The actual story in the NSA Scandal Troy University PA 6610 –Foundations in Public Administration Term V (2013) NARRATIVE SUMMARY OF THE CASE Case Summary Edward Snowden, a 29 year old ex-CIA and former NSA contractor in recent times just publicized disclosures about the extent and details of a massive NSA surveillance program. He obtained documents from the NSA that was beyond his access. It is said that the NSA operates a data-collection and eavesdropping (as some would say) system that accumulates multitudes of information on the private communications of non-US residents, and also some private communications on US residents. The program is called “Prism, which is a wiretapping agency” (Arthur, 2013). The program had “enabled emails, chats, and other private user data to be gathered for surveillance “directly from the servers” of companies including Google, Microsoft, Apple, and Facebook” among others (Gallagher, 2013).
The U.S. Government takes a lot of safety precautions to protect its property and people, but sometimes they go too far even as far as to invade the privacy of its citizens. In the new film Bourne Ultimatum many example of privacy invasion is demonstrated. Some of these examples of privacy invasion are acceptable under extreme circumstances, but others are not. In one scene the government’s agents received information that a British news reporter uncovered something about an operation called Black Briary, so they tried to track him down by looking up his record. They were able to find his personal information including his address, cell-phone numbers, and job location.
It evolve over time and President George W. Bush’s "Terrorist Surveillance Program" had created PRISM. This program gave NSA access to “Big Data” like phone’s metadata and data that are sent over the internet (Gellman B and Poitras L). This issue became aware to the public at June 6th, 2013, when Edward Snowden revealed to the items to The Guardian.
This act reduced the restrictions for U.S. agencies gathering information and intelligence within the United States. Many people argue that the government’s ability to spy on us whenever deemed necessary is a violation of their Civil Rights. This type of intelligence and the capabilities to monitor people however has been around for a while, it is known as the ECHELON program. “The NSA inherited the ECHELON program from AFSA. This global spy network, known as UK-USA, was a
Cell phones have went from being devices of contact to devices of mass communication, secrets, and the collection of common data. The use of the cell phone was used to illustrate the effects of technology on a personal level. This was illustrated by the increased social interactions by the owner of the café after acquisition of the mobile phone. This includes the interactions with the dead man’s mother, mistress, his illegal trade in body parts and his role as a husband. Thus, the cell phone could be termed as the lifeline of majority of people such as the dead man, to whom the cell phone was a lifeline for his interactions with the mistress as well as the lifeline in terms of his illegal operations as seller of illegal body parts.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.