Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Edward Snowden: Traitor or Protector of Privacy?

In June 2013, Edward Snowden, a technology contract worker for the National Security Agency (NSA), provided details of the NSA surveillance program called PRISM to the British newspaper The Guardian. Mr. Snowden had broad access to NSA files because he was working for the agency in Hawaii, helping manage the NSA's computer systems in an outpost that focuses on China and North Korea. He was one of 1.2 million people in the United States who have top security clearance. Snowden used inexpensive and widely available web crawler software to scrape data out of NSA systems and kept at it even after agency officials challenged him briefly. A web crawler automatically moves from website to website, following links embedded in each document, and can be programmed to copy everything in its path. U.S. intelligence officials believe Snowden accessed roughly 1.7 million files this way. Because Snowden worked at an NSA outpost that had not yet been upgraded with modern security measures, his copying of huge volumes of data raised few alarms. Snowden told The Guardian that he had grown concerned about how massive and invasive the NSA system had become. He described how NSA collects information on telephone calls, emails, social network postings, search queries, and other web communications of Internet users in the United States. The data are provided to the government by data-gathering giants Google, Facebook, Twitter, Microsoft, Yahoo, and other large Internet firms as well as telecommunications service providers such as Verizon. The availability and relatively low cost of contemporary data management and analytics technologies described earlier in this chapter make it possible for the NSA to store and conduct very sophisticated analysis of massive quantities of data. The purpose of PRISM is to identify terrorists and their plans before the plans can be executed. PRISM does not collect the contents of Internet communications, only the metadata (essentially who is communicating with whom.) Using this data, PRISM constructs a social graph of some Americans' social connections, identifying their associates, their locations at certain times, their traveling companions, and other personal information. After PRISM identifies suspicious patterns, it then requests more detailed information from these firms that can include the contents of the communication. NSA and government officials claimed the program is legal under existing statutes, had been in operation for many years with congressional oversight, and provided for judicial review of active surveillance of specific people. The phone-records program was built upon a provision in the USA Patriot Act, passed a month after the 9/11 terrorist attacks. Although aimed at communications with and among foreign nationals, it is apparent that the entire U.S. population, citizens and noncitizens, was included in the NSA data gathering effort. The documents Snowden leaked included details about the NSA data analysis and data visualization tool Boundless Informant, a secret court order requiring Verizon to hand the NSA millions of Americans' phone records daily, and the surveillance of French citizens' phone and Internet records, along with those of high-profile individuals from the world of business or politics. The documents also described XKeyscore, which allows for the collection of almost anything done on the Internet, including the content of personal email, web search history, and browsing patterns. The documents revealed that the NSA was harvesting millions of email and instant messaging contact lists, searching email content, tracking and mapping the location of cell phones, and undermining attempts at encryption to pinpoint targets for government surveillance. Tensions flared between the United States and some of its close allies after it was revealed that the United States had spied on Brazil, France, Mexico, Britain, China, Germany, and Spain as well as 35 world leaders, including German Chancellor Angela Merkel. Snowden's revelations reignited the public debate about how to strike a balance between security and liberty in the age of global terrorism and powerful technology. U.S. officials have stated that PRISM, in concert with other techniques, has helped thwart dozens of terrorist plots in the United States and overseas. President Obama argued that modest encroachments on privacy, including keeping records of phone numbers called and the length of calls that can be used to track terrorists, though not listening in to calls, were worthwhile to protect the country. These programs were authorized by Congress and regularly reviewed by federal courts. Critics charge that PRISM represents a massive invasion of privacy. They believe that routinely giving phone records and email contents to the federal government is a violation of the Fourth Amendment's prohibition against search and seizure without a warrant and probable cause. More than half of Americans surveyed by a Washington Post-ABC News Poll in November 2013 said that the NSA surveillance has intruded on their personal privacy rights. On May 7, 2015, a three-judge panel of the Second U.S. Circuit Court of Appeals in New York ruled that the NSA's bulk collection of phone records was illegal. The panel did not address whether the NSA program violated constitutional privacy rights but found that the Patriot Act language the Bush and Obama administrations used to justify the program wasn't meant to allow such massive data gathering. On June 2, 2015, President Obama signed bipartisan legislation curtailing the federal government's sweeping surveillance of American phone records. Bulk collection of metadata from domestic and international phone numbers shifts to the telecommunications providers, and the government must petition a special federal court for permission to search the data. Snowden has been charged with espionage and theft. He's living in Russia. Among those worried about NSA encroachment on individual privacy, Snowden has been praised as a hero. Among those more concerned with national security and the need to protect the nation and its citizens from terrorist and other attacks, Snowden is vilified as a traitor. The debate-and it is a very heated one-continues.

Case Study Question

1. Perform an ethical analysis of the PRISM program and NSA surveillance activities. What ethical dilemma does this case present?

2. Describe the role of information technology in creating this ethical dilemma.

3. Do you approve of what Edward Snowden did? Why or why not?

4. Do you think the NSA should be allowed to continue digital surveillance programs? Why or why not?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92207891

Have any Question?


Related Questions in Computer Engineering

What is 4g and its benefits how fast is your internet

What is 4G and its benefits. How fast is your Internet service supposed to be for stationary users?

Question suppose you work in the it department of global

Question : Suppose you work in the IT department of Global Hotels, a multinational hotel chain. Global Hotels runs several specialized business support systems, including a guest reservations system that was developed in ...

Questiondiscusses the development and evolution of decision

Question: Discusses the development and evolution of Decision Support Systems and identifies several categories : Model Driven DSS Data Driven DSS Communications Driven DSS Document Driven DSS Knowledge Driven DSS Conduc ...

Software reliability quality assurancequestion please refer

Software Reliability Quality Assurance Question please refer below Assume you work for an organisation that develops database products for individuals and small businesses. This organisation is interested in quantifying ...

Question after reviewing the assigned reading materials

Question: After reviewing the assigned reading materials, complete the following activities: 1. Develop a product service idea. A. Describe the product/service including the benefits of using the product/service B. Discu ...

1 what would be the purpose for a user to protect a

1. What would be the purpose for a user to protect a file from "read" or "write" access by other users? 2. Is there a reason why it would be safer for administrators to use two different accounts when working with a comp ...

Suppose a bowl has 9 chips one chip is labeled 1 three

Suppose a bowl has 9 chips. One chip is labeled "1", three chips are labeled "3", and five chips are labeled "5". Suppose two chips are selected at random with replacement. Let the random variable X equal the absolute di ...

When using todays digital cameras file sizes are often

When using today's digital cameras file sizes are often saved in a format that is well over 1 Megabyte. This may be great for high definition photo reproductions but is a disaster for uploading to the web. Images on your ...

My kids love playing uno and we just finished up an intense

My kids love playing UNO and we just finished up an intense round. Lets say that the deck has 80 cards. 20 red, 20 blue, 20 green and 20 yellow.  What is the probability of pulling 3 green cards if the first 2 are replac ...

Please discuss the followingas demand increased for these

Please discuss the following: As demand increased for these mortgage backed securities, lenders reacted by relaxing their approval standards to increase production. No longer were "all" borrowers required to document the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As