Premium Essay

Nsa Surveillance Under Obama Administration

In:

Submitted By Isaacs88
Words 345
Pages 2
The former director of the US National Security Agency has indicated that surveillance programs have "expanded" under Barack Obama's time in office and said the spy agency has more powers now than when he was in command.

Michael Hayden, who served most of his tenure as NSA director under George W Bush, said there was "incredible continuity" between the two presidents.

Advertisement

Hayden's comments came as the debate around the extent of government surveillance in the US and the UK intensified on Sunday. In Washington, some US senators demanded more transparency from the Obama administration. Libertarian Republican Rand Paul said he wanted to mount a supreme court challenge.

The British foreign secretary, William Hague, announced he would make a statement to parliament on Monday after the Guardian revealed that UK intelligence agencies used the US Prism system to generate intelligence reports.

Hague said it was "fanciful" and "nonsense" to suggest that the British monitoring service, GCHQ, would work with an agency in another country to circumvent restrictions on surveillance in the UK.

Advertisement

The issue dominated the Sunday talk shows on both sides of the Atlantic. On CNN, senator Mark Udall, one of the prominent Senate critics of US government surveillance, called for amendments to the Patriot Act, the controversial law brought in after the 9/11 attacks, to rein in the NSA's powers. "I'm calling for reopening the Patriot Act," Udall said. "The fact that every call I make to my friends or family is noted, the length, the date, that concerns me."

Udall, who has been privy to classified briefings about NSA data collection programs, said it was unclear to him that the surveillance initiatives had disrupted terrorist plots, as the administration has claimed.

He called on Obama's administration to make more information about the programs

Similar Documents

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...

Words: 2180 - Pages: 9

Premium Essay

Edward Snowden: Hero Or Hero?

...Snowden studied computers during his two short stints at a community college in Maryland. Soon after, he began working for the National Security Administration (NSA) as a security guard and then secured a high paying IT position with the Central Intelligence Agency (CIA) as a federal contractor. Eventually he landed a job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...

Words: 2005 - Pages: 9

Free Essay

Who Is Edward Snowden?

...Who is Edward Snowden? Edward Snowden, 30, was a three-month employee of a government consulting firm Booz Allen Hamilton. At Booz Allen (he has since been terminated), he worked as a systems administrator at an NSA Threat Operations Center in Hawaii, one of several facilities detect threats against government computer systems. In other words, he was a low-level intelligence government contractor. Background: Edward Joseph Snowden was born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney. Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005. Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given...

Words: 1691 - Pages: 7

Premium Essay

Data Mning

...As the world’s largest non-alcoholic beverage company, Coca-Cola generates petabytes of data from various sources. Multi-channel retail data, customer profile data from loyalty programs, social media data, supply chain data, competitor data, sales and shipment data from bottling partners as well as transaction and merchandising data. Coca-cola collects vast amounts of data and they take a refreshing approach in exploiting that data and deriving value from it. Chief Big Data Insights Officer, Esat Sezer, explains that Coca-Cola takes a strategic approach instead of a tactical approach with big data. They use the vast amount of available data sets to change the way they approach IT. They have embraced big data technologies and as such were able to create a shared services centre for their financial transactional activities as well as an employee service centre for HR activities. They moved from a decentralized approach to a centralized approach, where the data is combined centrally and available via the shared platforms across the organization. In addition, Coca-Cola has almost 70 million Facebook followers and big data enables Coca-Cola to connect to these followers better and be able to grow the brand advocacy. Coca-Cola also leverages Point of Sales data from companies like Walmart (Walmart alone is responsible for $ 4 billion in Coca-Cola sales annually) to build customer profiles, create centralized iPad reporting across the company and enable Collaborative Planning, Forecasting...

Words: 2706 - Pages: 11

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program Eric D. Reeves ITT Tech Online MG517 – Ethical and Regulatory Environment Dr. Carrie A. O'Hare June 9, 2013 Abstract/Executive Summary The American people are reaping what they sow.  They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week.  It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and...

Words: 2521 - Pages: 11

Premium Essay

Snowden Research Paper

...discharged afterward and the only thing the army had to say about Snowden was that “He did not complete any training or receive any awards” (_) After Snowden was discharged he landed a job as a security guard at the national security agency (or better known as the NSA). He somehow moved from a security guard to an IT (information-technology) job at the NSA. As an IT, Snowden would go on to get a job with the CIA in Geneva and would later get land jobs with the companies Dell and Booze Allen Hamilton. With Dell, Snowden was eventually shipped off to Japan and worked as a subcontractor for the NSA and then moved to Hawaii where he worked for Booze Allen Hamilton, another subcontractor for the NSA. Three months into his job at Hawaii Snowden made the biggest decision of his entire life (biography). While working with the NSA at their office in Oaho, Hawaii, Snowden noticed the NSA spying on American citizens via phone calls, emails, and other forms of social media. Unable to handle what Snowden thought was morally wrong, he started copying top secret NSA documents while at work, building a dossier of practices that he thought were invasive on US citizens. Snowden acquired a vast array of damming documents on domestic surveillance practices, including such programs as “Prism” (). “Prism” is probably the biggest revelation about the government’s data collecting capabilities that has been leaked so far by Snowden via the Guardian. The guardian, which is where most of Snowmen’s documents...

Words: 703 - Pages: 3

Free Essay

33 Sumaries

...News! 1. 6/6/2013 Doug Gross. * Barack Obama believes that there should be internet access in all schools. He wants to provide funds to around 99% of public schools for them to be able to have internet, even in libraries. He says that he wants all American students to be connected online in five years. Usually, adults don’t go for this type of thing they want children to not be so ‘connected’ to the internet. They want kids to not spend so much time on computers, but he almost wants just that to happen. People are becoming way too dependent on computers and the internet, which even libraries are eventually only going to be used just for that. Although Obama is more so moderate, this idea is clearly making him to be a liberal. He wants the change and wants to continue to further the change on technology. 2. 6/8/2013 Maureen Dowd * In this article, she quotes the book 1984. She is talking about how Bush felt about 9/11 and some of the after effects. It turns out that, for seven years the N.S.A was taking information from our phone calls. This all started while Bush was president through a program called prism. Prism would let the F.B.I. and N.S.A. into many social media websites and was able to access all of our information. These people were trying to spot out terrorists, and will go to any means necessary. According to Obama, they necessarily can’t hear the conversations; they are just able to learn about who we call. They also are saying that they don’t...

Words: 4728 - Pages: 19

Premium Essay

Conflict

...from people thinking it is okay to bend rules because they may know a person or are afraid to take a stand and confront someone. What most do not realize is that the rules are there to protect everyone and that it needs everyone to work together to be more efficient. People believe that rules do not apply to everyone all the time that the status of which they have earned gives them the right to skip past certain obligations. The company that Brittney is employed by has gone a step further, we have been provided with badges to get into the main door once we are in there is a receptionist desk. The receptionist is very familiar with the employees and she never hesitates to ask someone to sign in and show proper id. Everything is under video surveillance even the parking lots. In our parking lots and garages there are security guards riding around as long as the building is open for business. For example working in the Little Clinic there are strict HIPPA guidelines so even though employees are in the building a badge will still need to be scanned in to access the department that Brittney works. In this day, technology has expanded there's not very many punch time clocks anymore most...

Words: 1135 - Pages: 5

Premium Essay

NSA Spying Research Paper

...planet. The means available to control people’s behavior using financial and digital surveillance manipulation did not exist. These methods are not future science tech - this is a technological reality. The technology exists, standards are being developed and some of this technology is already in use; the NSA monitors electronic communications in the U.S. and elsewhere. Manipulation has already occurred to people, corporations and governments that did not perform as certain members the of U.S. Government preferred. Businesses and...

Words: 1763 - Pages: 8

Free Essay

Cyber

...For many years, nation’s governments have been monitoring their citizens through the use of surveillance technologies. Initially, privacy concerns involving computer technology arose because citizens feared that a strong centralized government could easily collect and store data about them. For the last decade in the United States, the federal government drastically increased its ability to monitor its citizens due to both changes in its laws and due to advancements in surveillance technologies. Together, the unfolding revelations opened a window into the growth of government surveillance that began under the Bush administration after the terrorist attacks of Sept. 11, 2001, and has clearly been embraced and even expanded under the Obama administration. In 2007, the United States National Security Agency (NSA) even launched the PRISM program. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things. However, just because we are able to do something it is not always the best decision to do so. For instance, is it wise or even ethical for the government to use this level of surveillance on its citizens in its CHIAO 1 broad unrestricted searches for terrorists. Let examine the ethics governmental monitoring from the perspective of a variety of ethical models such...

Words: 1506 - Pages: 7

Premium Essay

The Pros And Cons Of Edward Snowden

...and hunted by the NSA for his “crimes”. The biggest issue Snowden faces as a hacktivist is the ability and permission of the content he produces. Yet his goals includepublicity and controversy to draw influence and power of the many who areliberated by the information he shares.Snowden is a symbol to the liberation of social media. He may not realize this due to how people question the validity and how beneficial social media is to our society. Previous to the creation of his Twitter account Snowden was unable to reach his followers on a 1st person basis.Many supporters even took it upon themselves to create support pages and websites to free and lift the censorship Snowden faced. Overnight Snowden's twitter page received 1.1 million followers. This enormous fluctuation of followers goes to show the significance and notoriety he possesses. For Snowden I believe social media is used not to reach his followers, but simply to inspire them through social satire and publicity. Hissocial media serves as a living testimony to the rights he advocates for onebeing limited by government control over Internet content. Snowden's twitter liberates and serves as an active force supporting and helping the hacktivist community.Recently a pardon for Snowden was filed and sent to President Obama. USA today writes “The White House has rejected a petition to pardon NSA whistleblower Edward Snowden, dubbing the former contractor’s revelations about the US government’s surveillance apparatusas “dangerous”...

Words: 938 - Pages: 4

Premium Essay

Information Security

...Security Issues in Legal Context Discussion 5.1: Privacy in the Workplace The Children's Online Privacy Protection Act, which went into effect date, April 21, 2000, affects U. S. commercial Web sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001...

Words: 2799 - Pages: 12

Premium Essay

History 105

...do the right thing and Syria, who is denying they did any wrong. The court of public opinion is still out to lunch. Eric Snowden is a 30 year old former US contractor who is accused of being a traitor. Eric worked as a temp through Booz Allen Hamilton consulting firm. During the 3 months of employment, he downloaded information regarding wiretapping of high profile citizens of other countries. Before this information leaked out, Eric worked in other facets of top secret Government Entities like the Central Intelligence Agency (CIA) and the National Security Agency (NSA). Eric’s supervisor at the CIA gave him a bad review and also passed on information that he was trying to seek information above his grade pay. The report also detailed the young man’s change in attitude and work habits (Brice, B. 2013). The red flags flew under the radar. The report costs him a job in Geneva so he moved on to the NSA as a contractor. During the 4 years of employment, he leaked thousands of documents to let the other countries know through media intervention what was going on. This snowball affect caused Eric to flee the country (Brice, 2013). Eric went to Hong Kong and reached out to several countries for Asylum. Eric continued to speak to the foreign press while threatening the US about what he would do unless they allowed him to leave. An international arrest warrant has been issued for Eric by the US. Eric went to Russia and was stuck in the airport for 3 weeks while the...

Words: 1725 - Pages: 7

Premium Essay

History 105

...do the right thing and Syria, who is denying they did any wrong. The court of public opinion is still out to lunch. Eric Snowden is a 30 year old former US contractor who is accused of being a traitor. Eric worked as a temp through Booz Allen Hamilton consulting firm. During the 3 months of employment, he downloaded information regarding wiretapping of high profile citizens of other countries. Before this information leaked out, Eric worked in other facets of top secret Government Entities like the Central Intelligence Agency (CIA) and the National Security Agency (NSA). Eric’s supervisor at the CIA gave him a bad review and also passed on information that he was trying to seek information above his grade pay. The report also detailed the young man’s change in attitude and work habits (Brice, B. 2013). The red flags flew under the radar. The report costs him a job in Geneva so he moved on to the NSA as a contractor. During the 4 years of employment, he leaked thousands of documents to let the other countries know through media intervention what was going on. This snowball affect caused Eric to flee the country (Brice, 2013). Eric went to Hong Kong and reached out to several countries for Asylum. Eric continued to speak to the foreign press while threatening the US about what he would do unless they allowed him to leave. An international arrest warrant has been issued for Eric by the US. Eric went to Russia and was stuck in the airport for 3 weeks while the...

Words: 1725 - Pages: 7

Free Essay

The Counter Intelligence Community: Adequate Efficiency Within Our Ranks

...The Counter Intelligence Community Adequate Efficiency within Our Ranks American Military University Rodolfo Ivan Bustamante Professor Holden, Richard February 26, 2013 Counterintelligence is adequate only to those not directly affected by its lack of efficiency. CI adequacy is difficult to measure and its very status seems to be politically protected in secrecy. The American people are allowed to view things from the outside and cannot accurately provide a direct measure nor possess the slightest understanding of what really goes on behind closed doors. Measuring adequacy and efficiency requires benchmarks and detail accounts of mission failure or success. Classified information cannot be utilized in the equation, but at least the definition of the words can provide a basic understanding and from there begin to analyze unclassified information on various cases. Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). In other words, it’s the ability to identify, assess, neutralize and exploit foreign intelligence out to cause harm to the United States of America and its citizens. Efficiency in general describes the extent to which time, effort or cost is well used for the intended task or purpose. It is often used with the specific purpose of relaying the capability of a specific application of effort to produce a specific outcome effectively with...

Words: 1735 - Pages: 7