Preview

Edward Snowden Crimes

Good Essays
Open Document
Open Document
656 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Edward Snowden Crimes
Edward Snowden had taken asylum in Russia because of the information he had leaked to the public which proved that the NSA was spying on Americans. The U.S. government wanted every country that Snowden was in at the time, that they knew of, to extradite him to the United States. Not a single country would do so. He did not leak any secrets or put anyone's lives in danger but of course those in the government claimed that he did. But the government would not produce any evidence that would prove that claim. Edward Snowden did commit a crime. But so did the US Government. Snowden felt he had a responsibility to warn the U.S. citizens as to what the government was doing.
Documents that were released by Edward Snowden included details on the SSO unit. Internet service providers which include AOL, Apple, Google, Facebook, Microsoft, PalTalk, YouTube, and Yahoo allowed the NSA to collect communications data for analysis under the PRISM program. Also part of SSO are the programs which tap fibre-optic cables around the world. And through this industry cooperation some of the access to these fibre-optic cables is achieved. And without the knowledge of the companies included, there are other operations taking place.
…show more content…
The CO-TRAVELER system enables the NSA to gather location data to gain knowledge of relationships between individuals. Mobile apps are also targeted by NSA programs which collect cookies and data. Text messages are also collected.
Documents also released by Edward Snowden show a program called Boundless Informant. This program maps and graphs data from every Digital Network Intelligence (DNI) record in the SIGINT (signal intelligence) system and gives a full view of collection capabilities of GAO. The XKeyscore database allows the NSA to analyze data from the combination of data from PRISM, SCS sites (also called F6 sites) and FORNSAT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Truman. Digital Communication is basically the electronic way to exchange information. So that means every phone or video call, every text or email you make, is being monitored by real people who work behind the scenes. Charles Arthur further emphasized that “Some of the biggest internet companies such as: Apple, google, Yahoo, YouTube, Microsoft and Skype are all involved. “Also according to Charles Arthur, “potentially all of our data is being monitored by the NSA.…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Patriot Act Case Study

    • 365 Words
    • 2 Pages

    Obviously searching through internet and phone records is a great tool to aid them in tracking terrorists, while seizing bank accounts holts funding for their activities. I suspect…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    America After 9/11 Essay

    • 627 Words
    • 3 Pages

    Only Two months after 9/11 the federal government expanded the capability of National Security Agency (NSA) they gained access to gather data on U.S. citizens, in addition to foreign nationals and governments. This was not mentioned to the public until 2013 when Edward Snowden revealed the extent of NSA´s spying program.…

    • 627 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Snowden Affair Dbq

    • 1009 Words
    • 5 Pages

    The set of documents I will be reviewing are documents 118, 1, 4, and 26 regarding The Snowden Affair. The Snowden Affair is about a national security controversy that had to do with the National Security Agency (NSA) and its undisclosed surveillance of communications of American citizens under the Foreign Intelligence Surveillance Act (FISA). The information was leaked by Eduard Snowden, a former NSA agent and was published by a British newspaper, The Guardian. The Guardian revealed the NSA’s surveillance operations which included the archiving and tracking of vast amounts of data regarding use of electronic devices of U.S. citizens U.S. citizens and any foreign communications. The data revealed that Internet traffic and…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In recent discussions of Edward Snowden, a controversial issue has been whether or not he was wrong for leaking government information. On the one hand, some argue that he is an American hero. From this perspective, it is a good thing that he exposed the inappropriate surveillance tactics of the American government. On the other hand, however, others argue that he is a traitor. From this perspective, he betrayed his country by leaking information to other countries. In the words of President Barack Obama, “If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy” (Mason). In sum, then, the…

    • 1669 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Like the other programs, upstream involves collecting huge fibre-optic communications cables, both crossing the USA and some undersea cables. The collection allows the NSA access to large amounts of phone and internet data, where at least one end of the communication is outside of the country. Later it was revealed that the NSA keeps all the data it gains through Upstream and PRISM in database system called MARINA for at least 12 months (NSA files 5). This shows an example of only collecting the data of people if at least one person taking part in the communication is a non-US citizen, but it still doesn’t help to convince that the NSA shoud be doing what it…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The NSA's domestic surveillance program involves collects a multitude of metadata on phone calls. Additionally, raw data on internet traffic is collected (ProPublica(R.1)).…

    • 785 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Consider the technology that defines everyday life in America- texts, email, internet, and phone calls. In performing these constant activities, most never questioned their privacy, that is, until Edward Snowden squealed on the NSA’s less than ethical maneuvers. Without citizens’ consent, the American government was collecting metadata, “all the information surround a call, including the caller’s number, the receiver's number, the time and location of the call, and how long it lasted” (Diamond). The government may have been shooting for just the bad guys, but all American civilians got caught in the crossfire. Nothing would exempt a person from these invasions of privacy, and their data would be scanned and stored just like that of a seasoned…

    • 1555 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Edward Snowden Argument

    • 1168 Words
    • 5 Pages

    Activist Daniel Ellsberg, who himself had leaked the classified Pentagon Papers during the Nixon administration, applauded Snowden for being “the one person in the…NSA who did what he absolutely should have done” (Hope X). Ellsberg echoes the sentiments shared by many Americans and defends the whistleblower’s right to protect his own country’s Constitution. While it is clear that Snowden’s exposure of the NSA constitutes whistleblowing, it takes his supporters and well-known whistleblower Daniel Ellsberg to bring the issue light in the White House: the fact that the controversy is so ardent within the country—and the fact that the issues surrounding Snowden are not so cut-and-dry—mirrors many cases of questionable pardons in the U.S. in the past (Turley). According to Jonathan Tuley, Snowden’s situation is similar to Ellsberg’s and many other pardons in U.S. history, and furthermore, his pardon would pacify the “national divide” that has occurred as a result of the controversy. This argument is poignant, considering the level of controversy and the volume of unfavorable evidence against the NSA provided by…

    • 1168 Words
    • 5 Pages
    Good Essays
  • Good Essays

    domestic terrorism

    • 1144 Words
    • 3 Pages

    There is an unavoidable issue which continues inconclusive, whether Edward Snowden is a whistleblower, or a traitor. Those who support him call him a hero, a man protecting the people. Others view him as nothing but a traitor or defector. The people agree that his actions were unjust and are considered domestic terrorism on the United States. Snowden signed a contract under NSA, which he agreed to keep their secrets but he broke the contract by leaking information to the public. This was an enormous concern to political officials because that information leaked can be used by enemies of the United States.…

    • 1144 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    This article is by the FBI telling how people are accessing your information through the internet and how to protect your information.…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The purpose of this paper is to explain the existing challenges that result from the independent nature of federal agencies, as well as the other factors that are common to each of them and discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    national security agency

    • 299 Words
    • 2 Pages

    The NSA has a program known as Prism. This program is basically how the NSA gets everyone’s personal information. Major Internet companies like google, yahoo, and others give our personal info to them. They, the NSA, buy the companies’ silence. Edward Snowden, an agent working for the NSA, spilled all the secret information that they were trying to cover up. This incident led up to Edward Snowden being chased…

    • 299 Words
    • 2 Pages
    Satisfactory Essays