Premium Essay

Snowden Research Paper

Submitted By
Words 703
Pages 3
How did Snowden get into this mess? Where does he come from? Snowden’s past is talked about extensively on NPR with journalist Brian Burrough. Brian talked about Snowden’s interesting past. Snowden dropped out of high school at the very young age of 15. For five years Snowden had no job and was only taking a couple classes at a local community college at the time. Brian says that this is the most interesting part of Snowden’s life because he spent most of his time navigating the internet and learning about computer systems in depth. The crazy thing about it all is that he taught himself everything (NPR). After five years of private study and couple classes of computer science at a local community college, Snowden would go on to join the Military. It is really hard to try and unravel some of Snowden’s “shrouded” past because there isn’t much said about his past. It is especially hard to tell what the true answer is to the question of why Snowden left the military Snowden told the Guardian that he broke his legs in a training incident and was discharged …show more content…
The guardian, which is where most of Snowmen’s documents were directly released to, talks about the capabilities of the program which they learned about from a top secret 41-slide PowerPoint presentation. The PowerPoint talks about how the document claims "collection directly from the servers" of major US businesses and services. One of these services that the program talks about in specific detail is Google. There is no better place to find info on someone then the most used search engine in the nation right? But why would Google agree to something that blatantly violates the privacy of its users? That is the funny thing because they did not even agree to it. In a statement about the subject of privacy and the government’s data collection through Google, Google

Similar Documents

Premium Essay

Edward Snowden Research Paper

...Following Edward Snowden’s leak about the NSA, or the National Security Agency, there have been questions after questions regarding the privacy of the things people do online. People are fearing that the government and their respective agencies are overreaching in their collection of citizens’ data. The whole topic on its own, raises quandaries; and at times even resentment due to America’s belief in securing their personal data from the government. In today’s highly technological society, surveillance and monitoring do not encroach upon privacy, but rather aid in promoting civil liberties and public security. The NSA’s actions do not infringe on the 4th amendment and stand to be legal in the eyes of the constitution and that of the judiciary. People worry of the government’s intrusion into their private data, however, they do not realize that government surveillance does little in this matter. What the NSA does in regards to telephone surveillance is that they “collect phone numbers and the duration of calls, not the content” (Baker and Sanger). No person is reviewing discussions between the people within calls because that information was never collected in the first place. This, what they call metadata, does not invade on personal information, but just certain things needed by the government to ensure the protection of everyone in the nation. The NSA’s actions should not be something that citizens should worry about, because, holistically, it is with these programs and other...

Words: 959 - Pages: 4

Premium Essay

Edward Snowden Research Paper

...Assignment on NSA Edward Snowden Revelations and Congress reaction By ABC Date; NSA Edward Snowden Revelations and Congress reaction 1. NSA Edward Snowden Revelations The first bombs hell story was published on the basis of the top secret documents. This was related to the national security agency who spy on the American citizen. When the story was leaked, it was not mentioned that the treasure trove is based on NSA documents and source was not come in front. After three days, the person has leaked his identity. When the identity was leaked, it is revealed that he is “Edward Snowden”. Some of revelations were in queue and in coming years, explosive stories started to trickle the documents. Some of revelations are following: 1. Sweeping...

Words: 1501 - Pages: 7

Premium Essay

What Is Edward Snowden Unethical

...Snowden’s actions of disclosing valuable and classified NSA documents raise a number of ethical issues. Some people claim that Snowden did not do any wrong since he disclosed the wrong thing that was going on. However true that may be, this paper argues that there are better channels in which he could have used to let the cat out of the bag. Many are questioning if our government was betraying citizens because of the monitoring activity, and never revealing it. There was an absence present that lacked a legitimate procedure of informing citizens that they may be conducting unethical and unconstitutional activities. With the government’s activities set aside, the fact that he chose to reveal the classified information without following the right procedure will earn him the title of a whistleblower. A...

Words: 907 - Pages: 4

Free Essay

Whistleblowing

...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience...

Words: 3746 - Pages: 15

Premium Essay

Knowledge Management

...Knowledge Management Nicholas Miller Table of Contents Abstract 3 What is Knowledge Management? 4 Features of Knowledge Management 5 People 5 Processes 5 Technology 5 Knowledge Management Applications 7 Tacit Knowledge 7 Explicit Knowledge 7 Embedded Knowledge 7 Tacit vs. Explicit Knowledge 9 The Importance of Knowledge Management 10 Summary 11 Conclusion 12 References 13 Abstract The principal objective of this research paper is to define Knowledge Management (KM). The research findings in this paper will uncover the features and applications that have derived from the Knowledge Management process. It will also examine Tacit vs. Explicit Knowledge and the importance they have in the Knowledge Management process. This research paper is presented in the form of a report hence comprehensive analysis and conclusion will be drawn from the findings of the research as it relates to the topic “Knowledge Management”. What is Knowledge Management? “Knowledge is power”, as quoted by the English philosopher Francis Bacon (1561-1626) (Henry, 2002). With the requisite knowledge, an individual or organization can achieve any goal or objective. Now we ask ourselves, “What is Knowledge Management”? To arrive at a possible response to such a question it is imperative to underline the key terms Knowledge and Management. (Cavell, 2002) claimed that Knowledge is the understanding of information and skills acquired through experience or education, which exists mostly in...

Words: 1415 - Pages: 6

Premium Essay

Hr Management

...Human Resource Management Jennifer Harden Indiana Wesleyan University Dropbox 1 Introduction to Topic The topic for this paper is veteran recruiting and the outreach methods that are successful in hiring transitioning military. Telepresence robots could increase employee satisfaction for some because it would allow for less travel. The Harris Interactive poll commissioned by The Workforce Institute also revealed that 48 percent of people said commuting has a significant impact on their job satisfaction. (HERSHORN, 2011) Employees that save time traveling and commenting have more personal time, increasing job satisfaction. On the other side of the coin some employees will feel uncomfortable with the new technology lowering their job satisfaction. The resistance to change and new technology is not a new concept in the human resource industry. Employees may feel that the technology acts as a “big brother” and that they are being micromanaged. The people that would benefit most from this technology are the ones that travel 50% or more globally for their position. The robots would limit the amount of traveling for the key decision makers. Tasks such as brainstorming or planning events could easily be handled by Robots. Competing through Sustainability In 2012 new CEO Marissa Mayer announced that she was terminating the flextime policy at Yahoo. Mayer felt that people were more creative in groups and flextime was not conducive to creativity in the long run....

Words: 894 - Pages: 4

Free Essay

Participatory Video

...participatory video techniques (for example, social mapping, action search, prioritising, etc. * Short videos and messages are directed and filmed by the participants. * Footage is shown to the wider community at daily screenings. · * A dynamic process of community-led learning, sharing and exchange is set in motion. * Completed films can be used to promote awareness and exchange between various different target groups. * Participatory video films or video messages can be used to strengthen both horizontal communication (e.g. communicating with other communities) and vertical communication (e.g. communicating with decision-makers). THE FOGO PROCESS: The inception of participatory video is credited to Donald Snowden, a Canadian academic who specialized in communication...

Words: 4909 - Pages: 20

Premium Essay

Accounting and Finance

...Smarthinking's Tutor Response Form (Your marked-up essay is below this form.) HOW THIS WORKS: Your tutor has written overview comments about your essay in the form below. Your tutor has also embedded comments [in bold and in brackets] throughout your essay. Thank you for choosing Smarthinking's OWL; best wishes with revising your paper! Hi Denise! My name is Keren H., and I will be reviewing your submission today. Thank you for an interesting piece of research on Background Checks. In today’s review, we will revise sentence structure, word choice, and documentation. Strengths of the essay: Denise, “References” is the correct name for the heading of your page of sources. Good job! Sentence Structure: One or two of your sentences are “run-ons”. This means that two ideas “run on” into each other with no punctuation or links to separate them. Let’s see an example, and discuss how to correct the run-on:  A background check is a must in today’s business world. You never know what you may find on the applicant. What two ideas do you see here? “A background check is a must in today’s business world” is one; the rest makes up another idea. The easiest way to separate two ideas (two main clauses) is to put each in a sentence of its own. What punctuation (such as a capital letter and period) will you add, so that you have TWO sentences instead of the run-on? Visit Run-ons and Comma Splices to find more ways to revise run-ons. Word Choice: Denise, I notice that you use...

Words: 3007 - Pages: 13

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors. The executive branch of the government led by the Department of Homeland Security with close cooperation with other agencies including the National Institute of Standard and Technology (NIST) create mandatory policies and enforces their implementation by the private industry. This change was as a result of the September 11, attack...

Words: 1899 - Pages: 8

Free Essay

Breath Tests

...Random Breath Tests for Drivers is a Smart Thing to do As a six year old little girl I was faced with what I thought was the worst news of my life. In April 1989, my father was hit head on by a drunk driver and was killed instantly. Almost twenty years later and this horrific memory still plays over and over in my head. If random breathalyzers were performed more often by police officers then maybe my father would still be alive today. I believe random breathalyzers for drivers is a smart thing to perform on a daily basis around the world because they will keep intoxicated drivers off the road and keep our roads and highways safe. Far too many people drink near the legal limit not realizing that they may innocently go over the limit. It’s not uncommon for us to be out on a Saturday night with a group of our close friends, have a few drinks and drive home. Sometimes it’s difficult to gage ones alcohol intake and is easier to assume that we are okay to drive. The legal limit in most states is 0.8%. If a person is driving while above the legal limit they are arrested and charged with drinking and driving more commonly referred to as a DUI or DWI. Driving under the influence of alcohol can be seriously harmful to themselves and innocent bystanders such as my father. Alcohol blurs our judgment and decreases our reaction time which can be crucial while operating a motorized vehicle. Driving while under the influence is illegal and those that violate that law should...

Words: 1573 - Pages: 7

Free Essay

School

...using MLA or other assigned style manual; * Use syntax, punctuation, and spelling effectively in service of rhetorical purpose. Assignment: Your final essay will loosely based on the structure of a ‘literature review.’ As such, it will be either a closed-form, thesis-based structure or a thesis-seeking structure. You will choose one of the following topics and at least two of the assigned articles and create a synthesis essay based on them. Your paper should do the following: 1) introduce your research question and thesis (the answer to your research question and the argument you are defending), 2) summarize the articles from the authors’ perspectives, 3) compare and contrast the themes of the articles according to your research question, and 4) analyze the articles from your perspective and come to a conclusion on your research question using the information from the articles. Format: Your paper should be double-spaced and in MLA format, including parenthetical citations and a works cited page. It the body of the paper should be at least 1500 words (not including the reference page). Audience: The audience for this assignment is your ENC 1101 instructor and peers. For more information...

Words: 771 - Pages: 4

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Premium Essay

The Patriot Act and Its Effect on Corporations

...The Patriot Act and its Effect on Corporations SECR 5080 – Term Paper 9 May 2015 Table of Contents Abstract – page 3 Introduction – page 3 Current State of Affairs as by the law – page 5 Impact on computing – page 6 Surveillance on Businesses – page 9 Penalty on non-compliance – page 10 Internet Service Providers – page 10 Conclusion – page 12 References – page 13 Abstract The Patriot Act was written into law just a mere 45 days after the September 11, 2001 terrorist attacks on the United States. The Patriot Act was intended to counter terrorism by providing law enforcement agencies and intelligence agencies with an easier means to target those connected to terrorism. The Patriot Act has had a great impact on corporations, how they are surveilled and monitored, and huge penalties on noncompliance of the Patriot Act. This paper will further discuss the Patriot Act and its effects on Corporations. Introduction The terrorist attack on the United States on September 11, 2001 shook the foundation of the faith that America had in her security. This prompted congressional action on counteractive action to avoid a repeat occurrence of the terrorist attack on US soil. Measures that were taken included the passage of a Congressional Act referred to as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, hereby referred to as the Patriot Act. The passing of the Patriot Act was...

Words: 3253 - Pages: 14

Premium Essay

1984 George Orwell Analysis

...and his own view.. Knapps uses the view of other authors like Bernard Crick to express the opinions of others. His opinion on how someone of the books are closely related. With the authors of this section credentials and literary skills it can be used as a reliable source. He also uses many facts from his own studies and isn't afraid to express his own opinion and the opinion of others in his writing. He includes his research and a short bibliography with a small annotations afterwards. His writing style expresses his literary background, and his information on george orwell is very persist. Lakoff, George. "What Orwell Didn't Know About The Brain, The Mind, and Language." EScholarship. UC Berkeley, 2008. Web. 23 Oct. 2015. Lakoff tells of George Orwell’s 1984 and how he used to love the book, but now since he has more knowledge of the mind and how it works his opinion has changed. George Lakoff is Goldman Distinguished Professor of Cognitive Science and Linguistics at the University of California, Berkeley, and Senior Fellow at the Rockridge Institute. This paper seems reliable from the credential he has and how he voices his opinion with facts to back it up. The uses of this article help show by the authors facts and opinion, how Orwell didn't know much about the brain. That how Orwell describes how the mind is working within the citizens is inaccurate, because the lack of knowledge in the time period the book was written. This source is good to compare with the knowledge...

Words: 1819 - Pages: 8

Premium Essay

Week 7 Project

...wasn’t a need to worry about networks being attacked, and now to the current evolution of people where it’s not if your network will be attacked, it is when. The Current Problems with Network Security and How We Can Fix Them Network Security is defined by Sans Institute as the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment (SANS, 2014). As you can see with that definition the meaning can interpreted many different ways, so with this paper I will describe what network security is and how we can fix the ongoing problems. Current State of Network Security Before you fix or document any problems with network security you must first evaluate the current state of the problems we face. Most networks are somewhat secure, meaning they have the resources to make them nearly “bullet-proof”, but due to current policies within organizations, the information technology team is unable to enforce maximum security due to employees needing to plug their IPod’s in, charge their cell phones, and access social media sites, etc. the list could go on and on. The functionally of most organizations network security is geared toward making the customers and employees happy and no regards toward...

Words: 2317 - Pages: 10