that elaborates on the procedures and regulations for
surveillance of non–United States persons while they are located outside the US. It defines US
people as either citizens or permanent residence card (commonly known as green card) holders.
Because determination of the person's location can be hard (due to ambiguous borders in territorial
agreements and ways to hide malefactors' location), the law requires the targets to be only
reasonably believed to be located overseas. Section 702 is flexible in terms of obtaining legal ...
Show more content on Helpwriting.net ...
This argument exaggerates the scope of the discrimination against people based on their privacy
rights. On paper, it might seem like section 702 makes a big attempt and discriminating non–US
citizens with regards to their privacy rights. Nonetheless, it's not the case when it comes to the real–
life application of the law. Evidently, the government does not have interest in targeting and using
the collected data against people who do not pose threat to the national security of the United States.
In fact, only a tiny percent of the population of earth could be considered "dangerous" to the
national security of the United States. For other foreigners, it simply doesn't make any sense to
attempt to collect and analyze the data. It is expensive, as it costs money to maintain and buy hard
drives, takes too much effort and precious time from the NSA employees, and would damage the
reputation of the intelligence
... Get more on HelpWriting.net ...
Surveillance And The Threat Of Terrorism
Surveillance
Over the decades, as technology advanced, surveillance became easier and easier. In the 21st
century, people live in the world of ubiquitous surveillance, where everything becomes collected,
saved, searched, correlated and analyzed. Surveillance generally means to keep close watch over
someone or something. While a root word in surveillance is veil, which portrays imagery as saving
face, or hiding. The U.S. National Security Agency (NSA) and other federal agencies are engaging
in the extensive surveillance to fight crime and reduce the threat of terrorism. Not only does
surveillance fight crime, it proves the honesty and humility of people in the work office or on the
streets. However, surveillance threatens privacy and liberty because it monitors individuals,
meaning that certain information may not be kept secret. This frightens countless people because the
thought of being watched sparks a controversy of the 4th amendment of the constitution. The 4th
amendment protects the right against unreasonable searches and seizures. Surveillance challenges
the privacy and liberty of individuals; nevertheless, it upholds the protection and security of citizens
from terrorism and crime. The main purpose of surveillance systems is to monitor events from a
remote or secret location. The capabilities of domestic surveillance expanded rapidly in recent years
due to the equally rapid spread of new technologies that facilitate information gathering. However,
many of the
... Get more on HelpWriting.net ...
Analysis Of Edward Snowden 's Information Leaks
In a society centered on an ever growing technological bloom, the standards for security have been
placed very high to protect citizens from cyber–attacks and wrong doing. However, some of the
steps that have been taken pushed the limits to what is lawful. Very little reforms have been made
even with recent public awareness to the problem. The steps taken make the US government
surveillance programs contradict with the constitutional rights of the American people. This essay
will address the National Security Agency and its policies, Edward Snowden's information leaks, the
views of the opposition, and solutions to this lingering problem along with contributions. The
primary American government sector in charge of sorting through the massive amounts of data that
pass through technological means is the National Security Agency (NSA). The NSA searches for
threats to the United States, whether that be foreign or domestic. Many US citizens did not know
how data was being sorted until a few whistle blowers, the most famous being former NSA analyst
Edward Snowden, began leaking classified information to the public. This revealed that the US
government was using a massive internet "dragnet" that filtered through everyone 's information,
along with the tapping of phone calls and private messages, regardless of crimes being committed or
not. They could search through private messages, turn on unsuspecting users cameras while their
computer is idle, and listen through their phone
... Get more on HelpWriting.net ...
The Pros and Cons of the Foreign Intelligence Surveillance...
Introduction
Today, electronic surveillance remains one of the most effective tools the United States has to
protect against foreign powers and groups seeking to inflict harm on the nation, but it does not go
without a few possessing a few negative aspects either. Electronic surveillance of foreign
intelligence has likely saved the lives of many innocent people through prevention of potential acts
of aggression towards the United States. There are many pros to the actions authorized under the
Foreign Intelligence Surveillance Act (FISA) pertaining to electronic surveillance, but there are also
cons. Looking at both the pros and cons of electronic surveillance is important in understanding the
overall effectiveness of FISA. [1]
Definition ... Show more content on Helpwriting.net ...
Another pro of FISA, and the applicable amendments that followed, is the ability for electronic
surveillance to be conducted without a court order for a designated length of time to better facilitate
collection and streamline the process under USC. 1802, Sec 102. There are, of course, steps required
by high ranking officials, the President and Attorney General, which must be taken to conduct such
surveillance without a court order. Also, the criteria to conduct the surveillance is restricted
specifically to communications exclusively between foreign powers and must not include
"substantial likelihood" that the surveillance will acquire communications pertaining to a United
States Person. [4] While the appropriate legal process should always be followed, this provision is
necessary at times to bypass the lengthy legal process for obtaining a court order when time
restrictions apply.
The Cons of FISAAuthorized Electronic Surveillance. FISA provides many other pros to the IC
pertaining to electronic surveillance as well, but it also brings with it multiple disadvantages. One of
the biggest cons is what the founders of the Act were trying so hard to avoid, the lack of balance.
Many people believe that the balance between the protection electronic surveillance provides and
the infringement on civil
... Get more on HelpWriting.net ...
Government Surveillance vs Personal Privacy Essay
Today, individuals are sacrificing privacy in order to feel safe. These sacrifices have made a
significant impact on the current meaning of privacy, but may have greater consequences in the
future. According to Debbie Kasper in her journal, "The Evolution (Or Devolution) of Privacy,"
privacy is a struggling dilemma in America. Kasper asks, "If it is gone, when did it disappear, and
why?"(Kasper 69). Our past generation has experienced the baby boom, and the world today is
witnessing a technological boom. Technology is growing at an exponential rate, thus making
information easier to access and share than ever before. The rapid diminishing of privacy is leaving
Americans desperate for change. Privacy allows an individual the ... Show more content on
Helpwriting.net ...
Privacy has expanded to more complex forms including people's information displayed throughout
technology (Kasper 71). Technology has become very effective for a thriving generation, but it also
possesses a handful of flaws that counter the benefits. Technologies help people post and deliver a
message in a matter of seconds in order to get a message spread quickly. It also gives individuals the
power to be the person they want to be by only showing one side of themselves. But sometimes
information that had intentions of remaining protected gets out. That information is now open for all
human eyes to see. This information, quite frankly, becomes everybody's information and can be
bought and sold without the individual being aware of it at all. However, this is no accident.
Americans in the post 9/11 era have grown accustomed to being monitored. Government entities
such as the NSA and laws such as the Patriot Act have received power to do so in order to protect
security of Americans. However, the founding fathers wrote the fourth amendment to protect against
violations of individual's privacy without reason. In a rapidly growing technological world, civil
liberties are increasingly being violated by privacy wiretapping from government entities such as the
NSA, Patriot Act and the reduction of the Fourth Amendment. The NSA, National Security Agency,
is the largest manager of United States intelligence in the
... Get more on HelpWriting.net ...
Pros And Cons Of Edward Snowden
In 2010, Snowden took a job as a private contractor at an NSA facility in Japan. He worked for Dell
corporation which contracted with the agency. As we know, after 9/11, opportunities for contactors
increased as the American security state turned many of its intelligence tasks to private corporations.
This job gave Snowden a top–secret clearance and greater access to surveillance secrets than he
previously had working for the CIA. Like his reaction in the CIA, Snowden seemed even more
shocked by what he saw going on in the NSA: "I could watch drones in real times as they surveilled
the people they might kill. You could watch entire villages and see what everyone was doing. I
watched NSA tracking people's Internet activities as they typed. ... Show more content on
Helpwriting.net ...
This would lead us to the the most important question that should be asked here: What differentiates
Snowden from the previous whistleblowers like Julian Assange, Daniel Ellsberg, Bradley Manning
and many others, making him 'the most wanted man' by the US government? The exceptionality of
Snowden which will be analyzed in the next chapter might show if it is a reason behind the reforms
emerged later or
... Get more on HelpWriting.net ...
The Nsa And The Terrorist Attacks Against Paris
In wake of the terrorist attacks against Paris, many American political leaders are urging to increase
security measures used to fight terrorism. The question is perpetual, Is government spying necessary
to curtail terrorist acts?
History
The NSA was created on November 4, 1952, by President Harry Truman and was held responsible
for collecting, processing, and distributing intelligence information from foreign electronic signals.
The NSA contributed to the Nation 's work in breaking German and Japanese codes during WWII.
The information collected was to be used for national foreign intelligence and counterintelligence
purposes and to support military operations. Although the inner dynamic of the NSA would
completely change after september 11, 2001. Nearly 3,000 Americans were dead in the worst
terrorist attack in U.S. And those working for the NSA felt guilty, as if there was more they could
have done. Prior to the attacks, many hijackers were living in the U.S. "We all felt like a great wrong
had been done and that we are all – somewhat – if not all culpable," remembered J. Kirk Wiebe, a
former NSA senior analyst. After 9/11 No longer would surveillance be limited to foreign targets.
Instead, the agency would begin monitoring virtually all data involving communications flowing
through the U.S. without a warrant and without privacy protections. "everything changed at the NSA
after the attacks on September 11. The prior approach focused on complying with the Foreign
... Get more on HelpWriting.net ...
Essay On Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act (FISA) was first established in 1978. This enactment was
the Congressional reaction to the introduction amid numerous Committee hearings of past abuses of
United States persons' privacy rights by specific components of the United States government.
Those abuses had happened, according to the government, as a component of its endeavors to
counter indicated dangers to national security. The term 'foreign intelligence' means information
relating to the capabilities, intentions, or activities of foreign governments or elements thereof,
foreign organizations, foreign persons or international terrorist activities. When law enforcement
agencies and government entities want to gather information about a crime, ... Show more content
on Helpwriting.net ...
It guarantees that the Intelligence Community has the adaptability and readiness it needs to
distinguish and react to terrorist and other foreign dangers to our security. With the current Foreign
Intelligence Surveillance Act, it gives a key part to every branch of government. It gives
responsibilities mutually to the Attorney General and the Director of National Intelligence to
guarantee that the Nation's chief law enforcement and intelligence authorities cooperate in gathering
foreign intelligence in agreement with the law. The Foreign Intelligence Surveillance Act of 2008
recognizes two groups of potential targets for surveillance under the Foreign Intelligence
Surveillance Act. The first category is foreign powers which is defined as: "a foreign government, a
diplomat, other representative or employee of a foreign government, a faction of a foreign nation
that is not substantially composed of U.S. persons, an entity openly acknowledged by a foreign
government to be directed and controlled by it,
... Get more on HelpWriting.net ...
Riley V. California Case Study
It is unlikely for Computin to be able to successfully suppress the evidence against him considering
any avenue he could take would all be invalidated under the FISAAmendments act, specifically
Section 702. One such avenue is claiming his Fourth Amendment rights were violated. Under the
Fourth Amendment one can expect a "reasonable expectation of privacy" that is both subjective and
objective. If Computin expected his laptop to be private and if society would also agree that such
privacy is reasonable, he can claim that the court violated his Fourth Amendment Rights. Many
cases have seen people try but fail to invoke their Fourth Amendment rights. In the legal case of
Riley v. California, Riley moved to suppress evidence that was obtained without a warrant, citing his
Fourth Amendment rights that prevented warrantless searches. Even though this was a physical
procedure that is different from the manner in which ... Show more content on Helpwriting.net ...
If the government or institutional agency such as the FBI can successfully obtain a search order
from a judge in the Foreign Intelligence Surveillance Court, they have the authority to search all
electronic communications and cloud services that fall within the field of the warrant. In this
particular case, if the government had reasonable suspicion to believe that Computin was a threat to
the country, they have the right to through Section 702 of the FISAAmendments Act. Section 702 of
the FISAAmendments Act focuses on target people outside of the United States and is not a U.S.
person. Basically, it gives the Attorney General and the Director of National Intelligence the power
"to acquire foreign intelligence information by jointly authorizing the surveillance of non–U.S.
... Get more on HelpWriting.net ...
Taking a Look at Government Surveillance
Government Surveillance
Government Surveillance, a way that the government says that will keep you safe from foreign
dangers like terrorist attacks, espionage, and perhaps a international war. However you have to
sacrifice your private life, and business for increased protection and surveillance.
Government surveillance, defined by dictionary.com as a noun that states "
Close observation or supervision maintained over a person, group, etc, especially one in custody or
under suspicion"(Merriam–webster.com) the word was also taken from the French word surveiller
that means to watch over and was adopted and changed as the English word surveillance.
Government surveillance has been with us ever since the start of groups, dynasties, government and
more. Back then, in the medieval ages like in the sixteenth century. Surveillance was hardly
surveillance at all. Regular people paid by the enemy, or nation diplomats, or just amateur people
looking for easy money, all mostly did it. As the timeline grows closer to the present. There are
factors that have made up the system that now controversially exists in America as Government
Surveillance. The Timeline starts in 1791, when the 13 colonies still existed. But are now rebelling
against the British where in that year congress passed down the Bill of Rights and the fourth
Amendment saying that it "protects every and any citizen of America the right to not be searched in
house or work in unreasonable cases." 137 years
... Get more on HelpWriting.net ...
The Nsa 's National Security Agency
The National Security Agency's (NSA) warrantless collection of metadata has been questioned on
constitutional grounds. Specifically, the NSA's program has been argued to be in violation of the
Fourth Amendment of the Constitution, which states that all citizens are to be free from any
unreasonable search or seizure. Proponents of the NSA's collection of metadata believe that it is a
crucial tool in preventing terrorist attacks, while opponents of the program believe that its
questionable constitutional validity, along with its lack of clear success in preventing a single
terrorist attack, leaves the NSA's metadata collection program in desperate need of reform or
outright abolishment.
I. THE NSA'S PURPOSE AND THE EVOLUTION OF GOVERNMENT SURVEILLANCE It is
important to note what the NSA is tasked to do before discussing the constitutional arguments
against its metadata program. As Abdulmajeed Alhogbani, in his work, "Going Dark: Scratching the
Surface of Government Surveillance," informs, the agency has two tasks: "1) information assurance,
which prevents foreign agents from obtaining classified information, and 2) signals intelligence,
which collects and analyzes foreign intelligence" (475). Metadata collection does not fall under
either of these tasks.
Prior to the establishment of the National Security Agency in 1952, the earliest surveillance measure
enacted in the United States was the Communications Act of 1934, which centralized "the regulatory
process of
... Get more on HelpWriting.net ...
NSA Mass Surveillance
The integrity of one's communications and privacy of online activities is the largest casualty of the
National Security Agency's (NSA) surveillance over digital lives. Years since September 11, 2009,
the NSA's mass surveillance has greatly expanded due to the heightened concern that new
technology can be used by terrorists to plan and execute a terrorist attack. In today's age of
technology, there are easier ways of accessing information and communication as well as new ways
of hacking and gathering personal information. The new surveillance programs and regulations are
enabled by the Patriot Act and post 9/11 paranoia, but it has been over fourteen years since the
incident. After whistleblower, Edward Snowden, it was revealed that the government's mass
surveillance went beyond what many considered acceptable. It can be predicted that unless the U.S
Government reins in NSA mass surveillance, the ... Show more content on Helpwriting.net ...
The Amendment states that "The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall
issue, but upon probable cause, supported by Oath or affirmation" (Bill of Rights). The amendment's
intention was to create a constitutional defense for Americans and limit the intimidating power of
law enforcement. It established and protected the people's privacy by recognizing their rights by
restricting activities that are "unreasonable" or not authorized by a warrant based upon probable
cause. The amendment still remains as vitally important today as when it was enacted by balancing
the interests of the government with that of the people's right to be free of unreasonable conduct.
Though during post 9/11, the context of the amendment was utilized in a different way than the
Founding Fathers
... Get more on HelpWriting.net ...
Argumentative Essay On Prism
Throughout history, we as a country have worked tirelessly to improve our laws and rights as
citizens. Constitutionally, we are require to have specific privacy rights or acts that protect us. At
least it would be presumed that way, up until topics like government spying break that assumption
of safety of our calls, searches, emails, and history on our devices. The uproar that occurred in early
June of 2013, was due to a so called security program called PRISM. Prism is not just any security
programs. This specific program was created by the NSA and FBI and used to tap into servers
without consent. Reading articles such as, " NSA Prism program taps into user data of Apple,
Google and Others" by Glenn Greenwald and Ewen MacAskill from The Guardian ... Show more
content on Helpwriting.net ...
Overall, it seems the solution that is suggested would be for Congress to ultimately change and
revise the amendments according to the FISAAct. Kaminski believes this would minimize the issue
and reinstate the privacy rights that our country has worked so hard to respect and gain. Even though
The Guardian post does not provide a resolution, the article does close with this statement that was
cited earlier, "This requirement applies across the board, regardless of the nationality of the target."
(Greenwald and MacAskill par. 43) This statement is a well written closing, because the author tries
to make it known to the reader, in a strong sense, that nationality should not matter when it comes to
our privacy rights as
... Get more on HelpWriting.net ...
Summary: Foreign Intelligence Surveillance Act
In the modern society, the technology is growing at a dramatic speed. New ways of communication
make the conception of privacy more obscure. At the same time, it is harder for people to actually
keep the "privacy". For example, in old days, someone could steal others' privacy only by sneaking
around; in the phone era, this can be achieved by placing the detectaphone; currently, in the internet
era, with video calls, e–mails and the latest "cloud storage", the stealer can get the information by
acquiring the data from the server. Other than focusing on few people, those data allow the stealer to
have a broad surveillance, and even without exposing him/herself. This "access" could be "hacking",
or something worse, a special program used by the ... Show more content on Helpwriting.net ...
Just as Justice Robert H Jackson warned "exceptional protections for civil liberty might convert the
Bill of right into suicide part" (Janda, et al 437), it is understandable that the US government
sacrifice some people's privacy to achieve the national security in recent years, especially after the
terrorists' attack. However, the national security is not the excuse of abusing the surveillance. The
reason of starting the surveillance, which are "non–Americans" and "51 percent outside of US", is
definitely not strong enough. With the "eavesdropping without court approval", the "PRISM" is
more likely a warrantless search. It breaches the Fourth Amendment, and thus the project is
... Get more on HelpWriting.net ...
Sharing Is Not Always Caring
Sharing Is Not Always Caring
As a teenager, receiving one's very first cell phone is the first step in establishing "popularity."
Tweeting, texting, Instagram–ing and publishing life's "fails" and funnies are the teen social norm
and staple to the lines of communication between other teens. Creativity is put to the test when
language is turned into code (wyd, rotflmbo, ie.) and electronic communication between people
sitting across the table from each other becomes a matter of national security. A peaceful co–
existence between adults and teens continues as long as "actual" communication between both
parties is kept to a minimum. But somewhere along the way, the secret behind the codes was made
public, and parents everywhere were now able to decipher and share the coded information that was
not [originally] meant for the rest of the world–communicational anarchy ensued. In the same
manner, personal information not meant for the whole world can cause problems in the lives of
those whose information is shared. The right to collect and share information should be limited to
specific government programs or for specific purposes such as, Family Watchdog and the United
States Department of Justice National Sex Offender Public Website (NSOPW), but not shared
beyond that. In order to better understand the differences between American privacy and American
security, we must first take a look at these three factors: whose information is being obtained or
accessed, what and how is the
... Get more on HelpWriting.net ...
The Controversy Over U.S. Domestic Surveillance
Ever since the September 11, 2001 terrorist attack on the World Trade Center, the Pentagon, and an
area in Pennsylvania, in which nearly 3,000 helpless individuals were killed, the U.S. Congress
began to pass legislation that would strengthen the United State's counterterrorism efforts. Less than
a month after the horrific attack, the National Security Agency (NSA) started a "special collection
program" with intentions to track communications among suspected terrorists and Al Qaeda leaders.
Then on October 4, 2001, President George W. Bush authorized the NSA to monitor domestic
communications in order to track down suspected terrorists. Two problems shortly arose from
Bush's decision: the fact that his authorization to NSA was carried out in secret and also that
monitoring the domestic communications was done without a warrant. This proved to be illegal
since the 1978 Foreign Intelligence Surveillance Act states that the government is prohibited from
eavesdropping inside the United States without first getting a warrant from the Foreign Intelligence
Surveillance Court (FISA court). In order to counteract the issues he had caused, on October 26,
2001 Bush signed the Patriot Act; a law that would expand the government's electronic surveillance
powers. After signing this law Bush stated, "The existing law was written in the era of rotary
telephones. This new law that I sign today will allow surveillance of all communications used by
terrorists, including emails, the
... Get more on HelpWriting.net ...
The End Of The Second World War
The year is 1939, the start of the Second World War. During this era, alliances such as the Axis or
Allied Powers were able to communicate their battle plans by sending messages to one another
using certain codes. As an Allied Power, the United States formed the Single Security Agency to
divert and interpret Axis Power communications; this is also referred to as code breaking (History
Chanel 1). The surprise attack on Pearl Harbor brought an end to the Single Security Agency.
However, by the end of World War II in 1949, America was determined to defend themselves from
another surprise attack. Therefore, they formed the Armed Forces Agency. This agency was also
short–lived, by 1952 the Armed Forces Agency had lost governmental trust because they rejected
communications with the Central Intelligence Agency (CIA) and other federal agencies. Longing for
a structured security agency that would be able to break the code systems used by opposing forces,
President Harry Truman established the National Security Agency on November 2, 1952 (Plethrons
NSA 1). Prior to the early 1970s, American citizens viewed the Executive Branch with high respect.
Presidents of the United States throughout the early twentieth century claimed to have the power to
organize warrantless surveillances for national security purposes. However, in the early 1970s, many
citizens began to change their views of the Executive Branch (Plethrons 1). Specifically, the 1972
Supreme Court case of U.S. vs U.S.
... Get more on HelpWriting.net ...
NSAArgument Essay
"Even if you're not doing anything wrong, you're being watched and recorded," said former NSA
information technology contractor, Edward Snowden, as quoted in an article by CNN political
reporter, Jeremy Diamond. Despite his low position in the National Security Agency, Snowden
caught the world's eye in 2013 when he leaked documents revealing the NSA and FISC's plans for
mass domestic surveillance in the United States. His decision to reveal classified documents sent the
nation into widespread outrage. The NSA had access to not only metadata (records of activity), but
also content containing personal information that Americans rightfully assumed was protected by
laws such as the Stored Communications Act (SCA) and the Foreign Intelligence Surveillance Act
Amendments Act ... Show more content on Helpwriting.net ...
The SCA was amended, the Cybersecurity Act was written into law, and the USA FREEDOM Act
was added to the USA PATRIOT Act, all in 2015 in an attempt to bring regulations on surveillance
procedures up to date. Regulations would add limitations to NSA's ability to access information.
Yet, according to an article in the Huffington Post, one of the most popular American political sites,
by lawyer Shayana Kadidal, "...as even advocates of the Freedom Act note, there are many other
ways in which the government could be sweeping in the same records." Clearly, the multiple
additions to the law in 2015 weren't sufficient enough to hold back the government. A document
titled "What Went Wrong with the FISA Court", by Elizabeth Goitein and Faiza Patel, published by
the Brennan Center for Justice (BCJ) at New York University Law School, suggests that "Congress
should require the government, on a periodic basis, to submit to the FISA Court for its review a list
of the selection terms used to acquire electronic communications under Section 702 [of FAA]."
Periodic reviews such as these would eliminate any chance of current laws becoming
... Get more on HelpWriting.net ...
Essay on The Patriot Act is Unconstitutional
The Patriot Act was established after the tragedy of September, 11, 2001 in a moment of weakness.
It gave unprecedented and unnecessary powers to intelligence agencies under the wide umbrella of
national security. The Patriot Act has used an "us vs them" mentality as well as pro–American
propaganda to accomplish its goals. This new authority of the intelligence agencies has gone too far,
is unjustified, unconstitutional, and infringes on the privacy of the American people, as well as
others in the world. The Patriot Act should be weakened in order to preserve the rights of the
American people and to reaffirm to the world that the U.S will not tolerate violations of human
rights. On September, 11th, 2001, the United ... Show more content on Helpwriting.net ...
The other purposes section of that is incredibly vague, modifying laws concerning money
laundering, education, financing, credit reporting, computer fraud, electronic communications, and
others ("The USA Patriot"). One section of the Patriot Act pertaining to the NSA surveillance
revealed by Edward Snowden is an amendment to FISAAct of 1978, increasing surveillance
authority by allowing the collection of "certain business records for foreign intelligence and
international terrorism investigations" ("Uniting and Strengthening"). This gave the NSA and other
intelligence agencies a broad authority to collect data from corporations. This has been
"intentionally and willfully abused", with some workers spying on lovers, ex–lovers, and others,
"for practice", "out of curiosity", and other "reasons". There have been no reported employee
terminations due to this (Moyer). It wasn't just family, friends or ex–lovers that the NSA agents had
the capability to spy on. When Edward Snowden leaked his information, he informed the public, "I,
sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a
federal judge, to even the President if I had a personal email" (Masnick). For the agents to collect
information, except certain types of information, they had
... Get more on HelpWriting.net ...
The Foreign Intelligence Surveillance Act
Domestic Surveillance Citizens feeling protected in their own nation is a crucial factor for the
development and advancement of that nation. The United States' government has been able to
provide this service for a small tax and for the most part it is money well spent. Due to events
leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites
States' government has begun enacting certain laws and regulations that ensure the safety of its
citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National
Security Agency scandal, the government has attempted and for the most part succeeded in keeping
domestic safety under control. Making sure that the balance between ... Show more content on
Helpwriting.net ...
This act makes a significant amount of amendments to the FISA act one of which is Title II which is
titled "Enhanced Surveillance Procedures." While the FISA act targeted only non–US citizens for
"foreign intelligence information", this act allows the collection of foreign intelligence information
from US citizens as well. One section which raises a brow is section 215 of the Patriot Act which
grants the FBI permission to ask the FISA court to "compel the sharing of books, business
documents, tax records, library check–out–lists," and pretty much any tangible thing, "as part of a
foreign intelligence or international terrorism investigation." Upon further reading of this section it
becomes evident fairly quickly that these "required" materials can include purely domestic records.
Of course, if one has nothing to hide then one need to fear this act since it is geared towards non–US
and US citizens suspected of being affiliated with a foreign power; but later acts seem to notion that
perhaps the United States government is not only concerned with terrorist groups but rather all
information of its citizens and residents which can build patterned profiles.
Under George W. Bush's term, and shortly after the attacks of September 11th 2001, both the
President's Surveillance Program and the Terrorist Surveillance Program have been brought under
scrutiny. Each of the programs authorizes the National Security Agency (NSA) by executive order to
monitor phone calls,
... Get more on HelpWriting.net ...
Edward Snowden
Gathering of intelligence and espionage has been a fundamental part of American security since the
earliest days of the United States. Shortly after President George Washington took office in 1789, he
petitioned Congress to allocate a "secret fund" in the State Department budget for the purpose of
gathering foreign intelligence. By George Washington's third year in office, the "secret fund" was 12
percent of the federal budget. The first permanent intelligence organization the United States
established was the Office of Naval Intelligence in 1882. This organization's task was to gather
information about the military forces of foreign countries. Two years after World War II ended
(1945) congress passed the National Security Act. This gave birth to the modern intelligence
apparatus. After being signed into law by President Harry Truman, the U.S. Department of Defense
(made up of all the U.S. Armed Forces) and the CIA was created. This was created to inform the
president on issues of national security. Over the years, information gathering has become more and
more common. Recently, Edward Snowden showed the world how frequently it was actually
happening. Although many people consider Edward Snowden to be a hero, he is one of the biggest
traitors in American history.
Edward Snowden was born in Elizabeth City, North Carolina on June 21, 1983. He was the son of
Lonnie and Elizabeth Wendy Snowden. Edward's father was a Coast Guard officer. Edward spent
the first ten
... Get more on HelpWriting.net ...
Foreign Intelligence Surveillance Act Pros And Cons
ACLU. (2017). The Foreign Intelligence Surveillance Act – News and Resources. Retrieved from
ACLU: https://www.aclu.org/other/foreign–intelligence–surveillance–act–news–and–resources. This
Act was enacted in 1978 but did not have many controversial aspects in it and was later blamed for
not providing enough powers to aid the process of collecting intelligence. Some security experts
blamed the restriction in the Act for the poor intelligence leading to the September 11, 2001, attacks.
Bazan, E. B. (2008). The Foreign Intelligence Surveillance Act: overview and modifications. New
York: Nova Science Publishers. When you look into this Act, there were many flaws that were
infringing on American freedom. The FISA has faced much criticism and disapproval. One of the
major problems associated with the FISA is the fact ... Show more content on Helpwriting.net ...
M. (2011). 9/11 and the Transformation of U.S. Immigration Law and Policy. Human Rights
Magazine Home, 38(1). Many people decide to immigrate to the US to have a better life. But
Immigration reform was due to 9/11 attacks which had been revisited during the past years.
Obviously, administration's efforts failed.
Perl, R. (2017). The Department of Homeland Security: Background and Challenges. Retrieved
from The National Academies Press: https://www.nap.edu/read/10968/chapter/24. The issue of the
creation and impact of homeland security laws and presidential directives and executive orders was
bringing up the concern of the attacks in 2001. The president acted quickly to put in place and
believed would address security issue on the home front.
The "USA Patriot Act (2001)." American History, ABC–CLIO, 2017, americanhistory2.abc–
clio.com/Search/Display/567308 https://americanhistory2–abc–clio–com.gmclibrary.idm.oclc.org.
This Act may be described as the "Uniting and Strengthening America Act" by providing tools
required to intercept and obstruct terrorism. The Act was passed and with no debate voted on;
Congress did not fully read the
... Get more on HelpWriting.net ...
Research Paper On Edward Snowden
Interest sparked when Edward Snowden NSA contractor publicly disclosed a large number of
classified documents that are about U.S. government, implemented massive surveillance program
toward American citizens and foreign countries. This incident was viewed as the most significant
leak in America history and of course it has caused sensation worldwide. However, privacy issue
doesn't easily raise general public's attention due to it seems like don't bring substantial bad
consequence or effect our lives a lot. After Snowden escaped to Russia, different people called him
traitor whistleblower, dissident, and even a hero. Consequently, there has been a fierce debate about
whether he should be punished by law or be protected as hero of whistleblower. ... Show more
content on Helpwriting.net ...
But I had no idea which side I should stand on. Because I was have been told I should be an honest
man from the time I was a kid, so I think Snowden should tell the public the truth about what he
know. Snowden is absolutely obeys the law if he unveils government misdeed in public, in this case,
he should be exempt from punishment by the American government. But my concern is whether
these leaked information gives terrorists and other enemy countries advantage because they get to
know how to avoid detection by the American government. In this case, Snowden's actions harms
the national security. However, NSA eavesdrop peoples phone calls and Internet can be justifiable
under certain circumstances. For example, the surveillance program can detect the terrorists, in
consequence prevent people from terrorism attack. In order to figure out who is wrong and who is
right, I should do more research about what they did. Next, I attempt to find valuable information
about American government's intelligence gathering policies to scrutinize whether the policies are
useful or dysfunctional that should be reformed. I found a book named "Spying In America in the
Post 9/11 World: Domestic Threat and the Need for Change". The author Ronald Marks is a former
senior CIA official and his expertise lies in Cyber security and Homeland Security intelligence. He
is very familiar with U.S. government policy
... Get more on HelpWriting.net ...

More Related Content

More from Gina Alfaro

College Admission Essay Review. Online assignment writing service.
College Admission Essay Review. Online assignment writing service.College Admission Essay Review. Online assignment writing service.
College Admission Essay Review. Online assignment writing service.Gina Alfaro
 
Essay Writing Help, English Essay Writing Assignment
Essay Writing Help, English Essay Writing AssignmentEssay Writing Help, English Essay Writing Assignment
Essay Writing Help, English Essay Writing AssignmentGina Alfaro
 
Synthesis Essay Basic Guide On Writing A Good Essay - Wuzzupe
Synthesis Essay Basic Guide On Writing A Good Essay - WuzzupeSynthesis Essay Basic Guide On Writing A Good Essay - Wuzzupe
Synthesis Essay Basic Guide On Writing A Good Essay - WuzzupeGina Alfaro
 
006 Essay Example How To Write Col. Online assignment writing service.
006 Essay Example How To Write Col. Online assignment writing service.006 Essay Example How To Write Col. Online assignment writing service.
006 Essay Example How To Write Col. Online assignment writing service.Gina Alfaro
 
How To Write A Conclusion Paragraph, Writing Essay Conclusion.
How To Write A Conclusion Paragraph, Writing Essay Conclusion.How To Write A Conclusion Paragraph, Writing Essay Conclusion.
How To Write A Conclusion Paragraph, Writing Essay Conclusion.Gina Alfaro
 
1St Grade Writing Paper. Online assignment writing service.
1St Grade Writing Paper. Online assignment writing service.1St Grade Writing Paper. Online assignment writing service.
1St Grade Writing Paper. Online assignment writing service.Gina Alfaro
 
How To Write An Opinion Essay Skyteach. Online assignment writing service.
How To Write An Opinion Essay Skyteach. Online assignment writing service.How To Write An Opinion Essay Skyteach. Online assignment writing service.
How To Write An Opinion Essay Skyteach. Online assignment writing service.Gina Alfaro
 
Writing Templates Free Printables - Templates Pri
Writing Templates Free Printables - Templates PriWriting Templates Free Printables - Templates Pri
Writing Templates Free Printables - Templates PriGina Alfaro
 
Essay Writing Questions PT3 Copy - WahEasy
Essay Writing Questions PT3 Copy - WahEasyEssay Writing Questions PT3 Copy - WahEasy
Essay Writing Questions PT3 Copy - WahEasyGina Alfaro
 
Scrapbook Cat Handwriting Paper - KidsPressMagazin
Scrapbook Cat Handwriting Paper - KidsPressMagazinScrapbook Cat Handwriting Paper - KidsPressMagazin
Scrapbook Cat Handwriting Paper - KidsPressMagazinGina Alfaro
 
Value Of Education In Life Essay. Essay On Value Ed
Value Of Education In Life Essay. Essay On Value EdValue Of Education In Life Essay. Essay On Value Ed
Value Of Education In Life Essay. Essay On Value EdGina Alfaro
 
Handwriting Paper Printable Lined Paper - Free Lined Pap
Handwriting Paper Printable Lined Paper - Free Lined PapHandwriting Paper Printable Lined Paper - Free Lined Pap
Handwriting Paper Printable Lined Paper - Free Lined PapGina Alfaro
 
Essay On Whether. Solved Essay On Whether I Believ
Essay On Whether. Solved Essay On Whether I BelievEssay On Whether. Solved Essay On Whether I Believ
Essay On Whether. Solved Essay On Whether I BelievGina Alfaro
 
How To Write Any High School Essay. Online assignment writing service.
How To Write Any High School Essay. Online assignment writing service.How To Write Any High School Essay. Online assignment writing service.
How To Write Any High School Essay. Online assignment writing service.Gina Alfaro
 
Writing Paper And Envelopes Sets, 72PCS Cute Stationary
Writing Paper And Envelopes Sets, 72PCS Cute StationaryWriting Paper And Envelopes Sets, 72PCS Cute Stationary
Writing Paper And Envelopes Sets, 72PCS Cute StationaryGina Alfaro
 
Useful Phrases When Writing A Dissertation Ab
Useful Phrases When Writing A Dissertation AbUseful Phrases When Writing A Dissertation Ab
Useful Phrases When Writing A Dissertation AbGina Alfaro
 
Common Application Word Limit Essay. Online assignment writing service.
Common Application Word Limit Essay. Online assignment writing service.Common Application Word Limit Essay. Online assignment writing service.
Common Application Word Limit Essay. Online assignment writing service.Gina Alfaro
 
How Does Essay Writing Work. Online assignment writing service.
How Does Essay Writing Work. Online assignment writing service.How Does Essay Writing Work. Online assignment writing service.
How Does Essay Writing Work. Online assignment writing service.Gina Alfaro
 
A Page From The Book, Which Is Written In Black And White
A Page From The Book, Which Is Written In Black And WhiteA Page From The Book, Which Is Written In Black And White
A Page From The Book, Which Is Written In Black And WhiteGina Alfaro
 
Travelogue Example For Students Travelogue Sa
Travelogue Example For Students Travelogue SaTravelogue Example For Students Travelogue Sa
Travelogue Example For Students Travelogue SaGina Alfaro
 

More from Gina Alfaro (20)

College Admission Essay Review. Online assignment writing service.
College Admission Essay Review. Online assignment writing service.College Admission Essay Review. Online assignment writing service.
College Admission Essay Review. Online assignment writing service.
 
Essay Writing Help, English Essay Writing Assignment
Essay Writing Help, English Essay Writing AssignmentEssay Writing Help, English Essay Writing Assignment
Essay Writing Help, English Essay Writing Assignment
 
Synthesis Essay Basic Guide On Writing A Good Essay - Wuzzupe
Synthesis Essay Basic Guide On Writing A Good Essay - WuzzupeSynthesis Essay Basic Guide On Writing A Good Essay - Wuzzupe
Synthesis Essay Basic Guide On Writing A Good Essay - Wuzzupe
 
006 Essay Example How To Write Col. Online assignment writing service.
006 Essay Example How To Write Col. Online assignment writing service.006 Essay Example How To Write Col. Online assignment writing service.
006 Essay Example How To Write Col. Online assignment writing service.
 
How To Write A Conclusion Paragraph, Writing Essay Conclusion.
How To Write A Conclusion Paragraph, Writing Essay Conclusion.How To Write A Conclusion Paragraph, Writing Essay Conclusion.
How To Write A Conclusion Paragraph, Writing Essay Conclusion.
 
1St Grade Writing Paper. Online assignment writing service.
1St Grade Writing Paper. Online assignment writing service.1St Grade Writing Paper. Online assignment writing service.
1St Grade Writing Paper. Online assignment writing service.
 
How To Write An Opinion Essay Skyteach. Online assignment writing service.
How To Write An Opinion Essay Skyteach. Online assignment writing service.How To Write An Opinion Essay Skyteach. Online assignment writing service.
How To Write An Opinion Essay Skyteach. Online assignment writing service.
 
Writing Templates Free Printables - Templates Pri
Writing Templates Free Printables - Templates PriWriting Templates Free Printables - Templates Pri
Writing Templates Free Printables - Templates Pri
 
Essay Writing Questions PT3 Copy - WahEasy
Essay Writing Questions PT3 Copy - WahEasyEssay Writing Questions PT3 Copy - WahEasy
Essay Writing Questions PT3 Copy - WahEasy
 
Scrapbook Cat Handwriting Paper - KidsPressMagazin
Scrapbook Cat Handwriting Paper - KidsPressMagazinScrapbook Cat Handwriting Paper - KidsPressMagazin
Scrapbook Cat Handwriting Paper - KidsPressMagazin
 
Value Of Education In Life Essay. Essay On Value Ed
Value Of Education In Life Essay. Essay On Value EdValue Of Education In Life Essay. Essay On Value Ed
Value Of Education In Life Essay. Essay On Value Ed
 
Handwriting Paper Printable Lined Paper - Free Lined Pap
Handwriting Paper Printable Lined Paper - Free Lined PapHandwriting Paper Printable Lined Paper - Free Lined Pap
Handwriting Paper Printable Lined Paper - Free Lined Pap
 
Essay On Whether. Solved Essay On Whether I Believ
Essay On Whether. Solved Essay On Whether I BelievEssay On Whether. Solved Essay On Whether I Believ
Essay On Whether. Solved Essay On Whether I Believ
 
How To Write Any High School Essay. Online assignment writing service.
How To Write Any High School Essay. Online assignment writing service.How To Write Any High School Essay. Online assignment writing service.
How To Write Any High School Essay. Online assignment writing service.
 
Writing Paper And Envelopes Sets, 72PCS Cute Stationary
Writing Paper And Envelopes Sets, 72PCS Cute StationaryWriting Paper And Envelopes Sets, 72PCS Cute Stationary
Writing Paper And Envelopes Sets, 72PCS Cute Stationary
 
Useful Phrases When Writing A Dissertation Ab
Useful Phrases When Writing A Dissertation AbUseful Phrases When Writing A Dissertation Ab
Useful Phrases When Writing A Dissertation Ab
 
Common Application Word Limit Essay. Online assignment writing service.
Common Application Word Limit Essay. Online assignment writing service.Common Application Word Limit Essay. Online assignment writing service.
Common Application Word Limit Essay. Online assignment writing service.
 
How Does Essay Writing Work. Online assignment writing service.
How Does Essay Writing Work. Online assignment writing service.How Does Essay Writing Work. Online assignment writing service.
How Does Essay Writing Work. Online assignment writing service.
 
A Page From The Book, Which Is Written In Black And White
A Page From The Book, Which Is Written In Black And WhiteA Page From The Book, Which Is Written In Black And White
A Page From The Book, Which Is Written In Black And White
 
Travelogue Example For Students Travelogue Sa
Travelogue Example For Students Travelogue SaTravelogue Example For Students Travelogue Sa
Travelogue Example For Students Travelogue Sa
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 

Nsa Is The Spying Ofu.S Citizens

  • 1. Nsa Is The Spying Ofu.s Citizens The National Security Agency (NSA) has been an information gathering arm of the Executive branch since the Cold War and continues to be an essential part of ensuring the security of the United States. The public issue that involves the NSA is the spying of U.S citizens which can be seen as a violation of the Fourth Amendment of the United States Constitution. This was revealed to the public by the whistleblower Edward Snowden who released classified documents of activities that the NSA had been conducting in conjuncture with telecommunication companies, which angered many U.S citizens and received media coverage with a call for the U.S Government to restrict the NSA's activities or at least for there to be Congressional oversight. This debate revolves around how much the NSA's surveillance activities are actually used for national security as well as the constitutionality of the NSA's surveillance. This all began after the terrorist attacks on September 11, 2001 when there was a call for the attacks to never happen again and the adoption of the Patriot Act in that same year which increased the power of the NSA. The National Security Agency over the past few years was revealed to have spied on American citizens under what can be considered illegal or unconstitutional circumstances which sparked concern and outrage across most of America. This was first recognized in 2013 when the whistleblower Edward Snowden or traitor as the United States government considers him, leaked ... Get more on HelpWriting.net ...
  • 2.
  • 3. Pros And Cons Of Surveillance "The consciousness of being at war, and therefore in danger, makes the handing–over of all power to a small caste seem the natural, unavoidable condition of survival" (Orwell). The world today is full of many dangers domestic and abroad. It has become a routine in the news to report on the daily mass shooting or update with the war on terror. We live in a world where being worried is justified; however, we should not give up our constitutional rights in the face of fear. The NSA's dragnet surveillance programs, such as PRISM, are both ineffective and are surpassed by less questionable national security programs. The FISA court's' approval of NSA actions are not only illegal, but exist as an embarrassing formality. Surveillance is a necessary ... Show more content on Helpwriting.net ... In practice, the FISC system curtails the constitution, is appointed by a single person, and acts a simple bureaucratic box to tick. The judges of the FISC are appointed solely, without any approval, by the Chief Justice of the Supreme Court. Justice John Roberts and the chief justices before him alone dictate the interpretation of the fourth amendment, a largely republican bias, "[John Roberts] appoints all FISA judges, drawn from the federal bench, and right now 10 of 12 were originally appointed by Republican presidents" (Walsh). Likewise, the warrants issued by FISC are not specific to individuals, organizations, or specific items to be found. They lack essential principles of law, such as probable cause and particularity, "indiscriminate searches and seizures conducted under the authority of 'general warrants' were the immediate evils that motivated the framing and adoption of the Fourth Amendment" (Payton). Moreover, the government effectively provides no contest to any NSA search or spying. According to statistics of court rulings, warrants and records requests over the court's history were denied 0.03% of the time (Center). The current situation of surveillance oversight in the United States is dismal, reckless, and ... Get more on HelpWriting.net ...
  • 4.
  • 5. The National Security Agency ( Nsa ) Is An Intelligence... Security is key for the advancement and stability of the United States, and spying is nothing new to the world. With the advancement of technology, we are now able to stay connected with each other, while having a plethora of information at our fingertips. This is phenomenal, but dangerous. With the increasing amount of stored data online and the speed at which said data can be transferred, one can only worry that maybe were sharing a little TOO much information. The National Security Agency (NSA) is an intelligence organization created by the United States government. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence. Today, the NSA states that ... Show more content on Helpwriting.net ... These countries were pretty successful at obtaining sensitive Intel. However, in the 21st century surveillance is used in a different and more complicated way. Due to the drastic increase in crime rates and recent terrorist attacks, governments around the world were forced to use electronic surveillance to protect their own people. The electronic surveillance that each government conducts is so complex and covert that you don't even know that you are the target. The US government has become one of the biggest cases of this kind of surveillance. The US government has been employing several forms of high level surveillance such as wiretapping, CCTV cameras (Closed Circuit Televisions, aka street cameras) and now internet data by looking at the information transferred between devices. The thought that the government was secretly watching their citizens every move has been talked about for some time now. Although this talk was widespread and sort of heard of, there was no definitive proof. However, suspicions were confirmed in 2013 due to a man by the name of Edward Snowden leaking classified information from the NSA's archives. Amongst the leaked information, evidence showed that the NSA had been spying on millions of innocent people, and said monitoring is still being conducted. This shocking level of spying was without warrant, making it illegal. Now, the US government has taken its bad ... Get more on HelpWriting.net ...
  • 6.
  • 7. NSA Persuasive Essay Since the Edward Snowden leak in 2013, the controversy over NSA surveillance has focused on the invasion of privacy of United States citizens. Specifically the bulk collection programs that have picked up American phone data, even of those who haven't done anything wrong. This invasion of privacy has been deemed unconstitutional by many and for good reason. In recent years, the NSA controversy has become more eminent, mostly due to the Edward Snowden Leak in 2013. This leak revealed sensitive information about the NSA tracking the movements of millions of people using cell phone metadata and the action of the NSA intercepting and storing data on billions of people all over the world. More recently, in 2015, key provisions of the Patriot Act, a law intended to help the United States government detect and prevent acts of terrorism or the sponsorship of terrorist organizations, were debated over whether or not they should be allowed to expire. Due to their mass cellphone data collection program, other programs involving the wiretapping of suspects, and more that were possible threats to the privacy of U.S. citizen's, there was substantial discourse about what to do with these key provisions. These key provisions, specifically, Section 215, were renewed until 2019, with the exception of the mass collection of phone data, which was revised with more restrictions because it was the most controversial. With the opportunity to track terrorists comes the opportunity to invade ... Get more on HelpWriting.net ...
  • 8.
  • 9. Domestic Surveillance During The United States Domestic Surveillance in the Unites States has been going on for decades without the public 's knowledge. Domestic Surveillance didn 't seem important in the eye of the American government. After the September attacks (9/11) congress started to treat Domestic Surveillance as a number one priority. After September 11th Congress passed a law to use military force for those responsible for the attacks in New York, NY. The go ahead with using military force did not give the President to use surveillance without a warrant. Congress started to pass legislation against counterterrorism efforts. The most controversial measures, including the 2001 USA Patriot Act that gave the US federal government the ability to collect and analyze private information that has identified itself with the United States of America. With new found ways of viewing American citizens personal information the federal government had to learn how not to get caught. American citizens have right to their privacy and with all the new Domestic Surveillance programs many were warrantless. In 2002 Bush signed a presidential order allowing the National Security Agency to monitor without a warrant. This presidential order applied to international telephone calls and e–mail messages of thousands of citizens and legal residents inside the United States. This program never had the requirements to obtain or produce a warrant from the Foreign Intelligence Surveillance Court but, as the 4th Amendment to the Constitution ... Get more on HelpWriting.net ...
  • 10.
  • 11. A Study of the Foreign Intelligence Surveillance Act FOREIGN INTELLIGENCE SURVILLANCE ACT This act was created in 1978. It proposes methods for gaining judicial permission in order to carry out physical and technological search for a person, who might be a terrorist threat for USA, on behalf of a foreign power. In 1970, a man named Christopher H. Pyle discovered that the US army intelligence had hired 1500 officers whose job was to spy on protest or public demonstration that involved more than 20 people. This shocking news immediately captured the attention of Senator Sam Ervin, who was the chairman of a sub– committee of senate related to constitutional rights. Though Sam Ervin strongly condemned this act of US intelligence but he had very little authority to take a step against it. It was due to brave men like Christopher H. Pyle and Senator Sam Ervin that people came to know that how the government was ignoring and violating the provisions to the constitution. This violation of rules and laws by the government led towards the formulation of foreign intelligence surveillance act. The primary feature of this act was as follows; "the creation of the Foreign Intelligence Surveillance Court ("FISA Court") which allows the executive branch to secretly obtain warrants for electronic surveillance but only with strict judicial review" Previously there were seven members of foreign intelligence surveillance act court but now the number has been extended to eleven. All of these members are appointed by the chief justice of ... Get more on HelpWriting.net ...
  • 12.
  • 13. The Pros And Cons Of Verizon Wireless Verizon Wireless is known for their famous slogan, "Can you hear me now?" The National Security Agency (NSA) took the meaning to the slogan "Can you hear me now?" to a differently level. One may speculate that the NSA has brought a new meaning to the slogan putting Verizon in the spotlight of an ethical dilemma. Verizon Wireless was founded April 4, 2000 and not long after, they were considered the largest mobile network companies in the United Stated. Verizon was ordered under the Patriots Act Section 215 by the Foreign Intelligence Surveillance Court to supply individual and business cell phone data. The court was created by the Foreign Intelligence Surveillance Act of 1978 and provides judges appointed by the president. The review ... Show more content on Helpwriting.net ... However, they did know it would maximize their profits by selling the selling a portion of their business and other monies received. The loss of customer loyalty at the end of the day would not be worth the money they received. This scandal has now been seen as unethical and invasion of privacy. Before this chain of events Verizon was seen as one of the largest and best mobile company with 119.4 million subscribers as of 2013, now they face unsure customers who are not sure of this company and may switch to another provider. Although they were court ordered they did not fight this request and seen only their best ... Get more on HelpWriting.net ...
  • 14.
  • 15. America 's Justification For Surveillance And Spy Activity The National Security Agency of the United States has created a confidential surveillance program named PRISM, operating as the world's largest "Planning Tool for Resource Integration, Synchronization, and Management". This program is designed to gather and process "foreign intelligence" that travels through the United States, by extracting data from some of the world's largest tech companies and its users. The United States describes itself as the "Worlds telecommunications backbone", which was explicitly listed in the leaked PowerPoint presentation of PRISM's operation. By going undercover and secretively accessing file transfers, e–mails, videos, call logs and numerous other types of data, the United States government is enabling a watch dog on its citizens and creating the largest terrorist regime. These PowerPoint slides behold some very disturbing information in how U.S citizens are being deprived of privacy, leading to loss of agency. Restricting individuals to be watched all the time turns the human race into robots, as individuality is lost, and liberty and freedom begins to diminish. America's justification for surveillance and spy activity since 9/11 was to fight terrorism and protect the population, but these documents have nothing to do with capturing foreign terrorists or improving national security. They are a means of control, and instead of indicating those as the elected and the elector, meaning that congress and this government was only created through the ... Get more on HelpWriting.net ...
  • 16.
  • 17. Finding the Balance Between Privacy and Security Essay Clearly, the United States is in unfamiliar territory when it comes to combat– ing counter–terrorism with technology. The founding fathers could not foresee the technological advances, and the complications that arose from them. Under– standably, the United States law enforcement is having a rough time reconciling the constitutional rights a orded to its citizens, while protecting them from a terrorist threat. Initially, the government struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was built on over decades, ... Show more content on Helpwriting.net ... The PATRIOT Act was passed almost instantaneously, trading American freedoms for the sake of national security. The controversial act was a response for the panic–stricken Americans, and was the government's way of assuring another attack would not happen. Across the ocean, western Europe was also caught up in the turmoil. How– ever, wiretapping was already commonplace, and did not need an act like the PATRIOT Act to grant the necessary permissions. Instead, the European Union took a di erent approach. They began to record and keep track of the comings and goings of their citizens, storing all the data, in the event that it might prove useful in the future. However, the fear did not last forever. As time went on, the immediate threat began to fade. With the diminishing threat, the need to sacri ce privacy for protection ebbed as well, leaving only public backlash in its wake. The European Union's Data Retention Directive has come under re for it, as well at the PATRIOT Act in the United States. So the government tried again, with the Protect America Act. Designed to modernize FISA, it most likely was not as successful as its creators had hoped, and was allowed to sunset roughly a year after its passage. However, out of it came the FISAAmendments Act. The most recent act is ... Get more on HelpWriting.net ...
  • 18.
  • 19. The Foreign Intelligence Surveillance Act (FISA) The Foreign Intelligence Surveillance Act (FISA) of 1978 was a result of "congressional investigations into Federal surveillance activities conducted in the name of national security" (Intelligence Surveillance Act, n.d.). FISA allows for judicial and congressional supervision of foreign surveillance, while maintaining the "secrecy necessary to effectively monitor national security threats", and outlines the procedures for the physical and electronic surveillance and collection of foreign intelligence information (Intelligence Surveillance Act, n.d.). Under FISA, to obtain a warrant for electronic surveillance, agents need to show probable cause that the person in question is a foreign power or its agent, and the purpose of the surveillance ... Get more on HelpWriting.net ...
  • 20.
  • 21. Citizenfour: Global Surveillance Terrorism has become a plague for many nations, and surveillance has become an emerging cure. However, this cure is extremely controversial and was classified as top secret until very recently. In September of 2016, a drama/thriller movie was published on an individual who revealed this classified information called Snowden. Snowden is the Hollywood edition of Edward Snowden's story. Meanwhile, Citizenfour, a documentary published in October of 2014, is the historical version of the story. Citizenfour is a film on Edward Snowden, alias Citizenfour, and his undertaking in exposing the controversial and intrusive surveillance systems used by the National Security Agency (NSA) and other agencies across the globe. The documentary is directed by ... Show more content on Helpwriting.net ... Indeed you'll never be aware of all the things those agencies are doing to stop your identity being stolen and stop a terrorist blowing you up (Watts)." First of all, ask yourself the following: would you be willing to give a journalist the passwords to all of your social media accounts allowing them to scroll through all of your online activities and publish whatever they find interesting? Greenwald has asked this question to every person that has said a version of the saying but no one has ever replied to him ("Why Privacy Matters."). The reality is that even those that disclaim the importance of privacy, instinctively understand and value it. The ability to be "free of the judgmental eyes of other people" is just as important as having liberty because everyone has something to hide, even the government officials managing the surveillance ("Why Privacy Matters."). Furthermore, some individuals require privacy ... Get more on HelpWriting.net ...
  • 22.
  • 23. Essay on President Bush and FISA The Foreign Intelligence Surveillance Act of 1978 was a necessary measure signed by President Jimmy Carter in an effort to stop the CIA, FBI, NSA, and other executive powers from conducting warrantless wiretaps of domestic groups for so–called national security purposes. This was necessary because findings by the Church Committee in the early 1970s suggested that warrantless wiretapping had been going on for quite some time by these government entities and was exacerbated by President Nixon and the Watergate scandal. This bill not only set a future precedent for how surveillance should be conducted, but also attempted to set a standard for what "good" and "bad" surveillance were defined as. FISA did not face any substantial challenges ... Show more content on Helpwriting.net ... These problems that President Bush encountered where in fact very similar to the problems that the Carter administration predicted would surface when they were drawing up the bill in the late 1970s. Carter and other executive members brought up many valid concerns that included physical searches, overseas surveillance, communications intelligence, and how much power to give to the president (Carter Memo 2). The version of FISA proposed in 1978 was in itself a solid piece of legislature. Over the years, many amendments have been made to it that have slowly surrendered its power and allowed to the executive branch to create loopholes in which to continue warrantless surveillance where and when they see it fit. For this reason, the FISA process of requiring review by a special court is still viable, but does need some adjustments that allow it to stand similarly to its original form. Since the passing of FISA came after a widespread finding of warrantless wiretapping by a number of different government entities, Congress along with the Carter administration, needed to carefully craft a bill that not only reconciled national security needs to conduct domestic surveillance, but also continued to protect individual liberties such as that of the first and fourth amendments. The once top–secret Carter administration memos regarding FISA offer a first–hand glimpse at the thinking that went into ... Get more on HelpWriting.net ...
  • 24.
  • 25. Government Surveillance Government Surveillance Imagine a world where your every move was being monitored. A dark world where it is no secret who you are, where you have been and who you associate with; now include who you love, who you pray to and what you just ate for dinner. The word privacy doesn't exist in such world and it is such world that we are heading to."Big Brother is watching you!" This quote by George Orwell couldn't have been truer. Every aspect of our lives is being sorted through as Big Data this very moment. Government surveillance has prevailed by the name of security. But, is government surveillance of internet digital communications like social networks, cell phone calls, text messages, and emails really a public service of security? Or ... Show more content on Helpwriting.net ... Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text–messaging devices, the more providers of metadata the government has. In her journal "The Virtuous Spy: Privacy as an Ethical Limit", Anita L. Allen, an expert on privacy law, writes, "Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication...there are one or more counter–technologies of eavesdropping" (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices. Some Americans may argue that the government surveillance programs target only foreigners, that we, as Americans, are exempted from this type of scrutiny. They are even reassured by President Barrack Obama in an interview on Charlie Rose: "If you are ... Get more on HelpWriting.net ...
  • 26.
  • 27. The Foreign Intelligence Surveillance Act: Analysis, Pros... THE FOREIGN INTELLIGENCE SURVEILLANCE ACT: ANALYSIS, PROS AND CONS INTRODUCTION The Foreign Intelligence Surveillance Act (FISA) is an Act of Congress passed in 1978 and signed by the then President Jimmy Carter. The Act stipulates the procedures to be followed when obtaining intelligence from foreign powers and agents of foreign powers both physically and electronically. The Act has been amended severally. In 2001, it was amended to involve groups and terrorist organizations not supported by foreign governments in an Act called the USA PATRIOT Act. A further amendment was done in 2007 to overhaul most of the provisions, in the Act called Protect America Act. A final amendment was done in 2008 called the FISAAmendments Act of 2008 ... Show more content on Helpwriting.net ... A third provision by the FISA is the "Sneak and Peak" provision provided under section 213. This provision grants the security agencies the power to enter into the office, home or premise of a suspected terrorist or spy without informing the target. In the process of such undisclosed intrusions, the agencies are allowed to take photographs, examine data in the computers as well as planting devices that monitor or mirror the operation of the suspect on the computer. These devices should also be able to monitor the internet usage and transmissions of the suspect. In suggesting this provision, the Justice Department asserted that this unexplained intrusion had been used against drug dealers. But now that terrorism was of more danger to the homeland, then there was need to take terrorists as the most dangerous persons on US soil (Larry and Godoy 2006). A very controversial provision in the amendment to the FISA is the "Libraries Provision". This provision allows the government security agencies to access any tangible or written information regarding the suspects, be they documents, books, records or papers. The provision further does not obligate the agency to inform the suspect that it is accessing the vital information. The FBI is expected to get a court authority secretly by simply proving that the suspects could be involved in espionage or terrorism. This will ... Get more on HelpWriting.net ...
  • 28.
  • 29. The Pros And Cons Of Edward Snowden The United States of America has attracted immigrants for generations with promises of freedom from an interfering government. Despite the country's guarantee, security administrations have been secretly gathering private information belonging to U.S. citizen's. Disgraced by the National Security Agency's lack of preservation of the American public's personal messages, Edward Snowden, a former Central Intelligence Agency recruit NSA contractor, revealed documents that confirmed the government's protruding practices. Some consider Snowden to be a traitor for publishing secret government information. In contrast to these allegations, Edward Snowden is widely known as a hero because he exposed the invasive surveillance by NSA, led to major reform in previously flawed agencies, and has been celebrated by many journalists and reform committees. Edward Snowden is a hero for unveiling the unknown, invasive nature of government supervision over American civilians. In 2013, Edward Snowden leaked documents from the National Security Agency that revealed the agency's invasive tactics of collecting and storing personal information owned by Americans. The surveillance was authorized under Section 702 of the Foreign Intelligence Surveillance Act of 2008 (FISA), an act intended to allow foreign threats to be investigated through their internet usage. If agencies such as the FBI or the NSA desired personal customer information from private companies, they can easily issue a "National Security Letter." The letter would involve a gag order, or a document that demands complete disclosure surrounding a business deal. Commonweal Magazine informed Americans that an astounding "fifteen thousand such letters were issued in 2012."(Source #2) AT&T and Verizon were among the telecommunication companies to be convinced to give the NSA copies of their customer's internet messages. The government allowed the NSA to seize citizen's personal information with a simple processes. Considering how easy it was to access American's private documents, privacy advocates believe Section 702 encouraged invasive surveillance. The NSA was also capable of searching through international and American data by conducting "upstream" and "downstream ... Get more on HelpWriting.net ...
  • 30.
  • 31. Case Of 1928-Olmstead V. United States 1928– Olmstead v.United States Supreme court rules federal investigators can wiretap into suspects phones legally, and use those conversations as evidence. Roy Olmstead, a suspected bootlegger, was bugged in the basement of his office, and also in the streets surrounding his home. He was later convicted based on that evidence. An appeal was raised on the grounds that the wiretapped data violated the defendant 's Fourth and Fifth Amendment. It was decided that the wiretapped data did not violate the Fifth Amendment, because he was not forced to say anything incriminating, and did not violate the Fourth Amendment because wiretapping is not considered search and seizure (which would require a physical search of a person's belongings or possessions.) This event is important because it decided that wiretapping was legal and did not infringe on the Fourth or Fifth Amendment rights of criminals, effectively allowing wiretapping to be used in investigation and trial as evidence. In addition, it defined your Fourth Amendment rights to only apply to physical materials or properties of yours, not conversations or other non tangible things, and said that since wiretapped individuals were not forced to discuss incriminating information, the Fifth Amendment protection against self–incrimination did not apply. It set a major precedent that would stand for nearly forty years, when it was overturned in Katz v. United States. 1945– The predecessor to the NSA receives copies of every ... Get more on HelpWriting.net ...
  • 32.
  • 33. Section 702 Pros And Cons 1. Since the release of NSA's classified documents by the NSA ex–contractor Edward Snowden, the controversy of morality and legitimacy of FISA (Foreign Intelligence Surveillance Act), and, in particular, section 702, has become a major issue of public debate in the context of national security and privacy rights. To understand the underlying controversy, it is important to understand what powers section 702 gives to the US intelligence agencies. Section 702 of the Federal Intelligence and Surveillance Act (FISA) is the section that elaborates on the procedures and regulations for surveillance of non–United States persons while they are located outside the US. It defines US people as either citizens or permanent residence card (commonly known as green card) holders. Because determination of the person's location can be hard (due to ambiguous borders in territorial agreements and ways to hide malefactors' location), the law requires the targets to be only reasonably believed to be located overseas. Section 702 is flexible in terms of obtaining legal ... Show more content on Helpwriting.net ... This argument exaggerates the scope of the discrimination against people based on their privacy rights. On paper, it might seem like section 702 makes a big attempt and discriminating non–US citizens with regards to their privacy rights. Nonetheless, it's not the case when it comes to the real– life application of the law. Evidently, the government does not have interest in targeting and using the collected data against people who do not pose threat to the national security of the United States. In fact, only a tiny percent of the population of earth could be considered "dangerous" to the national security of the United States. For other foreigners, it simply doesn't make any sense to attempt to collect and analyze the data. It is expensive, as it costs money to maintain and buy hard drives, takes too much effort and precious time from the NSA employees, and would damage the reputation of the intelligence ... Get more on HelpWriting.net ...
  • 34.
  • 35. Surveillance And The Threat Of Terrorism Surveillance Over the decades, as technology advanced, surveillance became easier and easier. In the 21st century, people live in the world of ubiquitous surveillance, where everything becomes collected, saved, searched, correlated and analyzed. Surveillance generally means to keep close watch over someone or something. While a root word in surveillance is veil, which portrays imagery as saving face, or hiding. The U.S. National Security Agency (NSA) and other federal agencies are engaging in the extensive surveillance to fight crime and reduce the threat of terrorism. Not only does surveillance fight crime, it proves the honesty and humility of people in the work office or on the streets. However, surveillance threatens privacy and liberty because it monitors individuals, meaning that certain information may not be kept secret. This frightens countless people because the thought of being watched sparks a controversy of the 4th amendment of the constitution. The 4th amendment protects the right against unreasonable searches and seizures. Surveillance challenges the privacy and liberty of individuals; nevertheless, it upholds the protection and security of citizens from terrorism and crime. The main purpose of surveillance systems is to monitor events from a remote or secret location. The capabilities of domestic surveillance expanded rapidly in recent years due to the equally rapid spread of new technologies that facilitate information gathering. However, many of the ... Get more on HelpWriting.net ...
  • 36.
  • 37. Analysis Of Edward Snowden 's Information Leaks In a society centered on an ever growing technological bloom, the standards for security have been placed very high to protect citizens from cyber–attacks and wrong doing. However, some of the steps that have been taken pushed the limits to what is lawful. Very little reforms have been made even with recent public awareness to the problem. The steps taken make the US government surveillance programs contradict with the constitutional rights of the American people. This essay will address the National Security Agency and its policies, Edward Snowden's information leaks, the views of the opposition, and solutions to this lingering problem along with contributions. The primary American government sector in charge of sorting through the massive amounts of data that pass through technological means is the National Security Agency (NSA). The NSA searches for threats to the United States, whether that be foreign or domestic. Many US citizens did not know how data was being sorted until a few whistle blowers, the most famous being former NSA analyst Edward Snowden, began leaking classified information to the public. This revealed that the US government was using a massive internet "dragnet" that filtered through everyone 's information, along with the tapping of phone calls and private messages, regardless of crimes being committed or not. They could search through private messages, turn on unsuspecting users cameras while their computer is idle, and listen through their phone ... Get more on HelpWriting.net ...
  • 38.
  • 39. The Pros and Cons of the Foreign Intelligence Surveillance... Introduction Today, electronic surveillance remains one of the most effective tools the United States has to protect against foreign powers and groups seeking to inflict harm on the nation, but it does not go without a few possessing a few negative aspects either. Electronic surveillance of foreign intelligence has likely saved the lives of many innocent people through prevention of potential acts of aggression towards the United States. There are many pros to the actions authorized under the Foreign Intelligence Surveillance Act (FISA) pertaining to electronic surveillance, but there are also cons. Looking at both the pros and cons of electronic surveillance is important in understanding the overall effectiveness of FISA. [1] Definition ... Show more content on Helpwriting.net ... Another pro of FISA, and the applicable amendments that followed, is the ability for electronic surveillance to be conducted without a court order for a designated length of time to better facilitate collection and streamline the process under USC. 1802, Sec 102. There are, of course, steps required by high ranking officials, the President and Attorney General, which must be taken to conduct such surveillance without a court order. Also, the criteria to conduct the surveillance is restricted specifically to communications exclusively between foreign powers and must not include "substantial likelihood" that the surveillance will acquire communications pertaining to a United States Person. [4] While the appropriate legal process should always be followed, this provision is necessary at times to bypass the lengthy legal process for obtaining a court order when time restrictions apply. The Cons of FISAAuthorized Electronic Surveillance. FISA provides many other pros to the IC pertaining to electronic surveillance as well, but it also brings with it multiple disadvantages. One of the biggest cons is what the founders of the Act were trying so hard to avoid, the lack of balance. Many people believe that the balance between the protection electronic surveillance provides and the infringement on civil ... Get more on HelpWriting.net ...
  • 40.
  • 41. Government Surveillance vs Personal Privacy Essay Today, individuals are sacrificing privacy in order to feel safe. These sacrifices have made a significant impact on the current meaning of privacy, but may have greater consequences in the future. According to Debbie Kasper in her journal, "The Evolution (Or Devolution) of Privacy," privacy is a struggling dilemma in America. Kasper asks, "If it is gone, when did it disappear, and why?"(Kasper 69). Our past generation has experienced the baby boom, and the world today is witnessing a technological boom. Technology is growing at an exponential rate, thus making information easier to access and share than ever before. The rapid diminishing of privacy is leaving Americans desperate for change. Privacy allows an individual the ... Show more content on Helpwriting.net ... Privacy has expanded to more complex forms including people's information displayed throughout technology (Kasper 71). Technology has become very effective for a thriving generation, but it also possesses a handful of flaws that counter the benefits. Technologies help people post and deliver a message in a matter of seconds in order to get a message spread quickly. It also gives individuals the power to be the person they want to be by only showing one side of themselves. But sometimes information that had intentions of remaining protected gets out. That information is now open for all human eyes to see. This information, quite frankly, becomes everybody's information and can be bought and sold without the individual being aware of it at all. However, this is no accident. Americans in the post 9/11 era have grown accustomed to being monitored. Government entities such as the NSA and laws such as the Patriot Act have received power to do so in order to protect security of Americans. However, the founding fathers wrote the fourth amendment to protect against violations of individual's privacy without reason. In a rapidly growing technological world, civil liberties are increasingly being violated by privacy wiretapping from government entities such as the NSA, Patriot Act and the reduction of the Fourth Amendment. The NSA, National Security Agency, is the largest manager of United States intelligence in the ... Get more on HelpWriting.net ...
  • 42.
  • 43. Pros And Cons Of Edward Snowden In 2010, Snowden took a job as a private contractor at an NSA facility in Japan. He worked for Dell corporation which contracted with the agency. As we know, after 9/11, opportunities for contactors increased as the American security state turned many of its intelligence tasks to private corporations. This job gave Snowden a top–secret clearance and greater access to surveillance secrets than he previously had working for the CIA. Like his reaction in the CIA, Snowden seemed even more shocked by what he saw going on in the NSA: "I could watch drones in real times as they surveilled the people they might kill. You could watch entire villages and see what everyone was doing. I watched NSA tracking people's Internet activities as they typed. ... Show more content on Helpwriting.net ... This would lead us to the the most important question that should be asked here: What differentiates Snowden from the previous whistleblowers like Julian Assange, Daniel Ellsberg, Bradley Manning and many others, making him 'the most wanted man' by the US government? The exceptionality of Snowden which will be analyzed in the next chapter might show if it is a reason behind the reforms emerged later or ... Get more on HelpWriting.net ...
  • 44.
  • 45. The Nsa And The Terrorist Attacks Against Paris In wake of the terrorist attacks against Paris, many American political leaders are urging to increase security measures used to fight terrorism. The question is perpetual, Is government spying necessary to curtail terrorist acts? History The NSA was created on November 4, 1952, by President Harry Truman and was held responsible for collecting, processing, and distributing intelligence information from foreign electronic signals. The NSA contributed to the Nation 's work in breaking German and Japanese codes during WWII. The information collected was to be used for national foreign intelligence and counterintelligence purposes and to support military operations. Although the inner dynamic of the NSA would completely change after september 11, 2001. Nearly 3,000 Americans were dead in the worst terrorist attack in U.S. And those working for the NSA felt guilty, as if there was more they could have done. Prior to the attacks, many hijackers were living in the U.S. "We all felt like a great wrong had been done and that we are all – somewhat – if not all culpable," remembered J. Kirk Wiebe, a former NSA senior analyst. After 9/11 No longer would surveillance be limited to foreign targets. Instead, the agency would begin monitoring virtually all data involving communications flowing through the U.S. without a warrant and without privacy protections. "everything changed at the NSA after the attacks on September 11. The prior approach focused on complying with the Foreign ... Get more on HelpWriting.net ...
  • 46.
  • 47. Essay On Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act (FISA) was first established in 1978. This enactment was the Congressional reaction to the introduction amid numerous Committee hearings of past abuses of United States persons' privacy rights by specific components of the United States government. Those abuses had happened, according to the government, as a component of its endeavors to counter indicated dangers to national security. The term 'foreign intelligence' means information relating to the capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, foreign persons or international terrorist activities. When law enforcement agencies and government entities want to gather information about a crime, ... Show more content on Helpwriting.net ... It guarantees that the Intelligence Community has the adaptability and readiness it needs to distinguish and react to terrorist and other foreign dangers to our security. With the current Foreign Intelligence Surveillance Act, it gives a key part to every branch of government. It gives responsibilities mutually to the Attorney General and the Director of National Intelligence to guarantee that the Nation's chief law enforcement and intelligence authorities cooperate in gathering foreign intelligence in agreement with the law. The Foreign Intelligence Surveillance Act of 2008 recognizes two groups of potential targets for surveillance under the Foreign Intelligence Surveillance Act. The first category is foreign powers which is defined as: "a foreign government, a diplomat, other representative or employee of a foreign government, a faction of a foreign nation that is not substantially composed of U.S. persons, an entity openly acknowledged by a foreign government to be directed and controlled by it, ... Get more on HelpWriting.net ...
  • 48.
  • 49. Riley V. California Case Study It is unlikely for Computin to be able to successfully suppress the evidence against him considering any avenue he could take would all be invalidated under the FISAAmendments act, specifically Section 702. One such avenue is claiming his Fourth Amendment rights were violated. Under the Fourth Amendment one can expect a "reasonable expectation of privacy" that is both subjective and objective. If Computin expected his laptop to be private and if society would also agree that such privacy is reasonable, he can claim that the court violated his Fourth Amendment Rights. Many cases have seen people try but fail to invoke their Fourth Amendment rights. In the legal case of Riley v. California, Riley moved to suppress evidence that was obtained without a warrant, citing his Fourth Amendment rights that prevented warrantless searches. Even though this was a physical procedure that is different from the manner in which ... Show more content on Helpwriting.net ... If the government or institutional agency such as the FBI can successfully obtain a search order from a judge in the Foreign Intelligence Surveillance Court, they have the authority to search all electronic communications and cloud services that fall within the field of the warrant. In this particular case, if the government had reasonable suspicion to believe that Computin was a threat to the country, they have the right to through Section 702 of the FISAAmendments Act. Section 702 of the FISAAmendments Act focuses on target people outside of the United States and is not a U.S. person. Basically, it gives the Attorney General and the Director of National Intelligence the power "to acquire foreign intelligence information by jointly authorizing the surveillance of non–U.S. ... Get more on HelpWriting.net ...
  • 50.
  • 51. Taking a Look at Government Surveillance Government Surveillance Government Surveillance, a way that the government says that will keep you safe from foreign dangers like terrorist attacks, espionage, and perhaps a international war. However you have to sacrifice your private life, and business for increased protection and surveillance. Government surveillance, defined by dictionary.com as a noun that states " Close observation or supervision maintained over a person, group, etc, especially one in custody or under suspicion"(Merriam–webster.com) the word was also taken from the French word surveiller that means to watch over and was adopted and changed as the English word surveillance. Government surveillance has been with us ever since the start of groups, dynasties, government and more. Back then, in the medieval ages like in the sixteenth century. Surveillance was hardly surveillance at all. Regular people paid by the enemy, or nation diplomats, or just amateur people looking for easy money, all mostly did it. As the timeline grows closer to the present. There are factors that have made up the system that now controversially exists in America as Government Surveillance. The Timeline starts in 1791, when the 13 colonies still existed. But are now rebelling against the British where in that year congress passed down the Bill of Rights and the fourth Amendment saying that it "protects every and any citizen of America the right to not be searched in house or work in unreasonable cases." 137 years ... Get more on HelpWriting.net ...
  • 52.
  • 53. The Nsa 's National Security Agency The National Security Agency's (NSA) warrantless collection of metadata has been questioned on constitutional grounds. Specifically, the NSA's program has been argued to be in violation of the Fourth Amendment of the Constitution, which states that all citizens are to be free from any unreasonable search or seizure. Proponents of the NSA's collection of metadata believe that it is a crucial tool in preventing terrorist attacks, while opponents of the program believe that its questionable constitutional validity, along with its lack of clear success in preventing a single terrorist attack, leaves the NSA's metadata collection program in desperate need of reform or outright abolishment. I. THE NSA'S PURPOSE AND THE EVOLUTION OF GOVERNMENT SURVEILLANCE It is important to note what the NSA is tasked to do before discussing the constitutional arguments against its metadata program. As Abdulmajeed Alhogbani, in his work, "Going Dark: Scratching the Surface of Government Surveillance," informs, the agency has two tasks: "1) information assurance, which prevents foreign agents from obtaining classified information, and 2) signals intelligence, which collects and analyzes foreign intelligence" (475). Metadata collection does not fall under either of these tasks. Prior to the establishment of the National Security Agency in 1952, the earliest surveillance measure enacted in the United States was the Communications Act of 1934, which centralized "the regulatory process of ... Get more on HelpWriting.net ...
  • 54.
  • 55. NSA Mass Surveillance The integrity of one's communications and privacy of online activities is the largest casualty of the National Security Agency's (NSA) surveillance over digital lives. Years since September 11, 2009, the NSA's mass surveillance has greatly expanded due to the heightened concern that new technology can be used by terrorists to plan and execute a terrorist attack. In today's age of technology, there are easier ways of accessing information and communication as well as new ways of hacking and gathering personal information. The new surveillance programs and regulations are enabled by the Patriot Act and post 9/11 paranoia, but it has been over fourteen years since the incident. After whistleblower, Edward Snowden, it was revealed that the government's mass surveillance went beyond what many considered acceptable. It can be predicted that unless the U.S Government reins in NSA mass surveillance, the ... Show more content on Helpwriting.net ... The Amendment states that "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation" (Bill of Rights). The amendment's intention was to create a constitutional defense for Americans and limit the intimidating power of law enforcement. It established and protected the people's privacy by recognizing their rights by restricting activities that are "unreasonable" or not authorized by a warrant based upon probable cause. The amendment still remains as vitally important today as when it was enacted by balancing the interests of the government with that of the people's right to be free of unreasonable conduct. Though during post 9/11, the context of the amendment was utilized in a different way than the Founding Fathers ... Get more on HelpWriting.net ...
  • 56.
  • 57. Argumentative Essay On Prism Throughout history, we as a country have worked tirelessly to improve our laws and rights as citizens. Constitutionally, we are require to have specific privacy rights or acts that protect us. At least it would be presumed that way, up until topics like government spying break that assumption of safety of our calls, searches, emails, and history on our devices. The uproar that occurred in early June of 2013, was due to a so called security program called PRISM. Prism is not just any security programs. This specific program was created by the NSA and FBI and used to tap into servers without consent. Reading articles such as, " NSA Prism program taps into user data of Apple, Google and Others" by Glenn Greenwald and Ewen MacAskill from The Guardian ... Show more content on Helpwriting.net ... Overall, it seems the solution that is suggested would be for Congress to ultimately change and revise the amendments according to the FISAAct. Kaminski believes this would minimize the issue and reinstate the privacy rights that our country has worked so hard to respect and gain. Even though The Guardian post does not provide a resolution, the article does close with this statement that was cited earlier, "This requirement applies across the board, regardless of the nationality of the target." (Greenwald and MacAskill par. 43) This statement is a well written closing, because the author tries to make it known to the reader, in a strong sense, that nationality should not matter when it comes to our privacy rights as ... Get more on HelpWriting.net ...
  • 58.
  • 59. Summary: Foreign Intelligence Surveillance Act In the modern society, the technology is growing at a dramatic speed. New ways of communication make the conception of privacy more obscure. At the same time, it is harder for people to actually keep the "privacy". For example, in old days, someone could steal others' privacy only by sneaking around; in the phone era, this can be achieved by placing the detectaphone; currently, in the internet era, with video calls, e–mails and the latest "cloud storage", the stealer can get the information by acquiring the data from the server. Other than focusing on few people, those data allow the stealer to have a broad surveillance, and even without exposing him/herself. This "access" could be "hacking", or something worse, a special program used by the ... Show more content on Helpwriting.net ... Just as Justice Robert H Jackson warned "exceptional protections for civil liberty might convert the Bill of right into suicide part" (Janda, et al 437), it is understandable that the US government sacrifice some people's privacy to achieve the national security in recent years, especially after the terrorists' attack. However, the national security is not the excuse of abusing the surveillance. The reason of starting the surveillance, which are "non–Americans" and "51 percent outside of US", is definitely not strong enough. With the "eavesdropping without court approval", the "PRISM" is more likely a warrantless search. It breaches the Fourth Amendment, and thus the project is ... Get more on HelpWriting.net ...
  • 60.
  • 61. Sharing Is Not Always Caring Sharing Is Not Always Caring As a teenager, receiving one's very first cell phone is the first step in establishing "popularity." Tweeting, texting, Instagram–ing and publishing life's "fails" and funnies are the teen social norm and staple to the lines of communication between other teens. Creativity is put to the test when language is turned into code (wyd, rotflmbo, ie.) and electronic communication between people sitting across the table from each other becomes a matter of national security. A peaceful co– existence between adults and teens continues as long as "actual" communication between both parties is kept to a minimum. But somewhere along the way, the secret behind the codes was made public, and parents everywhere were now able to decipher and share the coded information that was not [originally] meant for the rest of the world–communicational anarchy ensued. In the same manner, personal information not meant for the whole world can cause problems in the lives of those whose information is shared. The right to collect and share information should be limited to specific government programs or for specific purposes such as, Family Watchdog and the United States Department of Justice National Sex Offender Public Website (NSOPW), but not shared beyond that. In order to better understand the differences between American privacy and American security, we must first take a look at these three factors: whose information is being obtained or accessed, what and how is the ... Get more on HelpWriting.net ...
  • 62.
  • 63. The Controversy Over U.S. Domestic Surveillance Ever since the September 11, 2001 terrorist attack on the World Trade Center, the Pentagon, and an area in Pennsylvania, in which nearly 3,000 helpless individuals were killed, the U.S. Congress began to pass legislation that would strengthen the United State's counterterrorism efforts. Less than a month after the horrific attack, the National Security Agency (NSA) started a "special collection program" with intentions to track communications among suspected terrorists and Al Qaeda leaders. Then on October 4, 2001, President George W. Bush authorized the NSA to monitor domestic communications in order to track down suspected terrorists. Two problems shortly arose from Bush's decision: the fact that his authorization to NSA was carried out in secret and also that monitoring the domestic communications was done without a warrant. This proved to be illegal since the 1978 Foreign Intelligence Surveillance Act states that the government is prohibited from eavesdropping inside the United States without first getting a warrant from the Foreign Intelligence Surveillance Court (FISA court). In order to counteract the issues he had caused, on October 26, 2001 Bush signed the Patriot Act; a law that would expand the government's electronic surveillance powers. After signing this law Bush stated, "The existing law was written in the era of rotary telephones. This new law that I sign today will allow surveillance of all communications used by terrorists, including emails, the ... Get more on HelpWriting.net ...
  • 64.
  • 65. The End Of The Second World War The year is 1939, the start of the Second World War. During this era, alliances such as the Axis or Allied Powers were able to communicate their battle plans by sending messages to one another using certain codes. As an Allied Power, the United States formed the Single Security Agency to divert and interpret Axis Power communications; this is also referred to as code breaking (History Chanel 1). The surprise attack on Pearl Harbor brought an end to the Single Security Agency. However, by the end of World War II in 1949, America was determined to defend themselves from another surprise attack. Therefore, they formed the Armed Forces Agency. This agency was also short–lived, by 1952 the Armed Forces Agency had lost governmental trust because they rejected communications with the Central Intelligence Agency (CIA) and other federal agencies. Longing for a structured security agency that would be able to break the code systems used by opposing forces, President Harry Truman established the National Security Agency on November 2, 1952 (Plethrons NSA 1). Prior to the early 1970s, American citizens viewed the Executive Branch with high respect. Presidents of the United States throughout the early twentieth century claimed to have the power to organize warrantless surveillances for national security purposes. However, in the early 1970s, many citizens began to change their views of the Executive Branch (Plethrons 1). Specifically, the 1972 Supreme Court case of U.S. vs U.S. ... Get more on HelpWriting.net ...
  • 66.
  • 67. NSAArgument Essay "Even if you're not doing anything wrong, you're being watched and recorded," said former NSA information technology contractor, Edward Snowden, as quoted in an article by CNN political reporter, Jeremy Diamond. Despite his low position in the National Security Agency, Snowden caught the world's eye in 2013 when he leaked documents revealing the NSA and FISC's plans for mass domestic surveillance in the United States. His decision to reveal classified documents sent the nation into widespread outrage. The NSA had access to not only metadata (records of activity), but also content containing personal information that Americans rightfully assumed was protected by laws such as the Stored Communications Act (SCA) and the Foreign Intelligence Surveillance Act Amendments Act ... Show more content on Helpwriting.net ... The SCA was amended, the Cybersecurity Act was written into law, and the USA FREEDOM Act was added to the USA PATRIOT Act, all in 2015 in an attempt to bring regulations on surveillance procedures up to date. Regulations would add limitations to NSA's ability to access information. Yet, according to an article in the Huffington Post, one of the most popular American political sites, by lawyer Shayana Kadidal, "...as even advocates of the Freedom Act note, there are many other ways in which the government could be sweeping in the same records." Clearly, the multiple additions to the law in 2015 weren't sufficient enough to hold back the government. A document titled "What Went Wrong with the FISA Court", by Elizabeth Goitein and Faiza Patel, published by the Brennan Center for Justice (BCJ) at New York University Law School, suggests that "Congress should require the government, on a periodic basis, to submit to the FISA Court for its review a list of the selection terms used to acquire electronic communications under Section 702 [of FAA]." Periodic reviews such as these would eliminate any chance of current laws becoming ... Get more on HelpWriting.net ...
  • 68.
  • 69. Essay on The Patriot Act is Unconstitutional The Patriot Act was established after the tragedy of September, 11, 2001 in a moment of weakness. It gave unprecedented and unnecessary powers to intelligence agencies under the wide umbrella of national security. The Patriot Act has used an "us vs them" mentality as well as pro–American propaganda to accomplish its goals. This new authority of the intelligence agencies has gone too far, is unjustified, unconstitutional, and infringes on the privacy of the American people, as well as others in the world. The Patriot Act should be weakened in order to preserve the rights of the American people and to reaffirm to the world that the U.S will not tolerate violations of human rights. On September, 11th, 2001, the United ... Show more content on Helpwriting.net ... The other purposes section of that is incredibly vague, modifying laws concerning money laundering, education, financing, credit reporting, computer fraud, electronic communications, and others ("The USA Patriot"). One section of the Patriot Act pertaining to the NSA surveillance revealed by Edward Snowden is an amendment to FISAAct of 1978, increasing surveillance authority by allowing the collection of "certain business records for foreign intelligence and international terrorism investigations" ("Uniting and Strengthening"). This gave the NSA and other intelligence agencies a broad authority to collect data from corporations. This has been "intentionally and willfully abused", with some workers spying on lovers, ex–lovers, and others, "for practice", "out of curiosity", and other "reasons". There have been no reported employee terminations due to this (Moyer). It wasn't just family, friends or ex–lovers that the NSA agents had the capability to spy on. When Edward Snowden leaked his information, he informed the public, "I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email" (Masnick). For the agents to collect information, except certain types of information, they had ... Get more on HelpWriting.net ...
  • 70.
  • 71. The Foreign Intelligence Surveillance Act Domestic Surveillance Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States' government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States' government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between ... Show more content on Helpwriting.net ... This act makes a significant amount of amendments to the FISA act one of which is Title II which is titled "Enhanced Surveillance Procedures." While the FISA act targeted only non–US citizens for "foreign intelligence information", this act allows the collection of foreign intelligence information from US citizens as well. One section which raises a brow is section 215 of the Patriot Act which grants the FBI permission to ask the FISA court to "compel the sharing of books, business documents, tax records, library check–out–lists," and pretty much any tangible thing, "as part of a foreign intelligence or international terrorism investigation." Upon further reading of this section it becomes evident fairly quickly that these "required" materials can include purely domestic records. Of course, if one has nothing to hide then one need to fear this act since it is geared towards non–US and US citizens suspected of being affiliated with a foreign power; but later acts seem to notion that perhaps the United States government is not only concerned with terrorist groups but rather all information of its citizens and residents which can build patterned profiles. Under George W. Bush's term, and shortly after the attacks of September 11th 2001, both the President's Surveillance Program and the Terrorist Surveillance Program have been brought under scrutiny. Each of the programs authorizes the National Security Agency (NSA) by executive order to monitor phone calls, ... Get more on HelpWriting.net ...
  • 72.
  • 73. Edward Snowden Gathering of intelligence and espionage has been a fundamental part of American security since the earliest days of the United States. Shortly after President George Washington took office in 1789, he petitioned Congress to allocate a "secret fund" in the State Department budget for the purpose of gathering foreign intelligence. By George Washington's third year in office, the "secret fund" was 12 percent of the federal budget. The first permanent intelligence organization the United States established was the Office of Naval Intelligence in 1882. This organization's task was to gather information about the military forces of foreign countries. Two years after World War II ended (1945) congress passed the National Security Act. This gave birth to the modern intelligence apparatus. After being signed into law by President Harry Truman, the U.S. Department of Defense (made up of all the U.S. Armed Forces) and the CIA was created. This was created to inform the president on issues of national security. Over the years, information gathering has become more and more common. Recently, Edward Snowden showed the world how frequently it was actually happening. Although many people consider Edward Snowden to be a hero, he is one of the biggest traitors in American history. Edward Snowden was born in Elizabeth City, North Carolina on June 21, 1983. He was the son of Lonnie and Elizabeth Wendy Snowden. Edward's father was a Coast Guard officer. Edward spent the first ten ... Get more on HelpWriting.net ...
  • 74.
  • 75. Foreign Intelligence Surveillance Act Pros And Cons ACLU. (2017). The Foreign Intelligence Surveillance Act – News and Resources. Retrieved from ACLU: https://www.aclu.org/other/foreign–intelligence–surveillance–act–news–and–resources. This Act was enacted in 1978 but did not have many controversial aspects in it and was later blamed for not providing enough powers to aid the process of collecting intelligence. Some security experts blamed the restriction in the Act for the poor intelligence leading to the September 11, 2001, attacks. Bazan, E. B. (2008). The Foreign Intelligence Surveillance Act: overview and modifications. New York: Nova Science Publishers. When you look into this Act, there were many flaws that were infringing on American freedom. The FISA has faced much criticism and disapproval. One of the major problems associated with the FISA is the fact ... Show more content on Helpwriting.net ... M. (2011). 9/11 and the Transformation of U.S. Immigration Law and Policy. Human Rights Magazine Home, 38(1). Many people decide to immigrate to the US to have a better life. But Immigration reform was due to 9/11 attacks which had been revisited during the past years. Obviously, administration's efforts failed. Perl, R. (2017). The Department of Homeland Security: Background and Challenges. Retrieved from The National Academies Press: https://www.nap.edu/read/10968/chapter/24. The issue of the creation and impact of homeland security laws and presidential directives and executive orders was bringing up the concern of the attacks in 2001. The president acted quickly to put in place and believed would address security issue on the home front. The "USA Patriot Act (2001)." American History, ABC–CLIO, 2017, americanhistory2.abc– clio.com/Search/Display/567308 https://americanhistory2–abc–clio–com.gmclibrary.idm.oclc.org. This Act may be described as the "Uniting and Strengthening America Act" by providing tools required to intercept and obstruct terrorism. The Act was passed and with no debate voted on; Congress did not fully read the ... Get more on HelpWriting.net ...
  • 76.
  • 77. Research Paper On Edward Snowden Interest sparked when Edward Snowden NSA contractor publicly disclosed a large number of classified documents that are about U.S. government, implemented massive surveillance program toward American citizens and foreign countries. This incident was viewed as the most significant leak in America history and of course it has caused sensation worldwide. However, privacy issue doesn't easily raise general public's attention due to it seems like don't bring substantial bad consequence or effect our lives a lot. After Snowden escaped to Russia, different people called him traitor whistleblower, dissident, and even a hero. Consequently, there has been a fierce debate about whether he should be punished by law or be protected as hero of whistleblower. ... Show more content on Helpwriting.net ... But I had no idea which side I should stand on. Because I was have been told I should be an honest man from the time I was a kid, so I think Snowden should tell the public the truth about what he know. Snowden is absolutely obeys the law if he unveils government misdeed in public, in this case, he should be exempt from punishment by the American government. But my concern is whether these leaked information gives terrorists and other enemy countries advantage because they get to know how to avoid detection by the American government. In this case, Snowden's actions harms the national security. However, NSA eavesdrop peoples phone calls and Internet can be justifiable under certain circumstances. For example, the surveillance program can detect the terrorists, in consequence prevent people from terrorism attack. In order to figure out who is wrong and who is right, I should do more research about what they did. Next, I attempt to find valuable information about American government's intelligence gathering policies to scrutinize whether the policies are useful or dysfunctional that should be reformed. I found a book named "Spying In America in the Post 9/11 World: Domestic Threat and the Need for Change". The author Ronald Marks is a former senior CIA official and his expertise lies in Cyber security and Homeland Security intelligence. He is very familiar with U.S. government policy ... Get more on HelpWriting.net ...