StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

National Security Agency - Case Study Example

Cite this document
Summary
This work called "National Security Agency" focuses on a cryptanalysis agency NSA used by the US government for protection towards the state’s security information. The author shows the mission of this agency, the description of the surveillance program in detail, further recommendations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
National Security Agency
Read Text Preview

Extract of sample "National Security Agency"

National Security Agency Introduction The National Agency (NSA) is a cryptanalysis agency used by the US government for protection towards the state’s security information. It is composed of the signals of intelligence (SIGINT), product and services of information assurance, computer network operations (CNO) which aid in gaining a decision advantage for nation and allies in all circumstances. The mission of the agency is to take the challenge of preventing the access to sensitive information concerning security of the nation by foreigners. The agency uses signals of intelligence to collect, process, destroy from foreign signals so as to protect the defense operations of the military. The agency as well, helps the Network Warfare Operations in defeating terrorists and all their organizations, alongside upholding US laws and protecting privacy and civil liberties (United States 1). Questions raised by features of NSA surveillance program There is a disagreement expressed by two judges and a presidential panel discussed by Adam Liptak & Michael S. Schmidt, as they discuss the opposite conclusions reached by these parties concerning the legality of phone records as used by the agency. The ruling by Judge William H. Pauley in the New York was similar to that of Judge Richard J. Leon in Washington University, stating it to be a matter and antimatter. The American Civil Liberties Union being the party that that had presented the case expressed their disappointment regarding the decision as an understatement to privacy implications of government surveillance. The justice department on the other hand was pleased with the idea that the NSA bulk telephony metadata collection was found lawful (Adam & Michael 2). Judge Pauley moreover approved of the importance of the program, citing an argument by a former director of FBI who stated that the program might have caught the hijackers of September 11, 2011 since it would have helped NSA to provide the Federal Bureau of Investigation with the missing information about the where bouts of Al-Mihdhar. Judge Leon in Washington expressed his disapproval saying the government had not been able to make a case of how the program would aid in protecting the nation against attacks. The government held a middle position concerning the program and recommended the implementation of a less intrusive measure. Group recommendation therefore was the disapproval of the government holding the telephone metadata and instead considered that the metadata was better held by a private party or private third party, where information would be obtained using a court order (Adam &Michael 3). The disparity however between the views held by the two judges however continue and at the end, Judge Pauley attributes the frustrations in unchanged technological changes to those in customer relationship with the telecommunication providers that has remained unchanged since 1979 (Adam & Michael 4). Jeff Jarvis acknowledges the work the views held by judges Leon and Pauley concerning the legality of NSA’s program. He however fears that the question of privacy may not only impact on the knowledge of what is as expected and what is not expected to be known but on freedom of speech as well. He believes that privacy is an argument of authority. Jeff states that “it is not so much what government (or anyone else) is allowed to know but what government, holding unique powers, is allowed to do with what it knows” (Jarvis 5). He brings an argument that the issue should not be on whether the metadata should be publicly or privately held since once held by a third party it could no longer be private, giving an example of an information on an envelope that had to be known by other people on the way other than just the sender and the receiver. Concerning telephone information also he argues that the government cannot obtain the information without affecting privacy this is because the companies that own the phones as well have information concerning who places and receives calls. Concern is as well raised concerning Judge Leon’s argument saying that some information is too much to have. Jeff says that “If we start to say that bad things can happen merely if knowledge exists, then too soon we fall into the trap of controlling the extent of knowledge” (Jarvis 5) and attributes this to a source of censorship and tyranny. He still raises concern about the issue of privacy in public as this would be a hindrance to journalists reporting as well as collection of data by researchers. Jeff defines privacy as “an ethic of knowing someone elses information (and whether sharing it further could harm someone) and publicness as an ethic of sharing your own information (and whether doing so could help someone)” (Jarvis 6). He expresses his views stating that the restrictions to NSA should be towards their seeking and using information without a person’s suspicion to crime, which should be documented. He views that government should also not seek for information unless it has a purpose to do so. He thinks that the question of where storage of information should be should be governed by different principles preferably consumer principles that allow transparency to what is done with the information. He expresses his disagreement to the assumption that metadata is bad and dangerous since this data might be important later for instance in case of data concerning a case of prostate cancer surgery he however thinks that this data should be held anonymously. The right protection should be offered for this data and access by government governed by different set of laws. He however concludes that the primary issue for NSA is the government overreach and oversight absence and not the presumed privacy and technology. Recommendations The implementation of the board’s recommendation would however help to alleviate Jeff’s fears concerning how the government might end up using personal communication data, since it offers a safeguard to privacy and civil liberties. It provides a balance between privacy, civil rights and national security. The board as well offers recommendations concerning the efficacy of government surveillance Jeff states that his fear is not on privacy but on the governments’ authority to use the information in its possession (Jarvis 4). The first recommendation is the revision of the targeting and tasking procedures (Recommendations 7). The procedures are to be reviewed so as to be in compliance with the statutory requirements. The review of the procedure will address the issue that the government is allowed to conduct surveillance without having a warranty. It will provide parity between foreignness determination and foreign intelligence purpose determination concerning the required level for explanation. The recommendation however expects NSA to review their procedures so as to require a more detailed written document explaining the purpose for foreign intelligence. The board therefore believes that the government is in a position to amend this in concern to their targeting procedures. The second recommendation by the board as well, helps to alleviate the fears raised. It concerns person queries and the review of this is concerned with limiting the use of the information collected for foreign intelligence purpose. The extent then of the use of information in the hands of the government should then be determined. This will therefore limit the government’s use of personal information in its possession as it deals with an issue that Jeff terms as “the extent to which government holding unique power is allowed to do with what it knows”. The third recommendation by the board is NSA minimization procedure permitting the agency to query data collected for the purpose of foreign intelligence. This concerns the metadata of section 702 communication. The government’s contribution to this process is writing guidelines that are to be followed by analysts, and giving a statutory explanation to the meaning of foreign intelligence information which under FISA has a narrower definition if it concerns US persons as compared to when it concerns non US persons. This will limit the access of information acquired unless there is an intelligence reason. The fourth recommendation is the FISA role which requires the government’s submission to provide targeting sheets for the court to be able to carry out random samples for NSA query terms involving US person identifiers. This provides information to the court concerning the minimization procedures by the government, and whether the procedures need to be amended. These will aid in limiting the government’s ability to seeking information without having a reasonable cause (Jarvis 6). The next recommendation by the board is for the government to incorporate its rules for operation which are not reflected in the FISA court certification orders, into the submission to the FISA court. This ensures that the government observes the required minimization procedures by FISA court as well as the guidelines of the attorney general and the statute. This ensures that judges acquire a generalized understanding of the program that enables them to make informed decisions. This also ensures government compliance to the use of information and thus a remedy to the concern by Jeff about how the government is able to access data (Jarvis 6). The recommendation concerning the review by NSA concerning communication acquired and that concerning avoidance of collection of purely domestic information ensures that only information that is useful for the purpose of foreign intelligence is collected thus irrelevant domestic information is not obtained (Recommendations 14). The government in collaboration with telecommunication authority should ensure the use of the right technology to filter the domestic information and retain only what is required. Recommendation concerning accountability and transparency of the government ensures that the government discloses its minimization procedures and thus being accountable and transparent to the public that it serves (Recommendations 15). This further helps to control the extent of the government’s information use. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(National Security Agency Case Study Example | Topics and Well Written Essays - 1500 words - 1, n.d.)
National Security Agency Case Study Example | Topics and Well Written Essays - 1500 words - 1. https://studentshare.org/law/1861718-national-security-agency-nsa
(National Security Agency Case Study Example | Topics and Well Written Essays - 1500 Words - 1)
National Security Agency Case Study Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/law/1861718-national-security-agency-nsa.
“National Security Agency Case Study Example | Topics and Well Written Essays - 1500 Words - 1”. https://studentshare.org/law/1861718-national-security-agency-nsa.
  • Cited: 0 times

CHECK THESE SAMPLES OF National Security Agency

Clinton administration conducted domestic spying

The top-secret Global Surveillance Network is called Echelon, and its run by the National Security Agency"(Kroft) The NewsMax article citing the CBS News 60 minutes report was used as a partisan political tactic as it attempted to debunk a New York Times article published on December 16, which stated that Bush's "decision to permit some eves dropping inside the country without court approval was a major shift in American intelligence gathering practices, particularly for the National Security Agency, whose mission is to spy on communications abroad" NewsMax, has put forth the story for all of its conservative republican cohorts to feed upon; Russ Limbaugh told the listeners of his nationally syndicated radio talk show 2 that the current surveillance program of George Bush"started in previous administrations, laying the operations of Echelon at the feet of the Clinton administration....
2 Pages (500 words) Essay

A Critique of Federal Agencies Prior to the September 11

The failure by institutions to prevent terrorism led to the 9/11 bombing,some of the reasons why these institutions failed include the failure to share information among agencies, failure to prioritise terrorism and the use of outdate technology … The failure by institutions to prevent terrorism led to the 9/11 bombing, some of the reasons why these institutions failed include the failure to share information among agencies, failure to prioritise terrorism and the use of outdate technology and techniques in preventing new forms of terrorism....
7 Pages (1750 words) Essay

The National Security Agency

It… (NSA/CSS| 2011) The National Security Agency/ Central Security Service is one of the unique agency of the United States because of The National Security Agency The National Security Agency or Central Security Service is the place for America's breakers makers.... armed forces and the National Security Agency.... (NSA/CSS| 2011)The National Security Agency/ Central Security Service is one of the unique agency of the United States because of all the responsibilities it owes to the Government of United States....
1 Pages (250 words) Essay

How do you think domestic and foreign intelligence should work in this country

The National Security Agency, the nation's intelligence institution, works in autonomy to other forms and institutions of domestic security and defense such as… The institution uses a complex network of information acquisition, analysis, storage and dissemination to the government.... The National Security Agency, the nation's intelligence institution, works in autonomy to other forms and institutions of domestic security and defense such as the police and marine....
1 Pages (250 words) Assignment

NYT Opinion: Privacy and the Threat to Self

hen American Citizens became aware of their governments spying programs such as phone tracking by the National Security Agency as a means of combating terrorism, some were against it while some were in support of the action (Harris 2).... The NSAs program which is responsible for tracking phone records of millions of US citizens is supported by majority of Americans who believe that what the government is doing as pertaining to security is very important even though it intrudes their privacy (Pew Research para....
1 Pages (250 words) Assignment

Managing Intelligence Activities

The National Security Agency (NSA) and Central Intelligence Agency (CIA) have been overlapping on their responsibilities; a factor that has resulted in the Latter's budget exceeding the National Security Agency's budget for the year 2013 by 50% (Miller & Gellman, 2013).... For instance, the national security Intelligence program has had to request for increased budget allocation in order to counter security lapses in Iraq and Afghanistan, as well as the rising cases of cyber crimes....
1 Pages (250 words) Essay

Privacy of Information

he main stakeholders around the privacy of information include the internet users, the websites visited by these internet users and the United States National Security Agency that has the ability to access internet communication from across the globe.... A number of serious privacy of information security concerns have been raised as a result of this practice.... They should also ensure that their company servers have the latest security systems to prevent unauthorized access by hackers....
1 Pages (250 words) Assignment

The Black Chamber Organization

However, the organization was disbanded in the year 1929 when the State Department pulled out (National Security Agency, 2009).... nbsp; Some Works of MI-8 Under Herbert, the organization and the team of cryptanalysts were able to decipher more than 24 foreign diplomatic cipher systems (National Security Agency, 2009).... Germany was the major target of the organization's deciphering skills and maybe the only reason for forming the secret agency....
3 Pages (750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us