Free Essay

Nsa Surveillance Program

In:

Submitted By edritt
Words 2521
Pages 11
NSA Surveillance Program
Eric D. Reeves
ITT Tech Online
MG517 – Ethical and Regulatory Environment
Dr. Carrie A. O'Hare
June 9, 2013

Abstract/Executive Summary The American people are reaping what they sow. They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week. It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction:
This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and other user activities.
This information really caused many Americans to really stat freaking out. With all this freaking out is making it hard to decipher what, exactly is happening and what is the means of all this. So now with what’s been stated so far let’s take a deep breath and break down what we know so far and elaborate some on the Patriot Act. * Theories:
The ethical dilemma raised is whether or not the government should spy on its citizens without their knowledge or permission even if their (the government's) actions are completely legal. The USA PATRIOT Act of 2001 is an Act of the U.S. Congress that was signed into law by President George W. Bush on October 26, 2001. The title of the act is a ten letter acronym (USA PATRIOT) that stands for Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism Act of 2001. In the wake of the attacks on the World Trade Center and Pentagon on September 11, 2001, legislation entitled Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (known by its acronym, the USA PATRIOT Act) was passed by Congress. Nearly as soon as the PATRIOT ACT was passed, people expressed concern over some of its provisions. The Patriot Act, was a response to the September 11 terrorist attacks of September 11th, significantly weakened restrictions on law enforcement agencies’ gathering of intelligence within the United States; expanded the Secretary of Treasury’s authority to regulate financial transactions, particularly those involving foreign individuals and entities; and broadened the discretion of law enforcement and immigration authorities in detaining and deporting immigrants suspected of terrorism-related acts. The Patriot Act also expanded the definition of terrorism to include terrorism, thus enlarging the number of activities to which the USA Patriot Act’s expanded law enforcement powers can be applied. President Barrack Obama signed the Patriot Sunsets Extension Act on May 26, 2011. Which was a four-year extension of three key provisions in the USA Patriot Act roving wiretaps, searches of business records(the “library record provision”), and conducting surveillance of “lone wolves” individuals suspected of terrorist-related activities not liked to terrorist groups.

With a major concern and ethical issue being raised on whether government should have the right to spy on citizens or have been raises major questions such as. Since when has the government been collecting phone records? It’s been reported that on April 25th, the Foreign Intelligence Surveillance Court approved a top-secret order requested by the National Security Agency. According to utilitarianism, our obligation or duty in any situation is to perform the action that will result in the greatest possible balance of good over evil (Boatright, 2007, p. 32). The order was it required Verizon, which is one of the largest telecommunications companies in the country, to hand over records of all its customers’ phone calls, both within the U.S. and to other countries and regardless of whether they’re suspected of wrongdoing, on an “ongoing, daily basis” until July 19th. Our government actions relates to Teleological Theory.
Teleological theories hold that the rightness of actions is determined solely by the amount of good consequences they produce. The word “teleological” is derived from the Greek word “telos,” which refers to an end. Actions are justified on teleological theories by virtue of the end they achieve, rather than some feature of the actions themselves (Boatright, 2007, p. 32). * Research:
With ethical concerns at a high from Verizon users, many people want clarification on has someone been listing in on their conversation? NSA Surveillance explained in the press release that no calls have been tapped in on. The order demanded the phone numbers and location data for both parties on a given call, its duration, and the time the call was made, but the content of the conversation is not included. Now this raises concern from other people, What if I don’t have Verizon am I fine? Press released not necessarily. At this current time Verizon is the only company that explicitly been implicated so far, but according to a Wall Street Journal report, “people familiar with NSA’s operations said the initiative also encompasses phone call data from AT&T and Sprint Nextel.”

Deontological theories, in contrast to teleological theories such as utilitarianism, deny that consequences are relevant to determining what we ought to do. Deontologists typically hold that we have a duty to perform certain acts not because of some benefit to ourselves or others but because of the nature of these actions or the rules from which they follow. (The word “deontological” derives from “deon,” the Greek word for duty.) Thus, lying is wrong, some say, by its very nature, regardless of the consequences (Boatright, 2007, p. 32). In contrast with Boatright Deontological theories many Verizon users want answers to many questions. Another question that raises issues and concerns form the end users. What about my Internet history? So that’s the other thing. According to The Washington Post report, the NSA and FCI also have been obtaining photographs, emails, documents, videos, and connection logs directly from the servers of Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This program, also top secret, is code-named PRISM and technically meant for spying on foreign targets. But that doesn’t mean Americans using these U.S.-based Internet servers aren’t exempt from the snooping. According to The Washington Post, the search terms, or “selectors,” used to determine “foreignness” is only 51 percent accurate, so content from the U.S. also may be collected. Other examples of nonconsequentialist reasoning in ethics include arguments based on principles such as the Golden Rule and those that appeal to basic notions of human dignity and respect for other persons (Boatright, 2007, p.32). It’s clear that with the recent actions that have been performed by NSA they don’t have respect for others and human dignity doesn’t exist. Dignity is a term used in moral, ethical, and political discussions to signify that a being has an innate right to respect and ethical.

In the PRISM program US citizens want to know did all the tech companies willingly participate in with this program. It’s not totally clear. Initially The Washington Post reported that the nine companies mentioned did “participate knowingly,” but after they all publicly denied having any involvement, the Post has removed that phrase from the article and added a new paragraph suggesting that the companies themselves may not have provided the NSA with direct access to data. Why is our government doing this? To protect is it says. In a press conference, President Obama defended the phone collecting, and National Intelligence Director James Clapper on Thursday condemned the leak of the classified order, insisting that it was done out of necessity to preserve national security. House of Intelligence Committee chairman Mike Rogers also said domestic terror arrack was thwarted as a result of the program, though he didn’t offer any details. What does our President have to say about the NSA actions? At a press conference Friday, our President Barrack Obama defended the order, saying it caused “modest encroachments on privacy” and of the collection of records: “My assessment was that they help us prevent terrorist attacks.” He also stressed that no Internet data was collected from U.S. citizens or people living in the United States. Earlier, the administration released talking points clarifying that the NSA order does not allow the government to listen in on phone calls, that this method of collecting intelligence is completely legal under the Foreign Intelligence Surveillance Act, and that it has been “a critical tool in protecting the nation from terrorist threats to the United States.” * Finding\results: Ethical theory is also necessary when reasonable people disagree about controversial issues in business. Everyone recognizes the right of privacy, but how far does this right extend (Boatright, 2007, p.24)? Many law abiding citizens would agree that nothing about the actions form NSA and our president were ethical. Verizon just so happen to be my carrier for my cell phone for work and personal phone. I would have to agree that I could see the actions of NSA being controversial issues for business; especially big cooperation’s where a lot of priority information is at risk. Controversial issues in business ethics are difficult precisely because they are not easily settled by our ordinary moral beliefs and the simple rules and principles of morality. When reasonable persons disagree about these matters, we need to go beyond our conflicting positions and seek common ground in ethical theory (Boatright, 2007, p.24).

A concern that comes to mine with the actions of NSA is Covert Surveillance. Some methods for obtaining information intrude in ways that companies have not anticipated and taken steps to prevent. These can be said to violate a company’s right to privacy. Employees who talk about confidential matters in a public place, for example, can have no expectation of privacy, but planting hidden microphones in a competitor’s place of business is a form of espionage that intrudes into an area that is regarded as private. Virtually all of the high tech gadgetry that government intelligence agencies use to spy on enemies abroad is available for competitor intelligence gathering at home. Whether corporations have a right to privacy is controversial, but if covert surveillance were to become an accepted practice, companies would be forced to take costly defensive measures. Respecting a company’s reasonable expectations of privacy, then, is in everyone’s best interests (Boatright, 2007, p.128-129). It is clear that when NSA performed their actions they didn’t take any of this inconsideration for privacy of individuals or cooperation’s.

The same surveillance techniques that are used to monitor employees are now used to detect theft by store customers. Video cameras are commonplace in retail stores, and some retailers have installed hidden microphones as well. The main threat to consumer privacy comes from the explosive growth of database marketing (Boatright, 2007, p.147). How ironic is this something that was designed for human good, NSA has some of the same technology to invade human privacy. For a thief surveillance is understandable, but for someone who is a law abiding citizen this is unjust for anyone to have access of your personal life at any given moment or unannounced time. Descriptive ethics may involve an empirical inquiry into the actual rules or standards of a particular group, or it could also consist of understanding the ethical reasoning process (Boatright, 2007, p.23). The Principle of Utility-Jeremy Bentham’s version of utilitarianism is set forth in the following passage from Introduction to the Principles of Morals and Legislation: By the principle of utility is meant that principle which approves or disapproves of every action whatsoever, according to the tendency which it appears to have to augment or diminish the happiness of the party whose interest is in question: or, what is the same thing in other words, to promote or to oppose that happiness (Boatright, 2007, p.32-33). Jeremy principle of utility has to be the best solution for future actions going forward from NSA. Clearly millions of Americans are unhappy at this moment from the actions that has been taken over the past few weeks, if given the popular vote or people as a society were given the opportunity to have their voices heard and decision was decided on human rights this would not have taken place.

So stated, the principle requires that consequences be measured in some way so that the pleasure and pain of different individuals can be added together and the results of different courses of action compared. Bentham assumed that a precise quantitative measurement of pleasure and pain was possible, and he outlined a procedure that he called the hedonistic calculus (“hedonistic” is derived from the Greek word for pleasure). The procedure is to begin with any one individual whose interest is affected (Boatright, 2007, p.32-33). Often times some actions are performed for someone pleasure that inflicts pains on others. Life is all about the Golden Rule do unto others as you would have them to do unto you. The actions that were performed by NSA have already started some whistleblowing actions just days after the press conferences and more Americans awareness has been raised. Now the issue of privacy within the U.S. will be viewed differently from citizens, if our government is allowing our privacy to be invaded at any given point in time, this will always be viewed as unethical action.

Conclusion: Considering the criticism of the vast surveillance programs that are implemented in the U.S. and foreign countries, it’s not surprising that our government system would allow NSA to infiltrate our personal lives. Considering the recent action from NSA they infiltrated our personal data and privacy through our number one means of communication. Knowing that our government can access our privacy at any given time this has really caused discomfort with many millions of Americans. Does ethics and morals still exist in our society today is yet to be determined.

Reference: 1. Boatright, J. R. (2007). Ethics and the conduct of business (5th ed.). Upper Saddle River, NJ: Pearson Education, Inc. 2. http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order 3. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_2.html 4. http://www.youtube.com/watch?v=Nhf-noHT6Gk 5. http://jurist.law.pitt.edu/forumy/2006/01/patriot-games-terrorism-law-and.php

Similar Documents

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...

Words: 2180 - Pages: 9

Free Essay

Electronic Surveillance

...Ethics in the Government and Public Sector in Electronic Surveillance “Can you hear me now, Yes I can even see you” Embry-Riddle Aeronautical University Abstract In todays society the number of computers, tablets, mobile devices will rise to about 65 billion devices connecting to the internet. That not counting vehicles, household applicances, gaming devices. However, with all of these deveices there is a significant benfit that will make our lives easier and one potential theat that invades our privacy called Geolocational Privacy and Surveillance (GPS). This sometimes hidden or masked feature is colleting our personal information, location and sometimes converstation. Laws have have enmpowered government and companies to collect databases of consumers without our consent. With ongoing technology where does the protection beging and the surveillance stop. Ethics in the Government and Public Sector in Electronic Surveillance In the movie Enemy of the State the lawyer played by Will Smith becomes a target by a corrupt politican who kills a congressman for his unwillingness to help with a new surveillance system with satellites. The politican with the help of National Security Aministration agents to destroy the lawyers life by manipulation thru the internet and surveillance. This movie was produced in 1998 and then the technological devices we have now were not that advanced. Little did we know that would become the norm of everyday life of those who possess...

Words: 1919 - Pages: 8

Free Essay

Case Study

...Maham ashfaq 16020248 Junaid sirat Comparative law Edward Snowden. Born in North Carolina in 1983, Edward Snowden worked for the National Security Agency through subcontractor Booz Allen in the NSA's Oahu office. While working there, Snowden began noticing government programs involving the NSA spying on American citizens via phone calls and internet use. Before long, leaving his very comfortable life and $200,000 salary behind, in May 2013, Snowden began copying top-secret NSA documents while at work, building a record of practices that he found invasive and alarming. The documents contained enormous and pejorative information on the NSA's domestic surveillance practices, including spying on millions of American citizens under the name of programs such as PRISM. (Edward Snowden biography) Snowden later forwarded these documents to journalists, from where on June 5th Guardian newspaper released those secret documents about an American intelligence body (Foreign Intelligence Surveillance Court) demanding that Verizon release information on a daily basis gathered from its American customers activities. Also the Guardian and the Washington Times released Snowden's leaked information on PRISM, a NSA program that allows real-time information collection, in this case, solely information on American citizens. Snowden now lives in Russia. One of his lawyers, Anatoly Kucherena, gave an interview with CBS News. Kucherena said that Snowden would seek temporary asylum in Russia and possibly...

Words: 533 - Pages: 3

Free Essay

Nsa Ethics of Mass Surveillance

...The Ethics of the NSA Mass-Surveillance Program University Name Student Name Course Number/Name Professor Name Date Introduction One of the most explosive scandals of the 21st century was involved the National Security Agency (NSA), and the revelations that the agency had set up a robust, warrantless mass surveillance program in the years after the 9/11 attacks. Designed to pick up bits of intelligence that could be used in order to thwart future 9/11 attacks, critics of the program argued that not only was it unconstitutional given the lack of warrants obtained prior to engaging in the program, but that it was ineffective at stopping any kind of real terrorism. Supporters pushed back that the program was an essential tool for fighting terrorists who had become more advanced digitally, often using the internet in order to communicate with each other. Much of the discussion on the program related to the ethical appropriateness of the NSA’s activities. This paper will summarize the NSA’s surveillance program and discuss it from the perspective of utilitarianism and Kantian ethics; in addition, the paper will discuss the author’s personal viewpoint of the program. Summary of the Program The NSA spying program, named the “Terrorist Surveillance Program” by the New York Times, focused on monitoring the communications of between 500 and 1000 people within the United States with suspected ties to Al-Qaeda (Dunn, 2015). Many of these individuals were American citizens,...

Words: 1335 - Pages: 6

Premium Essay

How Has the Nsa's Surveillance Impacted the Economy?

...How Has the NSA'S Surveillance Impacted the Economy? Southern New Hampshire University English 123: Composition II How Has the NSA'S Surveillance Impacted the Economy? Introduction The Guardian aired a report on the surveillance programs of the National Security Agency over one year ago. The report based on leaked information from one of the agency’s contractors named Edward Snowden. The national opinions from several interested parties concentrates on simplistic debates evaluating the tradeoff between individual privacy and national security. However, it is an important time for the government and other stakeholders to begin weighing the benefits and costs associated with the surveillance more carefully. In spite of the strong defense by intelligence officials in favor of the NSA programs, the officials fail to table any credible evidence in support of the benefits they suggest. In fact, some initial analysis of the programs indicates that the benefits are dubious. It is true that the United States is a target for terrorist and other malicious groups, state officials often use the threat as an excuse to conduct and promote the activities of the National Security Agency. It may be beneficial in the context of security, but the surveillance programs also jeopardize the activities and operations of other organizations and individuals within the United States. The impact of the activities of the NSA on other parties is a cause for an analysis of the economic effects realized...

Words: 1851 - Pages: 8

Free Essay

Who Is Edward Snowden?

...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...

Words: 1691 - Pages: 7

Premium Essay

National Security Should Be More Important

...evil NSA team conducting illegal surveillance on a labor lawyer Robert, who was supposed to have a videotape of a politically motivated murder. Robert’s life was peaceful and happy until he suddenly met his college friend Zavitz in a shop, who passed the videotape secretly to him. Ever since that moment, Robert’s life was turned upside down. A special team in NSA soon discovered that he might have the videotape, and then the team raided his house and planted surveillance devices in order to find the videotape. His every movement was tracked and every word was tapped, which destroyed Robert’s life: he was fired from his work, his bank accounts were frozen, his wife threw him out of home since photos about his meeting former girlfriend were sent to his wife. After stumbling around for a bit trying to figure out what's happening to him, Robert turned to Brill for help, who turns out be an ex-NSA agent and who was responsible for inventing some of the surveillance devices. Together, they fought the NSA using the same techniques used against them, and finally Robert got rid of all his accusation and went back to his peaceful life again. Although the plot of the movie might look like a little Hollywood style, the surveillance tools feathered in the movie, such as, phone wiretapping, Global Positioning System, voice and face recognition system, and some much advanced ones, are generally in use today. Apparently, the movie puts strong criticism on the abuse of such surveillance tools...

Words: 1714 - Pages: 7

Premium Essay

Ethics of Wiretapping

...Philosophy 203 – Introduction to Ethics August 7, 2015 ETHICS OF WIRETAPPING Since the First World War, government has been known to use private companies to wiretap phone lines for information. The legal structures, established by the 1978 Foreign Intelligence Surveillance Act (FISA), have defined a framework for legally securing a warrant for searches and tapping into phone lines of the American populace. Sometimes the government uses warrantless wiretapping without proper authorization and it exposes telecommunications companies to legal and financial ramifications. What I will argue in this paper is that warrantless wiretapping is unlawful and not ethical, as it harms citizens and violates their privacy. My position is that it is not violation of personal liberties and is immoral for the NSA to have access data when your average citizen is not a threat. Not completely following this law pertaining to wiretapping deviates from the natural check and balance system of the federal government. The failure to procure a warrant when wiretapping violates the Fourth Amendment of the Constitution, and provokes media criticism. The National Security Administration (NSA) and other government agencies are required to wiretap only with the direct written authority of the FISA-assembled courts through a signed warrant. In rare cases, however, such as an imminent terror plot, against the government should it be allowed to intervene. The law-abiding system...

Words: 1118 - Pages: 5

Free Essay

Persuasion, Politics, and Propaganda

...Persuasion, Politics and Propaganda Teneal Rusnak COM/400 September 9, 2014 Margaret Garberina, Ph.D. Persuasion, Politics and Propaganda An issue that seems to raise some concerns in our society would be the National Security Agency (NSA) not only spying on people in our country but also other countries by wiretapping and keeping surveillance on certain people. There have been a number of different laws that have been instated that help to protect our privacy such as the Omnibus Crime Control and Safe Streets Acts of 1968 which acknowledged that there were extensive amounts of wiretapping that seemed to be going on without any sort of legal sanctions and without the consent of anyone involved. With this law it helped to protect innocent people and stated that wiretapping should only be allowed only when authorized by the court and should therefore remain under the supervision of the court throughout its duration. However, in 1968 our technology was not as advanced as it is now so this law went through many significant changes over the next forty plus years. By 1986 a new amendment had been written in response to the ever-changing technological advances. The 1968 law only protected individuals who communicated through telephone calls. The Electronic Communications Privacy Act of 1986 took it a step further to focus primarily on any email that would be transmitted as well as stored in any type of storage device. The biggest improvement came...

Words: 1843 - Pages: 8

Premium Essay

Edward Snowden Research Paper

...Assignment on NSA Edward Snowden Revelations and Congress reaction By ABC Date; NSA Edward Snowden Revelations and Congress reaction 1. NSA Edward Snowden Revelations The first bombs hell story was published on the basis of the top secret documents. This was related to the national security agency who spy on the American citizen. When the story was leaked, it was not mentioned that the treasure trove is based on NSA documents and source was not come in front. After three days, the person has leaked his identity. When the identity was leaked, it is revealed that he is “Edward Snowden”. Some of revelations were in queue and in coming years, explosive stories started to trickle the documents. Some of revelations are following: 1. Sweeping...

Words: 1501 - Pages: 7

Free Essay

Spying of the Nsa, Public Speaking Report

...Spying of the NSA The past year we all have heard of the NSA spying through social media, phones and all sorts of stuff, we heard of this because of Edward Snowden, an ex CIA- system analyst. He exposed their spying and this has resulted in to a global issue. Because the spying is wrong on so many levels we are here to convince you that what the NSA is doing is wrong. *attention grabber* So now that I have your attention I will continue. Main Point 1: How is it possible that the NSA is spying on civilians? Sub Point 1: What is the NSA; I’m going to begin by telling you a little about what the NSA is. The NSA better known as the National Security Agency is the main producer and manager of the signals intelligence for the United States. The NSA is responsible for the protection of U.S. government. The NSA is tasked with monitoring on targeted individuals in the U.S. But the NSA doesn’t just spy on targeted individuals; they spy on every U.S. citizen, they even spy on world leaders. They can spy on anyone around the world, and they can do this through social media, the internet and phones. I will explain this in more detail later. Ok so now that I’ve talked about what the NSA is, I will tell you guys how it is possible that the NSA is spying on us. Well to begin, the NSA spying program started back when George Bush was the president of the United States, the spying started right after nine eleven, this was in 2001 and that is 13 years ago so consider how long they have...

Words: 1852 - Pages: 8

Premium Essay

Greenwald's No Place To Hide

...Greenwald insinuates throughout the entire reading of No Place to Hide, that the government believes that they should have surveillance on the entire state because of safety factors and that it would unite it more effectively. This coincides with the statement “Mass surveillance is a universal temptation for an unscrupulous power. And in every instance, the motive is the same: suppressing dissent and mandating power” (Greenwald, 4). If the government can pacify the people of the state by going under the illusion of safety, they can use “mass surveillance” and control the entire state without much, if any, dissent from the people. Greenwald’s stance is solid but his glazing over of how we can change things (other than using encryption like him)...

Words: 1363 - Pages: 6

Premium Essay

Internet Surveillance

...government agencies and corporations, but also hackers willing to risk a prison sentence. In 2013, NSA whistle blower Edward Snowden revealed previously unknown details of global surveillance programs run by the United States' NSA in close cooperation with three partners: Australia, the United Kingdom, and Canada. The documents leaked by Mr. Snowden revealed details about the NSA secretly tapping into Yahoo and Google data centers to collect information from millions of accounts worldwide. The shocking evidenced released by Mr. Snowden reveals that lawmakers and politicians should take greater control over how and why they are using their surveillance technologies, and question whether or not the fight against terrorism justifies the use of these surveillance programs on citizens as well. Furthermore, it is important to ensure that there be continued innovation in internet security in order to create services and products which can counter-act the use of these programs on ordinary citizens who don’t want their data accessible to anyone but themselves. Spying agencies are able to cripple the civil liberties and the right to privacy of citizens, therefore it is imperative that the government protect the rights of citizens through reforms on Surveillance Acts, but it is also equally pertinent for citizens take initiative and push for new reforms and innovation in online security. Surveillance is defined as the “monitoring of people and systems in order to regulate their behaviour” (Castree)...

Words: 1527 - Pages: 7

Premium Essay

Edward Snowden Case Study

...significance of ethics has been expanding quickly. The ethics are morals, qualities and standards utilized by a person to perform one’s own decisions. These qualities are considered by the people for their basic leadership. This paper represents the case study of Edward Snowden who is a defense contractor Booz Allen Hamilton, leaked very confidential information about the activities of USA’s National Security Agency (NSA). In June 2013, Snowden confessed to passing characterized records to columnists at The Guardian and The Washington Post—revealing the details of NSA observation programs that gather and perform information mining on a huge number of U.S. telephone calls and Internet...

Words: 1308 - Pages: 6

Premium Essay

Student

...Data Collection and Surveillance Andrew John Martin UNCW Computer Science Department Abstract The purpose of the research is to see if the mass collection and surveillance of U.S citizens legal and ethical. The goal is to have a better understanding of the how data is collected, and the what the Fourth Amendment means. This is done by examining several aspects of the Fourth Amendment, and recent articles on the NSA. Upon examination, it becomes clear that the NSA is indeed breaching the rights of lawful U.S citizens. Through showing that the Fourth Amendment protects the U.S citizens against such actions. Key Words: NSA, Fourth, Amendment, warrant, PRISM, Edward, Snowden. The NSA collects millions of American phone, internet, and personal information. They do this by using a system call PRISM which allows them to collect this data through several different internet websites. However, many believe this is in complete violation of the Fourth Amendment which protects against unwarranted searches and seizures. The Fourth Amendment of the U.S. Constitution provides, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." The ultimate goal of this provision is to protect people’s...

Words: 2486 - Pages: 10