Premium Essay

National Security Should Be More Important

In: Computers and Technology

Submitted By zixing
Words 1714
Pages 7
National Security Should Be More Important

Enemy of the state depicts an evil NSA team conducting illegal surveillance on a labor lawyer Robert, who was supposed to have a videotape of a politically motivated murder. Robert’s life was peaceful and happy until he suddenly met his college friend Zavitz in a shop, who passed the videotape secretly to him. Ever since that moment, Robert’s life was turned upside down. A special team in NSA soon discovered that he might have the videotape, and then the team raided his house and planted surveillance devices in order to find the videotape. His every movement was tracked and every word was tapped, which destroyed Robert’s life: he was fired from his work, his bank accounts were frozen, his wife threw him out of home since photos about his meeting former girlfriend were sent to his wife. After stumbling around for a bit trying to figure out what's happening to him, Robert turned to Brill for help, who turns out be an ex-NSA agent and who was responsible for inventing some of the surveillance devices. Together, they fought the NSA using the same techniques used against them, and finally Robert got rid of all his accusation and went back to his peaceful life again.

Although the plot of the movie might look like a little Hollywood style, the surveillance tools feathered in the movie, such as, phone wiretapping, Global Positioning System, voice and face recognition system, and some much advanced ones, are generally in use today. Apparently, the movie puts strong criticism on the abuse of such surveillance tools. It also warms us the potential threats to our privacy by unwarranted investigation under the disguise of national security purpose.

Actually, protecting national security and respecting individual’s privacy are two goals we all want to achieve today. However, since 9/11, the government implemented more tools to...

Similar Documents

Premium Essay

Compare and Contrast

...Approaches to Developing National Cybersecurity Strategies Steven Falzone University of Maryland University College CSIA 360 Introduction Why is it important that every nation has a cyber security strategies? The past decade multiple company national or international have faced cyber security threats. Either sensitive government information or individual’s information has been compromised. Cyber security issues have developed into a significant national level where now it requires government consideration. In this analysis we will compare Europe and the Commonwealth on how they approach the national and international cyber security strategies. Overview of national cyber security What is national cybersecurity? Well first cyber security is a body technologies, processes and practices designed to protect networks, computers, programs and data from being attacked, damaged and or unauthorized access (target, n.d.). Now in the bigger end nations are now in the need for cyber security. National cyber security is to protect publicly held information that can be personal or private, national security and more. There has been several attacks on public services that have compromised personal or private information. As technology rapidly changes, new vulnerabilities are being created. National cyber security also outlines visions and articulates priorities, principles and approaches to understanding and managing risks at the national level. Some cyber security strategies by......

Words: 2800 - Pages: 12

Premium Essay

Human Security

...United Nations Development Programme Human Development Report Office This note should be read in conjunction with the Regional/ National Human Development Report Toolkit. While the toolkit provides general guidance on preparing a Regional or National Human Development Report, this note gives specific suggestions on how to approach the concept of human security as a topic for such a report. Human Security A Thematic Guidance Note for Regional and National Human Development Report Teams BY OSCAR A. GÓMEZ AND DES GASPER Contents What is Human Security?............ 2 Getting Started...................................... 4 Selecting objectives and themes...... 4 The process.................................................... 6 Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way. This note explains how one might go about doing that. Human security relates to much more than security from violence and crime. A report team wanting to look at the security of people’s livelihoods (economic, food, environment or health security) might apply a human security approach. Human security can also be used to look into personal, community and political security. Indeed, human development reports from around the world have applied the approach in other innovative ways.......

Words: 7478 - Pages: 30

Free Essay

E-Security Review

...E-SECURITY REVIEW 2008 Submission from Microsoft Australia Introduction Microsoft Australia welcomes the opportunity to participate through this Submission in the Whole-of Government Review of E-Security. A periodic review of the E-Security framework, in light of the quickly evolving threat landscape, is both timely and appropriate. Over the last thirty years there have been dramatic advances in information technology - the development of the microprocessor, the rise of the personal computer, the emergence of the Internet - which have revolutionised the way information is created, stored, shared, and used. Today, powerful, affordable and diverse devices, together with expanding broadband networks, create a powerful opportunity for connectivity for individuals and communities. Over the past two decades, rapid advances in software, IT services, and communications have enabled many traditionally separate and disparate infrastructures and business operations to become more connected. Through this connectivity virtually every aspect of society has experienced a transformation. Businesses and governments have been able to manage and streamline their operations. Individuals have been offered ready access to multiple sources of information thereby expanding knowledge and choice. Across every field of endeavour – commercial, social, scientific and philanthropic – the power of information has been increased and the transaction costs of engagement have been lowered. Our broad reliance...

Words: 13936 - Pages: 56

Premium Essay

A Big Idea

...A BIG IDEA Over the past decade or more many governments, especially western governments, have taken steps to draw together a wide range of different functions, objectives and institutions under the concept of ‘national security’. This trend is driven by two simple ideas. First, countries and their citizens face many different types of security threats, and they all need to be taken seriously and given due attention and priority. Second, government has many different types of policy instruments that can be used to manage this range of security threats, and they can and should all be used in the most cost-effective combination to address the full range of security challenges. From these two ideas naturally springs a third: that governments should view the security threats they face, and the responses they make to them, holistically, and unite them under an overarching National Security Strategy. We might call these three ideas collectively ‘the idea of national security’. It is no coincidence that this idea emerged in the years after the Cold War. For forty years until 1989, one specific security issue—major war—was seen to have dominated threat perceptions, and one specific policy instrument—conventional armed forces and the intelligence apparatus that supported them—was seen to have dominated national policy priorities. As this era passed, it was natural that 2 political leaders, policymakers, analysts and voters would start to shift their attention to new threats and their......

Words: 1160 - Pages: 5

Premium Essay

Annotated Bibliography

...happening and evidence of the perpetrators posting comments online thru social media, the government should be focusing on applying laws requiring companies to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently a professor at John R. Miller School of Business......

Words: 1878 - Pages: 8

Premium Essay

Case Study

...Case Study 2: Information Security and the National Infrastructure Tamika C. McCray Professor Darrel Nerove SEC 310 – Homeland Security July 19, 2012 In reading the article, I gather that our country’s natural resources might be at very real danger due to cyber threats. I am once again surprised that there is no effective plan in place for protecting these very important resources. In any company that has something to lose, there should be appropriate security measures taken in accessing their company information. Along with those passwords, a level of security needs to be given to each individual with a password. Learning of the different security possibilities to protect our resources should be at the top of voter’s lists along with job security and a few other things this coming election. If we are easily hacked with simple things, more individual than world-wide, we should take heed when a security breech on a national level will affect millions. All possible threats should be taken seriously as with everything being wireless these days, there is more of a chance for hackers to find a way to get through the cracks. The fact that these industries rely heavily on information technology to conduct everyday service alone is a very real reason to be concerned. Being that there might be thousands of miles between employees, branches and facilities that operate in these areas, there is a great emphasis on telecommuting. When dealing with any type of outpost employment...

Words: 835 - Pages: 4

Premium Essay

Position Paper Summary

...in the context of information security Dear delegates, After reading your position papers, we made a summary as follows. Please read it and may it help you. Country Name Argentina Basic Position Argentina is focusing on cracking down the ill-using of ICTs. Past Actions Reached a ‘Tunisia commitment’ with many countries to make the commitment in advancing the development of information technology and accelerate the national exchange. Proposed Solutions (1) Introduce a law named" Information security law "to promote the protection of the domestic information security. (2) Call upon national institutions and social organizations to corporate to promote the maintenance of information security. (3) Call for regional organization to implement technology exchange. (1) Normalize laws and standards on cyber perpetration and ICT intelligence use and supply. (2) Promote a comprehensive collaboration framework based on critical regional cyber security organizations. (3) Elaborate common terms and definitions and exchange national views on the use of ICTs in conflict for the sake of confidence-building. Australia Australian government calls for international collaboration to cope with information perpetration and to establish constricting norms on the state use of ICT, relieving international instability and enhancing the freedom of information. Communication and cooperation among (1) Committed $125.8 million to cyber safety measures. (2) Cyber Security Strategy was ensued; (3)......

Words: 4012 - Pages: 17

Premium Essay

Justifying Military Intervention

...when, where and how the United States should exercise military force. Most people feel that military force may be used if a vital interest of the United States is threatened. “The difficulty lies in getting people to agree on what constitutes a vital national interest” (Military Intervention). In addition, there will be disagreements over the costs and benefits in intervening in a particular region and what type of military or political action should be carried out on the region. From a domestic perspective, almost every United States citizen would agree that an attack by a foreign country on the United States is a direct and serious threat to national security. In addition, if an organization or country attacked a nation which the United States has a security agreement with, a retaliation from the United States military and NATO would see no disagreements from Americans and the United States friends. Where disagreements can arise is when the situation does not pose an immediate threat to U.S. security but could imperil it in the future, such as when a region becomes unstable and the instability may lead to wider conflicts. Another area of debate emerges over issues of human rights and humanitarian efforts. The United States is the most powerful democratic nation on Earth. Does that mean we always have a vital interest in promoting human rights and democracy? Or, should we stay out of the affairs of other nations unless they threaten our national interests? Another issue......

Words: 2033 - Pages: 9

Free Essay

Information System Management

...they could deliver the information and service by IT solutions. When using the IT in a more efficient and coordinated way, government agencies could accomplish more on tighter budgets. Using cloud computing, the federal government not only reduced the costs, but also created its large data centers. Overall, cloud and mobile technologies help a lot to improve productivity and efficiency. Question 2. Why is security even more important for government agencies than businesses in the private sector? Actually, the government should defend the country and with it, its citizens and corporations. The government agencies may have access to information and data including businesses in the private sector, even individuals in order to protect the national security. The national security is related to everyone in the country. If the country is not safe, the citizens could not live easily either. As the importance of the national security, the government agencies’ servers are usually targets for terrorists and unfriendly foreign governments. So creating a secure system and developing policies and procedures to protect the nation’s IT infrastructure from cyber threats are challenging, however, also very necessary. To some extent, the security of government agencies is even more important than the security of businesses in the private sector. The government should deploy “improved technology to enable more rapid discovery of and response to threats to federal data, systems, and......

Words: 300 - Pages: 2

Premium Essay

Widgets International

...NETWORK SECURITY Introduction Network security is a major issue when developing a new computer system. A few of the issues that the new WInt must address are accidental disruptions to the system, loss or theft of sensitive data by employees, malicious attacks to system, and theft of intellectual property by employees (National Institute of Standards and Technology, 2014). The accidental disruption to systems are caused by employees who input mistakes or leave out important data during input; these mistakes and omissions are typically caused by data entry clerks that input a lot data every day or other system users who create and edit system data. WInt would need to implement applications that use quality control protocols, as well as requiring all users with system access to be trained to help reduce this type problems (National Institute of Standards and Technology, 2014). Loss or theft of sensitive data by employees can be described as computer crimes by people who have or get access to the system and steal or destroy sensitive information on the system. The majority of these crimes are committed by disgruntled, current employees, although some are committed by former employees who keep all their system log-in information, who use their access to commit fraud, theft or destruction of system data (National Institute of Standards and Technology, 2014). Malicious attacks to the system are caused by malicious software like viruses, worms,......

Words: 1907 - Pages: 8

Free Essay

Csec 620 Individual Assignment 1

...IA#1 Cybercrime Law, Regulation, Effects on Innovation John Doe CSEC 620 Section 9022 Note: This paper was submitted through originality check websites. Table of Contents 1. Introduction 3 2. Private Industry & Regulations 4 3. National Security Concerns 4 4. Methods 6 5. Impacts of Government Regulation 7 6. Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace......

Words: 2894 - Pages: 12

Free Essay

Paper

...foreign policy conducted during the Cold War, which is often described as passive and reactive. An assertive and multi-directional foreign policy was developed, and Turkey became much more active in its neighbourhood, establishing ties with the Caucasus and the Turkic Republics, participating in peacekeeping missions in the Balkans, promoting economic relations with Black Sea countries, increasing economic and political ties with the Middle East. However, a darker side of this activism in foreign policy was observed in the 1990s, when Ankara’s ready resort to the threat or the use of military force was particularly visible. Regular military incursions in Northern Iraq to crush PKK forces, threats against Syria, with troops amassed at the border in 1998, hard rhetoric during the Russian S-300 missiles crisis planned to be deployed in Cyprus in the same year are a few examples (Park 2005). In 1995, the Turkish Parliament announced that if Greece expanded its territorial waters from six to twelve miles, Turkey would go to war and war almost happened over islets in the Aegean Sea. In 1996, a former Turkish diplomat, Sukru Elekdag, published an article arguing that Turkey should be ready to fight two and a half wars (against Greece, Syria and the PKK) (Kirisci 2006). This primacy of security and the use of confrontational tools to solve foreign disputes seemed to have contributed to Turkey’s image as a “post- Cold War warrior (Kirisci 2006), a...

Words: 5433 - Pages: 22

Premium Essay

Information Security Policy in Malaysia.

...Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Should confidential information about a businesses customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information security has a......

Words: 6195 - Pages: 25

Premium Essay

Role of Intelligence in India’s Security

...RN KAO MEMORIAL LECTURE BY SHRI NARESH CHANDRA India’s Security Challenges in the next decade – Role of Intelligence I feel greatly honoured and privileged to have been asked to deliver the R. N. Kao Memorial Lecture this year. I believe, it is the sixth in the series started in 2007 by Shri Tharakan, the then Secretary, R&AW . It feels good to be following the five distinguished speakers who have delivered the lecture in previous years. Before this distinguished gathering, it is hardly necessary to enumerate the achievements of Shri Ramji Kao, one of the most celebrated civil servants of our time and the architect of our secret service. He was given charge of organizing the R&AW in September, 1968. Shri Kao had been associated with the creation of the Aviation Research Centre after 1962. He was able to set up and harness the capacities for both human and technical intelligence so successfully that within a period of less than three years, the Organisation was able to make a most valuable contribution to our triumph in the 1971 conflict. He is recognized as a father figure and role model for all officers, young and old, in the R&AW and the Directorate General of Security. As a person Shri Kao had an elegant and striking presence. He was measured and precise with his words yet had a keen sense of humour, an amazing human touch and a love for arts. A significant feature of Shri Kao’s vision for the R&AW was to lay strong emphasis on the quality of......

Words: 5434 - Pages: 22

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375