Preview

NSA paper

Good Essays
Open Document
Open Document
739 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NSA paper
NSA Affirmative
William Saletan, 2013[Going Courtless,William, National Correspondent at Slate.com, Going Courtless, http://www.slate.com/bullpen/warrantless_searches_the_court_oversight_of_nsa_phone_surveillan.html]
The National Security Agency has been collecting the phone records of all U.S. citizens—which numbers have called which other numbers, when, and for how long—in an enormous database. The government says this mass collection is OK because the database is “queried”—i.e., searched—only under court supervision. In theory, this two-tiered approach, with judicial scrutiny applied at the query stage rather than the collection stage, is defensible. But does the judiciary—in this case, the Foreign Intelligence Surveillance Court—really examine the database queries?

Tag- This section is about who has access to the data!
1. Who has access to the data?

“Only 20 analysts and NSA and their two managers, for a total of 22 people, are authorized to approve numbers that may be used to query this database,” Inglis testified. Mueller quoted the same figure: “You have just 22 persons who have access to this to run the numbers against the database—20 analysts and two supervisors.” Alexander elaborated:
“Could somebody get out and get your phone number and see that you were at a bar last night? The answer is no, because, first, in our system, somebody would have had to approve, and there's only 22 people that can approve a reasonable, articulable suspicion on a phone number. So, first, that [phone number] has to get input. Only those phone numbers that are approved could then be queried. And so you have to have one of those 22 [people] break a law.”
These statements don’t clarify whether the “access” reserved to these 22 people is a physical or just a legal matter. Is it possible for others to access the data? That raises the next question:

Tag-What is considered Unauthorized?
2. What are the barriers to unauthorized access?

Alexander testified, “To get

You May Also Find These Documents Helpful

  • Good Essays

    On May 7, 2015 the Federal Court of Appeals in New York ruled that the National Security Agency's collection of American phone records in bulk is illegal. Specifically, they ruled that the practice did not fall under the scope of the USA Patriot Act, which allows wire tapping of individuals to detect and prevent terrorism. What is the USA Patriot Act? The USA Patriot Act is a 10-letter acronym for uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism act of 2001. It was passed by Congress following the terrorist attacks of September 11 and signed into law by George W. Bush in 2001. Later when it was set to expire in 2011 Barack Obama renewed the law for another 4 years. The Patriot Act…

    • 405 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The BSA, or Bank Secrecy Act is comprised of six parts; The Patriot Act, MITR, CTR, MIP, SAR, and OFAC. The use of all of these in tandem makes it easy to catch fraud, money laundering, Terrorist funding, Criminal organizations and more. The six parts each play their parts in this, with some being smaller and less complicated but no less important.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The government has failed to identify any particular “authorized investigation”. While I believe the fight against terrorism is an important fight to fight, simply using that as a reason to collect this data is too broad. Additionally, I support Judge Lynch’s finding that Congress meant to exclude this broad collection of data, and that if he agreed with the government it would cause a reading out of the term “authorized investigation”.…

    • 544 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Legal requirements give you guidance and support when storing and handling personal and confidential information about an individual, it will enable you to store information correctly and safely.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In 2001, people are quick to dismiss the idea of an internment of American citizens, suggesting that the country has come a long way from 1942. The hypothesis that the government might conduct surveillance or use illegal wiretaps to monitor groups or individuals that it suspects of domestic terrorism seemed foreign before September 11th, and now has become a way to gain more information about potential suspects. These new measures, included in the USA Patriot Act, delicately trace the line between national security and civil liberties. A brief look at how the Bush…

    • 522 Words
    • 2 Pages
    Good Essays
  • Better Essays

    English Paper Wiretapping

    • 2159 Words
    • 6 Pages

    I. The government admits that well over 300,000 people have had their phone calls intercepted by state and federal wiretaps in the last year alone.…

    • 2159 Words
    • 6 Pages
    Better Essays
  • Good Essays

    To some people the citizens’ rights have been taken away and set back over 100 years. To others it’s an act of necessity for the good and security of the nation. The detaining of illegal aliens and racial profiling has caused many to question the legal aspects of these bills. The intrusion into citizens’ personal and financial information is also a very controversial ethical issue. Many citizens’ and private organization believe that the government has over-stepped their boundaries and is leaning towards a totalitarian form of government. Feingold,R(Senator)(2001)states that “You and I have a duty to analyze, to test, to weigh new laws that the zealous and often sincere advocates of security would suggest to…

    • 780 Words
    • 4 Pages
    Good Essays
  • Good Essays

    “My family and I were going into hiding in a Secret Annex that I started building in 1938, from the “S.S” men of Berlin.”…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The government should worry citizens, by hiring people to hack into their lives. The National Security Agency, NSA, is “inside” everything from phones to major websites like Google and Yahoo. The NSA is responsible for code breaking and getting information from phones and the internet. The NSA has headquarters in the United Kingdom as well. They try to focus overseas instead of domestically to prevent any serious crime and to defend the UK’s economic interest. Because the NSA doesn’t trust its own U.S. citizens, violates the fourth amendment, and made programs to “hack” us, the NSA invades the privacy of citizens and should be stopped.…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    September 11, 2001 marked a catastrophic change not only in American society but in every western state including Canada. The terrorist attacks on the World Trade Centre and the Pentagon have had a ripple effect, spreading to the entire world and terrifying thousands of people. Following these attacks, world populations were devastated and governments faced a never-before seen need to make laws governing this new form of terror. Countries like the United States of America, United Kingdom, and Canada have passed anti-terrorism legislations that define “terrorism” and how to respond and prevent such attacks.…

    • 1631 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “The Constitution limits the authority of federal courts to decide actual cases or controversies. That has come to mean that a federal; court can decide only a legal dispute that has real- world meaning to parties” (Denniston par. 26). The court decides whether or not that one’s case is valid or invalid on the matter of obtaining and assessing in the nature of electronic eavesdropping. Detaining the case in the first places is outrageous and obscured, because it maintains to go against a written Constitution that was placed in power by the Founding Fathers to supply America with clearly underlined rules and regulations to certain matter, and the fact that these matters are being take under consideration and sought out to be implicated only alls back on the eyes of the officials who wish to proceed further. With presidents coming into play only drowns the idea into oblivion. Reaching the capacity of perfection or a society built on perfection isn’t realistic or ideal in this instance. Maintaining structure on the other is apprehensible, and thus is well advised. Prompting society with allegations of corruption or granting approval to provoke this law is an awakening that is not perceived to end in bliss.…

    • 245 Words
    • 1 Page
    Good Essays
  • Good Essays

    “Tim, again, Mrs. Bailing did not prohibit the law at all. Remember, the president changed? He got rid of the 4th amendment. So now, anyone can look at your messages. You will get just one minor referral.”…

    • 868 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nsa Capstone Project

    • 16267 Words
    • 66 Pages

    PRELIMINARY SCHEDULE ....................................................................................................3 Staff Training .............................................................................................................5 Teacher Training ........................................................................................................6 INTRODUCTION......................................................................................................................... 7 Purpose of The Project Quality Management Plan ................................................... 7 PROJECT QUALITY MANAGEMENT OVERVIEW ........................................................... 8 Organization, Responsibilities, and Interfaces .......................................................... 8 PROJECT QUALITY MANAGEMENT ................................................................................... 8 Quality Planning ........................................................................................................ 8 RISK MANAGEMENT ...............................................................................................................9 DISASTER RECOVERY PLAN …………………………………………………………….....42 BUSINESS CONTINUITY PLAN ……………………………………………………..……..51 ACTIVE DIRECTORY SCHEMA ..............................................................................................52 SERVER/ CLIENT CONFIGURATIONS ..............................................................................53 NETWORK/ BUILDING DIAGRAMS ......................................................................................54 BUDGET ……………………………………………………………………………………….59…

    • 16267 Words
    • 66 Pages
    Powerful Essays