Free

Discussion on NSA Security - Essay Example

Comments (0) Cite this document
Summary
Practically, almost every international user of internet is under surveillance, according to Mikko Hypponen, a Finnish cyber security expert, columnist and hacker whose main focus is defense of networks from software that is malicious. Recent occurrences such as Edward…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Discussion on NSA Security
Read TextPreview

Extract of sample "Discussion on NSA Security"

Essay: NSA Security Discussion NSA Security Discussion Practically, almost every international user of internet is under surveillance, according to Mikko Hypponen, a Finnish cyber security expert, columnist and hacker whose main focus is defense of networks from software that is malicious. Recent occurrences such as Edward Snowden’s leaking of classified US government papers, have brought to the fore as well as highlighted the fact that the US is carrying out a blanket scrutiny on any foreign person whose data goes via an American entity such as Google, Facebook, Yahoo!, Apple etc. irrespective of whether they are suspects of any wrongdoing or not. According to Hypponen, basically, each international internet user is under US surveillance.
Hypponen is worried about our future communication and data which he fears will be stored in the US data center in Utah; the world’s largest. Hypponen laments how the US government is infringing on individual privacy and making everything insecure by infiltrating standardization bodies to purposely sabotage encryption algorithms. The NSA by use of PRISM which is a particular NSA database and an aspect of the entire NSA surveillance endeavor, details collection program for data collection from various service providers. Thus clearly, the world is no longer a safe place to communicate freely and the US has completely infiltrated people’s privacy under the guise of fighting terrorism. Although the US is legally obligated to monitor foreigners as well as foreigners’ data connections when they end up or pass through United States, you realize that 96% of people in the planet are foreigners. This means that almost virtually everybody is being watched by the US. This is not only morally wrong, but also rude and should make everybody angry. Hypponen proposes that the world unite together through either political pressure or by seeking alternative services, so as to build together open, free as well as secure systems.
References
http://new.ted.com/talks/mikko_hypponen_how_the_nsa_betrayed_the_world_s_trust_time_to_ac Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1655825-discussion-on-nsa-security
(Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words)
Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1655825-discussion-on-nsa-security.
“Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1655825-discussion-on-nsa-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Discussion on NSA Security

Home Land Security: Communication Discussion

...? Without a doubt, communication capability is the most single crucial resource of the response team. As soon as disaster occurs, the recovery team must have a head communication center called CommandCentre. CommandCentre, is the head communication center that plans and organizes recovery team. An incident manager is needed to supervise the whole mission as recovery teams are in action. Once the plan is embedded, notifications are sent to teams through asynchronous communication. There are many challenges that become obstacles towards establish vital communication. Disaster recovery consists of methodologies, processes and policies that transpire into a recovery plan in a crisis. Establishing communications during a disaster event...
1 Pages(250 words)Essay

NSA Information Security Standards

...? National Security Agency The National Security Agency (NSA) is United s’ cryptologic NSA synchronizes, performs exceedingly focused activities to protect Unites Stares information security systems, directs and creates foreign intelligence data. A cutting-edge institution, National Security Agency, is on the limits of communications and information processing. It is one of the most crucial organs of foreign language assessment and research inside the government. Federal Information Federal Information Processing Standard (FIPS) No. 197, was unveiled in 2001 and thus far supported the Advanced Encryption Standard (AES) as the official...
3 Pages(750 words)Research Paper

NSA Cyber Security Profile

...? NSA Cyber Profile Institute Recent information systems are sophisticated collections of technology, processes and people, working in unison to offer institutions with the potential to procedures, transmit, store data in a timely mode to support numerous missions and commercial functions. The extent to which institutions have come to rely on these information systems to carry out routine, significant, and essential missions and business operations means that the protection of the fundamental systems is paramount to the success of the institution. The assortment of the proper security controls for an information system is an essential duty that can have major ramifications on the functions and assets of an institution as well... as the...
3 Pages(750 words)Research Paper

Machiavelli on Powers of NSA and Defense Spending

...?Machiavelli on Powers of NSA and Defense Spending Introduction Operating under the jurisdiction of the department of defence, theNational Security Agency is the country’s largest intelligence organ. In terms of both budget and personnel, NSA is the largest American intelligence organization. The main objective of the organization is to keep the country safe from external aggressions. The organization carries out extensive global monitoring with the aim of detecting and intercepting potential security threats to the country (Aid, 2009). On July 2013, the house of representative passed the defence-spending bill allocating the organization $ 598.3 billion in the collection and monitoring of millions of American phone conversation... . The...
7 Pages(1750 words)Research Paper

NSA and the 4TH Amendment

...Order #534228 " " " and number]" " in format: 12 May 2002]" NSA and the 4th Amendment We are on the horns of a national dilemma. How much information should the government have about private citizens under the guise of “national security”? Does the government not need a warrant to violate one’s right to privacy? Is the Fourth Amendment that hard to understand? When considering a question such as the one posed for this paper, one must be willing to take a stand on one side of the issue or the other. Politics in and of itself will not determine which side of the issue one takes. What does impact one’s selection is whether or not one has had his rights violated and then to what degree. An example of...
1 Pages(250 words)Assignment

Questions about the NSA

... NSA Data Collected Under the Patriot Act The USA Patriot Act’s section 215 gives permission to the government to access specific business records for use in national security investigations. This, however, has to be approved by the Foreign Intelligence Surveillance Court (FISA Court). Also, the Foreign Intelligence Surveillance Act under section 402 allows the government to install and make use of a trap or pen register and trace device for investigations on national security. Two sensitive and crucial intelligence collection programs are supported by these authorities. The programs are authorized to do bulk collection of certain routing, dialing, signaling and addressing information about electronic and telephone communication... which are...
9 Pages(2250 words)Research Paper

Edward Snowdens NSA Leaks

...Edward Snowden’s NSA Leaks Edward Snowden is well known for his role in revealing a number of surveillance programs undertaken by GCHQ and NSA. He revealed how the agencies access information of technology companies without warrants. Snowden also leaked that the agencies intercept data from fibre optic cables that make up the backbone of internet networks and global phone. The manner in which these agencies work to undermine security standards that commerce, banking and internet rely upon were revealed. The NSA spying revelations were troubling and heart-breaking to many given the seriousness of certain information. The revealation was a show of gross violation of civil...
2 Pages(500 words)Assignment

Ethics & CIA/NSA

...Ethics & CIA/NSA Does the government have the ity to be collecting on so many Americans? Yes. It is a legality, which the state ought to embrace in ensuring safety for its people. This is in trailing elements whose intentions does not conform with the public’s agenda for peaceful living. Do you believe this activity to be ethical/unethical? Based on motives behind activities that compel to the act of gathering relevant and reliable information by NSA, I deem this is ethical. Since, its core intention encompasses ensuring and heightening the security state of all Americans despite numerous intense debates terming intelligence collection as intrusion of one’s privacy. To date numerous...
1 Pages(250 words)Essay

The NSA, Government Spying, and Privacy

...The NSA, Government Spying, and Privacy Internet and Telephone Surveillance President George W. Bush executed the National Security Agency’s domestic spying program after the September 2001 attack. From the revelations of Edward Snowden and other independent reporters, we have learned about a numbers of ways the National Security Agency is spying on the US people and around the world.Snowden points that the National Security Agency collects records of every American’s phone call. Given authority by the Patriot Act, the NSA gets the business records related to the terrorist investigations. It gave the government the power to collect all the information...
4 Pages(1000 words)Essay

Edward Joseph Snowden and the National Security Agency (NSA)

...Edward Joseph Snowden and the National Security Agency (NSA Formal Analysis of ethical issues surrounding Snowden’s Spy Issue Edward Snowden leaked information and documents that revealed some deep spying programs on US citizens and some other nations conducted by National Security Agency and the Five Eyes (Harding, 2014). This would involve some telecommunication firms and participation of some European governments. The world would look at Snowden at different angles with some seeing him as a hero, a patriot, and a whistleblower. However, the U.S government regarded him as a traitor and a criminal as well (Mazzie, 2013). The Department of Justice termed his actions as a violation of...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Discussion on NSA Security for FREE!

Contact Us