Premium Essay

Edward Snowden Case Study

Submitted By
Words 1308
Pages 6
1. INTRODUCTION
In the period of fast industrialization, the significance of ethics has been expanding quickly. The ethics are morals, qualities and standards utilized by a person to perform one’s own decisions. These qualities are considered by the people for their basic leadership. This paper represents the case study of Edward Snowden who is a defense contractor Booz Allen Hamilton, leaked very confidential information about the activities of USA’s National Security Agency (NSA). In June 2013, Snowden confessed to passing characterized records to columnists at The Guardian and The Washington Post—revealing the details of NSA observation programs that gather and perform information mining on a huge number of U.S. telephone calls and Internet
…show more content…
According to the given scenario, the main ethical issue is betraying done by Edward Snowden who was working at National Security Agency (NSA). He himself discovered liable for doing cheating with his profession and Country. He was accused of leaking the most confidential information about the security of individuals of his nation. This classified data is about surveillance program of NSA to gather and mine the data from billions of US telephone calls and internet browsers records over the web for the distinguishing proof of the suspicious connection with terrorists. After leaking of confidential data, Edward fled away from his nation to keep himself away from all sort of federal activities. This activity of Edward has been demonstrated him as a betrayer who fled away from the country after the violation of social equality and constitution. One pool of individuals believe that this act by Edward Snowden is betray in offending the social equality and the constitution while other sustain this thinking and called as traitor ought to be punished with the goal that nobody can dare do this attempt again in future. This activity of Edward Snowden drove numerous ethical issues of the organization and country directly or …show more content…
National Security Agency (NSA): By the activity of Edward Snowden on leaking out of the confidential information about the surveillance program of NSA by gathering and mining the information related to US telephone calls and internet browsers records over the web for the distinguishing in identifying the suspicious connection with terrorists in the country. This led National Security Agency of USA as the primary party affected by the activity of Edward Snowden which demonstrated the NSA as illegal as it is against the Law of security. A significant number of the security asserting advocates are demonstrating this program as lawful, and a large number of the lawful gatherings said that it is legitimate. Because of this activity, the NSA organization was stuck in a bad reputation in the country in terms of

Similar Documents

Free Essay

Global Economics and the Impact of Whistleblowing

...Whistleblowing and the global impact. Table of Contents ESSAY Introduction The importance and understanding of whistleblowing The notion of whistleblowing Whistleblowing – an act of good will Whistleblowing – an act of revenge The role of the government Government whistleblowing How Snowden formed society Introduction Whistleblowing, an act of certain controversy, has provided material for many a discussion. It has filled our newspapers, televisions and radios on a daily basis, since Wikileaks went public with its first act of exposing illegal activity. ‘Whistleblowing’ is a dynamic process involving at least three social actors; the wrongdoer, the whistleblower and the recipient, each of whom takes actions in response to the other’ (Near et al., p 509, 1996), while accepting the associated dangers and risks. Current events relating to Edward Snowden, Julian Assange and Bradley Manning have sparked intense debate throughout the world regarding policy changes, creation of new laws and the conduct of government and corporations. It is widely agreed that whistleblowing exists and happens on a daily basis. Scholars have examined the topic over the years narrowing it down to ethnical divergences or even to how the act of wrongdoing can impact a whistleblower. The importance and understanding of whistleblowing Age has a significant......

Words: 3369 - Pages: 14

Free Essay

Whistleblowing

...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such......

Words: 3746 - Pages: 15

Free Essay

Leg500 Assignment 1

...to enforce it. It was a sweeping change to standard reporting practices and was created to restore investor confidence, hold corporations and auditors financially and criminally accountable, and protect whistleblowers. Prior to the creation of SOX the whistleblower had no protection from retaliation by the organization. Whistleblowers had fears of criminal prosecution, bodily harm and job loss if they reported the misdeeds of their employer both publicly and privately. The Sarbanes-Oxley Act of 2002 redefined the whistleblower. An examination of the characteristics of a whistleblower, the Global Capital Markets Advisors whistleblower case, and whistleblower protection guaranteed by the Sarbanes-Oxley Act will demonstrate the benefits, setbacks, and drawbacks of SOX and whistleblowers. Characteristics of a Whistleblower There have been many studies on who is a whistleblower and what are the characteristics of a whistleblower. There is no easy answer to either...

Words: 1159 - Pages: 5

Free Essay

Criminology

...problem for many rape victims these days is the mass media sensationalism surrounding the crime. Having your face as the victim of a rape plastered all over many news stations is far from appealing and thus many victims may choose to hide in their shame rather than report the crime. However, not all cases are covered by the media and may not have the “celebrity” status that those covered by the media do. There is still however one major constituent in rape victims’ hesitance to come forward – actually facing their rapist. To bring a rapist to justice in the American justice system, one must go through the necessary legal trials and this process generally takes years. Throughout this time, the victim of the rape will have exposed him or herself to the rapist. And, in the end the victim will have to look their rapist in the eyes as they point them out in court. Rape is taken extremely personally by victims, and they fear their assailant holds the same personal vendetta. I believe a way to improve the reporting of rapes would first be a majorly concerted effort to protect any rape victims with the utmost of care. They were damaged both physically and emotionally and are very fragile cases. Law enforcement must ensure these victims know that when they come forward they will be welcome with open hands, open minds, and that their assailant...

Words: 1567 - Pages: 7

Premium Essay

The One of the Very Best Descriptive Titile

...15, (Mark, "The Presidential Empire," Dissent Magazine, Spring 2015, http://www.dissentmagazine.org/article/the-presidential-empire, accessed September 11, 2015) JCP-BL Edward Snowden’s revelations brought home the fact that one of the main tasks of the National Surveillance State is indeed surveillance. Much of what Snowden brought to public attention were modernized versions of classical espionage conducted by U.S. spies outside the United States. That sort of espionage was completely consistent with U.S. law. Technology meant, though, that surveillance outside the United States inevitably included information about activities by U.S. citizens both outside the nation’s borders and within them. The statutes creating the framework for this surveillance have provisions aimed at limiting its domestic use to cases with a substantial connection to international terrorism. But, Snowden showed us, those provisions were not fully effective, and the scale of modern surveillance meant that even reasonably effective protections against domestic surveillance still left large numbers of innocent people subject to it. Counter-Interpretation – Domestic surveillance deals with information transmitted within a country HRC 14 (Human Rights Council 2014 IMUNC2014 https://imunc.files.wordpress.com/2014/05/hrc-study-guide.pdf, accessed September 11, 2015) JCP-BL Domestic surveillance: Involves the monitoring, interception, collection, analysis, use, preservation, retention of,......

Words: 277 - Pages: 2

Premium Essay

The Importance Of Internet Privacy

...crime. Many showed their dissaproval over this activity. Also, outrage over the Verizon Metadata program revealed by Edward Snowden, resulted in a number of lawsuits being filed, to combat what was viewed as a violation of online privacy rights. Privacy has also been issue on government’s websites. According to several reports, a lot of Federal websites don’t respects the values of Internet privacy. It is a very delicate issue considering the amount of information the government contains. An additional issue that we can make a note of with the government is how they try to get information from companies on their customers. Several years ago, this happened to Northwest Airlines when they received all information on their customers. They are trying to access records of citizens and the right the government has to get these records is an enormous issue in web...

Words: 1336 - Pages: 6

Premium Essay

Persuasive Essay: The Right To Privacy?

...‘something to hide’ whether it is something embarrassing or just that they are simply unwilling to disclose intimate information about their personal lives. For example, an individual’s salary is typically a private matter and most people would not be very forthcoming with the details if asked about it from a stranger if it is not required. However, mass surveillance permits strangers to access personal data such as this and the ‘I have nothing to hide’ argument suggests that people should blindly let this happen if they are innocent of any wrong doing. In reaction to this argument, United States whistle-blower and former National Security Agency worker Edward Snowden...

Words: 1130 - Pages: 5

Free Essay

Cisco

...University of Houston Case Study of Cisco Systems, Inc. Nirav Sheth INTB 3354: Introduction of Global Business Professor Alana Aleman April 8, 2015 1. Introduction Leonard Bosack and Sandy Lerner, the married couple who met at Stanford University, founded Cisco in 1984 in San Francisco, California. During Cisco’s founding years at Stanford University, Leonard Bosack, Sandy Lerner, and a few others helped connect hundreds of computers throughout Stanford University on a wired network. They understood that they could take this technology and help other university and business, which helped Cisco grow into the $150 billion networking conglomerate it is today. Cisco multiprotocol router, Cisco’s first major product, was one of a kind package of a group of routers, switches, internetworking and other telecommunication devices that helps a group of computers multitask on a closed network. From here, Cisco’s management created a market where they could sell routers, switches, servers, data centers, and other telecommunication devices and software to help connect the world through electronic devices. Like many other technology companies, there were able to help bring this technology to the rest of the world because their hardware and software did not vary too much throughout different markets. They were able to become truly global and sell their products all over the world to enable billions of people enable them to connect into the digital world. (Boudreau) 2.......

Words: 1674 - Pages: 7

Premium Essay

Corporate Ethics and Government

...Corporate Ethics and Government assignment Name: Grade Course: Tutor’s Name: (16, April, 2012) Corporate Ethics and Government assignment Introduction In recent past, corporate ethics and governance has attracted a great deal of public interest due to its apparent importance in the economic health of corporations and society. In general, corporate ethics and governance include the relationship of the company to its shareholders as well as the society. It also includes promotion of fairness, transparency, accountability in references to the mechanism used in the governance so that the actions taken are consistent with the shareholders interest. Therefore, to ensure that corporate ethics and governance is properly addressed, issues of transparency, accountability, measures of risk management, proper information flow both vertical and horizontal should be properly addressed. This will help the companies to adopt the appropriate legal compliance mechanisms to ensure that ethics and conduct of issues are formally addressed. However, compliance of corporate ethics and governance do not come in handy. There are several issues hurdles that several companies and organizations have undergone in achieving these milestones. This has made this topic to be widely discussed especially in the media as will be demonstrated in the articles that will be discussed here after. Most of the newspapers have taken this issue with a lot of seriousness and dedicated their time to......

Words: 5001 - Pages: 21

Free Essay

Cyber Law

...FULL PAPER. AUTHOR’S NAME: NUPUR AGARWAL AFFILIATION: INSTITUTE OF LAW , NIRMA UNIVERSITY MAILING ADDRESS: 1 , RADHANPUR SOCIETY , BEHIND SWAMINARAYAN MANDIR , RAMBAUG , MANINAGAR , AHMEDABAD – 380008 PHONE NO: 09898839289 EMAIL-ID: nupuragarwal201995@yahoo.com CO-AUTHOR’S NAME: NUPUR JOSHI AFFILIATION: UNITED WORLD , SCHOOL OF LAW MAILING ADDRESS: 67, SWAGAT CITY , GANDHINAGAR – MEHSANA ROAD ADALAJ GANDHINAGAR PHONE NO: 9408968686 EMAIL-ID: nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation......

Words: 6245 - Pages: 25

Premium Essay

Airasia

...MBS Library Service Guide to citing references (Harvard system) John Hynes Feb 2010 MBS Library Service is part of the John Rylands University Library 1. 2. 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 INTRODUCTION………………………………………………………….. 3 CITING REFERENCES WITHIN THE TEXT…………………………… 3 Single author…………………………………………………………………………... 3 - 4 Two authors………………………………………………………………………………... 4 Multiple authors…………………………………………………………………………… 4 Authors of different titles………………………………………………………………... 5 Several works by single author (different years)…………………………………… 5 Several works by single author (different years)…………………………………… 5 Author of a chapter within an edited text…………………………………………….. 6 Corporate authors………………………………………………………………………… 6 No author…………………………………………………………………………………… 6 No date………………………………………………………………………………….. 6 - 7 Citing secondary sources……………………………………………………………….. 7 How to quote portions of a published text…………………………………………… 7 3. CREATING THE LIST OF REFERENCES & BIBLIOGRAPHY………….. 8 3.1 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 Introduction……………………………………………………………………………….. 8 Books (single author)……………………………………………………………………. 8 Books (2,3 or 4 authors)…………………………………………………………………. 9 Books (more than 4 authors)…………………………………………………………… 9 Books which are edited………………………………………………………………… 10 Chapter(s) from an edited book………………………………………………………. 10 Multiple works by single author within the same year…………………………… 11 Electronic......

Words: 3315 - Pages: 14

Premium Essay

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

...Cybersecurity Standards: A Case Study on Malaysian Banking Sector Anwer Yusoff Head, Industry & Business Department CyberSecurity Malaysia Sept 18th 2013 Copyright © 2013 CyberSecurity Malaysia Internet use in Malaysia 17 ,723,000 internet users Sources: Internet World Stats (30 June 2012) Copyright © 2013 CyberSecurity Malaysia 2 Internet use in Malaysia The highest usage was recorded among people aged 20-24. almost 6 in 10 (57%) regularly use the internet. Malaysian internet users (aged 20-24) spend an average of 22.3 hours online per week 87.9% of Malaysians on the internet access Facebook Once online, Malaysian’s Top 3 activities 1. social networking sites 2. instant messaging 3. reading local news Source: The Nielsen Company (April 2011) Copyright © 2013 CyberSecurity Malaysia 3 HIGH LEVEL USAGE = HIGH RISK Copyright © 2013 CyberSecurity Malaysia 4 HIGH LEVEL USAGE = HIGH RISK Cyber Security Incidents (1997-2013) Reported to Cyber999 Help Centre 16,000 15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion......

Words: 1957 - Pages: 8

Premium Essay

Establishing Security Risks and Countermeasures for Large Scale Businesses

...Establishing Security Risks and Countermeasures for Large Scale Businesses Stephen Yopp 23 May 2014 ISSC-361 American Military University Establishing risks and countermeasures can be a complex procedure, even more so when protecting hundreds of systems from internal and external threats. Many tools exist to assist in implementing and scaling security operations. There are many assets that represent risks to businesses ranging from information systems to the data which is stored on them and therefore almost as many existing threats (Smith, 2013). The National Institute of Standards and Technology (NIST) describes 11 types of assets; people, organizations, systems, software, databases, networks, services, data, computing devices, circuits, and websites (Halberdier, Waltermire, and Wunder, 2011). This list is more extensive than the categories discussed, for the sake of brevity, but it might be helpful to enterprise employees seeking to identify different assets. Hardware represents a large investment for businesses. Servers, network devices, cables, workstations, and mobile devices can cost enterprise businesses millions of dollars up front. Because information systems are such an integral part of modern business, companies cannot afford to be without access to file and print servers or internet access. This means that the loss of hardware would represent setbacks in productivity, potential negative impacts to the organization’s reputation, and necessary......

Words: 3285 - Pages: 14

Premium Essay

Moder Totalitarianism

...Modern Totalitarianism. In the 1940s through the 1960s, the world lived in a time of war. In September 1939 World War II broke out , and was followed by the Cold War of 1947 that lasted up until 1991. The historic wars of these times influenced literature and the writers of the time, as they shaped their novels and books around these events. Writers such as George Orwell and Kurt Vonnegut created novels of dystopian societies to alert nations that communism was not as great as it sounded. British writer George Orwell wrote the novel 1984 published by Harcourt Brace Jovanovich, Inc. in 1949. 1984 is a political novel written with the purpose of warning readers in the West of the dangers of totalitarian government. In 1949, the Cold War had not yet escalated, and many Americans supported communism as possible political systems for the west. Therefore, Orwell wrote his novel in order to expose the cruelty and oppression of communist countries. In his dystopian nation, Orwell gave a sneak peak of what a country could become if the people gave all the power to the government. In 1984, Orwell portrays the perfect totalitarian society in which the government monitors and controls every aspect of human life to the extent that having a disloyal thought is against the law. They do so with the use of technology such as tele screens and microphones across the city which allowed the government to monitor all the citizens almost all of the times. In order to keep the citizens of......

Words: 2560 - Pages: 11

Premium Essay

The "Protected Closure Act, 26 of 2000". (South African Content)

...Executive Summary Whistle blowing is when an employee raises a concern about wrongdoing or malpractice in the workplace that has a public interest aspect to it. Persons who act as whistle blowers are often subjected to retaliation by their employers. Therefore it became important to protect whistle blowers by introducing the Disclosure Protection Act (Act 26 of 2000). The purpose is to provide procedures and offer protection to employees against organisational detriment. Even though the Act intends to protect whistle blowers, the reporting rate has declined. Thus it is crucial to investigate the current procedures in order to provide recommendations to improve the Act, consequently curbing fraud and miscarriage of justice. Question 1 • How are informants being protected? As employers and employees consequently have to disclose criminal and unwanted conduct within the workplace, steps need to be instilled by employers to ensure that whistle blowers are protected from occupational detriment. This act attempt to prevent employers from treating disclosing employees with detriment such as disciplinary action, demotion, harassment, unwanted transfers, etc. • Who is being protected? Employees disclosing legitimate concerns about irregularities are being protected by the act. Those employees are to be protected from unwarranted conduct by their employers and cannot be discriminated against. They may not be victimised or penalised by their employer in any form for having......

Words: 3059 - Pages: 13