SlideShare a Scribd company logo
Edward J. Snowden, the thirty-year-old former National
Security Agency contractor who handed over a treasure trove of
classified documents about U.S. government surveillance to the
Washington Post and Britain's Guardian, is a hero to some and a
traitor to others. He claims to have acted out of a sense of
outrage over the NSA's indiscriminate collection of the phone
and internet records of Americans, decrying the danger such
intrusive government oversight poses to democracy and privacy.
Snowden subsequently fled to Hong Kong, and from there to
Moscow. His eventual destination appears to be Ecuador, Cuba,
or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous
light on his motives; the countries where he has sought refuge
are not known for upholding the sort of democratic values he
claims to be defending. While demanding accountability from
the U.S. government, he appears to be seeking immunity for his
own actions. Snowden's purposes and fate, however, should be
of secondary concern. However misguided his actions may have
been, they have reopened a much-needed debate about the reach
and authority of what is often called the National Security
State. While defending the NSA programs, even President
Barack Obama seems to welcome that debate. "You can't have
100 percent security and also then have 100 percent privacy and
zero inconvenience," Obama noted when asked about Snowden's
leaks. "We're going to have to make some choices as a society.
... There are trade-offs involved."
Administration officials and members of Congress say the
government's extensive surveillance programs are crucial to
preventing terrorist attacks, and that Snowden has done real
damage to efforts to keep Americans safe. Because almost all
the relevant information remains classified, it is difficult to
assess that claim. NSA officials have now promised to make
public details of some of the dozens of terrorist plots they say
the massive data-collection effort, called Prism, has helped
thwart. That sort of disclosure is long overdue. Although Prism
was approved by the Foreign Intelligence Surveillance Act court
and is monitored by the intelligence committees of Congress,
many Americans were shocked to learn that the government now
stores their phone and internet records for possible use in future
investigations. While the government is prohibited from
listening to the tracked calls, it uses sophisticated algorithms to
trace calling patterns. If a series of related calls seems
suspicious, the NSA or FBI then gets a warrant from the FISA
court to investigate further. No abuse of those procedures has
come to light. Still, the mere existence of such records in the
government's hands, information that might easily be exploited
for political purposes, should concern every American.
It is axiomatic that fighting clandestine terrorist groups requires
clandestine methods. Sources and allies must be protected; in
preemptive actions the element of surprise must be preserved.
Secrets about ongoing investigations cannot be compromised
without jeopardizing counterterrorism efforts. It is harder to
justify keeping such details secret after the fact. Judgments
about the trade-offs between privacy and safety cannot be made
unless the American people know what the government has done
in our name. Even if everything the government does to combat
terrorism is technically legal, not everything legal is prudent,
wise, or morally justified.
As a nation, we rely on a system of checks and balances to
prevent an excessive concentration of state power. Those checks
and balances are strained to the breaking point during times of
war, and especially during a war as ill-defined and open-ended
as the fight against terrorism. Congress is notoriously
pusillanimous when it comes to national-security issues. The
courts, meanwhile, are loath to intervene, preferring to leave the
conduct of "war" to the other two branches. The executive
rarely passes up an opportunity to expand its war-making
powers. The result is the steady accumulation of influence by
the nation's security agencies. As political philosopher and
former Clinton administration official William A. Galston
recently observed, "It may be true that as currently staffed and
administered, the new institutions of surveillance do not
threaten our liberties. It is also true that in the wrong hands,
they would make it much easier to do so."
Devising checks and balances that will reduce that threat should
be a goal that unites all Americans. Given the complexity of the
issues, perhaps a first step would be to convene a truly credible
bipartisan study commission. Bring together representatives
from the legislative, executive, judicial, military, and security
branches, as well as members of the fourth estate. The
commission's mandate should be to inform the American people
about the hard choices we face. The trade-offs between liberty
and security should not remain a secret any longer.
June 25, 2013
Source Citation
(MLA 7
th
Edition)
"Securing our liberty."
Commonweal
140.12 (2013): 5.
Academic OneFile
. Web. 6 July 2015.
URL
http://go.galegroup.com/ps/i.do?id=GALE%7CA338120396&v=
2.1&u=oran95108&it=r&p=AONE&sw=w&asid=9e2cb301e1f5d
09dfad265ac7a1a5ddb
After reading the article, draft a two-page response by
discussing the U.S. government’s decision to acquire phone and
internet data without disclosing its intentions to citizens. For
this assignment, consider the NSA as an organization (i.e.,
business) and Snowden as a manager. How have the decisions of
this event impacted the fairness of the U.S. government, its
citizens, and Snowden? How did ethics, perhaps, influence
Snowden’s decision to leak information? In this event, what are
the greater good and also the consequences/sacrifices of that
greater good? Based on the details of this event, what can we
learn about making important decisions as a leader and
manager? This event was covered by several news and media
organizations, so there should be plenty of articles in the
library. Conduct a bit more research in the online library related
to this event involving Edward Snowden and the U.S.
government—see what else you can discover about the event to
determine an appropriate punishment, if any, for Snowden’s
conduct. Include at least one additional source from the library
in your response. The purpose of this assignment is for you to
think critically about managers (and other leaders) making
important decisions, and the process managers use to make
important decisions. Consider how important it is to collect all
of the facts before making an important decision, such as those
involving fairness and ethics.
Use APA Style to format your response

More Related Content

More from elishaoatway

PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docxPROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
elishaoatway
 
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docxProblem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
elishaoatway
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docx
elishaoatway
 
Problem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docxProblem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docx
elishaoatway
 
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docxProblem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
elishaoatway
 
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docxPROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
elishaoatway
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
elishaoatway
 
Problem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docxProblem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docx
elishaoatway
 
Problem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docxProblem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docx
elishaoatway
 
Problem B Regulatory Compliance 1 No.docx
Problem B Regulatory Compliance     1  No.docxProblem B Regulatory Compliance     1  No.docx
Problem B Regulatory Compliance 1 No.docx
elishaoatway
 
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docxPROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
elishaoatway
 
Problem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docxProblem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docx
elishaoatway
 
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docxProblem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
elishaoatway
 
Essay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docxEssay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docx
elishaoatway
 
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docxEssay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
elishaoatway
 
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docxEssay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
elishaoatway
 
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docxEssay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
elishaoatway
 
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docxEssay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
elishaoatway
 
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docxEs la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
elishaoatway
 
Erving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docxErving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docx
elishaoatway
 

More from elishaoatway (20)

PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docxPROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
 
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docxProblem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docx
 
Problem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docxProblem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docx
 
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docxProblem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
 
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docxPROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
 
Problem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docxProblem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docx
 
Problem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docxProblem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docx
 
Problem B Regulatory Compliance 1 No.docx
Problem B Regulatory Compliance     1  No.docxProblem B Regulatory Compliance     1  No.docx
Problem B Regulatory Compliance 1 No.docx
 
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docxPROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
 
Problem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docxProblem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docx
 
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docxProblem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
 
Essay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docxEssay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docx
 
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docxEssay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
 
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docxEssay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
 
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docxEssay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
 
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docxEssay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
 
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docxEs la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
 
Erving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docxErving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docx
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 

Edward J. Snowden, the thirty-year-old former National Security Agen.docx

  • 1. Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela. Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge are not known for upholding the sort of democratic values he claims to be defending. While demanding accountability from the U.S. government, he appears to be seeking immunity for his own actions. Snowden's purposes and fate, however, should be of secondary concern. However misguided his actions may have been, they have reopened a much-needed debate about the reach and authority of what is often called the National Security State. While defending the NSA programs, even President Barack Obama seems to welcome that debate. "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," Obama noted when asked about Snowden's leaks. "We're going to have to make some choices as a society. ... There are trade-offs involved." Administration officials and members of Congress say the government's extensive surveillance programs are crucial to preventing terrorist attacks, and that Snowden has done real damage to efforts to keep Americans safe. Because almost all the relevant information remains classified, it is difficult to assess that claim. NSA officials have now promised to make public details of some of the dozens of terrorist plots they say the massive data-collection effort, called Prism, has helped thwart. That sort of disclosure is long overdue. Although Prism
  • 2. was approved by the Foreign Intelligence Surveillance Act court and is monitored by the intelligence committees of Congress, many Americans were shocked to learn that the government now stores their phone and internet records for possible use in future investigations. While the government is prohibited from listening to the tracked calls, it uses sophisticated algorithms to trace calling patterns. If a series of related calls seems suspicious, the NSA or FBI then gets a warrant from the FISA court to investigate further. No abuse of those procedures has come to light. Still, the mere existence of such records in the government's hands, information that might easily be exploited for political purposes, should concern every American. It is axiomatic that fighting clandestine terrorist groups requires clandestine methods. Sources and allies must be protected; in preemptive actions the element of surprise must be preserved. Secrets about ongoing investigations cannot be compromised without jeopardizing counterterrorism efforts. It is harder to justify keeping such details secret after the fact. Judgments about the trade-offs between privacy and safety cannot be made unless the American people know what the government has done in our name. Even if everything the government does to combat terrorism is technically legal, not everything legal is prudent, wise, or morally justified. As a nation, we rely on a system of checks and balances to prevent an excessive concentration of state power. Those checks and balances are strained to the breaking point during times of war, and especially during a war as ill-defined and open-ended as the fight against terrorism. Congress is notoriously pusillanimous when it comes to national-security issues. The courts, meanwhile, are loath to intervene, preferring to leave the conduct of "war" to the other two branches. The executive rarely passes up an opportunity to expand its war-making powers. The result is the steady accumulation of influence by the nation's security agencies. As political philosopher and former Clinton administration official William A. Galston recently observed, "It may be true that as currently staffed and
  • 3. administered, the new institutions of surveillance do not threaten our liberties. It is also true that in the wrong hands, they would make it much easier to do so." Devising checks and balances that will reduce that threat should be a goal that unites all Americans. Given the complexity of the issues, perhaps a first step would be to convene a truly credible bipartisan study commission. Bring together representatives from the legislative, executive, judicial, military, and security branches, as well as members of the fourth estate. The commission's mandate should be to inform the American people about the hard choices we face. The trade-offs between liberty and security should not remain a secret any longer. June 25, 2013 Source Citation (MLA 7 th Edition) "Securing our liberty." Commonweal 140.12 (2013): 5. Academic OneFile . Web. 6 July 2015. URL http://go.galegroup.com/ps/i.do?id=GALE%7CA338120396&v= 2.1&u=oran95108&it=r&p=AONE&sw=w&asid=9e2cb301e1f5d 09dfad265ac7a1a5ddb After reading the article, draft a two-page response by discussing the U.S. government’s decision to acquire phone and internet data without disclosing its intentions to citizens. For this assignment, consider the NSA as an organization (i.e., business) and Snowden as a manager. How have the decisions of this event impacted the fairness of the U.S. government, its citizens, and Snowden? How did ethics, perhaps, influence Snowden’s decision to leak information? In this event, what are
  • 4. the greater good and also the consequences/sacrifices of that greater good? Based on the details of this event, what can we learn about making important decisions as a leader and manager? This event was covered by several news and media organizations, so there should be plenty of articles in the library. Conduct a bit more research in the online library related to this event involving Edward Snowden and the U.S. government—see what else you can discover about the event to determine an appropriate punishment, if any, for Snowden’s conduct. Include at least one additional source from the library in your response. The purpose of this assignment is for you to think critically about managers (and other leaders) making important decisions, and the process managers use to make important decisions. Consider how important it is to collect all of the facts before making an important decision, such as those involving fairness and ethics. Use APA Style to format your response