As technology continues to advance at lightning speed, the world as we used to know it is beginning to disappear. Publically available data has replaced much of the espionage tactics that the CIA depended on after WWII and into the Cold War. Information that used to take years to obtain through covert missions is now readily available on social media, commercial databases, or through Signals intelligence (SIGINT). As the world becomes more technologically advanced and intelligence sources display new opportunities, the Intelligence Community (IC) has been there to exploit the data to gain the upper hand on the enemy, and support decision makers. Advancements in technology have made the IC what it is today, however, the path of learning the correct methods of exploitation is littered with abuses. In the 1950’s and 60’s, the CIA’s newest technology was a proposed mind control drug, and project MK-ULTRA was born. The Central intelligence Agency (CIA) performed rogue tests on an unknowing public without their knowledge and severely tainted the image of the agency. In 2013, the public found out about the National Security Agency’s (NSA) Top Secret PRISM program that obtained the phone and internet records of the public without their consent. These two programs were separated by decades, yet the similarities are undeniable. Both MK-ULTRA and PRISM resulted in intelligence oversight reforms aimed at managing these types of operations before they occur. While the government does not always have the ability to foresee how advancements in technology will affect the public, intelligence oversight mechanisms over the past 20 years provide the necessary safeguards that are needed to protect each American’s privacy, provide for th...
... middle of paper ...
...ists, and Project Paperclip, 1945 to 1990. New York: St. Martin's Press, 1991.
Cambone, Stephen. The National Security Act of 1947– a New Structure for National Security Policy Planning. Washington D.C.: CSIS, 1998.
Halpern, John. The Pharmacology of Lysergic Acid Diethylamide: A Review. Hanover, germany: Blackwell Publishing Ltd, 2008.
Lasby, Clarence. Project Paperclip: German Scientists and the Cold War. Scribner. February: Scriber, 1975.
Lee, Martin A. Acid dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond. Grove Press. 1985.
Richelson, Jeffrey T. The Wizards of Langley: Inside the CIA's Directorate of Science and Technology. Boulder, CO: Westview, 2001.
Stratified, D. Brainwash. St. Martin's Press. 2007. p 23 162,66,56.
Taubman, Phillip. Examining the Archives: The CIA's "Family Jewels". Washington D.C.: New York Times, 2007.
Guilford, CT: Dushkin/ McGraw-Hill, 1997. Chiatkin, Anton. A. Treason in America. Washington DC: Executive Intelligence. Review, a review of the book, Divine, Breen, Frederickson, and Williams. America Past and Present.
Taubman, Philip. “Death of a Spy Satellite Program.” Public Administration: Concepts and Cases. Stillman, Richard Joseph. Boston, MA: Wadsworth Cengage Learning, 2010. 361-369.
?Espionage.? 2000-2004. The War to End All Wars. Michael Duffy. Original Material. Primary Documents Online.
Prados, John. Safe for Democracy The Secret Wars of the CIA. Chicago, IL: Ivan R Dee, Publisher, 2006.
Sulick, Michael J.. Spying in America espionage from the Revolutionary War to the dawn of the Cold War., Georgetown University Press, 2012
Earley, P. (2014). CIA Traitor Aldrich Ames — The Story — Crime Library. Retrieved April 10, 2014, from http://www.crimelibrary.com/terrorists_spies/spies/ames/1.html
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
Weiner, Tim. Legacy of Ashes: The History of the CIA. New York: Doubleday, 2007. Print.
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
Wesson, Donald R. "Psychedelic Drugs, Hippie Counterculture, Speed And Phenobarbital Treatment Of Sedative-Hypnotic Dependence: A Journey To The Haight Ashbury In The Sixties." Journal Of Psychoactive Drugs 2 (2011): 153. Academic OneFile. Web. 23 Mar. 2014.
knowledge of the CIA and who would later would be involved in the clash between the
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
Domestic Surveillance Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States’ government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States’ government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between obtaining enough intelligence to protect the safety of the nation and the preservation of basic human rights is not extremely skewed, Congress has set forth requisites in FISA which aim to balance the conflicting goals of privacy and security; but the timeline preceding this act has been anything but honorable for the United States government.
Nichols, D. E., & Chemel, B. R. (2011). LSD and the serotonin system's effects on human