National Security Agency's Espionage

Topics: United States Constitution, Law, Fourth Amendment to the United States Constitution Pages: 6 (1672 words) Published: May 8, 2014
Brady Schappert
Professor J. Lennon
English Composition 1301-6505
26 February 2014
NSA’s Espionage
How ironic it is that the National Security Agency (NSA) would commit a crime such as espionage. Over the past decade, the NSA, FBI, and companies such as Google, Microsoft, and Facebook have been leaking each citizen’s personal information. After Truman established the NSA in 1952, it took twenty years for the Supreme Court to rule that warrants are required for domestic intelligence surveillance. Then in 1975, the Senate discovered illegal domestic spying by the NSA. After this incident, the Foreign Intelligence Surveillance Act, which specifies the use of surveillance for collecting information on foreign powers, started protecting citizens’ personal information in 1978. After September 11, 2001, Bush began the NSA’s domestic spying program, which allowed the NSA to collect information on citizens. Since then, the NSA has illegally collected metadata, or data about data, from sources varying from phone companies to social websites. Companies such as Dropbox, Sony, Facebook, Microsoft and Google have been caught or admitted to leaking metadata to third party organizations such as NSA. Recently lawsuits against the NSA spying were filed on July 11, 2013 and November 22, 2013. Even with these lawsuits, there was a court-ordered renewal of Foreign Intelligence Surveillance Act, a metadata program to collect American’s phone call’s data, on October 11, 2013 and then again on January 3, 2014. The latest action taken was the hearing held by the Senate Judiciary Committee, in which they recommended the removal of the program collecting phone records of the public. Also recent, was a poll done on American thoughts of NSA surveillance, which revealed that seventy percent of adults polled would rather keep their personal privacy than allow the freedom piercing surveillance of the NSA. Agreeing with the American people is Texas Governor Rick Perry, who has recently passed a Bill requiring the protection of private electronic storage from the state and law enforcement. So, NSA has been collecting phone records and third parties have leaked or sold information from social sites has been violated the U.S. citizens’ fourth constitutional right. Our society must enforce laws to ensure that corporations cannot give up personal information about their customers unless it is for a purpose specified by the citizen because selling or sharing of metadata is unconstitutional. First, Citizens’ information has also been illegally retrieved many times over the past century. For example, some high school students in Philadelphia were given laptops for school and when they were using them, the web camera would inconspicuously turn on. In response, there was a lawsuit filed on the school district for storing metadata retrieved from students through laptops issued to them. The lawsuit ended with the district plea of being guilty of installing software that allowed them to turn on the laptops. Over the past decade, many lawsuits have been field over the invasion of privacy. Another incident occurred with Google, in which millions of citizens’ emails were read and mined from their Gmail account. Even then, Google denied the invasion of security and privacy that had occurred. However, in the article, “Cloud-Based Education Apps Could be Data Mining for Ads”, David Perera had mentioned, “…[a] lawsuit filed in the U.S. Northern California district by some Gmail users who allege that Gmail machine email reading amounts to a violation of wiretapping law show that Google is in at least some cases scanning Apps for Education emails in order to target ads on other Google platforms, such as YouTube” (1). The lawsuit was filed because Google was illegally sharing information with advertisers and who knows who else. So, this is a perfect example of the illegal activities of media sites. The search and seizure of these citizen’s data through data...

Cited: Houston, Samuel. “Texas Constitution.” Texas Constitution and Statutes (2014):1. Web.
27 February 2014
Jefferson, Thomas. “Bill of Rights.” National Archives (2014):1. Web.
27 February 2014
Neal, Dave. “Nokia is Accused of Leaking Finnish Data to the U.S.” The Inquirer (2014):1.
Web. 27 February 2014
Perera, David. “Cloud-Based Education Apps Could Be Data Mining For
Ads.” FierceGovernmentIT (2014):1. Web. 27 February 2014
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • National security Essay
  • NSA: National Security or National Stalkers? Essay
  • National Security Essay
  • Privacy vs. National Security Essay
  • national security agency Essay
  • Individual Privacy vs. National Security Essay
  • National Security Essay
  • Essay about National Security

Become a StudyMode Member

Sign Up - It's Free