National Security/Computer Security Essay

1057 words - 5 pages

The government is using programs like Project Prism, which many have probably never heard of, in order to “protect” its national security. The program was created in 2007 by the Bush administration as a means to uphold national security against terroristic activities. The program uses social media as well as phone records in order to keep tabs on those they feel are involved in terroristic or criminal activity, but has since become a means for invading the privacy of innocent American citizens. This is the general idea shared by many citizens and a major topic in government debate, divided by those who feel that this is a breach of the constitution and is unjust and those who agree that it is a small breech, but a necessary one. After doing research online and reading articles by Brian Hammond it is very clear that this project set forth by the government is in fact in violation of the fourth amendment of the constitution, which in short guarantees the right to privacy for citizens who do not pose a threat to national security. Like every debate there exist two sides to argue, in this case the major argument is the good that comes of the prism project and programs similar to it.
These programs use many different resources in order to gather information on those they deemed to be a threat to national security, but in order to gain access to those who are in fact threats they must sift through data on all including those who are innocent. After reading multiple articles by Brian Hammond I learned of Project Prism and similar programs and gained some understanding on how they work. The government gains access to personal information through social media, online databases, and even cell phone records from service providers. Hammond points out Obama’s answers to questions about Project Prism where Obama says, “Now, with respect to the internet and e-mails, this does not apply to U.S. citizens, and it does not apply to people living in the United States.” Here Obama explains the program as it is supposed to be enforced, but unfortunately that did not seem to be the case as briefly touched based upon by Kim Dotcom, an online writer for the website www.theguardian.com, in his article “Prism: concerns over government tyranny are legitimate”.
The government has also been using the likes of social media in order to gain information on potential threats to national security, but this is not limited to just the actual threats. In order to find the threats data on everyone is looked through in order to find the potential terroristic activity. According to Joe Wolverton in his online article, “Social Spying”,
The Department of Homeland Security’s National Operations Center (NOC) released its Media Monitoring Initiative late last year, and in that report the intelligence-gathering arm of the DHS. the Office of Operations Coordination and Planning (OPS), gives itself permission to “gather, store, analyze, and disseminate” data on millions of users of social...

Find Another Essay On National Security/Computer Security

Computer Security Essay

3255 words - 13 pages Computer Security In the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what

computer security Essay

546 words - 2 pages Define computer security (2mks)Computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. The ability of a system to protect information and system resources with respect to confidentiality and integrityOutline the goals of computer security (5mks)- Confidentiality: verifying that information is private and therefore seen and accessed only by intended

Computer security

2637 words - 11 pages something that some may consider being something of the future and they may not come across it, this essay will show that it is already used within some aspects of work and various testing within other fields that are ongoing. Especially since the attack on the twin towers, information and identity are two fields in which the government feels should be protected to help in the fight against terrorism, "A computer based attack on the national

The National Security Agency

1687 words - 7 pages America’s international supremacy originates from the hard work of her agencies at home which provide a strong foundation for security and international diplomacy. One of these security agencies is the National Security Agency, or NSA. “By 2008, the NSA had become the largest, most costly, and most technologically sophisticated spy organization the world has ever known” (Bamford 1). The National Security Agency is a beneficial government program

Changes to National Security

1006 words - 5 pages National Security National Security was founded in 1952. On October 26, 2001 President George W. Bush signed the Patriot Act into U.S. law to protect its Americans by making sure Americas domestic and aerial terrorism was taken care of to ensure the protection of all U.S. citizens. After 9/11 the federal government decided that restrictions on the U.S. had gone too far, as a result of the terrorist attacks, the U.S. proved to be ill-prepared to

United States National Security

1784 words - 8 pages The United States has undoubtedly shaped its national security policies on issues presented in the global stage. Global factors are commonly examined to determine how U.S. national security policies are affected. By themselves, these factors are inadequate in explaining the direction that these multifaceted national security policies will take. Determining the direction of United States’ national security policies involves not only global

National Security Studies

2017 words - 8 pages ? AY 2011-2012 I Suspect My Government Will Not Do The Right Thing; I Hope They Protect Me. National Security Studies WILLIAM KURTZ DANIEL P CORBIN, NH-4, DEPARTMENT OF THE NAVY SEMINAR 13 KELLY MORRIS, PRIMARY FACULTY ADVISOR The Industrial College of the Armed

Khrushchev's National Security Failure

1388 words - 6 pages race. To deal with this scary time both leaders had to take action to keep their people safe, while maintaining peace. But to a leader of a country something more important than peace is the safety of the country. Khrushchev had to take actions to keep his country safe. Khrushchev did not succeed in strengthening national security because of one huge mistake he made with Cuba. The Soviet Union’s most important goal was national security. National

National Security Strategies

2308 words - 9 pages In terms of the national security strategies (NSS), one needs to comprehend the foreign policies of the United States. In understanding these foreign policies, one can learn how the U.S. asserts power. In essence, the foreign policies of each administration are integrated throughout the national security strategies. One should start with the presidential NSS of President Bush; then move down to the NSS of President Obama; and finally look at a

The National Security Scam

1457 words - 6 pages September 11th, 2001, arguably the most unforgettable day in modern history of the United States of America. It is a day that acts as a launch pad for the National Security Agency (NSA) and the plea for unlawful surveillance of Americans. The National Security Agency is understood to have the power to “global monitoring, collection, decoding, and analysis -- through clandestine means -- of information for foreign intelligence and

The National Security Agency

1486 words - 6 pages The National Security Agency was originated, as a unit to decipher code communications during World War I. It is an old and one of the largest US intelligence organization. It operates under the Department of Defense and reports to the Director of National Intelligence. Its responsibility is to guard the US Government Communication and Information system. It accomplishes its mission by bugging electronic systems, using subversive software for

Similar Essays

National Security Essay

1052 words - 4 pages The video is of President Bush when he is signing the Bill for the “Intelligence Reform and Terrorism Prevention Act” from the White House on the 17th of Dec, 2004. A key point that I took away from this video is with the Presidents opening statement, “In a few minutes, I will sign into law the most dramatic reform of our nation's intelligence capabilities since President Harry S. Truman signed the National Security Act of 1947. “ The reason

National Security Essay

1164 words - 5 pages opportunities to help fledgeling democracies take root. As well, we must be aware of the more nefarious motives of nations for whom state intervention is merely a thin veil for imperialistic ambitions. With this, we consider the recent events in Ukraine and its impact on our national security. Brief History of Ukraine An independent country embroiled in civil war, Ukraine fell prey to attack from Soviet forces in 1921. The acquisition of the

Computer Security Essay

1948 words - 8 pages information and create security plans that will meet this new challenge. Computer security controls work with a different set of variables than those used for mainframes and LANs. For example, control over program changes, data security, system documentation, backup, recovery plans, and system testing are inherent in most mainframe (LAN) environments. However, desktops, laptop, and handheld computer systems seldom have this protection. One of the most

Computer Security Essay

540 words - 2 pages NOT TOO INDEPTH BUT COVERS BASICS -The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer.Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer