Premium Essay

The Importance Of NSA Spying

Submitted By
Words 529
Pages 3
Due to Government’s spying program, more secrets are being held from the citizens. The Government is spying on citizens only to protect them, but really it has not been doing any good to the citizens. And with the spying program that the Government has started, they have begun to overreach its powers and have not stop it.

With all, the technology that the Government has for spying the American community expects results, and they are not getting that from the Government. According to an article called the day we fight back, “I asked deputy general james cole how many criminal reasons have been filed as a result of this massive spying operation. His answer? maybe one. And he wasn’t even 100% sure of that.” The NSA has most technology today that most american citizens don't have. They have the government protecting them, but they still haven't captured multiple people, only one, but that is it. The police officer was not even sure if the NSA caught them or not. If the NSA is not producing the results they are over reaching their powers for no reason. If the NSA continues to do spy on the citizens,and not produce results the NSA will be shut down. …show more content…
In an article called Secret Lies and American Spies, “The administrator’s immediate response to the PRISM revelation was that Americans have nothing to fear; it touched only foreigners. That adds insult to injury in countries that count themselves as close American allies.” If the government does not stop the NSA from spying on other countries they will lose the friendships they have with other countries. If any American citizen were to go in Paris, there would be much tough immigration because they do nut trust America, because the NSA was spying on them.These points may be correct, but there are reasons why there is a

Similar Documents

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program The Foreign Intelligence Surveillance Act (FISA) was created in 1978 as a response to past presidential abuses of massive domestic wiretapping and surveillance that were conducted by the National Security Agency (NSA) on many innocent Americans. FISA was designated to limit warrantless foreign intelligence surveillance for national security purposes and to issue the extent to which NSA could seize domestic communications. An executive power would need a warrant approved by FISA and only for the cases where the sole intention for the surveillance was to obtain foreign intelligence information (Skalski 15). Things changed shortly after the September 11 terrorist attacks in 2001 when President Bush secretly gave authorization to the NSA to wiretap Americans on the US soil without a warrant from FISA. By the same year, the Bush Administration passed the Patriotic Act that enabled FBI to demand the sharing of “any tangible things sought relevant to an authorized investigation” (Barnett 4), including strictly domestic records. Also, three days after the terrorist attacks, the Congress passed AUMF (Authorization for Use of Military Force) Act that was a necessity, but it was wrongly used by the Bush Administration as the reason of permission for the massive spying program. Because of the secrecy of these surveillance transmissions, the American public had no idea of the existence of these...

Words: 2180 - Pages: 9

Premium Essay

Rainforest

...and provide an insightful response to each question writing no more than two paragraphs. 3. An example of an excellent response is given for you. | Save and Submit to Dropbox | 1. Save your work as a Microsoft Word 2010 (.docx) file that includes your name, course code, and title in the file name. For example: JaneSmith_MAN1030_Week2.docx. 2. To submit your assignment, go to the Dropbox and click "Submit Assignment." 3. Click on the drop-down menu to select the Week 2: Individual Work basket in the Dropbox. | Objective:Describe the importance of business ethics and social responsibility. EXAMPLE:Find a current article about ethics in business. After reading the article, write a response in which you summarize the article and, in your own words, assess the article. | Example answer:I found an article discussing NSA spying on Verizon, and whether it was ethical for Verizon to disclose that it was providing NSA with all phone records. If the government requests data, I believe that Verizon should be more transparent. Their contracts say they will not disclose your phone records unless subpoenaed and they did. However, I believe that any use of our private phone calls should be communicated to us. Verizon is obligated to protect their customers’ privacy. However, they must also comply with the law. | Example a.: What references, if any, were used to assist you in answering the question? |...

Words: 532 - Pages: 3

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Premium Essay

Edward Snowden Propaganda

...The story of Edward Snowden is perhaps the biggest and most famous intelligence breach in United States history. The 29-year-old computer programmer who made headlines in 2013 was working for the National Security Agency through subcontractor Booz Allen in the NSA’s office in Oahu, Hawaii when he became disturbed and uncomfortable with some of the NSA’s data. He began collecting top-secret documents regarding NSA domestic surveillance practices. These documents confirmed unsettling spy activity against American citizens. The story of how Snowden fled the U.S. and leaked the documents to the press is shocking and exciting, like something only seen in movies. After watching a Frontline report on the story, a TED Talk with one of the reporters...

Words: 1117 - Pages: 5

Free Essay

Global Economics and the Impact of Whistleblowing

...Table of Contents ESSAY Introduction The importance and understanding of whistleblowing The notion of whistleblowing Whistleblowing – an act of good will Whistleblowing – an act of revenge The role of the government Government whistleblowing How Snowden formed society Introduction Whistleblowing, an act of certain controversy, has provided material for many a discussion. It has filled our newspapers, televisions and radios on a daily basis, since Wikileaks went public with its first act of exposing illegal activity. ‘Whistleblowing’ is a dynamic process involving at least three social actors; the wrongdoer, the whistleblower and the recipient, each of whom takes actions in response to the other’ (Near et al., p 509, 1996), while accepting the associated dangers and risks. Current events relating to Edward Snowden, Julian Assange and Bradley Manning have sparked intense debate throughout the world regarding policy changes, creation of new laws and the conduct of government and corporations. It is widely agreed that whistleblowing exists and happens on a daily basis. Scholars have examined the topic over the years narrowing it down to ethnical divergences or even to how the act of wrongdoing can impact a whistleblower. The importance and understanding of whistleblowing Age has a significant impact on the way an individual perceives...

Words: 3369 - Pages: 14

Free Essay

Nsa Spy Programs

...Since the invention of radio, intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy. Overview of Echelon Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows. How it Works Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA...

Words: 5284 - Pages: 22

Premium Essay

Hell

...The Issues of National Importance Based on Current Events 1. Nature And Animal Conservation Preserving species and their habitats is important for ecosystems to self-sustain themselves. Yet, the pressures to destroy habitat for logging, illegal hunting, and other challenges are making conservation a struggle. 2. Tobacco It is well know that tobacco smoking kills millions. But it also exacerbates poverty, contributes to world hunger by diverting prime land away from food production, damages the environment and reduces economic productivity. Second hand smoking also affects other people’s lives. Despite many attempts to prevent it, a global tobacco control treaty became international law in 2005. However, challenges still remain as tobacco companies try to hit back, for example, by targeting developing nations, increasing advertising at children and women, attempting to undermine global treaties and influence trade talks, etc. 3. COP19—Warsaw Climate Conference Posted Monday, December 02, 2013. An overview of the Climate Change Conference (also known as COP 19), held in Warsaw, Poland in November 2013. Predictably and sadly, the same issues have resurfaced: West stalling on doing anything, lack of funding, disagreement on priorities, etc. Climate Change And Global Warming Introduction Last updated Monday, November 11, 2013. The climate is changing. The earth is warming up, and there is now overwhelming scientific consensus that it is happening, and...

Words: 2601 - Pages: 11

Premium Essay

Essay On Fourth Amendment

...So, as the government maneuvers on how it is collecting information and interfering into someone’s privacy for the sake of protecting national security, we must take into consideration the individuals rights afforded under the constitution. Accordingly, the Supreme Court has established certain laws (Communications Act of 1934 and Electronic Communications Privacy Act of 1986) that provide protection from electronic surveillance. (Michael F. Dowley) Also, “Congress enacted FISA in 1978 after revelations of widespread spying on Americans by federal law-enforcement and intelligence agencies - including NSA.” (Avery) We can all agree that the government is mandated by the constitution to protect its citizens, but in order to provide that protection, we should consider that some rights, in certain situations and with the proper justification might infringed upon their right to privacy. So, that the government may act on situations that pose a significant threat to our way of life, and therefore providing the mandated protection we ask of our...

Words: 1064 - Pages: 5

Free Essay

Argument Essay

...with the help of former central intelligence agency employee, Edward Snowden. The article is a clear example of how a writer demonstrates the skill of risk taking. Greenwald took three main risks which includes the possibility of losing his life for reporting such sensitive information as well as not being allowed to enter the country and that his American passport would be cancelled to losing his job and receive criticism. The approach that Greenwald and his team took by secretly interviewing Snowden to publishing the article is a whole process of taking risks and being able to broadcast the truth to the public. The article “Edward Snowden: the whistleblower behind the NSA surveillance revelations” written and researched by Glenn Greenwald and his team.The article discusses the issue of the American government spying on their own citizens to sharing intelligence with Britain’s Government Communications Headquarters. Through interviewing Edward Snowden, a former central intelligence agency, the team has been able to gather detail information such as the core program of the national security agency called “Prism” which is similar to a database in which the government has access to very private information of a normal person around the world as long as they use the networks that participates in the program.Once the article was...

Words: 1933 - Pages: 8

Premium Essay

The Circle by Dave Eggers

...Cristal Zeas Professor Rogoff FYE 1320 April 1, 2014 Sharing is Caring In present day society, individuals dedicate their time to social media on the internet and electronics, towards updating statuses, rebloging pictures, favoriting videos, reading up on current events, and staying connected in general. It’s only been 25 years since Tim Burners-Lee invented the world wide web and it’s no secret that it is one of the most progressive and influential invention of our time. Dave Eggers, in his current book The Circle, foretells his version of what can happen with the growth of technology and social media and pushes our current standard of being virtually connected from the main social networks Facebook, Twitter, Google, and Tumblr. In this book, focusing on the ninth threshold of social networks and the technological self, we notice the influence of technology on societal construction and deconstruction of privacy and the nature of democracy impacting humanity’s digital life. Set in an undefined future time, Eggers’s novel tells the story of Mae Holland, a young idealist who comes to work at the Circle, an immensely powerful technology company that has conquered all its competitors by creating a single log-in for people to search, shop and socialize online. The company demands transparency in all things; two if its many slogans are “secrets are lies and privacy is theft.” Anonymity is banished; everyone’s past is revealed; everyone’s present may be broadcast live in video...

Words: 2335 - Pages: 10

Free Essay

Cyber Law

...FULL PAPER. AUTHOR’S NAME: NUPUR AGARWAL AFFILIATION: INSTITUTE OF LAW , NIRMA UNIVERSITY MAILING ADDRESS: 1 , RADHANPUR SOCIETY , BEHIND SWAMINARAYAN MANDIR , RAMBAUG , MANINAGAR , AHMEDABAD – 380008 PHONE NO: 09898839289 EMAIL-ID: nupuragarwal201995@yahoo.com CO-AUTHOR’S NAME: NUPUR JOSHI AFFILIATION: UNITED WORLD , SCHOOL OF LAW MAILING ADDRESS: 67, SWAGAT CITY , GANDHINAGAR – MEHSANA ROAD ADALAJ GANDHINAGAR PHONE NO: 9408968686 EMAIL-ID: nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and...

Words: 6245 - Pages: 25

Premium Essay

Wach List

...Mid-Term Individual Assignment   1. Information systems are too important to be left to computer specialists. Do you agree? Why or why not? 2. Adopting an enterprise application is a key business decision as well as a technology decision. Do you agree? Why or why not? Who should make this decision? 3. It has been said that the advantage that leading-edge retailers such as Dell and Wal-Mart have over their competition isn’t technology; it’s their management. Do you agree? Why or why not?   4. Should producers of software-based services, such as ATMs, be held liable for economic injuries suffered when their systems fail?   5. Why is selecting computer hardware and software for the organization an important business decision? What management, organization, and technology issues should be considered when selecting computer hardware and software?   6. To what extent should end users be involved in the selection of a database management system and database design? MID-TERM GROUP PROJECT - Dropbox   In groups of 3 or 4 (groups of 5 for this Session), complete the case analysis outlined below. Week 4  Midterm Group Project     Business Problem-Solving Case: Trouble with the Terrorist Watch List Database   This is a group project and only one group paper will be accepted for the team.   Read the case study for chapter 6 (pages 241 -244).  Complete a 5 to 8 page paper addressing each of the five case study questions listed below. State the question then the answer...

Words: 6259 - Pages: 26

Premium Essay

Cellular Effects

...Cellular Technology and Society Today , Political & Economic ., Health, Psychological & Sociological , Cellular Technology & History , Moral & Sociological DeVry University LAS432 Society, Ethics, and Technology   Abstract The following paper will discuss the psychological and sociological impact of cellular technology. Cellular technology has seen rapid growth in technology and in personal use. Texting has now become the dominant means of communication and actual conversation skills are diminishing. Exposure to electromagnetic radiation emitted from cellular devices has become a concern and is being studied from many various angles to determine actual health risks from cell phone use. Whether it is for personal or business use, the cell phone has become a permanent fixture in our lives, could have potential health risks, and can become an addiction if necessary steps are not taken to control use and dependency.   Cellular Technology and Society Today At any store they are visible. They have their hand plastered to their ear or they are seemingly talking to no one. These are the cellphone users. Hayley Tsukayama, a writer for the Washington post asserts that according to the Pew Internet and Life Project only seventeen percent of Americans still have a land line and ninety percent own a cellphone. (Tsukayama, 2014) The largest contributor to this trend is convenience. Most cellular devices are small and easily portable, allowing the user to move around freely...

Words: 19048 - Pages: 77

Free Essay

Is Aanteken

...International Security Lecture 1 March 30th, 2015 The politics of security knowledge What is international security? We could start thinking about the security council of the UN But also about the invasion of Afghanistan (chapter 7 UN in order to secure the international security) We can also think about security in terms of the invasion of Iraq in 2003. This was a unilateral act of war, but sure it can also mean other things We can think of the national security agency, the agency in charge of spying all the signals and communications to a certain extent. What’s interesting about the NSA, it is seen as a threat to the security of the privacy. Lately, with the reports of the UN development programme, we start talking about HUMAN security (not military security, but rather the security of individuals, having a livelihood that’s acceptable). Whether security is international or not, it can be a rather confusing word The protection of values we hold dear. We search for it, we pursue it, we achieve it, we deny it to others. * what is to be secured? Is it the security of states? Or individuals? * What is the actual threat that we’re facing? Primarily to be dealing with military threats, or are there other types of threats we are facing. Essentially contested concept A concept that ‘inevitably’ involves endless disputes about their proper uses on the part of their users – Walter Gallie There can be ambiguity (one persons freedom-fighter is the other’s...

Words: 16869 - Pages: 68

Free Essay

Google China

...China, Multinational Corporations, and Internet Privacy Issues: An Incoherent Landscape Lysette Kent China, Multinational Corporations, and Internet Privacy Issues, Lysette Kent 49 Abstract In the mid 2000s, staff at the Chinese division of Yahoo! sent information on one of its users, Shi Tao, to the Chinese government. The journalist had been critical of the Chinese government, and, based on the information sent to the government, Shi Tao was sentenced to ten years in prison. In 2010, e-mail accounts housed by Google were hacked. Many of these accounts belonged to human rights activists. Issues like these pose a conundrum for the United States and international entities that are looking to prevent human rights abuses, including violations of privacy, in countries such as China. This paper will evaluate current and proposed efforts to curb such actions by the Chinese government. I propose the following three-pronged approach to deal with these actions: 1) a vigorous naming, blaming, and shaming campaign; 2) the adoption of a uniform policy by the United States government for addressing the Chinese government on these issues; and 3) the development of coherent, enforceable, and specific codes of conduct by trade associations and business groups that discuss issues of censorship and privacy regarding the internet, their customers, and foreign governments. 50 The Public Purpose Statement of the Problem In the mid-2000s, staff at the Chinese branch of Yahoo! sent...

Words: 8823 - Pages: 36