Preview

Nsa Deep Packet Inspection

Best Essays
Open Document
Open Document
2249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nsa Deep Packet Inspection
The NSA’s Data Collection Initiatives |
|An Analysis of the DPI Systems in Place with our National Government

|This document explores the Deep Packet Inspection systems set in place by the United States government’s National Security Agency. Along with |
|an analysis of how the system works, the capabilities of said system will be discussed, along with its legality and future potential for data |
|harvesting. |

With so much happening in the world, and so much going wrong for the United States, the National Security Agency’s chief task is in gathering huge amounts of information and making it immediately useful to prevent terror and cyber warfare threats from damaging United States interests. The NSA’s most challenging task at this point is not in gathering huge amounts of information, but in making it useful. They have the facilities to monitor most telephone calls and email communication that happens in the United States, and with the new Utah Data Center which is currently under construction, they should be able to monitor almost all of it and be able to store it effectively. Ironically, the biggest disadvantage to having a huge amount of data at your disposal is that you have a huge amount of data that you have to sift through in order to get anything useful. This is why the NSA depends so heavily on a technology called Deep Packet Inspection (DPI) which helps the Agency to decrypt and organize internet traffic. Without this emerging technology, the Agency would have to rely on simple searches and manual filtering to find information that is relevant to national security, a very expensive process in terms of both time and money which would ultimately waste the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Kooool

    • 716 Words
    • 3 Pages

    and negatives of the system to support your statement about the capability of the system and…

    • 716 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Recently, it was brought to my attention that there are concerns about some activities on the network that can be considered less than trustworthy. Specifically, the concerns are regarding network traffic called ping sweeps and port scans. I’m putting together this paper to explain how ping sweeps and port scans impact our network traffic.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    System Build Project

    • 391 Words
    • 2 Pages

    o What part can technology solve- Data access availability companywide that is in one location.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Patriot Act Case Study

    • 365 Words
    • 2 Pages

    Obviously searching through internet and phone records is a great tool to aid them in tracking terrorists, while seizing bank accounts holts funding for their activities. I suspect…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The intelligence may collect information notwithstanding that the law enforcement agency intends to use the information collected for purposes of a law enforcement investigation or counterintelligence investigation (Fritsch et al, 2015). Thus, this alters the traditional distinction between intelligence and law enforcement. So, the connection of these two government function raises questions concerning the methods of collection, targets of collection, and the use of the resulting information, corresponding with the development of Fourth Amendment jurisprudence.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The use information sharing is the one of the components of intelligence gathering. Although it has always been legal, now with the new provisions of Patriot Act has given more power to agencies on the amount of information sharing. The agencies no longer pick and choose what information to pass on, they now pass on all facts to each other and from there the information is sorted. People are no longer seen as unlawful and lawful citizens with the Patriot Act, so now large sums everyone’s personal lives are being accessed throughout the country by law enforcement agencies.…

    • 956 Words
    • 4 Pages
    Good Essays
  • Better Essays

    1984 and Privacy

    • 893 Words
    • 4 Pages

    The National Security Agency, or NSA, is a top-secret agency believed to have the most advanced information vacuuming technology available, similar to the technology used to monitor people in 1984. "In the past, intercepting communications meant just that--copying a telegram mid-route, steaming open an envelope, or attaching alligator clips to the copper wires that connected every phone in the world."(Fordahl) These became extinct as we moved into the digital age; it is now easier than ever to access mass amounts of data. Many people fear that this is turning out to be a fast path to mass surveillance.…

    • 893 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The Fourth Amendment does not allow searches of personal items unless a warrant is used, but by tracking information on people it could help detect terrorism threats sooner. For example, President Obama claims that the data-collection programs “help prevent terrorism (Transcript: Obamas Remarks 4.3).” Even though people do not need a warrant to use these programs, people examine the phone numbers and length of calls, and by doing this it could ultimately protect the country from terrorism threats. Also, the U.S. Patriotism Act enables law enforcement agencies to search through “email and telephone communications, medical, financial, and library records (Legal Information Institute 1.1).” Furthermore, whenever the intelligence gathering community…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Alexander, then director of the National Security Agency (NSA), told Congress more than 50 potential terrorist attacks had been thwarted by two controversial programs tracking more than a billion phone calls and vast swaths of Internet data each day. Additionally, the attacks on would-be targets such as the New York Stock Exchange were prevented by consuming telephone and Internet information from millions of Americans since September 11, 2001. In testimony, General Alexander said, "In recent years, these programs, together with other intelligence, have protected the U.S and our allies from terrorist threats across the globe to include helping prevent the potential terrorist events over 50 times since…

    • 861 Words
    • 4 Pages
    Better Essays
  • Good Essays

    America's Privacy

    • 1205 Words
    • 5 Pages

    The National Security Agency (NSA) is a federal program under the Department of Defense that has the primarily task of global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes, including surveillance of targeted individuals on U.S. soil. In the mid-1970s, the NSA was investigated for the first time by Congress. At that time, the order of the NSA was that is “would never direct it’s surveillance apparatus domestically.” After the investigation was performed, Frank Church, the Democratic senator who was the head of the investigative committee, warned: “The NSA’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversation, telegrams, it doesn’t matter” (Greenwald). Recent leakage of government documents, that shows evidence of immense domestic spying, has many Americans worried that Frank Church’s warning has become a reality. So, what exactly is the NSA collecting and why? How does the United States’ data collection compare to that of other countries? And most importantly, have the government and the NSA put the privacy of US citizens at risk?…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Government Surveillance

    • 1146 Words
    • 5 Pages

    The first issue is that the government has been observing both Americans and foreigners for decades, without our knowledge or regulation of anyone. The NSA was established in 1952; its existence was not admitted to the American public until 20 years later, and still, its configuration and activity are largely unknown, even to members of congress and government. It is the biggest surveillance agency in the world. (MacAskill, Borger and Greenwald par. 8) In the 1970s, extreme far-reaching disclosures about the NSA led to senate hearings, which revealed stunning transgressions, with assassination plots, illegal mail opening, massive military spying. (Heuvel par. 10) In 1975, Democratic US Senator and former NSA employee Frank Church alerted us that the NSA's extending reach could be turned inwards on the American people.…

    • 1146 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Summary Of Ted Talk

    • 679 Words
    • 3 Pages

    Mr. Hypponen talks about how the national security agency or NSA for short and other American agencies are monitoring foreign data connections that enters or passes US soil, which includes personal data such as emails, text messages, phone calls and other types of data and how our encryption methods are being weaken by installing backdoor access by said agencies.…

    • 679 Words
    • 3 Pages
    Good Essays