StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discussion on NSA Security - Essay Example

Cite this document
Summary
Practically, almost every international user of internet is under surveillance, according to Mikko Hypponen, a Finnish cyber security expert, columnist and hacker whose main focus is defense of networks from software that is malicious. Recent occurrences such as Edward…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Discussion on NSA Security
Read Text Preview

Extract of sample "Discussion on NSA Security"

Essay: NSA Security Discussion NSA Security Discussion Practically, almost every international user of internet is under surveillance, according to Mikko Hypponen, a Finnish cyber security expert, columnist and hacker whose main focus is defense of networks from software that is malicious. Recent occurrences such as Edward Snowden’s leaking of classified US government papers, have brought to the fore as well as highlighted the fact that the US is carrying out a blanket scrutiny on any foreign person whose data goes via an American entity such as Google, Facebook, Yahoo!

, Apple etc. irrespective of whether they are suspects of any wrongdoing or not. According to Hypponen, basically, each international internet user is under US surveillance.Hypponen is worried about our future communication and data which he fears will be stored in the US data center in Utah; the world’s largest. Hypponen laments how the US government is infringing on individual privacy and making everything insecure by infiltrating standardization bodies to purposely sabotage encryption algorithms.

The NSA by use of PRISM which is a particular NSA database and an aspect of the entire NSA surveillance endeavor, details collection program for data collection from various service providers. Thus clearly, the world is no longer a safe place to communicate freely and the US has completely infiltrated people’s privacy under the guise of fighting terrorism. Although the US is legally obligated to monitor foreigners as well as foreigners’ data connections when they end up or pass through United States, you realize that 96% of people in the planet are foreigners.

This means that almost virtually everybody is being watched by the US. This is not only morally wrong, but also rude and should make everybody angry. Hypponen proposes that the world unite together through either political pressure or by seeking alternative services, so as to build together open, free as well as secure systems.Referenceshttp://new.ted.com/talks/mikko_hypponen_how_the_nsa_betrayed_the_world_s_trust_time_to_ac

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1655825-discussion-on-nsa-security
(Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words)
Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1655825-discussion-on-nsa-security.
“Discussion on NSA Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1655825-discussion-on-nsa-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discussion on NSA Security

Universal Plug and Play and Its Weaknesses

The assignment "Universal Plug and Play and Its Weaknesses" investigated that many routers are still shipped with grave security bugs, new exploits are coming into the fame where security flaws in Universal Plug and Play devices are turning up into dangerous issues for the systems.... Some of the main devices in which universal plug and play devices are used include printers, media servers, routers, digital video recorders (DVRs), computers, and even security cameras (Vaughan-Nichols 2013)....
12 Pages (3000 words) Assignment

Machiavelli on Powers of NSA and Defense Spending

Machiavelli on Powers of NSA and Defense Spending Name: Institution: Introduction Operating under the jurisdiction of the department of defence, the National security Agency is the country's largest intelligence organ.... The organization carries out extensive global monitoring with the aim of detecting and intercepting potential security threats to the country (Aid, 2009).... The growing security concerns in the country are arguable and justifiably especially following the events of 9/11....
8 Pages (2000 words) Research Paper

Contributing factors/components of national space policy

As a result “overall space policy directives have slowly been transformed from a cold-war emphasis that marginalized the economic and commercial implications of space activities into a truly integrated policy that recognizes the maturity of many space applications, sophisticated industrial capabilities, the globalization of space technologies and the importance of the space infrastructure to both civilian uses and security concerns”....
4 Pages (1000 words) Essay

Obama and National Security (NASA)

Moreover, NASA has been applied in development and preservation technologies, which contribute significantly to security of the state through military… For instance, this involves application of sensors on interplanetary probe, which resemble those applied in advanced spy satellite.... Nevertheless, NASA has undergone substantial changes that have raised significant concern among the citizens of America, since it has led to English Obama and National security (NASA) Conventionally, NASA was utilized for developing diplomatic relationship with other countries and for military purposes....
1 Pages (250 words) Essay

Impact of Revelations of Edward Snowden on Public Image of GCHQ

Many stakeholders in the current generation are focusing on ways that can improve the level of security within their environment and the general territory i.... hellip; ism has been identified as the most common and the most sensitive aspect of insecurity that has compelled many governments to formulate and implement proper security measures that would ensure that the well-being of their societies is not jeopardized.... 1 In this regard, most ons have made efforts directed towards improving the level of their national security intelligence with an aim of ensuring that proper investigations, surveillance as well as supervision of security issues is undertaken to prevent terrorism attacks....
17 Pages (4250 words) Essay

How Do the NSC and APNSA Operate

The idea of this research emerged from the author's interest and fascination in how do the National security Council (NSC) and The Assistant to the President for National security Affairs (APNSA) operate?... This research will begin with the statement that the national security agency (NSA) is the U.... On the other hand, the assistant to the president for national security affairs  APNSA is the senior-most official in the executive office of the president who serves as the chief advisor stationed in the white house to the president of the United States on national security issues....
5 Pages (1250 words) Essay

Information System Security Plans

A nation can protect itself from threats and reach the top echelons only if its security system is made optimal and effective without any chance of loopholes.... This is where the role of a security plan assumes significance.... A foolproof security plan for the nation's federal… cies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge' over other nations.... That is, once agencies' security structures and critical information are secured, they can operate without any threats, Then, with todays rapidly changing political, economic, and importantly technical environment increasing the threat for the federal agencies, it becomes paramount for those agencies to adopt a strong security plan....
5 Pages (1250 words) Research Paper

Edward Snowden Did More Harm Than Good

The security and peace of Britain and other populations in the west, then the Snowden leaks have been devastating and have caused a lot of harm (Scruton 2013; Whitehead, Hope and Swinford 2013).... hellip; The compromise occurs on many levels, from the way the secret procedures, tools, technologies and processes of data gathering of the nsa and other intelligence agencies are compromised, to the way the intense scrutiny has made it more difficult for the agencies to do their job of catching and arresting the bad guys....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us