The intelligence community has conducted surveillance operations on a domestic and international level for years. The methodology of surveillance operations has been the same for decades; to collect data and to interdict with plots carried out to cause harm, destruction and death. According to Mike Rodgers, the Chairman of the House Permanent Select Committee on Intelligence, the surveillance program has prevented over fifty terrorist attacks in the U.S and abroad. Technology has advanced tremendously since the Cold War era. The intelligence community has always had the capabilities to listen in on millions of American citizens.
It has recently been demonstrated through classified leaks of the depth and the breath of the NSA’s capabilities. American citizens protest that internal surveillance operations violate their privacy rights, and that the program should be terminated. With the numbers continuing to grow on terrorist threats to the homeland, the NSA should continue on the path of prevention and provide answers as to how the agency will grant the public’s request of re-instating their privacy rights.
The collection of data has changed in many ways for the intelligence community since non-state actors, such as Al Qaeda, have announced its goal to kill as many westerners as possible. One agency, in particular, is the National Security Agency (NSA). The NSA has demonstrated its sophisticated capabilities of using technological communications to spy on U.S. citizens and individuals abroad. This approach of collecting intelligence was deemed necessary and could bypass federal statutes, along with the Constitution, as long as there was a connection for tracking terrorists. The NSA’s surveillance program was exposed for the fir...
... middle of paper ...
...June 07, 2013., Regional Business News, EBSCOhost (accessed March 23, 2014).
Katyal, Neal and Richard Caplan. "THE SURPRISINGLY STRONGER CASE FOR THE LEGALITY OF THE NSA SURVEILLANCE PROGRAM: THE FDR PRECEDENT." Stanford Law Review 60, no. 4 (02, 2008): 1023-1077. http://search.proquest.com/docview/224068749?accountid=8289.
Page, Susan “Poll: Most Americans now oppose the NSA program,” usatoday.com, accessed March 23, 2014. http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa- surveillance/4638551/.
“What does the NSA/CSS do?” (2011). About NSA: Frequently Asked Questions. Accessed March 22, 2014. http://www.nsa.gov/about/faqs/about_nsa.shtml#about3.
Wiebe, Kirk J. Sep 2012. “Wiebe declaration in support of plaintiffs’ motion.” Jewl v. NSA. Accessed March 21, 2014. https://www.eff.org/document/wiebe-declaration-support-plaintiffs-motion.
Adam Penenberg’s “The Surveillance Society” reminds Americans of the tragic events of September 11, 2001 and the instant effects the that attacks on the World Trade Center had on security in the United States. Penenberg discusses how the airports were shut down and federal officials began to plot a military response. Although those were necessary actions, they were not as long lasting as some of the other safety precautions that were taken. The Patriot Act, which makes it easier for the government to access cell phones and pagers and monitor email and web browsing, was proposed. Politicians agreed that during a war civil liberties are treated differently. From there, Penenberg explains that for years before September 11th, Americans were comfortable with cameras monitoring them doing everyday activities.
Today, electronic surveillance remains one of the most effective tools the United States has to protect against foreign powers and groups seeking to inflict harm on the nation, but it does not go without a few possessing a few negative aspects either. Electronic surveillance of foreign intelligence has likely saved the lives of many innocent people through prevention of potential acts of aggression towards the United States. There are many pros to the actions authorized under the Foreign Intelligence Surveillance Act (FISA) pertaining to electronic surveillance, but there are also cons. Looking at both the pros and cons of electronic surveillance is important in understanding the overall effectiveness of FISA. [1]
As technology continues to advance at lightning speed, the world as we used to know it is beginning to disappear. Publically available data has replaced much of the espionage tactics that the CIA depended on after WWII and into the Cold War. Information that used to take years to obtain through covert missions is now readily available on social media, commercial databases, or through Signals intelligence (SIGINT). As the world becomes more technologically advanced and intelligence sources display new opportunities, the Intelligence Community (IC) has been there to exploit the data to gain the upper hand on the enemy, and support decision makers. Advancements in technology have made the IC what it is today, however, the path of learning the correct methods of exploitation is littered with abuses. In the 1950’s and 60’s, the CIA’s newest technology was a proposed mind control drug, and project MK-ULTRA was born. The Central intelligence Agency (CIA) performed rogue tests on an unknowing public without their knowledge and severely tainted the image of the agency. In 2013, the public found out about the National Security Agency’s (NSA) Top Secret PRISM program that obtained the phone and internet records of the public without their consent. These two programs were separated by decades, yet the similarities are undeniable. Both MK-ULTRA and PRISM resulted in intelligence oversight reforms aimed at managing these types of operations before they occur. While the government does not always have the ability to foresee how advancements in technology will affect the public, intelligence oversight mechanisms over the past 20 years provide the necessary safeguards that are needed to protect each American’s privacy, provide for th...
Domestic Surveillance helped combat terrorism as it had stopped attacks in the United States and overseas, and identified phone numbers that could be connected to terrorism. The way that Domestic Surveillance alerted us about potential threats is that AT&T and the NSA worked together to collect and analyze Internet and cell phone data. US citizens gained a sense of security as cyber programs began to have the same standards as international laws and standards, and telecom giants such as Verizon assist the NSA by sending them data. If we do not keep Domestic Surveillance, we are making ourselves vulnerable to more attacks as the government will not be able to foil plots that could be harmful to society. Although there is controversy surrounding Domestic Surveillance, it is best to know that there are more benefits than downsides to
Edward Snowden’s National Security Agency(NSA) leaked affair brought attention to American Citizens causing many arguments. Some argue they trust their government and wouldn’t change a thing about being monitored while others argue that their privacy being invaded is unconstitutional, and as a society living in surveillance, Americans need to reform the ECPA Act, and tell Congress to pass The USA Freedom Act.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
The NSA has been secretly ordered to eavesdrop by the Bush administration after the 9/11 terrorist attack. The base of where the NSA has been operating their wiretapping agenda is in Bluff Dale, Utah the building sprawls 1,500,000 square feet and possess the capacity to hold as much as five zeta bytes of data it has cost almost $2,000,000,000. The act of spying over the USA citizens even though they are suspicious is a threat to the people’s privacy and the privacy of other countries’ members are being infringed on by the NSA by the act of wiretapping. The action of wiretapping violates laws for privacy, like the Bill of Right’s Amendment Four which says “Every subject has a right to be secure from all unreasonable searches, and seizures of his person, his houses, his papers, and all his possessions”. The wiretapping controversy has caused the panic and hysteria of the citizens of the USA and USA’s allies. This panic and hysteria has troubled the government by resulting to mistrust and concern against them by both groups. The panic effect of the NSA wiretapping has caused many people such as journalist to have their freedom of speech to be restricted in fear of the NSA to stamp them as terrorist and according to the First Amendment of the Bill of Rights that is an infringement of the people’s right of freedom of expression consists of the rights to freedom of speech, press, assembly and to petition the government for a redress of grievances, and the implied rights of association and belief.
Throughout many years in the United States, there has been controversy over whether or not government surveillance and other technology is a violation of human rights. Ever since the publication of George Orwell’s dystopian novel 1984, there has been an increase in debates on the subject. The novel itself exemplifies what a surveillance-based society is like, providing the reader with a point of view of what could happen to their own society. Discussion over the usage of information that the government has gathered has become one of the foremost topics being analyzed to this day. The information that is being viewed by surveillance would otherwise be private, or information that people would not want to be leaked out. Therefore, surveillance executed by the government and companies has become an infringement to the right of privacy, and United States citizens should take actions upon it before the world reflects the Orwellian vision of the future.
The same surveillance state has become the new normal in America and is disturbingly recognizable today. Over six hundred state, local, and federal agencies conduct intelligence operations through Joint Terrorism Task Forces and Fusion Centers. In 2004, the ACLU discovered an FBI spying on political advocacy groups and found out that the FBI lied to hide these improper activities from Congress and the American public. The Senate report found the intelligence gathering at Fusion Centers was “flawed, irrelevant, unrelated to terrorism, and posed a serious threat to privacy (Rhode, 2017).” The Thought Police watch people in their public and private lives through the use of telescreens, microphones, and cameras and enforce loyalty and
In this week’s assignment we will be looking at a number of significant issues that are or have confronted the intelligence community in a post 9-11 environment. We will quickly touch on the role the Global War on Terrorism has had on changes to the intelligence community’s position, procedures, and policies along with assessing how the intelligence community has directed it efforts when it comes to dealing with traditional military threats from other countries. It is inarguable that for the large majority of times, change is instituted to make a situation better, or to prevent a bad situation from arising. So too can be said about the countless changes in policy and practices that have affected the intelligence community since 9-11. Retrospectively assessing a few of these polices it can become difficult to see in its totality if they have helped the intelligence community or in a way weakened it.
Today, surveillance is heavily present in the U.S., and as a result citizens continue to face a threat of their privacy being invaded. Since 9/11, the National Security Agency, Federal Bureau of
Mass surveillance is a justified method of governmental intelligence gathering. An example of this is National Security Agency surveillance. National Security Agency Surveillance directly prevents terrorist plots from occurring. According to James Jay Carafano, a leading expert in national security, there have been 60 Islamic-inspired terrorist attacks on the United States since 9/11. Of these sixty, fifty-three were thwarted long before the public was ever in any danger, due in large part to combined efforts of United States law enforcement and intelligence provided by metadata collection