The Information Technology behind Counter-Terrorism

575 Words2 Pages

The Information Technology behind Counter-Terrorism The information technology behind counter-terrorism saves American lives. In the weeks after 9/11, President Bush authorized the National Security Agency (NSA) to conduct plethora of surveillance activities inside the United States, which had been barred by law and agency policy for decades prior. When the NSA’s spying program was first brought to public knowledge by the New York Times in 2005, President Bush admitted a small aspect of the program—what the administration labeled the terrorist surveillance program—in which the NSA monitored, without warrants, the communications of between 500-1000 people inside the US with suspected connections to Al Qaeda. The current head of the NSA Gen. Keith Alexander condones collecting the phone records, internet searches, and emails of American’s nation-wide. Alexander encourages the program stating that, “It is needed for domestic counterterrorism and that it was helpful in investigating the Boston Marathon bombings and the plots against U.S. diplomatic sites during the summer.”(“NSA chief defends U.S. spying”) The technology behind the NSA abilities to spy on unassuming Americans, the use of collected data and, the contribution of the PATRIOT Act, are all contributing factors to the effectiveness of the NSA in preventing terrorist attacks. According to the foremost authority on data mining Dr. Gregory Piatetsky-Shapiro “If the NSA just has the metadata—who calls whom – that’s sufficient to determine the status of people,” “You don’t necessarily need the conversation if you have the network” (Piatetsky-Shapiro) In the past 20 years information technology has advanced more than ever in our history. This rapid increase has brought an... ... middle of paper ... ...stions will be asked as they should as to laws of the land. The technologies behind the many agencies such as the NSA and FBI that secure our borders both physical and virtual only become more important each year. As our country continues to promote democracy and support uprisings in countries around the world Works Cited Gilbert, F. (2013). DEMYSTIFYING THE UNITED STATES PATRIOT ACT. Journal of Internet Law, 16(8), 3-7. New York Times reports that NSA uses collected data to map out a person's social connections. (n.d.). Canadian Press, The, International Business, T. (2013, June 12). NSA and Big Data: How Technology Innovation Fuels PRISM. International Business Times. Investor's Business, D. (2013, September 26). NSA chief defends U.S. spying. Investors Business Daily. p. A02. Stewart, B. (n.d). Don't play games with U.S. security. USA Today.

Open Document