This website uses cookies to ensure you have the best experience. Learn more

The National Security Agency And The Surveillance Scandal

1237 words - 5 pages

Introduction
In recent years the National Security Agency (NSA) has received extensive scrutiny as a result of their disclosed participation in nationwide surveillance programs that ultimately violates thousands of innocent American’s privacy rights. Only recently has the exposure been brought the forefront of media headlines, still the NSA privacy violations date back to the early 2000s when the domestic spying program known as the “President’s Surveillance Program,” was implemented by President George W. Bush shortly after the September 11th attacks in 2001. With the infiltration of several major telecommunication companies the NSA has been able to create a database of every call made ...view middle of the document...

Classified information continued to surface thanks to former CIA member turned whistleblower, Edward Snowden. Snowden exposed the NSA and other private organization for the mass collections of surveillance data and privacy violations taking place throughout the U.S. and other parts of the country.
The first program revealed was PRISM, which is a clandestine mass electronic surveillance data mining program. Launched in 2007 by the NSA, PRISM is a government code name for a data-collection effort known officially by the Signal Intelligence Activity Designator (SIGAD) US-984XN. The PRISM program collects stored internet communications made to internet companies such as Google, Yahoo, Bing, and others. The program operated under the premise of the Foreign Intelligence Surveillance Act (FISA) Amendment Act of 2008, which demanded that any data that match court-approved search terms be turned over. Documents indicate that PRISM is the number one source of raw intelligence used for NSA analytic reports, and it accounts for 91% of the NSA's Internet traffic acquired under FISA section 702 authority.
The NSA call database, also known as MAINWAY, is a collection of metadata for billions of phone calls and phone records made through the two largest phone carriers in the U.S., Verizon and AT&T. Though the MAINWAY was exposed in 2006 to the public, it was not until recently that, Boundless Informant, another component of the program was revealed in Snowden’s leaked documents. Boundless Informant is a data analysis and data visualization tool used by the NSA, which essentially counts metadata and is transmitted into a visual summary of the NSA’s world wide data collection activities.
The NSA was also harvesting millions of email and instant messaging contact lists, searching email content, tracking and mapping the location of cell phones, and undermining attempts at encryption via Bullrun, a highly classified decryption program. The agency also used cookies to highjack the same tools used by internet advertisers to pinpoint targets for government hacking and to bolster surveillance. The NSA was shown to be secretly tapping into Yahoo and Google data centers to collect information from hundreds of millions of account holders worldwide by tapping undersea cables using the MUSCULAR program, a jointly operated surveillance program by the NSA of the US and Britain’s GCHQ.
Taking it one step further, the documents reveal undeniable excessive use of power when it was disclosed that the NSA, CIA, and GCHQ spied on users of popular computer games such as World of Warcraft through the creation of make-believe characters, and their love interests that the employees of the NSA termed LOVEINT. Documents also show that the NSA was tracking online sexual activity of people, people they termed radicalizers in order to discredit them. The NSA also targeted oil...

Find Another Essay On The National Security Agency and The Surveillance Scandal

National Security Agency and Edward Snowden

1504 words - 6 pages other sorts of data is mined and collected by the government for years now. The first of the leaks happened in June 2013, almost a year ago now. Glenn Greenwald, a journalist for The Guardian, reports that the National Security Agency (NSA) has been collecting millions of Verizon customer’s phone records. This was permitted by a secret court order that allows the government unlimited authority to obtain communication for three months. The next day

National Security Agency, Privacy and Security for American Citizens

882 words - 4 pages Background The National Security Agency was established in 1952 from the National Security Council for the purposes of intercepting foreign radio communications (Howe, p 11). Since, the NSA has been one of the most secretive institutions within the intelligence community. However, recent events have focused on the NSA’s domestic surveillance, encouraging a debate between security and privacy. In 1978 the Foreign Intelligence Surveillance Act

Mass Surveillance and Its Role in Promoting National Security

1622 words - 7 pages surveillance initially arose in early 2013, when former CIA {Central Intelligence Agency} and NSA {National Security Agency} employee Edward Snowden “leaked information about the United States government’s highly classified mass surveillance programs” to journalists from several major publications, including the Washington Post and the Guardian (Edward Snowden). The result was an uproar of accusations aimed at the executive branch and the NSA, declaring

The National Security Scam

1457 words - 6 pages September 11th, 2001, arguably the most unforgettable day in modern history of the United States of America. It is a day that acts as a launch pad for the National Security Agency (NSA) and the plea for unlawful surveillance of Americans. The National Security Agency is understood to have the power to “global monitoring, collection, decoding, and analysis -- through clandestine means -- of information for foreign intelligence and

CyberSecurity and the Threat to National Security

1974 words - 8 pages rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomena, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national

The Catalysts and Images of Terrorism: National Security Threat

3468 words - 14 pages modern terrorism has learned their lessons from the past and has adapted their techniques in order to achieve their political agenda. Dr. Robert Brathwaite, asserts, “The U.S. National Security establishment currently views terrorism as the single biggest challenge the U.S. faces” (pg. 2). Most policy makers debate over the true definition of terrorism, but many agree on a narrow set of reasons why terrorism poses such a threat. First image

Video Surveillance and the Equipment

2414 words - 10 pages more memory and inputs. Now you know about the basic equipment required for a closed circuit television system, let’s discuss some of the features you might need for your business. Remote video surveillance systems can give your business an extra level of security. Many small businesses use their surveillance system for prosecution and investigation of the crime. The remote video surveillance systems will let you take a more active role in the

Tesco and the Horsemeat Scandal

1378 words - 6 pages of this essay revolves around Tesco’s issues with Corporate Social Responsibility (Hench forth know as CSR) as they didn’t hold themselves to the stakeholders and society in general. These issues with CSR can be explained through applying agency theory and various ethical theories. Furthermore the actions taken by Tesco will be examined; both how they handled the scandal and the repercussions for parties involved in the scandal. Finally the

Tesco and The Horsemeat Scandal

2155 words - 9 pages focal point of this essay revolves around Tesco’s issues with Corporate Social Responsibility (Hench forth know as CSR) as they didn’t hold themselves to the stakeholders and society in general. These issues with CSR can be explained through applying agency theory and various ethical theories. Furthermore the actions taken by Tesco will be examined; both how they handled the scandal and the repercussions for parties involved in the scandal

National Security vs. the Right to Privacy

3061 words - 12 pages "Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue

Role of the National Cyberspace for American National Security

3032 words - 12 pages , UBS, SHS, BAT, CMD, and PIF. So, it is in a computer user's best interests to not even open any e-mail from a unknown sender or an e-mail with a file attached with more than one extension.Cyber security should be a high priority to our countries national defense, but it continues to seem like the United States government is not doing all that it can do to improve amaerica's cyber security. Scot Peterson wrote an article for eWeek titled, "Wanted

Similar Essays

The National Security Agency Essay

1687 words - 7 pages . "Pre-1952 Historical Timeline." National Security Agency - NSA/CSS. National Security Agency, 21 Mar. 2012. Web. 01 Apr. 2014. S. J. Res. 23, 107th Cong. (2001) (enacted). Print. Shiffman, John, Kristina Cooke, Mark Hosenball, and Matthew Haldane. "Insight: FBI Relies on Secret U.S. Surveillance Law, Records Show." Ed. Warren Strobel and Martin Howell. Reuters. Reuters, 18 June 2013. Web. 6 Apr. 2014. Thiessen, Marc A. Courting Disaster: How the

The National Security Agency Essay

1486 words - 6 pages The National Security Agency was originated, as a unit to decipher code communications during World War I. It is an old and one of the largest US intelligence organization. It operates under the Department of Defense and reports to the Director of National Intelligence. Its responsibility is to guard the US Government Communication and Information system. It accomplishes its mission by bugging electronic systems, using subversive software for

The National Security Agency And Its Access To Private Information

2417 words - 10 pages By simply looking at a computer screen, it has the ability to track her people’s familial, political, professional, and religious associations. Does this statement sound like a line from a cheap science fiction book written by a paranoid author? Unfortunately, “it” already exists. This entity is the United States Government’s National Security Administration. (Rubenfeld) Through programs codenamed Prism (Edward Snowden), Dishfire, and Prefer

Is The National Security Agency Taking It Too Far?

1664 words - 7 pages group or inspired by (al-Qaida’s) ideology” and charged in the United States with an act of terrorism post-Sept. 11. NSA surveillance contributions to initial investigations, the report states, were minimal (Scuiletti). Reports by James Scuiletti from PBS.com state that very few of the NSA’s investigations led to capturing or stopping any terrorists or their attacks. A vast majority of the data the National Security Agency is collecting from United