Preview

Nsa Deep Packet Inspection

Best Essays
Open Document
Open Document
2249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nsa Deep Packet Inspection
The NSA’s Data Collection Initiatives |
|An Analysis of the DPI Systems in Place with our National Government

|This document explores the Deep Packet Inspection systems set in place by the United States government’s National Security Agency. Along with |
|an analysis of how the system works, the capabilities of said system will be discussed, along with its legality and future potential for data |
|harvesting. |

With so much happening in the world, and so much going wrong for the United States, the National Security Agency’s chief task is in gathering huge amounts of information and making it immediately useful to prevent terror and cyber warfare threats from damaging United States interests. The NSA’s most challenging task at this point is not in gathering huge amounts of information, but in making it useful. They have the facilities to monitor most telephone calls and email communication that happens in the United States, and with the new Utah Data Center which is currently under construction, they should be able to monitor almost all of it and be able to store it effectively. Ironically, the biggest disadvantage to having a huge amount of data at your disposal is that you have a huge amount of data that you have to sift through in order to get anything useful. This is why the NSA depends so heavily on a technology called Deep Packet Inspection (DPI) which helps the Agency to decrypt and organize internet traffic. Without this emerging technology, the Agency would have to rely on simple searches and manual filtering to find information that is relevant to national security, a very expensive process in terms of both time and money which would ultimately waste the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Kooool

    • 716 Words
    • 3 Pages

    and negatives of the system to support your statement about the capability of the system and…

    • 716 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Recently, it was brought to my attention that there are concerns about some activities on the network that can be considered less than trustworthy. Specifically, the concerns are regarding network traffic called ping sweeps and port scans. I’m putting together this paper to explain how ping sweeps and port scans impact our network traffic.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If someone told you “You are being watched every time you use digital communications, “how would you feel? The majority of people would probably feel discomfort. Sadly, you are being watched by the National Security Agency or NSA. While they allegedly keep us safe, the NSA shouldn't continue to monitor everyone’s digital communications. It gets every tax paying citizens money involved. They violate an amendment of the constitution. Likewise, there is a major loss of privacy. They simply have access to too much information. (Pathos)…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    System Build Project

    • 391 Words
    • 2 Pages

    o What part can technology solve- Data access availability companywide that is in one location.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Patriot Act Case Study

    • 365 Words
    • 2 Pages

    Obviously searching through internet and phone records is a great tool to aid them in tracking terrorists, while seizing bank accounts holts funding for their activities. I suspect…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NSA Pros And Cons

    • 514 Words
    • 3 Pages

    By filtering things like calls, texts, and emails terrorist attacks can be prevented. During a visit to Berlin President Obama said “At least fifty threats have been avoided because of the information that is gathered.This information has not only avoided attacks in the United States, but in other countries around the world. So lives have been saved.” The information gathered has been successful at least fifty times already. This shows that all the information used by the NSA is…

    • 514 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The intelligence may collect information notwithstanding that the law enforcement agency intends to use the information collected for purposes of a law enforcement investigation or counterintelligence investigation (Fritsch et al, 2015). Thus, this alters the traditional distinction between intelligence and law enforcement. So, the connection of these two government function raises questions concerning the methods of collection, targets of collection, and the use of the resulting information, corresponding with the development of Fourth Amendment jurisprudence.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The use information sharing is the one of the components of intelligence gathering. Although it has always been legal, now with the new provisions of Patriot Act has given more power to agencies on the amount of information sharing. The agencies no longer pick and choose what information to pass on, they now pass on all facts to each other and from there the information is sorted. People are no longer seen as unlawful and lawful citizens with the Patriot Act, so now large sums everyone’s personal lives are being accessed throughout the country by law enforcement agencies.…

    • 956 Words
    • 4 Pages
    Good Essays
  • Better Essays

    1984 and Privacy

    • 893 Words
    • 4 Pages

    The National Security Agency, or NSA, is a top-secret agency believed to have the most advanced information vacuuming technology available, similar to the technology used to monitor people in 1984. "In the past, intercepting communications meant just that--copying a telegram mid-route, steaming open an envelope, or attaching alligator clips to the copper wires that connected every phone in the world."(Fordahl) These became extinct as we moved into the digital age; it is now easier than ever to access mass amounts of data. Many people fear that this is turning out to be a fast path to mass surveillance.…

    • 893 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The Fourth Amendment does not allow searches of personal items unless a warrant is used, but by tracking information on people it could help detect terrorism threats sooner. For example, President Obama claims that the data-collection programs “help prevent terrorism (Transcript: Obamas Remarks 4.3).” Even though people do not need a warrant to use these programs, people examine the phone numbers and length of calls, and by doing this it could ultimately protect the country from terrorism threats. Also, the U.S. Patriotism Act enables law enforcement agencies to search through “email and telephone communications, medical, financial, and library records (Legal Information Institute 1.1).” Furthermore, whenever the intelligence gathering community…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Good Essays

    NSA surveillance

    • 884 Words
    • 3 Pages

    There has been a ton of controversy surrounding the topic of the NSA. Throughout the history of the United States we have fallen victim to terrorist attacks and we cannot blame the governments desire to be ten steps ahead rather than 10 steps behind. The NSA’s main focus is our safety, they do not exist to infringe on our constitutional rights. Liberty and security go hand-in-hand; one cannot exist without the other.…

    • 884 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Summary Of Ted Talk

    • 679 Words
    • 3 Pages

    Mr. Hypponen talks about how the national security agency or NSA for short and other American agencies are monitoring foreign data connections that enters or passes US soil, which includes personal data such as emails, text messages, phone calls and other types of data and how our encryption methods are being weaken by installing backdoor access by said agencies.…

    • 679 Words
    • 3 Pages
    Good Essays