Instead, significant adjustments often result from some type of external disruption—a tragedy, catastrophic event or scandal that exposes the imperfections of the status quo. For example, World War II gave rise to the CIA with the creation of the National Security Act of 1947, the fall of the Soviet…
for up to 30 years in prison by the federal prosecutors in Virginia. He is on the run from the American authorities, and the White house spokesman, Jay Carney said, “he is not a human rights activist. He is not a dissident” (Herzenhorn, 2013). The National Secret Administration also claims that their programs are constitutional and that their aim is to protect the public from terrorist attacks (Macaskill & Dance, 2013). Meaning that Edward Snowden should be seen as a criminal, a spy, that has…
While Edward Snowden was working for the NSA under a subcontractor, he noticed many questionable and disturbing methods used by the government to spy on and collect data from its citizens. He decided to collect as many incriminating documents as possible, leak them to the press while in China. During his stay in China, newspapers like the UK’s Guardian, and the Washington Times, released the documents leaked that showed the NSA’s real time information collection system from American citizens via…
their boundaries. The Patriot Act is an act that was created by Congress. It was signed into law by former President George W. Bush on October 26th, 2001. The overall goal of The Patriot Act was to strengthen the powers of higher law enforcement agencies to combat terrorism.…
Force 2025 given the current strategic direction and global security environment to ensure Freedom of Maneuver (FOM) in the global commons and dominance within the cyber and space domains. Enhanced capabilities to protect cyber and space domains and synchronized partnered alliances are required to counter threats to these domains. This rebalancing is warranted to maintain a level of readiness that meets the needs of the National Security Strategy (NSS). By addressing key capabilities in each…
Does national security override free speech? In the case of Snowden, Manning and Assange, they each leaked classified documents to the public under the name of free speech. Is this actually classified as free speech? According to J.S Mills, if it doesn’t cause physical harm to a populace, then it is classified as ‘free speech’ and so the leakage of government documents is allowed in accordance to Mills’ theory on free speech. Mills does not include psychological harm to anyone in his definition…
our society? That is what I wanted to find out in my second Media Search. Having already researched current technology like license plate readers, I wanted to look at the new and developing uses of digital technology. Using government sources and national surveys, I began to get a better…
Austin, Texas-based online reputation management firm Status Labs, is recognized, as the preeminent firm, for restoring damaged reputations. A recent incident involving a former employee snowballed into a national story and threatened to tarnish Status Labs, own stellar, online reputation. Recognized as the leader in reshaping online image and reputation, Status Labs now found itself as its own client. Critics scoff at image and reputation management, citing it as a ploy to hide or conceal…
world. As an effort to unite the world as a whole, countries share economical, geographical, cultural, political, and social borders. However, this attempt of uniting the world also creates a major global issue over national security around the globe. To maintain the national security, countries have to take a local and global measure. A local measure would be amongst the country itself to protect themselves; however, for a global effort, countries must create alliances with other countries for…
information, knowledge, and, most importantly, security. Security has been defined in primarily militaristic terms by the prominent realist theorists of the past. However, the issue of cyber security must be considered to fully understand the contemporary era of security. Furthermore, there is a distinct gender gap in the field of cyber security, which is relevant in the context of standpoint feminism, constructivism, realism. First of all, the security of states is usually thought to be…