Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Ethics & CIA/NSA - Essay Example

Comments (0) Cite this document
It is a legality, which the state ought to embrace in ensuring safety for its people. This is in trailing elements whose intentions does not conform with the public’s agenda for peaceful living.
Based on motives behind activities that compel to the act of gathering…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Ethics & CIA/NSA
Read TextPreview

Extract of sample "Ethics & CIA/NSA"

Ethics & CIA/NSA Does the government have the ity to be collecting on so many Americans? Yes. It is a legality, which the state ought to embrace in ensuring safety for its people. This is in trailing elements whose intentions does not conform with the public’s agenda for peaceful living.
Do you believe this activity to be ethical/unethical?
Based on motives behind activities that compel to the act of gathering relevant and reliable information by NSA, I deem this is ethical. Since, its core intention encompasses ensuring and heightening the security state of all Americans despite numerous intense debates terming intelligence collection as intrusion of one’s privacy. To date numerous people and especially those who choose to politicize the entire process will on the other hand cite the government through its respective intelligence authorities is not doing enough or equal to the task of protecting its individuals. The latter complaint is especially when attacked like in 2011 or which what they do not know is collection of intelligence is meant for “bad guys” not only in the country but also globally who target US. In addition, NSA normally operates within already outlined codes of conduct such that what they collect will serve in the interests of public but not the satisfaction of few influential.
Should the government be doing this?
Yes. Since, collection, analysing and preserving of necessary information by NSA largely is essential in trailing anti-peace elements that mostly encompass extremists1. For instance, this is quite evident in the trailing of Abu Musab Zargawi whereby if it were not for this approach it would have been easy in exterminating his networks and acting on him appropriately2. Therefore, when it comes to spying or trailing such elements is more of legality for the involved agency and its members all their core commitment is for the public’s safety. In addition, spying has not started with US but time immemorial with Israelites (Moses’ time) with the intention of knowing exactly where they were heading despite then led by God3. Therefore, NSA ought to undertake its activities and even intercept all relevant information that it deems will contribute to the safety of the good citizen who needs to live peacefully.
Does this violate the Patriot Act or FISA or the Fourth Amendment?
Contending infringement of 4Th amendment especially when collecting information meant for intelligence purpose is where I think it entails much considerations and even rectifications. This is because its drafters never had the thought of advanced technological knowhow that we have today. This to fashion and even put the definitions in such a way when NSA activities when collecting data are not intruding to one’s privacy but undertaking its roles as it is supposed to be.
Lefever, Ernest, W. 2003. The Essential CIA. Ethics and Public Policy Center. 10Th January 2003.
Scarborough, Rowan. 2013. An eavesdropping phoenix, NSA arose from ashes of 9/11. The Washington Times, July 23 2013. arose-ashes-911/?page=all Read More
Cite this document
  • APA
  • MLA
(“Ethics & CIA/NSA Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Ethics & CIA/NSA Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(Ethics & CIA/NSA Essay Example | Topics and Well Written Essays - 250 Words)
Ethics & CIA/NSA Essay Example | Topics and Well Written Essays - 250 Words.
“Ethics & CIA/NSA Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


NSA Information Security Standards

...? National Security Agency The National Security Agency (NSA) is United s’ cryptologic NSA synchronizes, performs exceedingly focused activities to protect Unites Stares information security systems, directs and creates foreign intelligence data. A cutting-edge institution, National Security Agency, is on the limits of communications and information processing. It is one of the most crucial organs of foreign language assessment and research inside the government. Federal Information Federal Information Processing Standard (FIPS) No. 197, was unveiled in 2001 and thus far supported the Advanced Encryption Standard (AES) as the official algorithm for shielding insightful and unclassified electronic...
3 Pages(750 words)Research Paper

NSA Cyber Security Profile

...? NSA Cyber Profile Institute Recent information systems are sophisticated collections of technology, processes and people, working in unison to offer institutions with the potential to procedures, transmit, store data in a timely mode to support numerous missions and commercial functions. The extent to which institutions have come to rely on these information systems to carry out routine, significant, and essential missions and business operations means that the protection of the fundamental systems is paramount to the success of the institution. The assortment of the proper security controls for an information system is an essential duty that can have major ramifications on the functions and assets of an institution as well... NSA Cyber...
3 Pages(750 words)Research Paper


...The CIA Operation "PBSUCCESS" Greatly Damaged the Credibility of the US Government during the Cold War The CIA Operation "PBSUCCESS" in Guatemala damaged the credibility of the US Government when dealing with other foreign nations during the Cold War. This was proved by the strong criticism it received from both its allies and foes over its actions in Guatemala. This operation was only aimed at serving selfish interests at the expense of the Guatemalans and the US tax payers. Operation "PBSUCCESS" was organized by the US Central Intelligence Agency, CIA. "PBSUCCESS" is CIA cryptonym. The first two character prefixes are used for designating a geographical and functional...
4 Pages(1000 words)Essay

CIA and Chiles Coup

...). Recently declassified documents verify that these actions were taken as a coordinated effort that was financed and sponsored by the US government. The unrealistic fear of the spread of socialism resulted in a series on actions taken by the CIA in Chile that escalated from political intervention to a clear cut case of state sponsored terrorism. The acts of supplying weapons to the opposition, encouraging violence, and supporting the murder of political adversaries defines the US activity in Chile as an armed intervention and an act of war, which can not be ethically justified. Interference in the democratic process is highly unethical and unacceptable in any situation, though may not rise to the level...
6 Pages(1500 words)Essay


...The CIA The Central Intelligence Agency, famously known as the CIA refers to an independent agency of the United States Government. It is charged with the responsibility of ensuring that the senior policy makers of the United States are provided with the much needed national security intelligence. As an executive agency, it reports directly to the Director of National Intelligence. Intel gathering operations are carried out by non-military commissioned civilians who make up the CIA. At the President’s request, the CIA is also in a position to carry out certain covert activities1. The agency was established in the year 1947 through an act accented to by the then...
7 Pages(1750 words)Research Paper

CIA operations

...CIA OPERATIONS (An Essay) of (affiliation) ATTACKING CIA OPERATIONS The politicians in Washington are rightly concerned with the ease with which the CIA is killing off opponents of America, in particular the terrorists who have sought sanctuary in other countries. Those who criticize the Central Intelligence Agency want more transparency in CIA operations but the very nature of its operations require utmost secrecy, and so the politicians in Washington can be reminded that the CIA is already under the oversight of the president. In fact, it is President Obama who personally approves its ultra-secret list of targets for the drone attacks. Politicians are...
1 Pages(250 words)Essay

Questions about the NSA

.... Without confirmation of targets’ identities using informants or operatives on the ground, the U.S military or the CIA then orders strikes basing on the location and activity of the cell phone believed to be used by the persons. The drone operator was a member of a task force, High Value Targeting, under JSOC and charged with the identification, capture and killing of suspected terrorists in Yemen, Afghanistan, Somalia and elsewhere. His revelations are bolstered by NSA top-secret documents leaked out by another whistleblower, Edward Snowden. In support of the same is a former U.S Air Force drone sensor operator, Brandon Bryant, who turned out to be outspoken in criticizing lethal operations in Yemen, Afghanistan and Iraq... , in...
9 Pages(2250 words)Research Paper

Edward Snowdens NSA Leaks

...resigned from CIA, he started working as a contractor at the NSA facility in the United States Military base in Japan. Snowden had excellent computer skills and was given top secret clearance. At the time, there were a lot of opportunities for contractors as the United States security outsourced intelligence tasks to outside private companies. Snowden found out the all-consuming NSA surveillance activities. He was also keen to notice that the mechanisms that were built into the United States system to keep NSA in check were not working. While working for one of the 13 hubs that spied on Chinese interests, he made anonymous contacts with journalists and leaked top secret...
2 Pages(500 words)Assignment

Mock Interview with Edward Snowden

...Running Hear: A Mock Interview I had with Edward Snowden. Interviewer: Good morning Edward, I wish to request your permission for an interview on documents you released to journalists. Edward Snowden: No problem, you can ask me anything and I will answer you. Interviewer: If you don’t mind please share with me your work history in a nutshell. Edward Snowden: Sure, I enlisted in the National Army in the year 2003 and began my training for joining the Special Forces with the hope of working for humanity especially in Iraq. From there I landed the first job as a gourd for NSA’s Maryland University covert facility. I later worked for the CIA as an IT security expert. I rose very fast due to my expertise...
4 Pages(1000 words)Assignment

Discussion on NSA Security

...Essay: NSA Security Discussion NSA Security Discussion Practically, almost every international user of internet is under surveillance, according to Mikko Hypponen, a Finnish cyber security expert, columnist and hacker whose main focus is defense of networks from software that is malicious. Recent occurrences such as Edward Snowden’s leaking of classified US government papers, have brought to the fore as well as highlighted the fact that the US is carrying out a blanket scrutiny on any foreign person whose data goes via an American entity such as Google, Facebook, Yahoo!, Apple etc. irrespective of whether they are suspects of any wrongdoing or not. According to Hypponen, basically, each international...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Ethics & CIA/NSA for FREE!

Contact Us