NSA Surveillance Report

Improved Essays
As a brief overview, the NSA surveillance program was a secret program, code-named PRISM, which allowed the agency to gain access to end-user information stored by big-name and popular internet and social media organizations, such as Microsoft, Apple, Skype, Google, Yahoo!, AOL and Facebook. PRISM tracks user “metadata” information of photos, content of e-mails, live chat, videos, and login alerts. This program was reported to have been authorized by President George W. Bush in 2007 along with other changes to the US surveillance rules. President Barack Obama renewed the edict during his term.
Rahul Sagar, assistant professor of politics at Princeton University, argues State secrecy is vital for national security, but it can also be used to

Related Documents

  • Improved Essays

    Article #1: Sinha, G. Alex. " NSA surveillance since 9/11 and the human right to privacy." Loyola Law ReviewWinter 2013: 861+. Academic OneFile. Web.…

    • 1103 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    After the terrible atrocities of 9/11, presidential power intensified. A month after 9/11, Bush created a secret program to gather foreign intelligence. This was named the President’s Surveillance Program (PSP). It gave the National Security Agency permission to monitor communications going in or out of the country. Under Congress’s Foreign Intelligence Surveillance Act (FISA), this program would have to require FISC order.…

    • 224 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    9/11 Ethical Dilemmas

    • 1132 Words
    • 5 Pages

    Ever since people became concerned about the amount of power given to the NSA, there were proposals to alter the bill to hold the government agency more accountable for their actions and place limits on who and what they can actually search, however the version passed by the House of Representatives left many of the more prominent issues unattended to. The current bill in place “requires the government to limit any requests for records to a ‘specific selection term’ but it defines ‘specific selection term’ broadly” (Sloan) This is one of the many loopholes placed in the bill allowing the government to search almost anything they want if they see the need without a warrant. “Credible evidence indicates that billions of everyday communication of ordinary Americans are swept up by government computers and run through a process that includes both data-mining and review of content.” (Cohn)…

    • 1132 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Since the horrific events of September 11 2001, the Congress has passed the Patriot Act and approved by the Senate and the House of Representatives. But on October 26, when the President Bush signed the Act, no House of Representatives or the Senate reports this. The extensive terrorist attack may be decreased, but the Patriot Act still have false charge and still be accused of dangerous rise of the government surveillance. It’s true that the Patriot Act has acted to violate privacy expectations and suspect regular Americans citizens. “It violates the privacy of millions of innocent people” (source 1).…

    • 338 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Foreign Intelligence Surveillance Court (FISC) was created by the United States Congress with the Passing of the Foreign Intelligence Surveillance Act(FISA) of 1978. The main purpose of the Foreign Intelligence Surveillance Court is to provide jurisdictive guidance of intelligence activities in a secure, classified setting. The Foreign Intelligence Surveillance Court is make of Federal judges that are selected by the United States Supreme Court Chief Justice. (Foreign Intelligence Surveillance Court, 2017). Oversight for the Foreign Intelligence Surveillance Court is provided by the Foreign Intelligence Surveillance Court of Review and above them the United States Supreme Court.…

    • 663 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    National Security Agency (NSA) can withdraw any information from the following list of the U.S. Service Providers; Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype YouTube and Apple. Everyone at least uses these two to ten times a day, especially teens who chain themselves to social media. The U.S. Service Provider, Microsoft, began collecting data for six years and when attackers in Congress found changes in the FISA Amendments Act, any lawmaker who knew about PRISM or NSA been obligated by promise to hold their tongue (Gellman, Poitras, @0143). Who in what mind would want to do that? No one wants to feel a cold breath against their skin that makes them shiver of fear from not being protected by people…

    • 122 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Covert Action Report

    • 673 Words
    • 3 Pages

    Going back to how realism relates to covert action, according to a chapter titled “Covert Action” from a book, Partly Cloudy, the more specified activities in covert actions are divided into three, as follows; “1) Political operations, primarily meaning propaganda and financial support of foreign political leaders, groups, and dissidents; 2) coups d’état; and 3) assassination.” For political operation, it is done during the case when a particular regime has rebel groups that desire a reform within the state. Overt action is always preferred, however, it is often impossible to be done. In this case, if a regime were coveted to change, the reformers would have to work in secret on a daily basis. If these reformers were to be backed by a sponsor from a foreign nation, these sponsors must also…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Edward snowden is a computer professional that is famously known for leaking information on the U.S. National Security Agency in 2013. Snowden said in an interview that “ The NSA has built an infrastructure that allows it to intercept almost everything that is uses telecommunications.”(www.cfr.org). This infrastructure collects data all around the United States. This is private information that is being collected without our consent or a warrant being present. The Obama Administration defended the surveillance program saying “ it 's legal, limited and effective with preventing terrorist acts” (www.cfr.org).…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Violation Of The NSA

    • 1435 Words
    • 6 Pages

    The National Security Agency (NSA) is an organization that is a part of the United States government that is responsible for the collection and processing of worldwide data records as well as global monitoring. According to an article from Electronic Frontier Foundation, the NSA is “responsible for collecting, processing, and disseminating intelligence information from foreign electronic signals for national foreign intelligence and counterintelligence purposes and to support military operations” (EFF). Incorporated in that professional and sophisticated definition, one of the rights that the administration owns is the right to view mobile phone data of those inhabiting the United States and globally across the world.…

    • 1435 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    In the hundred years since its entry into force, the Espionage Act of 1917 continues to raise debates about constitutionality and power of the government to limit speech. In answering my research questions, it revealed that defending free speech from the Espionage Act has led to scrutiny, defense, and interpretation beyond the original intent of the Act. The Supreme Court Cases outnumber, the Congressional amendments. Nevertheless, legal cases show the fight to protect the press and individuals First Amendment Rights. The evolution of judicial opinions shows the issue of separating political agenda from judicial interpretation.…

    • 328 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Influence Of Prism

    • 144 Words
    • 1 Pages

    Not only has PRISM affected privacy in the United States, the program has also helped British intelligence go around their own laws and receive their citizens’ online information. Due to the NSAs actions electronic security is becoming a worldwide…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The focus of my field research was to attempt to discover people’s opinions of the NSA mass data collection programs. There are various surveys showing opinions on the Internet, but none specifically focusing on the area where I lived. So, I decided to create my own survey. Based on the general topic, I decided that most people would have a negative opinion, as America was founded on principles of freedom from government intrusion. As for my choice of a survey, I decided on it because a survey provides a relatively large of information in a relatively short amount of time from a large population.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The Obama years have accelerated the use of these systems and brought forth the dilemma where people working for the government started to question the authority and rights of the government for the people. This increase in data collection and these programs has led to some agents from these programs to go out in public and release information. The most recent figure is known as Edward Snowden. Due to Snowden’s leaks and many others starting to pop up, it has brought forth political obligation into question. More people are becoming aware of the practices that are occurring and thanks to his attempts governments around the world have started to show more of the information that they are collecting and what they are doing with it.…

    • 2374 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    Not only is PRISM a controversial topic, but wiretapping has always been a fear of the American people, but why should the average person be scared if they are doing things right? The American people see this as the breach in their freedom of speech, but this is where the balance is needed; freedom of speech? Or public safety? All wiretapping is, is the United States Federal Government listening in on phone calls to ensure the safety of everyone in the country, and does not typically affect/effect the average American, but rather one who has had complaints or been doing suspicious activity in the eyes of the government. There are individuals who come to America to scope it out, and then call back home to tell them about where the best place to attack would be, and that is exactly why we have programs such as PRISM to ensure the safety of everyone in America and to take down the one’s trying to harm the country and those in it.…

    • 1889 Words
    • 8 Pages
    Great Essays