SlideShare a Scribd company logo
1 of 77
Download to read offline
Pursuit of Privacy and The National Security Agency
Officially given its name on the fourth of November 1952, the National Security Agency was
developed to ensure the safety of American citizens (Howe 11). In an effort to prevent any
unauthorized spying on innocent civilians a court known as FISA was created in 1978 to regulate the
NSA. Up until the events of September 11th, 2001, the NSA was used strictly as a tool for foreign
investigation to decipher international communications ("Frequently Asked Questions About NSA"
1). Twenty–three days after the Twin Towers fell, President Bush passed the Patriot Act ("Timeline
of NSA Domestic Spying" 16). This act ushered the NSA into a position of limitless capability.
Millions of Americans are having their personal lives followed, tracked, and recorded into mass data
pools. This unethical acquisition of personal information is in strict violation of the Fourth
Amendment. Immediate action must be taken by the Government to return the rights assured by our
Founding Fathers and the Constitution.
The NSA was established in 1952 by order of President Harry Truman (Howe 11). Preceding the
official announcement of the National Security Agency the United States had an organization called
the Armed Forces Security Agency (AFSA). The Armed Forces Security Agency played a key role
in the United State's victory over the Axis Powers, which entailed Japan, Germany, and Italy, during
World War II (Howe 17). The NSA was developed as a way to continue surveillance into the post–
war era.
... Get more on HelpWriting.net ...
The Cyber Defense Exercise Hosted By The National Security...
Knowledge of the techniques of the information security discipline, including encryption, access
control, physical security, training, threat analysis, and authentication.
As an Information Technology major at the United States Naval Academy (USNA), I was selected
to participate on USNA's team for the 2010 Cyber Defense Exercise hosted by the National Security
Agency. Our team, which won the competition, had to design, operate, and defend our virtual
network. As File Systems Manager, I was directly responsible for the encryption, user
authentication, and intrusion analysis of our web server, exchange services, and databases.
Transitioning out of the classroom and into the U.S. Navy, I am assigned as the Anti–Submarine
Warfare (ASW) ... Show more content on Helpwriting.net ...
From my course instruction and indoctrination at the Academy to operating in the Sea of Japan, my
exposure to the core tenets of the information security discipline has gone from unpacking what is
taught in the classroom to applying it on the U.S Navy's most capable warship.
Knowledge of the human factors in information security, including human computer interaction,
design, training, sabotage, human error prevention and identification, personal use policies, and
monitoring.
At the operator level, my work group of 16 Sailors requires the use of sophisticated information
systems to perform daily tasks and execute our mission. From submitting classified SONAR contact
reports via our network to interacting with the server cluster responsible for launching torpedoes,
my team's respect for, and proper use of, the systems they are utilizing is my responsibility. Whether
it be reporting email phishing attempts or ensuring USB drives and other unauthorized equipment
are not introduced into the network, my team plays an important role in ensuring our ship's networks
remain secure and free from intrusion. Additionally, the proper maintenance of our information
systems and attention to detail with regards to operator input into the weapons' programs is vital to
the effective employment of our capabilities. During my time on the ship, although my team was not
directly involved, we have had
... Get more on HelpWriting.net ...
National Security Agency Summary
On June 5, 2013, a London newspaper was the first to report that the United States National Security
Agency (NSA) was collecting the telephone records of millions of U.S. customers of the Verizon
Wireless Company. The NSA did not listen in or record the telephone calls themselves but collected
data about the calls such as the telephone numbers used and the time, date and length of the calls.
There was a top secret order issued by the U.S. Foreign Intelligence Surveillance Court (FISA court)
required Verizon to give the NSA metadata information on the telephone calls both between the U.S.
and other countries and within the U.S. PRISM, a secret NASA program, is a system designed to
permit the agency to collect data directly from the servers of ... Show more content on
Helpwriting.net ...
federal government. Like 25% of Booz Allen's 25,000 employees, Snowden held a top–secret
clearance. To gain this clearance, Snowden had signed the federal government's Classified
Information Nondisclosure Agreement, which described the possible fines and prison terms for
violations, as well as a Booz Allen nondisclosure and confidentiality agreement. Meaning Snowden
gained all access to all access to classified communications intelligence from the NSA and with the
position from Hamilton he was granted access to lists of machines all over the world the NSA
hacked. When Greenwald asked Snowden why, Snowden answered, "I can't allow the U.S.
government to destroy privacy, Internet freedom and basic liberties," he said. "My sole motive is to
inform the public as to that which is done in their name and that which is done against them."
Snowden said he told his concerns to his supervisors, ten officials in all, and he was told to either
"let the issue be someone else's problem" or to keep quiet to avoid
... Get more on HelpWriting.net ...
Edward Snowden: United States National Security Agency
The Case of Edward Snowden Key words
CIA (Central intelligence agency Spy's)
FBI (federal Bureau Investigations, police
NSA (National Security Agency, monitors surveillance)
Who was Edward snowden?
Edward Snowden, was a former US(NSA) contractor, now lives in Russia after fleeing the United
States via Hong Kong in May, having revealed extensive internet and phone surveillance by US
intelligence.
What was prism
PRISM is a code name for a program under which the United States National Security Agency
(NSA) collects internet communications from at least nine major US internet companies. The
program is also known by the SIGAD US–984XN. What did Edward Snowden believe?
He believed that there was a fine line between state secrecy (all the
... Get more on HelpWriting.net ...
National Security Agency Essay
National Security Agency/Central Security Service
The National Security Agency/Central Security Service (NSA/CSS) was established in November
1952 to provide a cryptologic organization for the civilian and military leaders of the United States
and to provide them with timely information. The National Security Agency (NSA) coordinates,
directs, and performs highly specialized activities to produce foreign intelligence information and
protect United States information systems through two main missions, Signals Intelligence
(SIGINT) and Information Assurance (IA). The Signals Intelligence (SIGINT) mission uses
cryptologic machines to break foreign codes to find out what they know and what they are doing.
The biggest accomplishment publicly ... Show more content on Helpwriting.net ...
2. Radically Improve the Production and Protection of Information.
3. Enhance an Expert Workforce to Meet Global Cryptologic Challenges.
4. Create and Integrate Business Management Capabilities Within the Enterprise and With
Stakeholders.
The NSA also has one of the biggest research and development programs in the United States. It is
said that the NSA employs more mathematicians than anyone else in the U.S. and possibly the world
to help design and develop cipher systems that will protect information systems and search for
weaknesses within the existing ones. Though NSA research and development is top secret, some of
its past accomplishments were the development of the first large–scale computer and the first solid–
state computer which led to the development of the modern computer. The NSA was also
responsible for the development of the tape cassette.
I believe the NSA has proven to be one of our greatest agencies. Not only has it developed
technology to be used among every day civilians such as computers and cassette tapes, but has also
developed life saving equipment including communication and code cracking machines for the men
and women of our military. While serving in the U.S. Navy, I was stationed in a squadron that used
spy planes equipped with modern day crypto machines. This technology was developed in the
research and development teams of the NSA agencies to intercept signals
... Get more on HelpWriting.net ...
The National Security Agency Invasion
Living in a country that is known to be "Land of the free..." is not exactly what most people dream
of. The United States may be known for its freedom and power, but most people are unaware of the
covertness behind the government. And by now, almost every American citizen knows that privacy
no longer exists. In this century and country, it really does not. In the United States, most people
look toward the government as salvation, protection, and reliance. Unfortunately, not everything is
as good as it seems. Imagine your personal information, your daily conversations, and your daily
actions being viewed and judged by the government. This is exactly what the government does.
Sometimes the government is not always our solution; they can also be our problems.
National Security Agency (NSA) is also known as the "President's Surveillance Program". It was
first implemented after the Twin Towers attack on September 11, 2001 by President George W.
Bush. Soon after, more surveillance programs sprouted in order to assist the National Security
Agency. Some surveillance programs include the FBI, IRS, Terrorist Scanning Center (TSC),
Department of Defense (DoD), Department of Homeland Security (DHS), etc. All of these
surveillance programs's main purpose is to conduct a range of surveillance activities inside the
United States in search for terrorists. These surveillance activities required much information such
as call histories, data records and other personal information. This daily
... Get more on HelpWriting.net ...
Information Safety and the National Security Agency
Security" information In the last 20 years, we had a boom in communication. The industry of
telecommunication and the velocity of internet has increased, in a way that never happened. In the
past the evolution of communication increased each decade, today increase each second. In the past
the only way for communication was the voice, and sometimes, for example, they used animals to
send a message, like a bird, but it still take a long time to send a message. However each century
brings another ways to made a communication. The interception of message, is not a new, in the past
the people intercepted the messenger from another country to get information. The communications
increased so much, on the other hand, the ways to intercept the message increased to. Nowadays, we
living a age of information, everything happens faster than other times. Consequently the
interception of information, in other words, the cases of espionage, become one of the biggest
worries for the nations around the world. Recently, Edward Snowden, an ex–agent of NSA (National
Security Agency) from USA, leaks a largest number of documents containing information about
various countries. This leak sparked the warning signal of the countries (Shoichet, 2013). The
predecessor of NSA, was created in April 28, 1917, when a code and cipher decryption unit was
established as the Cable and Telegraph Section, in the Military Information Section; I'm August 26,
1918, became a independent department called by
... Get more on HelpWriting.net ...
National Security Agency Vs NSA
In 2013, a man named Edward Snowden ignited a national debate by revealing that our National
Security Agency, or the NSA, has been gathering mass amounts of phone records and other, private,
data without consulting the American public. That means American emails, chats, phone calls,
online transactions, web searches, or even online medical records can and have be stolen by the
government without consent. Using decryption methods, court orders, supercomputers, and
technical tricks, the NSA is slowly gaining ground on its war on encryption. All of these things are
supposed to be defended by technology companies and Internet Service Providers, but in the article,
"Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security" by James ... Show
more content on Helpwriting.net ...
In the article, they discuss how the NSA has overreached and "cracked much of the online
encryption relied upon by hundreds of millions of people to protect the privacy of their personal
data, online transactions and emails" (Ball). Throughout the article, they argue that the NSA is
interfering with American privacy, and security, by trying to win a war on encryption. They even
reveal that the NSA is even coercing some unnamed technology companies and Internet Service
Providers to cooperate with their demands and hand over keys or create backdoors. According to the
NSA, this is "the price of admission for the US to maintain unrestricted access to and use of
cyberspace" (Ball). Yet, at the same time they are effectively undermining the security of different
networks. Additionally, the article "NSAAble to Foil Basic Safeguards of Privacy on Web" by
Nicole Perlroth, Jeff Larson, and Scott Shane build on this argument of national security against
privacy. They argue that the NSA is undermining everyday privacy in communications of today's
digital
... Get more on HelpWriting.net ...
Edward Snowden: The National Security Agency
Edward Snowden was formerly part of the National Security Agency (NSA). Snowden leaked
documents that detailed how Americans were being observed, including the PRISM program. The
United States has filed multiple charges against Snowden and he has since found asylum in Russia.
Four Reasons why Snowden's actions should be considered ethical are:
1. Snowden was trying to protect the rights of the American people and make sure everyone is being
treated equally. According to Kantianism, people should not be treated as a means to an end.
Snowden saw that the NSA treated ordinary citizens as a means to an end to get whatever
surveillance the NSA wanted. Snowden was ethical here, because he acted with good intentions or
good will, according to Kantianism. ... Show more content on Helpwriting.net ...
According to Rule Utilitarianism, Snowden broke one of the laws that were in place to maximize
overall happiness. The rule he broke was rule nine, "Obey the law." It is against the law in the
United States to reveal confidential information because of the Espionage Act. Since breaking this
rule did not exactly enhance overall utility, it would be considered an unethical decision.
2. Another rule of Rule Utilitarianism that Snowden violated is rule seven, "Keep your promises."
As part of his contract for working at the NSA, Snowden signed an agreement or oath in which he
promised to keep confidential information private and would not reveal classified information or
else he would face the consequences of doing such. Breaking this rule did not have a solid argument
for increasing happiness either, so this is also unethical.
3. In Act Utilitarianism, Snowden's decision to expose the NSA's surveillance techniques caused a
massive decrease in overall happiness in the United States, since everyone began to argue about
whether or not the NSA is justifiable in these actions. In addition to the U.S. being in an uproar, it
probably did not do much to make Snowden any happier since he had to seek asylum in a foreign
country. This makes Snowden unethical because the consequences of his actions resulted in an
overall decrease in
... Get more on HelpWriting.net ...
The Operations of the National Security Agency
The National Security Agency (NSA) has been a United States discernment org since 1952 when
President Truman formally named it; in spite of the fact that the office has been around since World
War I translating code correspondences. It is presently one of the biggest United States brainpower
associations on the planet. It works under the sway of the Department of Defense. The NSA's
primary objectives are screening , gathering, deciphering, translating and examining data and
information of outside intelligences around the globe. This incorporates the associated people with
terrorism in the United States.
A number of the operations the NSA does are clandestine and obscure by the overall population.
They are given this sanction by the administration to guarantee insurance of the US from terrorism
and different dangers. The office regularly utilizes tame approaches to gather data on remote
knowledge including electronic frameworks irritating, tapping phone records, and subverting
through subversive programming. Mass reconnaissance of the United States is likewise a practice
utilized by Security Agency, gathering and putting away all telephone records of all American
subjects.
The Federal Emergency Management Agency (FEMA) is an office under the locale of the United
States Department of Homeland Security. Made in 1978, the office's main role is to facilitate the
reaction to any calamity that happens in the US and is excessively for the assets of neighborhood
and state
... Get more on HelpWriting.net ...
National Strategy For Homeland Security Agencies
Introduction
The state has the mandate of safeguarding citizens of hit places from suffering the disproportionate
impact of natural disasters. The hurricane that hit Jacksonville town in Florida crippled the city's
infrastructure. The destroyed power and telephone lines stopped all the communication and
transportation systems in the city. The copper wires were left hanging precariously along the charred
roads. Looters took the opportunity to steal the expensive copper wires and motorists drove around
carelessly as all the traffic lights had gone off. The local government experienced difficulties in
trying to contain the situation. The task to locate, triage and secure citizens were nearly impossible
as the whole town was in chaos. The local authorities could have coordinated with various
Homeland security agencies to restore normalcy.
The Coordinated Responses and Key Resources office of the president has come up with three main
strategies to respond to disasters and protect the critical infrastructure in the USA. The President has
charged the National Strategy for Homeland Security (NSHS) with the responsibility to address the
vulnerabilities that involve more than one sector or needs the responsiveness of more than one
agency. The advanced strategy calls for interconnectivity and complementarity of homeland security
systems. The second approach involves the National Strategy for the Physical Protection of Critical
Infrastructures, and Key Assets (NSPPCIKA) identifies
... Get more on HelpWriting.net ...
National Security Agency Surveillance
In January of 2014, news agencies reported on the National Security Agency's (NSA) use of "leaky"
mobile phone applications to obtain private user information. The United States government has
admitted to spying on its citizens, but claims that doing so is the best way to protect the U.S. from
foreign threats. Certain smartphone applications, such as the popular Angry Birds game,
inadvertently transmit personal user information, such as age, gender, ethnicity, marital status and
current location, collectively known as the user's metadata, across the internet[1]. As part of their
world–wide telecommunications surveillance for terrorism or other criminal activity, the NSA
exploits these security holes in smartphone applications, by collecting and storing user data. While
many users are unaware of the information leaks in their mobile applications, most people would
certainly prefer to keep such information private [2]. Smartphones know almost everything about
who we are, what we do, and where we go, but how much of that information does the government
have the right to know and possess? Is it ethical for the United States government to collect and
track the cell phone data of its citizens in the name of national defense, or does that violate the
citizens' right to personal privacy? NSA surveillance of private user data of U.S. citizens is the best
method of protection against terrorism and is also legal under the Constitution. By examining these
two components, it is plain to
... Get more on HelpWriting.net ...
The National Security Agency ( Nsa ) Is An Intelligence...
Security is key for the advancement and stability of the United States, and spying is nothing new to
the world. With the advancement of technology, we are now able to stay connected with each other,
while having a plethora of information at our fingertips. This is phenomenal, but dangerous. With
the increasing amount of stored data online and the speed at which said data can be transferred, one
can only worry that maybe were sharing a little TOO much information. The National Security
Agency (NSA) is an intelligence organization created by the United States government. The NSA is
responsible for global monitoring, collection, and processing of information and data for foreign
intelligence and counterintelligence. Today, the NSA states that ... Show more content on
Helpwriting.net ...
These countries were pretty successful at obtaining sensitive Intel. However, in the 21st century
surveillance is used in a different and more complicated way. Due to the drastic increase in crime
rates and recent terrorist attacks, governments around the world were forced to use electronic
surveillance to protect their own people. The electronic surveillance that each government conducts
is so complex and covert that you don't even know that you are the target. The US government has
become one of the biggest cases of this kind of surveillance. The US government has been
employing several forms of high level surveillance such as wiretapping, CCTV cameras (Closed
Circuit Televisions, aka street cameras) and now internet data by looking at the information
transferred between devices. The thought that the government was secretly watching their citizens
every move has been talked about for some time now. Although this talk was widespread and sort of
heard of, there was no definitive proof. However, suspicions were confirmed in 2013 due to a man
by the name of Edward Snowden leaking classified information from the NSA's archives. Amongst
the leaked information, evidence showed that the NSA had been spying on millions of innocent
people, and said monitoring is still being conducted. This shocking level of spying was without
warrant, making it illegal. Now, the US government has taken its bad
... Get more on HelpWriting.net ...
The National Security Agency and Electronic Surveilance
George Zimmerman committed murder, and was acquitted of charges by a jury, as there was not
enough evidence to prove that Zimmerman had not acted in self–defense. Zimmerman walked away
from the trial without any repercussion, and much of the country was outraged. But what if
Zimmerman had been wearing Google Glasses, or what if Martin had been using his phone? Both
devices have the capability to record events. Either of those could have been used as evidence
against Zimmerman, and might have been enough for the jury to find him guilty of murder. Many
Americans find flaws with the NSA's (National Security Agency) cell phone, satellite and camera
monitoring. Though most people despise the program, the NSA's monitoring power needs to be
raised. With the ability to more thoroughly investigate crime scenes though electronic methods, the
NSA could help catch local criminals, and could also investigate terrorist attacks on the country
more thoroughly. In the end, it comes down to a simple choice, privacy or safety. Which is more
important, a small amount of privacy on electronic devices, or the safety of the entire country? In
recent months, the NSA has been attacked by cell phone users across America. This accusation is
greatly aided by the media, which makes the NSA appear much worse than it actually is. The media
has made it appear that the NSA directly reads each and every text sent by Americans, and the
privacy of American citizens is being infringed upon. While many texts
... Get more on HelpWriting.net ...
U.s. National Security Agency
Imagine a world where you are being watched by the government all the time. This sounds similar
to the classical dystopian novel 1984, where Big Brother invades the private lives of its citizens
including, the protagonist, Winston. Even though our society is not as invasive we have our own big
brother, the NSA. Although it protects U.S. national security, the government should discontinue the
surveillance done by the NSA because it is detrimental the U.S. economy the Constitution and the
citizens of the U.S.
The National Security Agency, NSA, is an intelligence organization of the United States
government, responsible for global monitoring, collection and processing of information and data
for foreign intelligence and counterintelligence. In 2013, whistleblower Edward Snowden leaked
documents revealing the lengths of the National Security Agency's surveillance on the United States'
citizens. This caused mass debate of privacy vs. security over the agency's surveillance. Some major
arguments for and against the NSA surveillance have involved the sections of the Constitution.
These include : The Fourth Amendment which states "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the persons or things to be seized" and
"Section 702 [of
... Get more on HelpWriting.net ...
The Nsa 's National Security Agency
The National Security Agency's (NSA) warrantless collection of metadata has been questioned on
constitutional grounds. Specifically, the NSA's program has been argued to be in violation of the
Fourth Amendment of the Constitution, which states that all citizens are to be free from any
unreasonable search or seizure. Proponents of the NSA's collection of metadata believe that it is a
crucial tool in preventing terrorist attacks, while opponents of the program believe that its
questionable constitutional validity, along with its lack of clear success in preventing a single
terrorist attack, leaves the NSA's metadata collection program in desperate need of reform or
outright abolishment.
I. THE NSA'S PURPOSE AND THE EVOLUTION OF GOVERNMENT SURVEILLANCE It is
important to note what the NSA is tasked to do before discussing the constitutional arguments
against its metadata program. As Abdulmajeed Alhogbani, in his work, "Going Dark: Scratching the
Surface of Government Surveillance," informs, the agency has two tasks: "1) information assurance,
which prevents foreign agents from obtaining classified information, and 2) signals intelligence,
which collects and analyzes foreign intelligence" (475). Metadata collection does not fall under
either of these tasks.
Prior to the establishment of the National Security Agency in 1952, the earliest surveillance measure
enacted in the United States was the Communications Act of 1934, which centralized "the regulatory
process of
... Get more on HelpWriting.net ...
National Security Agency
The National Security Agency
Many have wondered why America is so great and one of those reasons is because of the NSA. The
National Security Agency was founded on November 4, 1952 and continues today. The NSA is an
intelligence organization of the United States government, responsible for global monitoring,
collection, and processing of information. There are many different opinions about the NSA and the
work that they do. The National Security Agency is, in fact, a good thing because it provides
national security and supports the military.
Without the NSA, our country could face some major issues such as the middle eastern countries
and many more. It protects us from terrorism and everything that comes with it. In 2014 an article
was released describing that the NSA has stopped fifty–four terrorist attacks with mass spying. One
example of when this happened was, "The case of Najibullah Zazi who confessed to ... Show more
content on Helpwriting.net ...
Evidence has shown that the NSA can and has done many good things for the United States. Many
argue that the NSA invades our personal rights. The NSA protects citizens private information using
the custom database software called Cloudbase, which has fine–grained security to control access
down to the cell level(nsa.gov1 2). If the NSA can access our information than enemies could just as
easily do the same but thanks to the NSA, we don't have to worry about that because they are the
ones who keep our information protected. The National Security Agency is, in fact, a good thing
because it provides national security and supports the military. Instead of being negative and upset
with the NSA, we should be more grateful that we live in a country where we don't have to worry
about civil wars, terrorism, or anything else of that effect. America is what it is and we should be
proud to live in the land of the free and home of the
... Get more on HelpWriting.net ...
Edward Snowden: The National Security Agency
Edward Snowden Edward Snowden worked for the National Security Agency (NSA) as a security
guard. Eventually, he got a job at the Central Intelligence Agency (CIA) working in the
information–technology field. In 2009, Snowden left the CIA to work for Dell. Dell sent him to
Japan to work under the NSA and was then stationed in Hawaii. After working in Hawaii for three
months, Snowden left Dell and switched over to Booz Allen Hamilton . Snowden started making
copies of NSA documents that contained information over their surveillance. The information
consisted of statements stating that the NSA was spying on Americans in a program known as
PRISM . Once Snowden had enough documents, he took a period off and flew to Hong Kong. In
June, the Guardian ... Show more content on Helpwriting.net ...
The first option would be to call the hotline number and anonymously tip the government about
what the NSA was doing14. If done, the NSA would have no idea who tipped them off to the
government. I would still be able to keep my job and hopefully see the NSA stop looking into the
lives of civilians. Anonymously tipping would ensure my safety from being persecuted by the
government and society for what I had illegally done by attaining all of those
... Get more on HelpWriting.net ...
Surveillance And The National Security Agency
There are all different types of surveillance now–a–days. The thought of it has come a long way and
it has evolved significantly. There are many pros and cons as to surveillance in today's world. Also,
there are many different ways that technology allows people to get surveillance on many different
things such as people, where they go, who they talk to, private information, and so much more.
Surveillance and security in the United States has also changed significantly since September 11th,
2001. The National Security Agency also plays a big role in surveillance and security today and it
has come a long way.
The National Security Agency, also known as the NSA, was created on November 4, 1952, by
President Harry S. Truman. It was created during World War 2 to try and decode codes from the
Germans and Japanese (Murse, What is the National Security Agency). According to the Article
'What is the National Security Agency' written by U.S. Politics expert Tom Murse, the National
Security Agency gathers intellect by piloting surveillance on its adversaries through the assembly of
phone–call, email and Internet data. He also states that the National Security Agency's surveillance
activities are directed by the U.S. Constitution and overseen by members of Congress, precisely
members of the House Intelligence Subcommittee on Technical and Tactical Intelligence. The paper
'Government Surveillance and Internet Search Behavior' written by Alex Marthews and Catherine E.
Tucker, on June 6,
... Get more on HelpWriting.net ...
National Security Agency Spying Research Paper
They're here for protection
Espionage is spying on other countries to obtain confidential information about the procedures with
government and military. The world has used espionage as a means of knowledge acquisition for
many years, and the United States is well known for use of intelligence agencies for spying,
conducting covert operations, and funneling money to sway foreign elections or to remove foreign
leaders from power. Intelligence agencies were developed to utilize precautionary strategies and
tactics in strengthening security and defense of the country. The history of the United States
intelligence agencies has been to develop a system where terrorists, drug cartels, money launderers
and others are stopped by elite forces. Currently, ... Show more content on Helpwriting.net ...
Calls were made for secret prisons to open for suspected terrorist to be exposed to interrogation,
torture methods, and collecting data. During the time of 9/11 the Agencies started to build drones for
locating on Al–Qaeda and other terror groups for terrorist personnel. Over the years the NSA
(National Security Agency) created "sophisticated technology called PRISM" said Agrawal, it
helped improve surveillance for our government and tracked threats to the country. The government
organized these intelligence agencies to enable each agency to focus on their own intel and jobs.
Agrawal mentioned that in the year of 2015 the total budget of the government's agencies and
military intelligence was $66.8 billion. That money is spent on the Intelligence community that is
comprised of the agencies and offices for the weaponry and security systems. Crumpton used a
statement by James Comey, "there will come a day it will matter a great deal to the lives of people...
that we will be able to gain access." to criticize Apple and Google for their lack of warnings for their
security
... Get more on HelpWriting.net ...
National Security Agency
The National Security Agency is a subunit of the U.S. Department of Defence and is the controller
of the largest electronic and online surveillance programs. Given their authority from Foreign
Intelligence and Surveillance Act of 1978, the initial plans were for the NSA to be a regulated
program, that had to go through a series of checks and balances in order to collect any information.
It was also not intended for domestic use. On June 6, 2013, news outlets the Washington Post and
the Guardian released the detailed reports that the NSA was going above and beyond the call of
duty, but probably not through the best of means.
There has always been the question on whether the nation's Big Brother, was spying on everything
we did. The NSA is essentially created for spying on people, for the nation's defense. When Edward
Snowden released top secret government documents, brought to light how far the NSA was willing
to go to achieve this goal. In a recent post by the Guardian, it was found that the NSA gathers more
information than the Library of Congress (Macaskill, Dance). The Library of Congress is the largest
in the ... Show more content on Helpwriting.net ...
His new rules, "allow the National Security Agency to share information it gleans from its vast
international surveillance apparatus with the 16 other agencies" (Waddell). This allows other
intelligence agencies to use NSA surveillance systems and expands the people who have access to
unwarranted information. This means that the information gathered by the NSA will be accessible to
other agencies, and these agencies will be able to pilfer through the data and collect what they may
find pertinent to their own investigations. On one hand, this means there are more checks and
balances on the information that is stored by the NSA, while on the other it means more people are
able to invade the privacy of innocent people and their personal
... Get more on HelpWriting.net ...
Edward Snowden: The National Security Agency
The National Security Agency (NSA) is an intelligence organization of the United States federal
government responsible for global monitoring, collection, and processing of information and data
for intelligence and counterintelligence purposes. They have the ability to see web browser history,
massages, they can see exactly what is displayed on the screens. If they are interested, they can even
see what you are reading right now. The NSA collects every American phone records, they have the
power to see which phone number was called, at what time, how long the call lasted, and they can
even listen to everything that was said in the call. The PRISM program lets the NSA access private
user data on well–known leading online services. Edward Snowden, ... Show more content on
Helpwriting.net ...
With this, they have the ability to watch citizens and view anything they do electronically in any
country. When Edward Snowden leaked many files involving the organization watching, people
around the world and in the US people have either said that it is right or that it is wrong for them to
do this. Embarrassed and irritated by Edward Snowden's leaks, Obama charged last year at a press
conference that Snowden was presenting a false picture of NSA by releasing parts of its work
piecemeal: "Rather than have a trunk come out here and a leg come out there," he said, "let's just put
the whole elephant out there so people know exactly what they're looking at. ... America is not
interested in spying on ordinary people," he assures us. The government, he went on, is not
"listening in on people's phone's phone calls or inappropriately reading people's emails." Founded in
November 4, 1952 by Harry S. Truman, the NSA grew up quite big organization. The three billion
phone calls made in the U.S. each day are snatched up by the agency, which stores each call's
metadata (phone numbers of the parties, date and time, length of call, etc.) for five years. Every out–
of–country call and email from (or to) a U.S. citizen is grabbed by NSA computers, and agents are
authorized to listen to or read them. Their Ethernet is very fast, that they have the ability to
download data at the speed of 10 gigabytes per second which is 10000 megabytes. Just so you know,
the average civil Ethernet speed is 60 megabytes per second which is 166.6 times slower that NSA
Ethernet. Every day they collect 21 petabytes of
... Get more on HelpWriting.net ...
Edward Snowden: The National Security Agency
In June of 2013, Edward Snowden, a former NSA employee, exposed the world to the many shady
practices taking place behind the closed doors of both the U.S. and U.K. governments at the time.
The National Security Agency (NSA) and other intelligence agencies within the United States, were
using illegal tactics in order to spy on their own citizens in efforts to determine possible threats.
What was so shocking to the world was the fact that these intelligence agencies were doing so on
their own terms and were operating without the permission of the public. They were hacking into
people's phones and computers and reading private messages. When word of this leaked to the
public, the United States began to panic, as they felt that their every move ... Show more content on
Helpwriting.net ...
Although it is unclear how much information Snowden had access too, it is believed to be around
1.7 million classified documents. These documents exposed to the public the NSA's major collection
of phone and internet metadata from U.S users, according to NBC New,s in their article "Who is
Edward Snowden, the Man Who Spilled the NSA's Sectret:" the NSA was "Spying on the personal
communications of foreign leaders, including U.S. allies; and the NSA's ability to tap undersea fiber
optic cables and siphon off data." (Dedman, Bruckner, and Cole; NBC News) Following the initial
leak of this story, The Guardian published a secret court order in which showed how the NSA was
requiring Verizon to hand over all of its telephone data to them on a daily basis. With this, followed
more revelations both within the Guardian and the Washington Post. It was revealed that the NSA
was not only tapping into millions of citizens phone calls and messages, but that they were also
tapping into the servers of some of the world's largest and most popular internet companies.
Facebook, Google, Microsoft, and Yahoo are a few of these big name companies. It is said that these
intelligence agencies were able to track these companies by using Prism, a surveillance program.
(BBC News: Edward Snowden: Leaks that
... Get more on HelpWriting.net ...
National Security Agency Is Unconstitutional
The NSA is an unconstitutional Federal government agency established by a failed president. In
1952, the worst president in U.S. History, President Truman, established the National Security
Agency (NSA). Truman is known for committing the worst crime against humanity by using a
nuclear bomb on the people of Hiroshima and Nagasaki in Japan, as well as for losing China and
North Korea. For a president that is known for his poor performance on foreign policy, Truman
establishes the NSA to safeguard American interests from foreign and domestic threat to American
National Security. The NSA surveillance program is a critically important program to the national
security in the United States. The NSA has two missions, to exploit foreign communications, known
as SIGINT, and protect U.S. information systems, known as IA. The headquarters are located at Fort
George G. Meade, Maryland, in the Baltimore–Washington corridor, which is very close to
Washington D.C. The NSA is known for its high tech prowess, and it is on the frontiers of
communications and information technology. Actually, NSA is incompetent. NSA was not able to
stop the Boston bombers from bombing in Boston Marathon because it was overwhelmed with data
from Mass Surveillance on Americans. We have to ask ourselves, if NSA is on the frontiers of
communications and information technology, why did the NSA is not able to prevent a terrorist
attack? The NSA is not able to keep the American people safe. The Government is not
... Get more on HelpWriting.net ...
National Security Agency Analysis
How the NSA and U.S. ICE Agencies Affect Digital Crime The National Security Agency (NSA)
and the United States Immigration and Customs Enforcement (ICE) both play crucial roles when it
comes to combating and investigating cyber crimes. The NSA's primary responsibility is to create
and maintain computer–coding systems that protect sensitive information regarding U.S.
information systems (Taylor, Fritsch, and Liederbach, 2015). Along with their crucial role of
protecting the United States' sensitive computer information, the NSA also provides specialized
information system training to both private and government entities (Taylor et al., 2015). The ICE
Agency's responsibilities go far beyond physically protecting U.S. Borders. The ICE Agency ...
Show more content on Helpwriting.net ...
ICE is actually the Department of Homeland Security's main investigative firm (Taylor et al., 2015).
According to Taylor et al. (2015), ICE is a large agency consisting of about 15,000 employees
whose responsibilities are "identifying and investigating weaknesses within the nation's borders,
developing intelligence concerning threats, removing foreign nationals, and enforcing over 400
federal statutes (p. 266). ICE plays a large role in controlling and investigating computer crime
because of how easy it is for cyber crimes to extend past the border of the country (Taylor et al.,
2015). ICE maintains the Cyber Crimes Center (C3) which consists of four sections: child
exploitation, computer forensics, cyber crimes, and information technology and administration
(Taylor et al., 2015). Each subsection of the C3 has very specific goals related to fighting
cybercrime. The Information and Technology and Administration section of the C3 supports the
other three branches of the C3 with technical and administrative services (Taylor et al., 2015). The
Child Exploitation Section's (CES) purpose is to investigate those who produce, distribute, and
possess child pornography and also to investigate cases of sex tourism (Taylor et al., 2015). The
CES established Operation Predator, which has been highly successful in that it
... Get more on HelpWriting.net ...
National Security Agency Benefits
Fortunately I am currently working for the "company" I would be interested in working for if I was
seeking for a career. I searched for my "companies" compensation and benefits if as though I was
not currently working there and was seeking a job opportunely. Company: The National Security
Agency (NSA) URL: https://www.intelligencecareers.gov/nsa.html The compensation plan that
NSA offers motivates me, because of the following: They offer a wide range of benefits such as
health care coverage, retirement savings, room for improvements, flexible leave, job movement,
training, etc. They promote work life balance, which is very important for me and my family, and
job/education growth, which allows for advancement. NSA provides meaningful
... Get more on HelpWriting.net ...
The Ns The National Security Agency
The National Security Agency or otherwise known as the NSA, had sparked a recent debate of the
fundamental amendment rights that American citizens have. To provide some historical context, the
NSA in 2013 was exposed by Edward Snowden, a former contractor and employer of the NSA. He
was a NSA whistleblower who divulged the surveilling tactics that the government had imposed on
its citizens, as well as on many of its international allies. Many senior governmental officials had
repeatedly stated the program's importance in national security; however, many had also questioned
its efficiency and validity in due process of one 's security. As a vehement believer of one's
individual rights, I do not think that even in times of war the NSA's ... Show more content on
Helpwriting.net ...
The major reason on why this source is essential is because it shows that our rights as citizens. We
are supposed to be safe from "unreasonable searches" and the right to be "secure". The NSA being a
large entity of the government does not satisfy the conditions of the amendments. If we were to
think critically about this issue, surveillancing 300 million people is a great price to pay for finding a
terrorist or a criminal. If we let the government have complete control of our communications, then
we would have a totalitarian society where the government is aware of all of our actions. The
government would unintentionally use the power of communications and abuse it under it's own
favor. A great example of this would be the dictatorship regimes of Napoleon, where he similarly
silences the people and controls the government in a monarchic method. This would inevitably
cause the American citizens to be in a state of fear which would be counter–productive of what the
government's creation was about. People's amendments are made as rights. By undermining them,
we are not effectively creating a system that would respect the privileges that everyone should
willingly have. Another particular reason that shows that the NSA's actions are not permissible is
because it fundamentally goes against what our country was founded for. The people see that the
NSA 's actions as a violation of our historic beliefs, as the NSA's actions is the complete
... Get more on HelpWriting.net ...
The Importance Of The National Security Agency
The role of the NSA and the agency's importance to this country have certainly been put under
scrutiny in the last few years. People are receptive that the United States government has secrets that
are set in place for the benefit of 'national security', however, citizens have been questioning the
country's intentions ever since the leak by Edward Snowden occurred. As technological advances
occur, the conceptualization of the agency's innocence and pure intentions slowly subside. When
Edward Snowden leaked top secret information about the country, legality and ethics were placed on
a metaphorical weight scale of importance to weigh what sacrifices were worth making. This
eventually led people to compromise their rights of privacy for a supposed ... Show more content on
Helpwriting.net ...
As this issue has been recognized in the past, the agency has been forced to go to court to face the
accusation of law bending. In some of these cases, there has been a ruling of unconstitutionality,
however, as time progressed and more of these cases had come to surface, former U.S. President
Bush moved all cases of this degree to a specific court. By doing this, the public began to feel that
the agency's illegal activities can be automatically defended by a mysterious and unexplained claim
of 'maintaining national security'. When attempting to evaluate the legality of their actions, only the
information available to the public can be evaluated, but even then, there are issues that have
appeared. When reviewing legality concerning national security, the president and congress will
undoubtedly come into play. This is a responsibility and action that the president gives approval for
to maintain his standards of national security. However, this does not mean that it is a legal route as
"FISA is a valid regulation of presidential powers, and therefore that the wiretapping program is
illegal" (Lee). As the agency's activities can be accused to be unconstitutional or illegal, it is easy to
assume they are aware of the loopholes and methods to get around this type of 'technicality' in their
eyes. Along with the concern of legality of surveillance, the ethics behind
... Get more on HelpWriting.net ...
National Security Agency Analysis
The National Security Agency does whatever it takes to protect the American citizens from
terrorism, even if it means spying on them. The National Security Agency, commonly known as the
NSA, is a bureaucracy that's often shrouded in mystery. From the time they were founded up until
now, the National Security Agency has been an agency of the government that almost seemed to act
completely separate from the government they protect. From codebreaking in World War II to
domestic spying on the American people in the name of national security in the twenty–first century,
they have been involved in a lot of secretive and questionable dealings. In this essay we will be
learning about subjects like the laws dealing with the NSA to exactly what it takes ... Show more
content on Helpwriting.net ...
On their website, the newest current information regarding the NSA is from the beginning of
January 2016. The new information is the release of the new report on the implementation of the
USA Freedom Act towards business records. Currently, there have been no public announcements in
2016 from the National Security Agency. The NSA works under the Patriot Act, Privacy Act, and the
Foreign Intelligence Surveillance Act (FISA). The Patriot Act was the first piece of legislation
following 9/11 that dealt with terrorism. It increased the punishment for crimes of terrorism and
made it easier for law enforcement and government agencies to share information dealing with
crimes regarding terrorism. The Privacy Act was passed in 1974 to establish control over what
personal information is used, maintained, and collected by agencies in the executive branch of the
government. It safeguards against an invasion of personal privacy by the government agencies. The
Foreign Intelligence Surveillance Act came out in 1978 and has been amended three times to reflect
the security needs of Americans. It regulates what information the NSA can access from Americans
without their knowledge.
The person in charge of this agency is Admiral Michael S. Rogers of the United States Navy. The
Director of the NSA is also the Chief of the Central Security Service (CSS) and also serves as the
Commander of the U.S. Cyber Command. The Director of the NSA is always a commissioned
military officer with a rank of four stars. The new director is nominated by the President, but must
be approved by the Senate. None of the past directors of the NSA has been someone notable enough
that it's a common
... Get more on HelpWriting.net ...
The United States National Security Agency
With the ever–expanding enigma that is the internet and technology, there is the constant question of
privacy; how does the US monitor its citizens or foreign nations? Edward Snowden, a man who
risked himself to bring details about the United States National Security Agency to light; the
National Security Agency (NSA) is the government agency responsible for surveillance on foreign
countries as well as the US itself. How do these two tie together? Or how did the NSA let Snowden,
or others before him, get into through their security and publicize classified information? Snowden,
the whistle–blower of the NSA that revealed thousands of NSA secrets, started life as a normal child
and into his teen years he never stood out. Edward Snowden is known as s computer literate person
of interest, yet when he was young and in high–school, he dropped out of school. Despite being a
high–school dropout, at the age of 16 Snowden attended a community college. While in his teens
and late twenties Snowden was very interested in the internet; it could be theorized that this interest
in the internet would lead to what he would want to reveal. In his teens and early twenties, Snowden
was often found online in chat rooms about computers and other things involving the internet. He
was known for contributing on a site know as Ars Technica. As stated by Harding, Snowden first
started on this site with the intention of setting up his own server.
In 2009, his active posting and discussions on Ars
... Get more on HelpWriting.net ...
National Security Agency Wiretapping : Legal Or Violation...
National Security Agency Wiretapping: Legal or Violation of Civil Rights? "Wiretapping American
citizens on American soil without the required warrant is in direct contravention of our criminal
statutes," stated by Senator Russ Feingold; pertains to the unwarranted wiretapping of United States
civilians suspected of terrorist affiliation (Feingold). The National Security Agency's act of
wiretapping the United States' people is argued to be illegal and a violation of civil rights. However,
under the Authorization for Use of Military Force, the President of the United States is permitted to
authorize a terrorist surveillance program to protect the nation from foreign attacks (Feingold).
Therefore, wiretapping should be allowed in order to ... Show more content on Helpwriting.net ...
The National Security Agency does not have any restrictions on the use of data, and former Obama
administration officials said the agency collected data from both Americans and foreigners. The data
links phone numbers and e–mails directly or indirectly to a person or organization that is of foreign
interest. Almost all information about the National Security Agency's operations is hidden. The
limitations concerning Americans was decided in secret. The Justice Department and the Pentagon
allowed for the National Security Agency to create contact chains including the timing, location and
other details of calls and e–mails, but not the content (James Risen, Laura Poitras). Feingold
mentions George W. Bush's State of Union address and how the President called upon the nation to
"lead this world toward freedom" (Feingold). The President discussed freedom and how it can
transform nations. In the same moment, he openly admitted that he ordered the National Security
Agency to spy on Americans without warrants. Feingold believes that the program and the President
are breaking the law. He states, "When someone breaks the law, when someone misleads the public
in an attempt to justify his actions, he needs to be held accountable. The President of the United
States has broken the law. The President of the United States is trying to mislead the American
people. And he needs to be held accountable" (Feingold).
... Get more on HelpWriting.net ...
The National Security Agency
1) In regards to question number one involving if we – as societal citizens – have a Natural Right to
Privacy, I believe the answer is no – due to understanding equivocal terminology. For example, we
all know that the National Security Agency (NSA), The Law Enforcement Community (LE), and the
Intelligence Community (IC), all routinely collect information on us – on a daily basis. Such
information involving: emails, video and voice chats, videos, photos, Voiceover Internet Protocols
[e.g. Skype, Google Chrome, Oovoo, Teamspeak, & etc], file transfers, retail products [e.g. Home
Security Cameras & Home Thermostats] and social networking sites; including but not limited to
soliciting the following information to second and third party vendors [e.g. private companies &
contractors]. With that being said, we are now living in an institutionalized society – where privacy
is null and void.
For example, the constitutions of many countries guarantee and protect the privacy of individuals,
whereas, the United States of America does not. For instance, many people would argue and say
"The Ninth Amendment" allows us the Right to Privacy. According to the Ninth Amendment, the
Ninth Amendment states "The enumeration in the Constitution, of certain rights, shall not be
construed to deny or disparage others retained by the people." In other words, the right to privacy is
one of those unenumerated rights. According to our Founding Fathers, they believed people (i.e.
Much like John Locke)
... Get more on HelpWriting.net ...
National Security Agency Values
We all value our privacy, and we all know that privacy can conflict with other important social
values. However, in this increasingly digital and technological world, we are more susceptible than
ever to government intrusion of our digital communications and data. This came to light in June
2013, when former National Security Agency (NSA) employee Edward Snowden revealed
thousands of classified documents detailing the intrusive mass surveillance and bulk data collection
of the NSA to journalists and subsequently the American public. As a result, widespread distrust and
questioning of the American government's data–collection programs grew among American citizens
and bipartisan leaders who were also subject to the surveillance apparatus of the ... Show more
content on Helpwriting.net ...
Hardline conservatives like Senate Majority Leader Mitch McConnell opposed the Freedom Act as
they defended mass surveillance as a crucial means of counterterrorism and maintaining national
security. They also thought that the act would make the U.S. vulnerable to more terrorist attacks, as
it would slow down the ability of the NSA and other agencies to lawfully acquire information
necessary to counterterrorism efforts. Although also against the Freedom Act, liberals like Bernie
Sanders opposed the act for different reasons. Strong privacy supporters like Sanders denounced the
act for not doing enough for privacy rights and argued that it would have been a better alternative to
have allowed the Patriot Act and Section 215 to sunset and expire in order for a more effective
reform bill to be passed into
... Get more on HelpWriting.net ...
National Security Agency Research Paper
The National Security Agency has been accused and found guilty of not following standard
procedures, giving inaccurate information, and unreasonably spying on U.S. Residents. In 2011, the
NSA violated 2,776 rules and court orders. There has been numerous incidents of the NSA
committing Illegal and unjust acts. There is nothing just about exploiting and infringe on our rights
as U.S. citizens.
The NSA role is to collect and process global information for foreign intelligence. They are to
protect all government systems and communications. They have over used their power for there own
gain. They have been found guilty of their actions but nobody has done anything. Nothing has
happened because people don't want to accept the fact that we are being ... Show more content on
Helpwriting.net ...
With their knowledge and power they have the ability to find history on anyone. They can use their
systems to find information on politicians and public leaders. Nobody should be able to find
information on anyone so easily. We should be able to have privacy and not having to worry about
someone recording our conversation. Imagine every call, text, email, message and conversation you
have had and knowing someone can see it all.
In December of 2015, the government wanted Apple to unlock and allow them to view all the files
of a terrorist's phone. Apple denied their request and told them it was against the terrorist's rights.
This wasn't the first time Apple was asked to decrypt one of their products. Apple protected the
rights of the people by not allowing the government access to their personal information.
The NSA servers are beginning to overflow and they are having to delete useless information that is
stored. "The National Security Agency's Special Source Operations branch manages "partnerships"
in which U.S. and foreign telecommunications companies allow the NSA to use their facilities to
intercept phone calls, emails and other data. This briefing describes problems with overcollection of
data from e–mail address books and buddy lists, as well as NSA efforts to filter out what it does not
need (washingtonpost.com)." Imagine a government serve with so many personal recorded
conversations that it is over over
... Get more on HelpWriting.net ...
Nsa, The National Security Agency Of The United States Of...
Decades of misinterpretation, secrets as well as a not clarified actions involving mainly the use of
data collection, leaded the NSA, the National Security Agency of United States of America whose
was founded in 1952 for the former United States President Harry S. Truman, one of the greatest
questions marks in America's society at 21st Century. However, limitless efforts made against
national and foreign terrorist plots, cyber technology alongside of security advances, noticeable
actions also a huge support from the government, created a notable and extensive mixture of feeling
towards NSA within its purpose to protect the United States of America. Throughout this research,
an examination of privacy and security issues regarding the NSA is made; are people really having a
legitimate reason for complying? What really matters for NSA? Intelligence, systems and tools, are
privacy issues the real NSA concern? What is really being traded off? Is NSA a helpful asset for the
nation? Amendments, bill of rights, the gap that allows space for doubt, as well the incredible
acceptance in some areas. Questions and points to be explained throughout the research and
opinions from the same of those who have daily questions about what is really being done "For the
Good of the Nation" (NSA home). Security and privacy, distinctive subjects of priority in a human
being life. Privacy, the all–time, basic and fundamental ability of being free of public attention; the
reason of the existence and
... Get more on HelpWriting.net ...
National Security Agency Analysis
Nowadays everyone has a cell phone, or some device that allows them to reach others, get
directions, and take pictures. These devices could be monitored or tracked, and we wouldn't even
know it. In December 2005 the NSA (National Security Agency) was exposed to intercepting
American phone calls and monitoring internet communications. How would you feel if the
government was listening your calls? How would you feel if the government was monitoring
everything you do on your phone? The NSA spying, monitoring calls, and data trafficking is what
bothers many American's.
Now that the NSA's watching over people without them knowing has been exposed, it raises some
eyebrows. People often feel that our privacy is protected and respected, but often times it's not.
There are so many organizations, apps, or things you have accounts ... Show more content on
Helpwriting.net ...
The NSA has monitored things in the past and could be doing them right now or in the future. The
"NSA spying on Americans'' article states "Secret government documents, published by the media in
2013, confirm the NSA obtains full copies of everything that is carried along major domestic fiber
optic cable networks.'' This is concerning because think about the data the NSA has monitored and
investigated. The NSA has also used partnered applications to maintain surveillance over people.
The Codebreaker is a good representation of this because The Puppet Master kept video surveillance
on the team, and always knew where they were. In The Codebreaker this is directly displayed. "The
realization of what Murphy just explained kicks in. "He can't see us anymore! Tanner exclaims. "Do
you think he's still listening?" she asks," (Petry 43) Things that the NSA have done are a little
uneasy, because we don't know everything they have done, but it's good because they protect and
prevent bad things from
... Get more on HelpWriting.net ...
The National Security Agency
The National Security Agency (NSA) was created in 1952 and is headquartered in Forte Meade,
Maryland. It is under the direction of the Department of Defense and reports to the Director of
National Intelligence. Although classified, the NSA has an estimated 37,000 employees (1) and an
estimated operating budget of about 11 billion dollars per year, for comparison the Central
Intelligence Agency has an estimated 20,000 employees and an operating budget of about 14 billion
dollars per year (2). At the moment the director of the NSA is Keith B. Alexander who has served
since 2005 and is the 16th director of the NSA since its inception.
Although the NSA was created in 1952 the history and origins of the NSA can be traced backed,
though under ... Show more content on Helpwriting.net ...
The third aspect is called "Upstream" where the NSA collects data from fiber optic cables, which are
the cables that connect the USA and foreign countries Internet communication, as data flows
through them (8). These three aspects of the NSA that Edward Snowden specifically wanted reveal
to the American people is what has created the most conversation and discussion. Some people are
outraged, some people think this is a necessity in this era, and some just do not understand the
ramifications thoroughly to have an opinion (9).
This brings to the forefront: is the NSA a necessity needed in the complex and technological 21
century? With out a doubt the world is very complex in this day and age with the exponential growth
in technology there seems to be new technology that should be monitored as a conventional medium
of communication. In reality that is a very subjective opinion. For example, as e–mails replace
conventional mail there should be no reason to collect data for e–mails. Conventional mail has no
known data tracking system in place comparable to the NSA. Since e–mails do this would elude to
the fact the e–mails are inherently more dangerous than conventional mail. But, aside from the
speed of e–mails relative to conventional mail, there seems to be no inherently more dangerous
aspect
... Get more on HelpWriting.net ...
Office Of The National Security Agency
Headquarters of the National Security Agency (NSA), employees a multitude of employees
consisting of computer scientists, analysists, linguists, voice interceptors and mathematicians.
(Factory, T.S. Nova, 2009) The scope of what happens behind closed doors at the National Security
Agency is mind boggling. The average citizen could not even begin to apprehend the complex work
these professional complete in a normal work week. The employees at the National Security Agency
monitor terrorist by intercepting and interpreting phone calls, e–mails, webmail, monitors social
media and website sites. Nova's program "The Spy Factory" explores how safe is our county when it
comes to terrorism. Nova brings up some interesting facts that are chilling and make you think, are
we really safe in America? The program begins with by stating "none of this information that we are
speaking about this evening is in the 9/11 Commission Report. They simple ignored it." (Scheuer,
M. Former Central Intelligence Agency Analysist) The program quickly moves into the events
leading up to September 11, 2001 and the World Trade Center attacks. In November 1996, Al Qaeda
contacts are holding a conversation on a satellite phone from a store in New York City; this phone
will soon be in the hands of Osama bin Laden. NSA is listening as bin Laden makes a phone call
from Afghanistan. Al Qaeda is hard to track, but homing in on this phone now establishes the area
where bin Laden is located. NSA collects a
... Get more on HelpWriting.net ...
National Security Agency (NSA)
National Security Agency (NSA) U.S. intelligence agency within the Department of Defense that is
responsible for cryptographic and communications intelligence and security. Its headquarters are in
Fort Meade, Maryland. The NSA grew out of the communications intelligence activities of U.S.
military units during World War II. It was established in 1952 by a presidential directive from Harry
S. Truman in which he specified its mission as to provide an effective, unified organization and
control of the communications intelligence activities of the United States conducted against foreign
governments, to provide for integrated operational policies and procedures pertaining thereto. The
NSA was created in part out of the belief that the importance ... Show more content on
Helpwriting.net ...
He is assisted by a Deputy Director, who is the highest–ranking civilian within the NSA/CSS. NSA
also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel,
head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the
Office of the Director of Compliance (ODOC). Unlike other intelligence organizations such as CIA
or DIA, NSA has always been particularly reticent concerning its internal organizational
structure.As of the mid–1990s, the National Security Agency was organized into five Directorates:
Michael S. Rogers, the director of the NSA. The NSA is led by the Director of the National Security
Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and
Commander of the United States Cyber Command (USCYBERCOM) and is the highest–ranking
military official of these organizations. He is assisted by a Deputy Director, who is the highest–
ranking civilian within the NSA/CSS. NSA also has an Inspector General, head of the Office of the
Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and
a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC). Unlike
other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent
concerning its internal organizational structure. As of the mid–1990s, the National Security Agency
was organized into five
... Get more on HelpWriting.net ...

More Related Content

More from Sheri Elliott

Floral Writing Paper Printables, Letter Paper, 8.
Floral Writing Paper Printables, Letter Paper, 8.Floral Writing Paper Printables, Letter Paper, 8.
Floral Writing Paper Printables, Letter Paper, 8.Sheri Elliott
 
Music(Open Handed Essay)
Music(Open Handed Essay)Music(Open Handed Essay)
Music(Open Handed Essay)Sheri Elliott
 
Essay On Music Music Essay For Students And Ch
Essay On Music Music Essay For Students And ChEssay On Music Music Essay For Students And Ch
Essay On Music Music Essay For Students And ChSheri Elliott
 
Exceptional Narrative Interview Essay Thatsnotus
Exceptional Narrative Interview Essay ThatsnotusExceptional Narrative Interview Essay Thatsnotus
Exceptional Narrative Interview Essay ThatsnotusSheri Elliott
 
How To Write A Convincing College Essay
How To Write A Convincing College EssayHow To Write A Convincing College Essay
How To Write A Convincing College EssaySheri Elliott
 
Paper Clipart Handwriting Paper, Paper Handwriting Paper Transparent
Paper Clipart Handwriting Paper, Paper Handwriting Paper TransparentPaper Clipart Handwriting Paper, Paper Handwriting Paper Transparent
Paper Clipart Handwriting Paper, Paper Handwriting Paper TransparentSheri Elliott
 
Free Picture Student, Writing, Young, Homework, Paper
Free Picture Student, Writing, Young, Homework, PaperFree Picture Student, Writing, Young, Homework, Paper
Free Picture Student, Writing, Young, Homework, PaperSheri Elliott
 
Vickymorgan Exploring Rubrics
Vickymorgan Exploring RubricsVickymorgan Exploring Rubrics
Vickymorgan Exploring RubricsSheri Elliott
 
Best Free Writing Course
Best Free Writing CourseBest Free Writing Course
Best Free Writing CourseSheri Elliott
 
009 How To Write An Essay In English Example Writin
009 How To Write An Essay In English Example Writin009 How To Write An Essay In English Example Writin
009 How To Write An Essay In English Example WritinSheri Elliott
 
How To Quote An Online Article - Inspiration
How To Quote An Online Article - InspirationHow To Quote An Online Article - Inspiration
How To Quote An Online Article - InspirationSheri Elliott
 
Les Hiboux Sur La Branche. Free Printable Stationery, P
Les Hiboux Sur La Branche. Free Printable Stationery, PLes Hiboux Sur La Branche. Free Printable Stationery, P
Les Hiboux Sur La Branche. Free Printable Stationery, PSheri Elliott
 
Summary Writing Skills
Summary Writing SkillsSummary Writing Skills
Summary Writing SkillsSheri Elliott
 
Remarkable Diversity Essay Thatsnotus
Remarkable Diversity Essay ThatsnotusRemarkable Diversity Essay Thatsnotus
Remarkable Diversity Essay ThatsnotusSheri Elliott
 
Wide Ruled Lined Paper MadisonS Paper Templates
Wide Ruled Lined Paper MadisonS Paper TemplatesWide Ruled Lined Paper MadisonS Paper Templates
Wide Ruled Lined Paper MadisonS Paper TemplatesSheri Elliott
 
How To Write An Abstract For A Research Paper Abstrac
How To Write An Abstract For A Research Paper AbstracHow To Write An Abstract For A Research Paper Abstrac
How To Write An Abstract For A Research Paper AbstracSheri Elliott
 
A Report LearnEnglish Teens - British Council
A Report LearnEnglish Teens - British CouncilA Report LearnEnglish Teens - British Council
A Report LearnEnglish Teens - British CouncilSheri Elliott
 
Resources For Teaching The Literary Essay Essaywriti
Resources For Teaching The Literary Essay EssaywritiResources For Teaching The Literary Essay Essaywriti
Resources For Teaching The Literary Essay EssaywritiSheri Elliott
 
Research Paper Writer Services
Research Paper Writer ServicesResearch Paper Writer Services
Research Paper Writer ServicesSheri Elliott
 
Write A Composition - The Game I Like Most Good S
Write A Composition - The Game I Like Most Good SWrite A Composition - The Game I Like Most Good S
Write A Composition - The Game I Like Most Good SSheri Elliott
 

More from Sheri Elliott (20)

Floral Writing Paper Printables, Letter Paper, 8.
Floral Writing Paper Printables, Letter Paper, 8.Floral Writing Paper Printables, Letter Paper, 8.
Floral Writing Paper Printables, Letter Paper, 8.
 
Music(Open Handed Essay)
Music(Open Handed Essay)Music(Open Handed Essay)
Music(Open Handed Essay)
 
Essay On Music Music Essay For Students And Ch
Essay On Music Music Essay For Students And ChEssay On Music Music Essay For Students And Ch
Essay On Music Music Essay For Students And Ch
 
Exceptional Narrative Interview Essay Thatsnotus
Exceptional Narrative Interview Essay ThatsnotusExceptional Narrative Interview Essay Thatsnotus
Exceptional Narrative Interview Essay Thatsnotus
 
How To Write A Convincing College Essay
How To Write A Convincing College EssayHow To Write A Convincing College Essay
How To Write A Convincing College Essay
 
Paper Clipart Handwriting Paper, Paper Handwriting Paper Transparent
Paper Clipart Handwriting Paper, Paper Handwriting Paper TransparentPaper Clipart Handwriting Paper, Paper Handwriting Paper Transparent
Paper Clipart Handwriting Paper, Paper Handwriting Paper Transparent
 
Free Picture Student, Writing, Young, Homework, Paper
Free Picture Student, Writing, Young, Homework, PaperFree Picture Student, Writing, Young, Homework, Paper
Free Picture Student, Writing, Young, Homework, Paper
 
Vickymorgan Exploring Rubrics
Vickymorgan Exploring RubricsVickymorgan Exploring Rubrics
Vickymorgan Exploring Rubrics
 
Best Free Writing Course
Best Free Writing CourseBest Free Writing Course
Best Free Writing Course
 
009 How To Write An Essay In English Example Writin
009 How To Write An Essay In English Example Writin009 How To Write An Essay In English Example Writin
009 How To Write An Essay In English Example Writin
 
How To Quote An Online Article - Inspiration
How To Quote An Online Article - InspirationHow To Quote An Online Article - Inspiration
How To Quote An Online Article - Inspiration
 
Les Hiboux Sur La Branche. Free Printable Stationery, P
Les Hiboux Sur La Branche. Free Printable Stationery, PLes Hiboux Sur La Branche. Free Printable Stationery, P
Les Hiboux Sur La Branche. Free Printable Stationery, P
 
Summary Writing Skills
Summary Writing SkillsSummary Writing Skills
Summary Writing Skills
 
Remarkable Diversity Essay Thatsnotus
Remarkable Diversity Essay ThatsnotusRemarkable Diversity Essay Thatsnotus
Remarkable Diversity Essay Thatsnotus
 
Wide Ruled Lined Paper MadisonS Paper Templates
Wide Ruled Lined Paper MadisonS Paper TemplatesWide Ruled Lined Paper MadisonS Paper Templates
Wide Ruled Lined Paper MadisonS Paper Templates
 
How To Write An Abstract For A Research Paper Abstrac
How To Write An Abstract For A Research Paper AbstracHow To Write An Abstract For A Research Paper Abstrac
How To Write An Abstract For A Research Paper Abstrac
 
A Report LearnEnglish Teens - British Council
A Report LearnEnglish Teens - British CouncilA Report LearnEnglish Teens - British Council
A Report LearnEnglish Teens - British Council
 
Resources For Teaching The Literary Essay Essaywriti
Resources For Teaching The Literary Essay EssaywritiResources For Teaching The Literary Essay Essaywriti
Resources For Teaching The Literary Essay Essaywriti
 
Research Paper Writer Services
Research Paper Writer ServicesResearch Paper Writer Services
Research Paper Writer Services
 
Write A Composition - The Game I Like Most Good S
Write A Composition - The Game I Like Most Good SWrite A Composition - The Game I Like Most Good S
Write A Composition - The Game I Like Most Good S
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Pursuit Of Privacy And The National Security Agency

  • 1. Pursuit of Privacy and The National Security Agency Officially given its name on the fourth of November 1952, the National Security Agency was developed to ensure the safety of American citizens (Howe 11). In an effort to prevent any unauthorized spying on innocent civilians a court known as FISA was created in 1978 to regulate the NSA. Up until the events of September 11th, 2001, the NSA was used strictly as a tool for foreign investigation to decipher international communications ("Frequently Asked Questions About NSA" 1). Twenty–three days after the Twin Towers fell, President Bush passed the Patriot Act ("Timeline of NSA Domestic Spying" 16). This act ushered the NSA into a position of limitless capability. Millions of Americans are having their personal lives followed, tracked, and recorded into mass data pools. This unethical acquisition of personal information is in strict violation of the Fourth Amendment. Immediate action must be taken by the Government to return the rights assured by our Founding Fathers and the Constitution. The NSA was established in 1952 by order of President Harry Truman (Howe 11). Preceding the official announcement of the National Security Agency the United States had an organization called the Armed Forces Security Agency (AFSA). The Armed Forces Security Agency played a key role in the United State's victory over the Axis Powers, which entailed Japan, Germany, and Italy, during World War II (Howe 17). The NSA was developed as a way to continue surveillance into the post– war era. ... Get more on HelpWriting.net ...
  • 2.
  • 3. The Cyber Defense Exercise Hosted By The National Security... Knowledge of the techniques of the information security discipline, including encryption, access control, physical security, training, threat analysis, and authentication. As an Information Technology major at the United States Naval Academy (USNA), I was selected to participate on USNA's team for the 2010 Cyber Defense Exercise hosted by the National Security Agency. Our team, which won the competition, had to design, operate, and defend our virtual network. As File Systems Manager, I was directly responsible for the encryption, user authentication, and intrusion analysis of our web server, exchange services, and databases. Transitioning out of the classroom and into the U.S. Navy, I am assigned as the Anti–Submarine Warfare (ASW) ... Show more content on Helpwriting.net ... From my course instruction and indoctrination at the Academy to operating in the Sea of Japan, my exposure to the core tenets of the information security discipline has gone from unpacking what is taught in the classroom to applying it on the U.S Navy's most capable warship. Knowledge of the human factors in information security, including human computer interaction, design, training, sabotage, human error prevention and identification, personal use policies, and monitoring. At the operator level, my work group of 16 Sailors requires the use of sophisticated information systems to perform daily tasks and execute our mission. From submitting classified SONAR contact reports via our network to interacting with the server cluster responsible for launching torpedoes, my team's respect for, and proper use of, the systems they are utilizing is my responsibility. Whether it be reporting email phishing attempts or ensuring USB drives and other unauthorized equipment are not introduced into the network, my team plays an important role in ensuring our ship's networks remain secure and free from intrusion. Additionally, the proper maintenance of our information systems and attention to detail with regards to operator input into the weapons' programs is vital to the effective employment of our capabilities. During my time on the ship, although my team was not directly involved, we have had ... Get more on HelpWriting.net ...
  • 4.
  • 5. National Security Agency Summary On June 5, 2013, a London newspaper was the first to report that the United States National Security Agency (NSA) was collecting the telephone records of millions of U.S. customers of the Verizon Wireless Company. The NSA did not listen in or record the telephone calls themselves but collected data about the calls such as the telephone numbers used and the time, date and length of the calls. There was a top secret order issued by the U.S. Foreign Intelligence Surveillance Court (FISA court) required Verizon to give the NSA metadata information on the telephone calls both between the U.S. and other countries and within the U.S. PRISM, a secret NASA program, is a system designed to permit the agency to collect data directly from the servers of ... Show more content on Helpwriting.net ... federal government. Like 25% of Booz Allen's 25,000 employees, Snowden held a top–secret clearance. To gain this clearance, Snowden had signed the federal government's Classified Information Nondisclosure Agreement, which described the possible fines and prison terms for violations, as well as a Booz Allen nondisclosure and confidentiality agreement. Meaning Snowden gained all access to all access to classified communications intelligence from the NSA and with the position from Hamilton he was granted access to lists of machines all over the world the NSA hacked. When Greenwald asked Snowden why, Snowden answered, "I can't allow the U.S. government to destroy privacy, Internet freedom and basic liberties," he said. "My sole motive is to inform the public as to that which is done in their name and that which is done against them." Snowden said he told his concerns to his supervisors, ten officials in all, and he was told to either "let the issue be someone else's problem" or to keep quiet to avoid ... Get more on HelpWriting.net ...
  • 6.
  • 7. Edward Snowden: United States National Security Agency The Case of Edward Snowden Key words CIA (Central intelligence agency Spy's) FBI (federal Bureau Investigations, police NSA (National Security Agency, monitors surveillance) Who was Edward snowden? Edward Snowden, was a former US(NSA) contractor, now lives in Russia after fleeing the United States via Hong Kong in May, having revealed extensive internet and phone surveillance by US intelligence. What was prism PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies. The program is also known by the SIGAD US–984XN. What did Edward Snowden believe? He believed that there was a fine line between state secrecy (all the ... Get more on HelpWriting.net ...
  • 8.
  • 9. National Security Agency Essay National Security Agency/Central Security Service The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missions, Signals Intelligence (SIGINT) and Information Assurance (IA). The Signals Intelligence (SIGINT) mission uses cryptologic machines to break foreign codes to find out what they know and what they are doing. The biggest accomplishment publicly ... Show more content on Helpwriting.net ... 2. Radically Improve the Production and Protection of Information. 3. Enhance an Expert Workforce to Meet Global Cryptologic Challenges. 4. Create and Integrate Business Management Capabilities Within the Enterprise and With Stakeholders. The NSA also has one of the biggest research and development programs in the United States. It is said that the NSA employs more mathematicians than anyone else in the U.S. and possibly the world to help design and develop cipher systems that will protect information systems and search for weaknesses within the existing ones. Though NSA research and development is top secret, some of its past accomplishments were the development of the first large–scale computer and the first solid– state computer which led to the development of the modern computer. The NSA was also responsible for the development of the tape cassette. I believe the NSA has proven to be one of our greatest agencies. Not only has it developed technology to be used among every day civilians such as computers and cassette tapes, but has also developed life saving equipment including communication and code cracking machines for the men and women of our military. While serving in the U.S. Navy, I was stationed in a squadron that used spy planes equipped with modern day crypto machines. This technology was developed in the research and development teams of the NSA agencies to intercept signals ... Get more on HelpWriting.net ...
  • 10.
  • 11. The National Security Agency Invasion Living in a country that is known to be "Land of the free..." is not exactly what most people dream of. The United States may be known for its freedom and power, but most people are unaware of the covertness behind the government. And by now, almost every American citizen knows that privacy no longer exists. In this century and country, it really does not. In the United States, most people look toward the government as salvation, protection, and reliance. Unfortunately, not everything is as good as it seems. Imagine your personal information, your daily conversations, and your daily actions being viewed and judged by the government. This is exactly what the government does. Sometimes the government is not always our solution; they can also be our problems. National Security Agency (NSA) is also known as the "President's Surveillance Program". It was first implemented after the Twin Towers attack on September 11, 2001 by President George W. Bush. Soon after, more surveillance programs sprouted in order to assist the National Security Agency. Some surveillance programs include the FBI, IRS, Terrorist Scanning Center (TSC), Department of Defense (DoD), Department of Homeland Security (DHS), etc. All of these surveillance programs's main purpose is to conduct a range of surveillance activities inside the United States in search for terrorists. These surveillance activities required much information such as call histories, data records and other personal information. This daily ... Get more on HelpWriting.net ...
  • 12.
  • 13. Information Safety and the National Security Agency Security" information In the last 20 years, we had a boom in communication. The industry of telecommunication and the velocity of internet has increased, in a way that never happened. In the past the evolution of communication increased each decade, today increase each second. In the past the only way for communication was the voice, and sometimes, for example, they used animals to send a message, like a bird, but it still take a long time to send a message. However each century brings another ways to made a communication. The interception of message, is not a new, in the past the people intercepted the messenger from another country to get information. The communications increased so much, on the other hand, the ways to intercept the message increased to. Nowadays, we living a age of information, everything happens faster than other times. Consequently the interception of information, in other words, the cases of espionage, become one of the biggest worries for the nations around the world. Recently, Edward Snowden, an ex–agent of NSA (National Security Agency) from USA, leaks a largest number of documents containing information about various countries. This leak sparked the warning signal of the countries (Shoichet, 2013). The predecessor of NSA, was created in April 28, 1917, when a code and cipher decryption unit was established as the Cable and Telegraph Section, in the Military Information Section; I'm August 26, 1918, became a independent department called by ... Get more on HelpWriting.net ...
  • 14.
  • 15. National Security Agency Vs NSA In 2013, a man named Edward Snowden ignited a national debate by revealing that our National Security Agency, or the NSA, has been gathering mass amounts of phone records and other, private, data without consulting the American public. That means American emails, chats, phone calls, online transactions, web searches, or even online medical records can and have be stolen by the government without consent. Using decryption methods, court orders, supercomputers, and technical tricks, the NSA is slowly gaining ground on its war on encryption. All of these things are supposed to be defended by technology companies and Internet Service Providers, but in the article, "Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security" by James ... Show more content on Helpwriting.net ... In the article, they discuss how the NSA has overreached and "cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails" (Ball). Throughout the article, they argue that the NSA is interfering with American privacy, and security, by trying to win a war on encryption. They even reveal that the NSA is even coercing some unnamed technology companies and Internet Service Providers to cooperate with their demands and hand over keys or create backdoors. According to the NSA, this is "the price of admission for the US to maintain unrestricted access to and use of cyberspace" (Ball). Yet, at the same time they are effectively undermining the security of different networks. Additionally, the article "NSAAble to Foil Basic Safeguards of Privacy on Web" by Nicole Perlroth, Jeff Larson, and Scott Shane build on this argument of national security against privacy. They argue that the NSA is undermining everyday privacy in communications of today's digital ... Get more on HelpWriting.net ...
  • 16.
  • 17. Edward Snowden: The National Security Agency Edward Snowden was formerly part of the National Security Agency (NSA). Snowden leaked documents that detailed how Americans were being observed, including the PRISM program. The United States has filed multiple charges against Snowden and he has since found asylum in Russia. Four Reasons why Snowden's actions should be considered ethical are: 1. Snowden was trying to protect the rights of the American people and make sure everyone is being treated equally. According to Kantianism, people should not be treated as a means to an end. Snowden saw that the NSA treated ordinary citizens as a means to an end to get whatever surveillance the NSA wanted. Snowden was ethical here, because he acted with good intentions or good will, according to Kantianism. ... Show more content on Helpwriting.net ... According to Rule Utilitarianism, Snowden broke one of the laws that were in place to maximize overall happiness. The rule he broke was rule nine, "Obey the law." It is against the law in the United States to reveal confidential information because of the Espionage Act. Since breaking this rule did not exactly enhance overall utility, it would be considered an unethical decision. 2. Another rule of Rule Utilitarianism that Snowden violated is rule seven, "Keep your promises." As part of his contract for working at the NSA, Snowden signed an agreement or oath in which he promised to keep confidential information private and would not reveal classified information or else he would face the consequences of doing such. Breaking this rule did not have a solid argument for increasing happiness either, so this is also unethical. 3. In Act Utilitarianism, Snowden's decision to expose the NSA's surveillance techniques caused a massive decrease in overall happiness in the United States, since everyone began to argue about whether or not the NSA is justifiable in these actions. In addition to the U.S. being in an uproar, it probably did not do much to make Snowden any happier since he had to seek asylum in a foreign country. This makes Snowden unethical because the consequences of his actions resulted in an overall decrease in ... Get more on HelpWriting.net ...
  • 18.
  • 19. The Operations of the National Security Agency The National Security Agency (NSA) has been a United States discernment org since 1952 when President Truman formally named it; in spite of the fact that the office has been around since World War I translating code correspondences. It is presently one of the biggest United States brainpower associations on the planet. It works under the sway of the Department of Defense. The NSA's primary objectives are screening , gathering, deciphering, translating and examining data and information of outside intelligences around the globe. This incorporates the associated people with terrorism in the United States. A number of the operations the NSA does are clandestine and obscure by the overall population. They are given this sanction by the administration to guarantee insurance of the US from terrorism and different dangers. The office regularly utilizes tame approaches to gather data on remote knowledge including electronic frameworks irritating, tapping phone records, and subverting through subversive programming. Mass reconnaissance of the United States is likewise a practice utilized by Security Agency, gathering and putting away all telephone records of all American subjects. The Federal Emergency Management Agency (FEMA) is an office under the locale of the United States Department of Homeland Security. Made in 1978, the office's main role is to facilitate the reaction to any calamity that happens in the US and is excessively for the assets of neighborhood and state ... Get more on HelpWriting.net ...
  • 20.
  • 21. National Strategy For Homeland Security Agencies Introduction The state has the mandate of safeguarding citizens of hit places from suffering the disproportionate impact of natural disasters. The hurricane that hit Jacksonville town in Florida crippled the city's infrastructure. The destroyed power and telephone lines stopped all the communication and transportation systems in the city. The copper wires were left hanging precariously along the charred roads. Looters took the opportunity to steal the expensive copper wires and motorists drove around carelessly as all the traffic lights had gone off. The local government experienced difficulties in trying to contain the situation. The task to locate, triage and secure citizens were nearly impossible as the whole town was in chaos. The local authorities could have coordinated with various Homeland security agencies to restore normalcy. The Coordinated Responses and Key Resources office of the president has come up with three main strategies to respond to disasters and protect the critical infrastructure in the USA. The President has charged the National Strategy for Homeland Security (NSHS) with the responsibility to address the vulnerabilities that involve more than one sector or needs the responsiveness of more than one agency. The advanced strategy calls for interconnectivity and complementarity of homeland security systems. The second approach involves the National Strategy for the Physical Protection of Critical Infrastructures, and Key Assets (NSPPCIKA) identifies ... Get more on HelpWriting.net ...
  • 22.
  • 23. National Security Agency Surveillance In January of 2014, news agencies reported on the National Security Agency's (NSA) use of "leaky" mobile phone applications to obtain private user information. The United States government has admitted to spying on its citizens, but claims that doing so is the best way to protect the U.S. from foreign threats. Certain smartphone applications, such as the popular Angry Birds game, inadvertently transmit personal user information, such as age, gender, ethnicity, marital status and current location, collectively known as the user's metadata, across the internet[1]. As part of their world–wide telecommunications surveillance for terrorism or other criminal activity, the NSA exploits these security holes in smartphone applications, by collecting and storing user data. While many users are unaware of the information leaks in their mobile applications, most people would certainly prefer to keep such information private [2]. Smartphones know almost everything about who we are, what we do, and where we go, but how much of that information does the government have the right to know and possess? Is it ethical for the United States government to collect and track the cell phone data of its citizens in the name of national defense, or does that violate the citizens' right to personal privacy? NSA surveillance of private user data of U.S. citizens is the best method of protection against terrorism and is also legal under the Constitution. By examining these two components, it is plain to ... Get more on HelpWriting.net ...
  • 24.
  • 25. The National Security Agency ( Nsa ) Is An Intelligence... Security is key for the advancement and stability of the United States, and spying is nothing new to the world. With the advancement of technology, we are now able to stay connected with each other, while having a plethora of information at our fingertips. This is phenomenal, but dangerous. With the increasing amount of stored data online and the speed at which said data can be transferred, one can only worry that maybe were sharing a little TOO much information. The National Security Agency (NSA) is an intelligence organization created by the United States government. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence. Today, the NSA states that ... Show more content on Helpwriting.net ... These countries were pretty successful at obtaining sensitive Intel. However, in the 21st century surveillance is used in a different and more complicated way. Due to the drastic increase in crime rates and recent terrorist attacks, governments around the world were forced to use electronic surveillance to protect their own people. The electronic surveillance that each government conducts is so complex and covert that you don't even know that you are the target. The US government has become one of the biggest cases of this kind of surveillance. The US government has been employing several forms of high level surveillance such as wiretapping, CCTV cameras (Closed Circuit Televisions, aka street cameras) and now internet data by looking at the information transferred between devices. The thought that the government was secretly watching their citizens every move has been talked about for some time now. Although this talk was widespread and sort of heard of, there was no definitive proof. However, suspicions were confirmed in 2013 due to a man by the name of Edward Snowden leaking classified information from the NSA's archives. Amongst the leaked information, evidence showed that the NSA had been spying on millions of innocent people, and said monitoring is still being conducted. This shocking level of spying was without warrant, making it illegal. Now, the US government has taken its bad ... Get more on HelpWriting.net ...
  • 26.
  • 27. The National Security Agency and Electronic Surveilance George Zimmerman committed murder, and was acquitted of charges by a jury, as there was not enough evidence to prove that Zimmerman had not acted in self–defense. Zimmerman walked away from the trial without any repercussion, and much of the country was outraged. But what if Zimmerman had been wearing Google Glasses, or what if Martin had been using his phone? Both devices have the capability to record events. Either of those could have been used as evidence against Zimmerman, and might have been enough for the jury to find him guilty of murder. Many Americans find flaws with the NSA's (National Security Agency) cell phone, satellite and camera monitoring. Though most people despise the program, the NSA's monitoring power needs to be raised. With the ability to more thoroughly investigate crime scenes though electronic methods, the NSA could help catch local criminals, and could also investigate terrorist attacks on the country more thoroughly. In the end, it comes down to a simple choice, privacy or safety. Which is more important, a small amount of privacy on electronic devices, or the safety of the entire country? In recent months, the NSA has been attacked by cell phone users across America. This accusation is greatly aided by the media, which makes the NSA appear much worse than it actually is. The media has made it appear that the NSA directly reads each and every text sent by Americans, and the privacy of American citizens is being infringed upon. While many texts ... Get more on HelpWriting.net ...
  • 28.
  • 29. U.s. National Security Agency Imagine a world where you are being watched by the government all the time. This sounds similar to the classical dystopian novel 1984, where Big Brother invades the private lives of its citizens including, the protagonist, Winston. Even though our society is not as invasive we have our own big brother, the NSA. Although it protects U.S. national security, the government should discontinue the surveillance done by the NSA because it is detrimental the U.S. economy the Constitution and the citizens of the U.S. The National Security Agency, NSA, is an intelligence organization of the United States government, responsible for global monitoring, collection and processing of information and data for foreign intelligence and counterintelligence. In 2013, whistleblower Edward Snowden leaked documents revealing the lengths of the National Security Agency's surveillance on the United States' citizens. This caused mass debate of privacy vs. security over the agency's surveillance. Some major arguments for and against the NSA surveillance have involved the sections of the Constitution. These include : The Fourth Amendment which states "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized" and "Section 702 [of ... Get more on HelpWriting.net ...
  • 30.
  • 31. The Nsa 's National Security Agency The National Security Agency's (NSA) warrantless collection of metadata has been questioned on constitutional grounds. Specifically, the NSA's program has been argued to be in violation of the Fourth Amendment of the Constitution, which states that all citizens are to be free from any unreasonable search or seizure. Proponents of the NSA's collection of metadata believe that it is a crucial tool in preventing terrorist attacks, while opponents of the program believe that its questionable constitutional validity, along with its lack of clear success in preventing a single terrorist attack, leaves the NSA's metadata collection program in desperate need of reform or outright abolishment. I. THE NSA'S PURPOSE AND THE EVOLUTION OF GOVERNMENT SURVEILLANCE It is important to note what the NSA is tasked to do before discussing the constitutional arguments against its metadata program. As Abdulmajeed Alhogbani, in his work, "Going Dark: Scratching the Surface of Government Surveillance," informs, the agency has two tasks: "1) information assurance, which prevents foreign agents from obtaining classified information, and 2) signals intelligence, which collects and analyzes foreign intelligence" (475). Metadata collection does not fall under either of these tasks. Prior to the establishment of the National Security Agency in 1952, the earliest surveillance measure enacted in the United States was the Communications Act of 1934, which centralized "the regulatory process of ... Get more on HelpWriting.net ...
  • 32.
  • 33. National Security Agency The National Security Agency Many have wondered why America is so great and one of those reasons is because of the NSA. The National Security Agency was founded on November 4, 1952 and continues today. The NSA is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information. There are many different opinions about the NSA and the work that they do. The National Security Agency is, in fact, a good thing because it provides national security and supports the military. Without the NSA, our country could face some major issues such as the middle eastern countries and many more. It protects us from terrorism and everything that comes with it. In 2014 an article was released describing that the NSA has stopped fifty–four terrorist attacks with mass spying. One example of when this happened was, "The case of Najibullah Zazi who confessed to ... Show more content on Helpwriting.net ... Evidence has shown that the NSA can and has done many good things for the United States. Many argue that the NSA invades our personal rights. The NSA protects citizens private information using the custom database software called Cloudbase, which has fine–grained security to control access down to the cell level(nsa.gov1 2). If the NSA can access our information than enemies could just as easily do the same but thanks to the NSA, we don't have to worry about that because they are the ones who keep our information protected. The National Security Agency is, in fact, a good thing because it provides national security and supports the military. Instead of being negative and upset with the NSA, we should be more grateful that we live in a country where we don't have to worry about civil wars, terrorism, or anything else of that effect. America is what it is and we should be proud to live in the land of the free and home of the ... Get more on HelpWriting.net ...
  • 34.
  • 35. Edward Snowden: The National Security Agency Edward Snowden Edward Snowden worked for the National Security Agency (NSA) as a security guard. Eventually, he got a job at the Central Intelligence Agency (CIA) working in the information–technology field. In 2009, Snowden left the CIA to work for Dell. Dell sent him to Japan to work under the NSA and was then stationed in Hawaii. After working in Hawaii for three months, Snowden left Dell and switched over to Booz Allen Hamilton . Snowden started making copies of NSA documents that contained information over their surveillance. The information consisted of statements stating that the NSA was spying on Americans in a program known as PRISM . Once Snowden had enough documents, he took a period off and flew to Hong Kong. In June, the Guardian ... Show more content on Helpwriting.net ... The first option would be to call the hotline number and anonymously tip the government about what the NSA was doing14. If done, the NSA would have no idea who tipped them off to the government. I would still be able to keep my job and hopefully see the NSA stop looking into the lives of civilians. Anonymously tipping would ensure my safety from being persecuted by the government and society for what I had illegally done by attaining all of those ... Get more on HelpWriting.net ...
  • 36.
  • 37. Surveillance And The National Security Agency There are all different types of surveillance now–a–days. The thought of it has come a long way and it has evolved significantly. There are many pros and cons as to surveillance in today's world. Also, there are many different ways that technology allows people to get surveillance on many different things such as people, where they go, who they talk to, private information, and so much more. Surveillance and security in the United States has also changed significantly since September 11th, 2001. The National Security Agency also plays a big role in surveillance and security today and it has come a long way. The National Security Agency, also known as the NSA, was created on November 4, 1952, by President Harry S. Truman. It was created during World War 2 to try and decode codes from the Germans and Japanese (Murse, What is the National Security Agency). According to the Article 'What is the National Security Agency' written by U.S. Politics expert Tom Murse, the National Security Agency gathers intellect by piloting surveillance on its adversaries through the assembly of phone–call, email and Internet data. He also states that the National Security Agency's surveillance activities are directed by the U.S. Constitution and overseen by members of Congress, precisely members of the House Intelligence Subcommittee on Technical and Tactical Intelligence. The paper 'Government Surveillance and Internet Search Behavior' written by Alex Marthews and Catherine E. Tucker, on June 6, ... Get more on HelpWriting.net ...
  • 38.
  • 39. National Security Agency Spying Research Paper They're here for protection Espionage is spying on other countries to obtain confidential information about the procedures with government and military. The world has used espionage as a means of knowledge acquisition for many years, and the United States is well known for use of intelligence agencies for spying, conducting covert operations, and funneling money to sway foreign elections or to remove foreign leaders from power. Intelligence agencies were developed to utilize precautionary strategies and tactics in strengthening security and defense of the country. The history of the United States intelligence agencies has been to develop a system where terrorists, drug cartels, money launderers and others are stopped by elite forces. Currently, ... Show more content on Helpwriting.net ... Calls were made for secret prisons to open for suspected terrorist to be exposed to interrogation, torture methods, and collecting data. During the time of 9/11 the Agencies started to build drones for locating on Al–Qaeda and other terror groups for terrorist personnel. Over the years the NSA (National Security Agency) created "sophisticated technology called PRISM" said Agrawal, it helped improve surveillance for our government and tracked threats to the country. The government organized these intelligence agencies to enable each agency to focus on their own intel and jobs. Agrawal mentioned that in the year of 2015 the total budget of the government's agencies and military intelligence was $66.8 billion. That money is spent on the Intelligence community that is comprised of the agencies and offices for the weaponry and security systems. Crumpton used a statement by James Comey, "there will come a day it will matter a great deal to the lives of people... that we will be able to gain access." to criticize Apple and Google for their lack of warnings for their security ... Get more on HelpWriting.net ...
  • 40.
  • 41. National Security Agency The National Security Agency is a subunit of the U.S. Department of Defence and is the controller of the largest electronic and online surveillance programs. Given their authority from Foreign Intelligence and Surveillance Act of 1978, the initial plans were for the NSA to be a regulated program, that had to go through a series of checks and balances in order to collect any information. It was also not intended for domestic use. On June 6, 2013, news outlets the Washington Post and the Guardian released the detailed reports that the NSA was going above and beyond the call of duty, but probably not through the best of means. There has always been the question on whether the nation's Big Brother, was spying on everything we did. The NSA is essentially created for spying on people, for the nation's defense. When Edward Snowden released top secret government documents, brought to light how far the NSA was willing to go to achieve this goal. In a recent post by the Guardian, it was found that the NSA gathers more information than the Library of Congress (Macaskill, Dance). The Library of Congress is the largest in the ... Show more content on Helpwriting.net ... His new rules, "allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies" (Waddell). This allows other intelligence agencies to use NSA surveillance systems and expands the people who have access to unwarranted information. This means that the information gathered by the NSA will be accessible to other agencies, and these agencies will be able to pilfer through the data and collect what they may find pertinent to their own investigations. On one hand, this means there are more checks and balances on the information that is stored by the NSA, while on the other it means more people are able to invade the privacy of innocent people and their personal ... Get more on HelpWriting.net ...
  • 42.
  • 43. Edward Snowden: The National Security Agency The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for intelligence and counterintelligence purposes. They have the ability to see web browser history, massages, they can see exactly what is displayed on the screens. If they are interested, they can even see what you are reading right now. The NSA collects every American phone records, they have the power to see which phone number was called, at what time, how long the call lasted, and they can even listen to everything that was said in the call. The PRISM program lets the NSA access private user data on well–known leading online services. Edward Snowden, ... Show more content on Helpwriting.net ... With this, they have the ability to watch citizens and view anything they do electronically in any country. When Edward Snowden leaked many files involving the organization watching, people around the world and in the US people have either said that it is right or that it is wrong for them to do this. Embarrassed and irritated by Edward Snowden's leaks, Obama charged last year at a press conference that Snowden was presenting a false picture of NSA by releasing parts of its work piecemeal: "Rather than have a trunk come out here and a leg come out there," he said, "let's just put the whole elephant out there so people know exactly what they're looking at. ... America is not interested in spying on ordinary people," he assures us. The government, he went on, is not "listening in on people's phone's phone calls or inappropriately reading people's emails." Founded in November 4, 1952 by Harry S. Truman, the NSA grew up quite big organization. The three billion phone calls made in the U.S. each day are snatched up by the agency, which stores each call's metadata (phone numbers of the parties, date and time, length of call, etc.) for five years. Every out– of–country call and email from (or to) a U.S. citizen is grabbed by NSA computers, and agents are authorized to listen to or read them. Their Ethernet is very fast, that they have the ability to download data at the speed of 10 gigabytes per second which is 10000 megabytes. Just so you know, the average civil Ethernet speed is 60 megabytes per second which is 166.6 times slower that NSA Ethernet. Every day they collect 21 petabytes of ... Get more on HelpWriting.net ...
  • 44.
  • 45. Edward Snowden: The National Security Agency In June of 2013, Edward Snowden, a former NSA employee, exposed the world to the many shady practices taking place behind the closed doors of both the U.S. and U.K. governments at the time. The National Security Agency (NSA) and other intelligence agencies within the United States, were using illegal tactics in order to spy on their own citizens in efforts to determine possible threats. What was so shocking to the world was the fact that these intelligence agencies were doing so on their own terms and were operating without the permission of the public. They were hacking into people's phones and computers and reading private messages. When word of this leaked to the public, the United States began to panic, as they felt that their every move ... Show more content on Helpwriting.net ... Although it is unclear how much information Snowden had access too, it is believed to be around 1.7 million classified documents. These documents exposed to the public the NSA's major collection of phone and internet metadata from U.S users, according to NBC New,s in their article "Who is Edward Snowden, the Man Who Spilled the NSA's Sectret:" the NSA was "Spying on the personal communications of foreign leaders, including U.S. allies; and the NSA's ability to tap undersea fiber optic cables and siphon off data." (Dedman, Bruckner, and Cole; NBC News) Following the initial leak of this story, The Guardian published a secret court order in which showed how the NSA was requiring Verizon to hand over all of its telephone data to them on a daily basis. With this, followed more revelations both within the Guardian and the Washington Post. It was revealed that the NSA was not only tapping into millions of citizens phone calls and messages, but that they were also tapping into the servers of some of the world's largest and most popular internet companies. Facebook, Google, Microsoft, and Yahoo are a few of these big name companies. It is said that these intelligence agencies were able to track these companies by using Prism, a surveillance program. (BBC News: Edward Snowden: Leaks that ... Get more on HelpWriting.net ...
  • 46.
  • 47. National Security Agency Is Unconstitutional The NSA is an unconstitutional Federal government agency established by a failed president. In 1952, the worst president in U.S. History, President Truman, established the National Security Agency (NSA). Truman is known for committing the worst crime against humanity by using a nuclear bomb on the people of Hiroshima and Nagasaki in Japan, as well as for losing China and North Korea. For a president that is known for his poor performance on foreign policy, Truman establishes the NSA to safeguard American interests from foreign and domestic threat to American National Security. The NSA surveillance program is a critically important program to the national security in the United States. The NSA has two missions, to exploit foreign communications, known as SIGINT, and protect U.S. information systems, known as IA. The headquarters are located at Fort George G. Meade, Maryland, in the Baltimore–Washington corridor, which is very close to Washington D.C. The NSA is known for its high tech prowess, and it is on the frontiers of communications and information technology. Actually, NSA is incompetent. NSA was not able to stop the Boston bombers from bombing in Boston Marathon because it was overwhelmed with data from Mass Surveillance on Americans. We have to ask ourselves, if NSA is on the frontiers of communications and information technology, why did the NSA is not able to prevent a terrorist attack? The NSA is not able to keep the American people safe. The Government is not ... Get more on HelpWriting.net ...
  • 48.
  • 49. National Security Agency Analysis How the NSA and U.S. ICE Agencies Affect Digital Crime The National Security Agency (NSA) and the United States Immigration and Customs Enforcement (ICE) both play crucial roles when it comes to combating and investigating cyber crimes. The NSA's primary responsibility is to create and maintain computer–coding systems that protect sensitive information regarding U.S. information systems (Taylor, Fritsch, and Liederbach, 2015). Along with their crucial role of protecting the United States' sensitive computer information, the NSA also provides specialized information system training to both private and government entities (Taylor et al., 2015). The ICE Agency's responsibilities go far beyond physically protecting U.S. Borders. The ICE Agency ... Show more content on Helpwriting.net ... ICE is actually the Department of Homeland Security's main investigative firm (Taylor et al., 2015). According to Taylor et al. (2015), ICE is a large agency consisting of about 15,000 employees whose responsibilities are "identifying and investigating weaknesses within the nation's borders, developing intelligence concerning threats, removing foreign nationals, and enforcing over 400 federal statutes (p. 266). ICE plays a large role in controlling and investigating computer crime because of how easy it is for cyber crimes to extend past the border of the country (Taylor et al., 2015). ICE maintains the Cyber Crimes Center (C3) which consists of four sections: child exploitation, computer forensics, cyber crimes, and information technology and administration (Taylor et al., 2015). Each subsection of the C3 has very specific goals related to fighting cybercrime. The Information and Technology and Administration section of the C3 supports the other three branches of the C3 with technical and administrative services (Taylor et al., 2015). The Child Exploitation Section's (CES) purpose is to investigate those who produce, distribute, and possess child pornography and also to investigate cases of sex tourism (Taylor et al., 2015). The CES established Operation Predator, which has been highly successful in that it ... Get more on HelpWriting.net ...
  • 50.
  • 51. National Security Agency Benefits Fortunately I am currently working for the "company" I would be interested in working for if I was seeking for a career. I searched for my "companies" compensation and benefits if as though I was not currently working there and was seeking a job opportunely. Company: The National Security Agency (NSA) URL: https://www.intelligencecareers.gov/nsa.html The compensation plan that NSA offers motivates me, because of the following: They offer a wide range of benefits such as health care coverage, retirement savings, room for improvements, flexible leave, job movement, training, etc. They promote work life balance, which is very important for me and my family, and job/education growth, which allows for advancement. NSA provides meaningful ... Get more on HelpWriting.net ...
  • 52.
  • 53. The Ns The National Security Agency The National Security Agency or otherwise known as the NSA, had sparked a recent debate of the fundamental amendment rights that American citizens have. To provide some historical context, the NSA in 2013 was exposed by Edward Snowden, a former contractor and employer of the NSA. He was a NSA whistleblower who divulged the surveilling tactics that the government had imposed on its citizens, as well as on many of its international allies. Many senior governmental officials had repeatedly stated the program's importance in national security; however, many had also questioned its efficiency and validity in due process of one 's security. As a vehement believer of one's individual rights, I do not think that even in times of war the NSA's ... Show more content on Helpwriting.net ... The major reason on why this source is essential is because it shows that our rights as citizens. We are supposed to be safe from "unreasonable searches" and the right to be "secure". The NSA being a large entity of the government does not satisfy the conditions of the amendments. If we were to think critically about this issue, surveillancing 300 million people is a great price to pay for finding a terrorist or a criminal. If we let the government have complete control of our communications, then we would have a totalitarian society where the government is aware of all of our actions. The government would unintentionally use the power of communications and abuse it under it's own favor. A great example of this would be the dictatorship regimes of Napoleon, where he similarly silences the people and controls the government in a monarchic method. This would inevitably cause the American citizens to be in a state of fear which would be counter–productive of what the government's creation was about. People's amendments are made as rights. By undermining them, we are not effectively creating a system that would respect the privileges that everyone should willingly have. Another particular reason that shows that the NSA's actions are not permissible is because it fundamentally goes against what our country was founded for. The people see that the NSA 's actions as a violation of our historic beliefs, as the NSA's actions is the complete ... Get more on HelpWriting.net ...
  • 54.
  • 55. The Importance Of The National Security Agency The role of the NSA and the agency's importance to this country have certainly been put under scrutiny in the last few years. People are receptive that the United States government has secrets that are set in place for the benefit of 'national security', however, citizens have been questioning the country's intentions ever since the leak by Edward Snowden occurred. As technological advances occur, the conceptualization of the agency's innocence and pure intentions slowly subside. When Edward Snowden leaked top secret information about the country, legality and ethics were placed on a metaphorical weight scale of importance to weigh what sacrifices were worth making. This eventually led people to compromise their rights of privacy for a supposed ... Show more content on Helpwriting.net ... As this issue has been recognized in the past, the agency has been forced to go to court to face the accusation of law bending. In some of these cases, there has been a ruling of unconstitutionality, however, as time progressed and more of these cases had come to surface, former U.S. President Bush moved all cases of this degree to a specific court. By doing this, the public began to feel that the agency's illegal activities can be automatically defended by a mysterious and unexplained claim of 'maintaining national security'. When attempting to evaluate the legality of their actions, only the information available to the public can be evaluated, but even then, there are issues that have appeared. When reviewing legality concerning national security, the president and congress will undoubtedly come into play. This is a responsibility and action that the president gives approval for to maintain his standards of national security. However, this does not mean that it is a legal route as "FISA is a valid regulation of presidential powers, and therefore that the wiretapping program is illegal" (Lee). As the agency's activities can be accused to be unconstitutional or illegal, it is easy to assume they are aware of the loopholes and methods to get around this type of 'technicality' in their eyes. Along with the concern of legality of surveillance, the ethics behind ... Get more on HelpWriting.net ...
  • 56.
  • 57. National Security Agency Analysis The National Security Agency does whatever it takes to protect the American citizens from terrorism, even if it means spying on them. The National Security Agency, commonly known as the NSA, is a bureaucracy that's often shrouded in mystery. From the time they were founded up until now, the National Security Agency has been an agency of the government that almost seemed to act completely separate from the government they protect. From codebreaking in World War II to domestic spying on the American people in the name of national security in the twenty–first century, they have been involved in a lot of secretive and questionable dealings. In this essay we will be learning about subjects like the laws dealing with the NSA to exactly what it takes ... Show more content on Helpwriting.net ... On their website, the newest current information regarding the NSA is from the beginning of January 2016. The new information is the release of the new report on the implementation of the USA Freedom Act towards business records. Currently, there have been no public announcements in 2016 from the National Security Agency. The NSA works under the Patriot Act, Privacy Act, and the Foreign Intelligence Surveillance Act (FISA). The Patriot Act was the first piece of legislation following 9/11 that dealt with terrorism. It increased the punishment for crimes of terrorism and made it easier for law enforcement and government agencies to share information dealing with crimes regarding terrorism. The Privacy Act was passed in 1974 to establish control over what personal information is used, maintained, and collected by agencies in the executive branch of the government. It safeguards against an invasion of personal privacy by the government agencies. The Foreign Intelligence Surveillance Act came out in 1978 and has been amended three times to reflect the security needs of Americans. It regulates what information the NSA can access from Americans without their knowledge. The person in charge of this agency is Admiral Michael S. Rogers of the United States Navy. The Director of the NSA is also the Chief of the Central Security Service (CSS) and also serves as the Commander of the U.S. Cyber Command. The Director of the NSA is always a commissioned military officer with a rank of four stars. The new director is nominated by the President, but must be approved by the Senate. None of the past directors of the NSA has been someone notable enough that it's a common ... Get more on HelpWriting.net ...
  • 58.
  • 59. The United States National Security Agency With the ever–expanding enigma that is the internet and technology, there is the constant question of privacy; how does the US monitor its citizens or foreign nations? Edward Snowden, a man who risked himself to bring details about the United States National Security Agency to light; the National Security Agency (NSA) is the government agency responsible for surveillance on foreign countries as well as the US itself. How do these two tie together? Or how did the NSA let Snowden, or others before him, get into through their security and publicize classified information? Snowden, the whistle–blower of the NSA that revealed thousands of NSA secrets, started life as a normal child and into his teen years he never stood out. Edward Snowden is known as s computer literate person of interest, yet when he was young and in high–school, he dropped out of school. Despite being a high–school dropout, at the age of 16 Snowden attended a community college. While in his teens and late twenties Snowden was very interested in the internet; it could be theorized that this interest in the internet would lead to what he would want to reveal. In his teens and early twenties, Snowden was often found online in chat rooms about computers and other things involving the internet. He was known for contributing on a site know as Ars Technica. As stated by Harding, Snowden first started on this site with the intention of setting up his own server. In 2009, his active posting and discussions on Ars ... Get more on HelpWriting.net ...
  • 60.
  • 61. National Security Agency Wiretapping : Legal Or Violation... National Security Agency Wiretapping: Legal or Violation of Civil Rights? "Wiretapping American citizens on American soil without the required warrant is in direct contravention of our criminal statutes," stated by Senator Russ Feingold; pertains to the unwarranted wiretapping of United States civilians suspected of terrorist affiliation (Feingold). The National Security Agency's act of wiretapping the United States' people is argued to be illegal and a violation of civil rights. However, under the Authorization for Use of Military Force, the President of the United States is permitted to authorize a terrorist surveillance program to protect the nation from foreign attacks (Feingold). Therefore, wiretapping should be allowed in order to ... Show more content on Helpwriting.net ... The National Security Agency does not have any restrictions on the use of data, and former Obama administration officials said the agency collected data from both Americans and foreigners. The data links phone numbers and e–mails directly or indirectly to a person or organization that is of foreign interest. Almost all information about the National Security Agency's operations is hidden. The limitations concerning Americans was decided in secret. The Justice Department and the Pentagon allowed for the National Security Agency to create contact chains including the timing, location and other details of calls and e–mails, but not the content (James Risen, Laura Poitras). Feingold mentions George W. Bush's State of Union address and how the President called upon the nation to "lead this world toward freedom" (Feingold). The President discussed freedom and how it can transform nations. In the same moment, he openly admitted that he ordered the National Security Agency to spy on Americans without warrants. Feingold believes that the program and the President are breaking the law. He states, "When someone breaks the law, when someone misleads the public in an attempt to justify his actions, he needs to be held accountable. The President of the United States has broken the law. The President of the United States is trying to mislead the American people. And he needs to be held accountable" (Feingold). ... Get more on HelpWriting.net ...
  • 62.
  • 63. The National Security Agency 1) In regards to question number one involving if we – as societal citizens – have a Natural Right to Privacy, I believe the answer is no – due to understanding equivocal terminology. For example, we all know that the National Security Agency (NSA), The Law Enforcement Community (LE), and the Intelligence Community (IC), all routinely collect information on us – on a daily basis. Such information involving: emails, video and voice chats, videos, photos, Voiceover Internet Protocols [e.g. Skype, Google Chrome, Oovoo, Teamspeak, & etc], file transfers, retail products [e.g. Home Security Cameras & Home Thermostats] and social networking sites; including but not limited to soliciting the following information to second and third party vendors [e.g. private companies & contractors]. With that being said, we are now living in an institutionalized society – where privacy is null and void. For example, the constitutions of many countries guarantee and protect the privacy of individuals, whereas, the United States of America does not. For instance, many people would argue and say "The Ninth Amendment" allows us the Right to Privacy. According to the Ninth Amendment, the Ninth Amendment states "The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people." In other words, the right to privacy is one of those unenumerated rights. According to our Founding Fathers, they believed people (i.e. Much like John Locke) ... Get more on HelpWriting.net ...
  • 64.
  • 65. National Security Agency Values We all value our privacy, and we all know that privacy can conflict with other important social values. However, in this increasingly digital and technological world, we are more susceptible than ever to government intrusion of our digital communications and data. This came to light in June 2013, when former National Security Agency (NSA) employee Edward Snowden revealed thousands of classified documents detailing the intrusive mass surveillance and bulk data collection of the NSA to journalists and subsequently the American public. As a result, widespread distrust and questioning of the American government's data–collection programs grew among American citizens and bipartisan leaders who were also subject to the surveillance apparatus of the ... Show more content on Helpwriting.net ... Hardline conservatives like Senate Majority Leader Mitch McConnell opposed the Freedom Act as they defended mass surveillance as a crucial means of counterterrorism and maintaining national security. They also thought that the act would make the U.S. vulnerable to more terrorist attacks, as it would slow down the ability of the NSA and other agencies to lawfully acquire information necessary to counterterrorism efforts. Although also against the Freedom Act, liberals like Bernie Sanders opposed the act for different reasons. Strong privacy supporters like Sanders denounced the act for not doing enough for privacy rights and argued that it would have been a better alternative to have allowed the Patriot Act and Section 215 to sunset and expire in order for a more effective reform bill to be passed into ... Get more on HelpWriting.net ...
  • 66.
  • 67. National Security Agency Research Paper The National Security Agency has been accused and found guilty of not following standard procedures, giving inaccurate information, and unreasonably spying on U.S. Residents. In 2011, the NSA violated 2,776 rules and court orders. There has been numerous incidents of the NSA committing Illegal and unjust acts. There is nothing just about exploiting and infringe on our rights as U.S. citizens. The NSA role is to collect and process global information for foreign intelligence. They are to protect all government systems and communications. They have over used their power for there own gain. They have been found guilty of their actions but nobody has done anything. Nothing has happened because people don't want to accept the fact that we are being ... Show more content on Helpwriting.net ... With their knowledge and power they have the ability to find history on anyone. They can use their systems to find information on politicians and public leaders. Nobody should be able to find information on anyone so easily. We should be able to have privacy and not having to worry about someone recording our conversation. Imagine every call, text, email, message and conversation you have had and knowing someone can see it all. In December of 2015, the government wanted Apple to unlock and allow them to view all the files of a terrorist's phone. Apple denied their request and told them it was against the terrorist's rights. This wasn't the first time Apple was asked to decrypt one of their products. Apple protected the rights of the people by not allowing the government access to their personal information. The NSA servers are beginning to overflow and they are having to delete useless information that is stored. "The National Security Agency's Special Source Operations branch manages "partnerships" in which U.S. and foreign telecommunications companies allow the NSA to use their facilities to intercept phone calls, emails and other data. This briefing describes problems with overcollection of data from e–mail address books and buddy lists, as well as NSA efforts to filter out what it does not need (washingtonpost.com)." Imagine a government serve with so many personal recorded conversations that it is over over ... Get more on HelpWriting.net ...
  • 68.
  • 69. Nsa, The National Security Agency Of The United States Of... Decades of misinterpretation, secrets as well as a not clarified actions involving mainly the use of data collection, leaded the NSA, the National Security Agency of United States of America whose was founded in 1952 for the former United States President Harry S. Truman, one of the greatest questions marks in America's society at 21st Century. However, limitless efforts made against national and foreign terrorist plots, cyber technology alongside of security advances, noticeable actions also a huge support from the government, created a notable and extensive mixture of feeling towards NSA within its purpose to protect the United States of America. Throughout this research, an examination of privacy and security issues regarding the NSA is made; are people really having a legitimate reason for complying? What really matters for NSA? Intelligence, systems and tools, are privacy issues the real NSA concern? What is really being traded off? Is NSA a helpful asset for the nation? Amendments, bill of rights, the gap that allows space for doubt, as well the incredible acceptance in some areas. Questions and points to be explained throughout the research and opinions from the same of those who have daily questions about what is really being done "For the Good of the Nation" (NSA home). Security and privacy, distinctive subjects of priority in a human being life. Privacy, the all–time, basic and fundamental ability of being free of public attention; the reason of the existence and ... Get more on HelpWriting.net ...
  • 70.
  • 71. National Security Agency Analysis Nowadays everyone has a cell phone, or some device that allows them to reach others, get directions, and take pictures. These devices could be monitored or tracked, and we wouldn't even know it. In December 2005 the NSA (National Security Agency) was exposed to intercepting American phone calls and monitoring internet communications. How would you feel if the government was listening your calls? How would you feel if the government was monitoring everything you do on your phone? The NSA spying, monitoring calls, and data trafficking is what bothers many American's. Now that the NSA's watching over people without them knowing has been exposed, it raises some eyebrows. People often feel that our privacy is protected and respected, but often times it's not. There are so many organizations, apps, or things you have accounts ... Show more content on Helpwriting.net ... The NSA has monitored things in the past and could be doing them right now or in the future. The "NSA spying on Americans'' article states "Secret government documents, published by the media in 2013, confirm the NSA obtains full copies of everything that is carried along major domestic fiber optic cable networks.'' This is concerning because think about the data the NSA has monitored and investigated. The NSA has also used partnered applications to maintain surveillance over people. The Codebreaker is a good representation of this because The Puppet Master kept video surveillance on the team, and always knew where they were. In The Codebreaker this is directly displayed. "The realization of what Murphy just explained kicks in. "He can't see us anymore! Tanner exclaims. "Do you think he's still listening?" she asks," (Petry 43) Things that the NSA have done are a little uneasy, because we don't know everything they have done, but it's good because they protect and prevent bad things from ... Get more on HelpWriting.net ...
  • 72.
  • 73. The National Security Agency The National Security Agency (NSA) was created in 1952 and is headquartered in Forte Meade, Maryland. It is under the direction of the Department of Defense and reports to the Director of National Intelligence. Although classified, the NSA has an estimated 37,000 employees (1) and an estimated operating budget of about 11 billion dollars per year, for comparison the Central Intelligence Agency has an estimated 20,000 employees and an operating budget of about 14 billion dollars per year (2). At the moment the director of the NSA is Keith B. Alexander who has served since 2005 and is the 16th director of the NSA since its inception. Although the NSA was created in 1952 the history and origins of the NSA can be traced backed, though under ... Show more content on Helpwriting.net ... The third aspect is called "Upstream" where the NSA collects data from fiber optic cables, which are the cables that connect the USA and foreign countries Internet communication, as data flows through them (8). These three aspects of the NSA that Edward Snowden specifically wanted reveal to the American people is what has created the most conversation and discussion. Some people are outraged, some people think this is a necessity in this era, and some just do not understand the ramifications thoroughly to have an opinion (9). This brings to the forefront: is the NSA a necessity needed in the complex and technological 21 century? With out a doubt the world is very complex in this day and age with the exponential growth in technology there seems to be new technology that should be monitored as a conventional medium of communication. In reality that is a very subjective opinion. For example, as e–mails replace conventional mail there should be no reason to collect data for e–mails. Conventional mail has no known data tracking system in place comparable to the NSA. Since e–mails do this would elude to the fact the e–mails are inherently more dangerous than conventional mail. But, aside from the speed of e–mails relative to conventional mail, there seems to be no inherently more dangerous aspect ... Get more on HelpWriting.net ...
  • 74.
  • 75. Office Of The National Security Agency Headquarters of the National Security Agency (NSA), employees a multitude of employees consisting of computer scientists, analysists, linguists, voice interceptors and mathematicians. (Factory, T.S. Nova, 2009) The scope of what happens behind closed doors at the National Security Agency is mind boggling. The average citizen could not even begin to apprehend the complex work these professional complete in a normal work week. The employees at the National Security Agency monitor terrorist by intercepting and interpreting phone calls, e–mails, webmail, monitors social media and website sites. Nova's program "The Spy Factory" explores how safe is our county when it comes to terrorism. Nova brings up some interesting facts that are chilling and make you think, are we really safe in America? The program begins with by stating "none of this information that we are speaking about this evening is in the 9/11 Commission Report. They simple ignored it." (Scheuer, M. Former Central Intelligence Agency Analysist) The program quickly moves into the events leading up to September 11, 2001 and the World Trade Center attacks. In November 1996, Al Qaeda contacts are holding a conversation on a satellite phone from a store in New York City; this phone will soon be in the hands of Osama bin Laden. NSA is listening as bin Laden makes a phone call from Afghanistan. Al Qaeda is hard to track, but homing in on this phone now establishes the area where bin Laden is located. NSA collects a ... Get more on HelpWriting.net ...
  • 76.
  • 77. National Security Agency (NSA) National Security Agency (NSA) U.S. intelligence agency within the Department of Defense that is responsible for cryptographic and communications intelligence and security. Its headquarters are in Fort Meade, Maryland. The NSA grew out of the communications intelligence activities of U.S. military units during World War II. It was established in 1952 by a presidential directive from Harry S. Truman in which he specified its mission as to provide an effective, unified organization and control of the communications intelligence activities of the United States conducted against foreign governments, to provide for integrated operational policies and procedures pertaining thereto. The NSA was created in part out of the belief that the importance ... Show more content on Helpwriting.net ... He is assisted by a Deputy Director, who is the highest–ranking civilian within the NSA/CSS. NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC). Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.As of the mid–1990s, the National Security Agency was organized into five Directorates: Michael S. Rogers, the director of the NSA. The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest–ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest– ranking civilian within the NSA/CSS. NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC). Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure. As of the mid–1990s, the National Security Agency was organized into five ... Get more on HelpWriting.net ...