Cyber Security and Surveillance: Bulk Data and Metdata

848 Words2 Pages

Subject: Cyber Security and Surveillance: Bulk Data/Metadata
Summary:
The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat to the nation. This collection of mass data without issued warrants violates the Fourth Amendment and brings the potential abuses with this program into view. Not to mention possible cyber security threats: if a subcontractor was able to commandeer this information and leak it, what is stopping hackers from doing the same, or worse.
One of the factors at stake is the perception of the United States government to both the national and international community. The U.S. is typically seen as the “land of the free” but these leaks suggest otherwise and create distrust with the government. Also, the information collected is only as secure as the program designed; meaning, where will this data go and who is able to access it. The administration should consider addressing these issues quickly to prevent cyber security concerns, at the very least, from escalating.
The main focus should be on how to proceed and move forward in terms of the NSA data collection program. There are three options: 1) Authorize or renew the current program; 2) Transfer the data to a phone company or third party within legal constraints; 3) End the program completely.

Background:
The events of 9/11 brought out the issue of attack prevention and the transformation of America’s intelligence community. These technology adva...

... middle of paper ...

...nt: the U.S. still has enemies and threats, so how could the intelligence agencies go about in confronting them? Attacks or cyber threats cannot be prevented without some capabilities to pierce communication.
There could be public discussion about the balance between security and liberty to allow for a potentially better public understanding. A new and/or different program could be created with transparency in the initiatives and legalities.
Next Steps:
More research should be conducted in finding potential phone companies and/or third parties who could take on this massive and important responsibility. Cyber security measures would need to be strengthened and any sort of gap would need to be addressed. The urgency lies in potential threats to the collected data from outside hackers or enemies of the U.S. – this deems it urgent since it could lead to cyber warfare.

Open Document