preview

Infringing the Fourth Amendment: Edward Snowden and The NSA

analytical Essay
1616 words
1616 words
bookmark

Mass surveillance by the United States Government has been a predominant reoccurring issue since classified government documents were leaked in May of 2013. These leaks lead to one of the most significant debates about an individual’s daily life in decades; the constituent’s right to privacy. According to the fourth amendment of the United States’ Constitution, section 1, “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated”. The purpose of this amendment in the Bill of Rights is to ensure the protection against unreasonable searches and seizures by the Government without a proper warrant. Top secret leaked Government surveillance programs contracted by the National Security Agency and the Department of Justice have revealed that the government has infected computers with malware, collected phone records, metadata, data, and content from American citizen’s computers and phones. The United States’ Federal Government have gone too far in their surveillance techniques and in doing so have infringed the rights of United States’ citizens in the process. On July 5th, 2013, The Guardian, a British newspaper, announced the leak of National Security Agency documents starting with the leak of the NSA collecting phone records of Verizon customers in the United States. The PRISM program was then revealed the next day, regarding the server access to many of the top technology firms in the world. Finally, on June 9th, 2013 Edward Snowden revealed himself as the whistleblower to the world. According to The Guardian, Edward Snowden is a “29-year-old former technical assistant for the CIA and current employee of the defense contractor Booz Allen Hami... ... middle of paper ... ...4/03/12/nsa-plans-infect-millions-computers-malware/>. "How the NSA's Domestic Spying Program Works." Electronic Frontier Foundation. N.p., n.d. Web. 23 May 2014. . "NSA Secrets." Washington Post. The Washington Post, 20 Dec. 2013. Web. 20 May 2014. . Schneier, Bruce . "Schneier on Security."Blog. N.p., 9 Oct. 2013. Web. 17 Mar. 2014. . "Surveillance of Citizens by Government." - News. N.p., n.d. Web. 23 May 2014. < http://topics.nytimes.com/top/reference/timestopics/subjects/s/surveillance_of_citizens_by_government/index.html>. Weaver, Nicholas. "A Close Look at the NSA’s Most Powerful Internet Attack Tool." Wired.com. Conde Nast Digital, 14 Mar. 2011. Web. 15 Mar. 2014.

In this essay, the author

  • Explains that mass surveillance by the united states government has been a predominant reoccurring issue since classified government documents were leaked in may of 2013.
  • Describes edward snowden as a 29-year-old former technical assistant for the cia and current employee of the defense contractor booz allen hamiliton.
  • Explains that prism is an eavesdropping program that collects data from fiber-optic cable networks that carry the world's internet and phone data.
  • Argues that the nsa's surveillance programs have revolutionized the way the government can find and dismantle terrorist operations.
  • Opines that the federal government's surveillance programs need to be rebuilt. without constitutional liberties, the united states is no better than those countries we oppose because of their lack of fundamental rights.
  • Explains that there are three types of hackers: white, grey, and black hat. the nsa developed a system called quantum in the 2000s.
  • Explains that the national security agency's reach has grown considerably in recent years. tor is a brilliant way to stay anonymous from the government and independent hackers.
  • Explains how the nsa plans to infect millions of computers with malware. schneier, bruce, and nicholas weaver.
Get Access