Sunday, May 24, 2020

The Nsa s Prism Program Information Without Public Knowledge

The question of whether the government has a right to access unlimited amounts of information without public knowledge, has been a popular topic of debate among not only our nation, but others as well. This all started when Edward Snowden, a former National Security Agency (NSA) surveillance analyst, told the world that the NSA had a program that was using the servers of U.S internet companies to gather information. Snowden leaked a document, detailing his findings about the NSA’s PRISM program retrieving information from prominent tech companies. (â€Å"What is the NSA Controversy and what did Edward Snowden leak?†) PRISM or Planning Tool for Resource Integration, Synchronization, and Management, is a government program which collects data from U.S. phone call records to search for possible links to terrorists abroad, and works on surveillance of online communications to and from foreign targets to detect suspicious behavior. (â€Å"What is the NSA Controversy†¦Ã ¢â‚¬ ) Many people were outraged with the government for keeping this a secret, while others thought that this technology could be useful. Regardless, mass surveillance is a problem in our society because it is a clear invasion of privacy, and it can be very dangerous if abused. Even though it may be for the best interest of our country, the invasion of personal privacy is borderline on infringing the right to free speech and privacy. Edward Snowden, 30, was a three-month employee of a government consulting firm Booz AllenShow MoreRelatedThe Ethics Of The Nsa863 Words   |  4 PagesSnowden worked for the NSA through subcontractor Booz Allen Hamilton as a senior analyst, and during his time with the organization, he collected top-secret documents regarding NSA’s surveillance practices with the intention of disclosing them to the public. He then went to Hong Kong and disclosed those documents to the Guardian journalists. Soon after, newspapers began printing those documents detailing the widespread surveillance activities of the NSA through programs such as PRISM. It can be said thatRead MoreDomestic Surveillance During The United States1474 Words   |  6 Pageshas been going on for decades without the public s knowledge. Domestic Surveillance didn t seem important in the eye of the American government. After the September attacks (9/11) congress started to treat Domestic Surveillance as a number one prio rity. After September 11th Congress passed a law to use military force for those responsible for the attacks in New York, NY. The go ahead with using military force did not give the President to use surveillance without a warrant. Congress started toRead MoreFacebook : A Social Media Company Essay2268 Words   |  10 Pagesrevenue of 17,928 million (NASDAQ). Through these platforms a user is able to upload photos, videos, and message other users. Information including photos and videos from Instagram and WhatsApp are connected to an individual’s Facebook account. Facebook differentiates itself from the other two platforms by allowing a user to add information to their profile. This information includes: name, gender, birth date, email address, hometown, education, hobbies, interests, relationship status, sexual orientationRead MoreDigital Privacy Concerns Essay1565 Words   |  7 Pagesrights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving the mass data stockpiles and the rights of foreigners against immoderate and disproportionate surveillance by the US. Furthermore, the intentions of the NSA still remain unclear; why is theRead MoreCybercrime And The World Of Cybercrime Essay1742 Words   |  7 Pageshave a sense of security and keep their most sensitive information private which would mean making computers more secure and teaching people about the basics of online safety. There have been many innovations in cybersecurity to better protect people’s information by encryption. Encryption is the process of encoding information in such a way that only the authorized user can decode it via a password. The newest computers can process information significantly faster, meaning that using the c orrect software;Read MoreThe Nsa s National Security Agency2363 Words   |  10 PagesThe National Security Agency’s (NSA) warrantless collection of metadata has been questioned on constitutional grounds. Specifically, the NSA’s program has been argued to be in violation of the Fourth Amendment of the Constitution, which states that all citizens are to be free from any unreasonable search or seizure. Proponents of the NSA’s collection of metadata believe that it is a crucial tool in preventing terrorist attacks, while opponents of the program believe that its questionable constitutionalRead MoreGovernment Surveillance5539 Words   |  23 Pagessurveillance has prevailed by the name of security. But, is government surveillance of internet digital communications like social networks, cell phone calls, text messages, and emails really a public service of security? Or is it simply a form of short-term security with long-term dangerous effects to the freedom of the public? How much are we willing to give up in the name of so called security? I believe that the issue of government surveillance of the internet and digital devices is a very important andRead MoreWeb Traffic And The Individual s Footprint Online959 Words   |  4 Pagesthey are unfounded and must be balanced against the very real need to combat terrorism. Web traffic and the individual’s footprint online are inarguably public knowledge, if one simply knows how to look. Much like a person can be observed leaving their home and visiting a public establishment, so too can their online traffic be observed without invasive measures that one might consider an unreasonable breach of any private thought or space. In the case of the San Bernardino shooting late last yearRead More Whistleblowers: Are They Heroes or Traitors? Essay1524 Words   |  7 Pages Imagine a world without leadership, without risk-takers. The buildup for security would create a facade of a dystopian society with false freedom. The need for people to speak up is vital for a diverse, functioning environment. Whistle blowers are just the people who will expose the flaws, give the knowledge, empower the people, and count on them to make collective decisions on how to deal with these issues. Whistleblowers are intriguing. They grip the crowd’s attention throughRead MoreInformation Systems : Computer Ethics1525 Words   |  7 PagesBIS- 601 INFORMATION SYSTEMS COMPUTER ETHICS Submitted by Lakshmi Gajjarapu Student id: 665584 Global Id: gajja1l Email:gajja1l@cmich.edu INTRODUCTION: As the use of Computers have increased now-a-days with improvements in the technology which brings both advantages and disadvantages. Advantages comes with technological developments and disadvantages are like frauds happening using technology. These frauds using technology are called â€Å"Cyber-attacks† where intruders or hackers

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.