The National Security Agency was established in 1952 from the National Security Council for the purposes of intercepting foreign radio communications (Howe, p 11). Since, the NSA has been one of the most secretive institutions within the intelligence community. However, recent events have focused on the NSA’s domestic surveillance, encouraging a debate between security and privacy.
In 1978 the Foreign Intelligence Surveillance Act (FISA) was enacted for the purposes of outlining protocol for collection of foreign intelligence using electronic surveillance of communications or persons (Brazen, p 2). In 2007, the Act was amended to include the Protect America Act, stating that the National Security Agency had the right to monitor electronic communications between people on U.S. soil, if believed to be a threat, without court supervision (Nakashima and Warrick). The Protect America Act expired after 2007, and the FISA Amendments Act of 2008 was signed into law. This amendment included immunity to telecommunications providers for complying with orders to provide information to the NSA (Lichtblau). The program PRISM, was then adopted by the NSA. This program collects and stores internet communications that are provided by telecommunications companies under the FISA Amendment Act of 2008 (Gellman and Poitras). This information is stored as metadata, or specific details about a communication, such as the location, time, or date, a phone call or e-mail was sent (A Guardian Guide to Metadata).
In May of 2013 Edward Snowden flew to Hong Kong to meet with journalists to disclose what he, and the NSA, had been doing. Snowden, a former technical assistant for the CIA, had been working with the NSA, and various other companies i...
... middle of paper ...
...g key intelligence. The most viable option for reform is the USA Freedom Act.
The recommendation of this research is to vote in favor of the USA Freedom Act. As a representative, voting in favor of this bill serves the public interest and the interests of your constituents. One of the abuses of the Patriot Act occurred in Las Vegas, Nevada, where the owner of two clubs in Las Vegas, was prosecuted unfairly under statutes of the Patriot Act (ACLU). The constituents of Nevada deserve privacy and security, and voting in favor of the USA Freedom Act will ensure that.
American’s right privacy continues to need protection, and intelligence continues to need to be collected to protect America’s security. The USA Freedom Act finds a balance between these two fundamental needs. Voting in favor of this Act is a step to protect America’s interests, both at home, and abroad.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- It is eminent that while you are checking you email or going through social network there is an organization that is monitoring everything, from your conversations to your search history just to determine the kind of person that you are for then investigate you more in deep; the responsible for this is an organization called: National Security Agency (NSA) is a government organization that provides with intelligence to protect the security aspects of classified documentations, surveillance, and overall the security of the USA intelligence agenda.... [tags: PRISM program]
2082 words (5.9 pages)
- Privacy — at first glance, most people see this word as describing one’s right to be free from observation and disturbance by others; however, upon further examination it means much more. According to author Dylan Love of the Business Insider, this word in itself is one of hundreds that flag you as a potential terrorist when typed it in an email. Perhaps this comes as no surprise since citizens of the United States have seen an increasing presence of the National Security Agency (NSA) in the media and their daily lives.... [tags: Privacy in the USA 2015]
1962 words (5.6 pages)
- Impeach the NSA The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. Edward Snowden said this just last year in 2013. The unconstitutional atrocity that is the NSA (National Security Agency) has not been ended since then.... [tags: National Security Agency, Privacy, Invasion]
1021 words (2.9 pages)
- Ever since the horrible events that took place on 9/11, the United States of America has taken more security precautions. The main security change has been in airports. But, not just airports, the National Security agency (NSA) has been invading people’s privacy more and more since then. The NSA was founded by President Truman on November 4th, 1952 as an organization to decrypt code communications in WW2 (wiki/NSA). It was not until soon after 9/11 that the NSA started to become the organization it is today.... [tags: National Security Agency, United States, Terrorism]
1167 words (3.3 pages)
- In May of 2013, a former National Security Agency (NSA) contractor, Edward Snowden, confiscated several sensitive security documents having to do with confidential government activities that had to do with as described by news outlet Aljazeera America (AA), “…an order from the Foreign Intelligence Surveillance Court (FISC) requiring Verizon to hand over metadata from millions of Americans' phone calls to the Federal Bureau of Investigation (FBI) and the NSA” (AA). Snowden then later released these documents to British news outlet, The Guardian.... [tags: National Security Agency, Foreign Intelligence]
1739 words (5 pages)
- Many people are excited when it comes to the new technological advances and next-generation devices that are being invented and discovered. The world is advancing at an extremely fast rate; so fast that it's nearly impossible to keep up with the latest and greatest. The “latest and greatest”, however is not exactly what people think. Some of the more interesting inventions range from giant billion dollar global satellites that record and store your every text and call to the seemingly harmless front cameras on your iphones that could be on and recording at any given moment.... [tags: national security agency]
938 words (2.7 pages)
- James Madison once said “Knowledge will forever govern ignorance; and a people who mean to be their own governors must arm themselves with the power which knowledge gives.” To gain a better understanding of a society, one must gain knowledge of the needs and wants the citizens’ demand from the country’s representatives. In every country the needed to protect its citizens is the same. In some nations, security is a higher priority which causes sacrifices to be made to obtain an indefinite protection against all rivals.... [tags: Privacy vs Security ]
1175 words (3.4 pages)
- The Effectiveness of the National Security Association (NSA) American citizens are entitled to own freedom, which says that the citizens can act, behave, and do whatever we want without worrying about someone watching our every move. Ayn Rand once said, “Civilization is the progress toward a society of privacy. The savage’s whole existence is public, ruled by laws of his tribe. Civilization is the progress of setting a man free from men.” The National Security Association (NSA) was set up to protect the American citizen’s freedom, although they may push their boundaries which interferes with the right to privacy; this organization is very effective.... [tags: Terrorism, National Security]
1896 words (5.4 pages)
- The National Security Agency was originated, as a unit to decipher code communications during World War I. It is an old and one of the largest US intelligence organization. It operates under the Department of Defense and reports to the Director of National Intelligence. Its responsibility is to guard the US Government Communication and Information system. It accomplishes its mission by bugging electronic systems, using subversive software for sabotaging and intercepting phone conversations and Internet communications of people.... [tags: world war I, US intelligence]
1278 words (3.7 pages)
- The NSA can capture more than 1 Yottabyte of data each day, but what is the NSA to start and is it abusing its power. NSA stands for National security agency, it works with the united stated government to prevent individuals from developing terrorist activity. To prevent activities such as terrorism, the NSA intercepts communications between people online which is good, but not all interceptions are illegal activates because the NSA can also intercept individuals that have no criminal background.... [tags: yottabyte, surveillance, monitoring]
563 words (1.6 pages)
- Corporate Organizations in Toronto and their Use of Social Media
- The Imaging of Neuroendocrine Tumors
- Technology and Crime Analysis
- Story about a Wealthy Incompassionate Man and The Building of His Hotel
- Personal Essay: Ethics in All Aspects of my Life
- The Relationship of Earthly Life and Spiritual Salvation Created by Edward Taylor’s Symbolism