Preview

NSA paper

Good Essays
Open Document
Open Document
739 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NSA paper
NSA Affirmative
William Saletan, 2013[Going Courtless,William, National Correspondent at Slate.com, Going Courtless, http://www.slate.com/bullpen/warrantless_searches_the_court_oversight_of_nsa_phone_surveillan.html]
The National Security Agency has been collecting the phone records of all U.S. citizens—which numbers have called which other numbers, when, and for how long—in an enormous database. The government says this mass collection is OK because the database is “queried”—i.e., searched—only under court supervision. In theory, this two-tiered approach, with judicial scrutiny applied at the query stage rather than the collection stage, is defensible. But does the judiciary—in this case, the Foreign Intelligence Surveillance Court—really examine the database queries?

Tag- This section is about who has access to the data!
1. Who has access to the data?

“Only 20 analysts and NSA and their two managers, for a total of 22 people, are authorized to approve numbers that may be used to query this database,” Inglis testified. Mueller quoted the same figure: “You have just 22 persons who have access to this to run the numbers against the database—20 analysts and two supervisors.” Alexander elaborated:
“Could somebody get out and get your phone number and see that you were at a bar last night? The answer is no, because, first, in our system, somebody would have had to approve, and there's only 22 people that can approve a reasonable, articulable suspicion on a phone number. So, first, that [phone number] has to get input. Only those phone numbers that are approved could then be queried. And so you have to have one of those 22 [people] break a law.”
These statements don’t clarify whether the “access” reserved to these 22 people is a physical or just a legal matter. Is it possible for others to access the data? That raises the next question:

Tag-What is considered Unauthorized?
2. What are the barriers to unauthorized access?

Alexander testified, “To get

You May Also Find These Documents Helpful

  • Powerful Essays

    Nsa Capstone Project

    • 16267 Words
    • 66 Pages

    PRELIMINARY SCHEDULE ....................................................................................................3 Staff Training .............................................................................................................5 Teacher Training ........................................................................................................6 INTRODUCTION......................................................................................................................... 7 Purpose of The Project Quality Management Plan ................................................... 7 PROJECT QUALITY MANAGEMENT OVERVIEW ........................................................... 8 Organization, Responsibilities, and Interfaces .......................................................... 8 PROJECT QUALITY MANAGEMENT ................................................................................... 8 Quality Planning ........................................................................................................ 8 RISK MANAGEMENT ...............................................................................................................9 DISASTER RECOVERY PLAN …………………………………………………………….....42 BUSINESS CONTINUITY PLAN ……………………………………………………..……..51 ACTIVE DIRECTORY SCHEMA ..............................................................................................52 SERVER/ CLIENT CONFIGURATIONS ..............................................................................53 NETWORK/ BUILDING DIAGRAMS ......................................................................................54 BUDGET ……………………………………………………………………………………….59…

    • 16267 Words
    • 66 Pages
    Powerful Essays
  • Good Essays

    The government has failed to identify any particular “authorized investigation”. While I believe the fight against terrorism is an important fight to fight, simply using that as a reason to collect this data is too broad. Additionally, I support Judge Lynch’s finding that Congress meant to exclude this broad collection of data, and that if he agreed with the government it would cause a reading out of the term “authorized investigation”.…

    • 544 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Legal requirements give you guidance and support when storing and handling personal and confidential information about an individual, it will enable you to store information correctly and safely.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In 2001, people are quick to dismiss the idea of an internment of American citizens, suggesting that the country has come a long way from 1942. The hypothesis that the government might conduct surveillance or use illegal wiretaps to monitor groups or individuals that it suspects of domestic terrorism seemed foreign before September 11th, and now has become a way to gain more information about potential suspects. These new measures, included in the USA Patriot Act, delicately trace the line between national security and civil liberties. A brief look at how the Bush…

    • 522 Words
    • 2 Pages
    Good Essays
  • Good Essays

    “My family and I were going into hiding in a Secret Annex that I started building in 1938, from the “S.S” men of Berlin.”…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    English Paper Wiretapping

    • 2159 Words
    • 6 Pages

    I. The government admits that well over 300,000 people have had their phone calls intercepted by state and federal wiretaps in the last year alone.…

    • 2159 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The government should worry citizens, by hiring people to hack into their lives. The National Security Agency, NSA, is “inside” everything from phones to major websites like Google and Yahoo. The NSA is responsible for code breaking and getting information from phones and the internet. The NSA has headquarters in the United Kingdom as well. They try to focus overseas instead of domestically to prevent any serious crime and to defend the UK’s economic interest. Because the NSA doesn’t trust its own U.S. citizens, violates the fourth amendment, and made programs to “hack” us, the NSA invades the privacy of citizens and should be stopped.…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Sub-Point A, Legality : The Heritage Foundation(1.1) has documented the legal and constitutional precedence for the NSA's data collection programs. In 1976 the Supreme Court ruled that when information is provided to a third party, such as a phone provider, it is accepted that said information may be turned over to the government. Furthermore, in the 1979 case of Smith v. Maryland, it was affirmed that a warrant was not needed to survey phone data. This stands under the fourth amendment, as actual content, or rather the phone conversation itself, is not obtainable, merely phone numbers and call length times are logged by the National Security Agency.…

    • 785 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    September 11, 2001 marked a catastrophic change not only in American society but in every western state including Canada. The terrorist attacks on the World Trade Centre and the Pentagon have had a ripple effect, spreading to the entire world and terrifying thousands of people. Following these attacks, world populations were devastated and governments faced a never-before seen need to make laws governing this new form of terror. Countries like the United States of America, United Kingdom, and Canada have passed anti-terrorism legislations that define “terrorism” and how to respond and prevent such attacks.…

    • 1631 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    “The Constitution limits the authority of federal courts to decide actual cases or controversies. That has come to mean that a federal; court can decide only a legal dispute that has real- world meaning to parties” (Denniston par. 26). The court decides whether or not that one’s case is valid or invalid on the matter of obtaining and assessing in the nature of electronic eavesdropping. Detaining the case in the first places is outrageous and obscured, because it maintains to go against a written Constitution that was placed in power by the Founding Fathers to supply America with clearly underlined rules and regulations to certain matter, and the fact that these matters are being take under consideration and sought out to be implicated only alls back on the eyes of the officials who wish to proceed further. With presidents coming into play only drowns the idea into oblivion. Reaching the capacity of perfection or a society built on perfection isn’t realistic or ideal in this instance. Maintaining structure on the other is apprehensible, and thus is well advised. Prompting society with allegations of corruption or granting approval to provoke this law is an awakening that is not perceived to end in bliss.…

    • 245 Words
    • 1 Page
    Good Essays
  • Good Essays

    NSA leaked

    • 1272 Words
    • 6 Pages

    Eight months later, media outlets around the world have published more than 100 revelations in over a dozen languages. We now know that the NSA has tracked private American citizens’ phone calls, emails and social connections; monitored Internet traffic in and out of the U.S.; and spied on allied countries and foreign companies alike. What we have learned so far suggests that the agency has gone from protecting national security to facilitating the United States’ political and economic advantage on the world stage.…

    • 1272 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “Tim, again, Mrs. Bailing did not prohibit the law at all. Remember, the president changed? He got rid of the 4th amendment. So now, anyone can look at your messages. You will get just one minor referral.”…

    • 868 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Technology Civil Rights

    • 717 Words
    • 3 Pages

    The government wants to prevent terrorism but by collecting our data is violating our rights and not telling us the people. “The U.S. Circuit Court of Appeals has said that the bulk collection of phone records is illegal, saying it is “an unprecedented contraction of the privacy expectations of all Americans.” (Listenwise 2015) The government doesn’t care that its violating our rights because they are trying to catch terrorism by considering our data. If the government considers catching terrorist through looking in our data, why hasn’t there been any cases where they catch terrorist because of considering his data as in my opinion a terrorist up to no good in the united states would be using different phones to not get…

    • 717 Words
    • 3 Pages
    Good Essays