US Government Surveillance

Improved Essays
Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day. This document will examine how and what role the US government surveillance has played in the information security of tomorrow. Additionally, this report will address what individual organizations can do in this ever changing environment. Lastly, …show more content…
Quite often the answer is not as safe as one might think. Then add to that fact the condition of the US government quest for information through surveillance procedures the situation becomes that much muddled. Mikko Hypponen and others like Bob Schneier suggest we are not as secure as we believe; if we believe that what the government is doing is not intentional and with a purpose. With this being said how then can private organizations kept their digital information private when the government has an unlimited budget and resources. Once again the answer is that perhaps many organizations are fighting an uphill battle. Understanding how important information security is to the business world today this issue must be addressed. While this may appear to be like David vs Goliath there are always measures that can be done to make informational assets of the organization as safe as possible. One such measure is to understand the value of information security. That means everyone within the organization has a firm understanding that informational assets are the bloodline of the future of the organization. The second …show more content…
So, then is information security bigger than many thought. The answer appears to be “yes” it is. This is pointed out in the concept of “Big Data”. Along with this concept is the notion that any and all data is important to collect mine and analyze. This analyzed data then creates and shapes pattern, trends and norms of human behavior. Therefore, it is safe to assume that information security is a big data problem. The government understands this concept all too well and this is why they attempt to secure as much data as possible. The lasting question is do the private sector understand it as well. If they did, then they would have to acknowledged that they can’t compete will the government on a level of resources and financial status. Therefore, they would look to do so with ensuring that their data is analyzed to be relevant to their organizational objectives. If this is done correctly there the analyzation of organizational data could be used to discover what is out of the normal. This in turn could be used for the organization to be proactive instead of reactive. Organizations that get this wrong are often left with data that is simply being stored instead of analyzed for the use of proactive measures. Cybersecurity in the information age while the government is watching is indeed tricky; however, the

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Everybody walks around like a robot, every move and every word is being surveillanced. A totalitarian government is a political concept that citizens should be completely subject to an absolute state of authority. In 1984 many examples of the control and authority, the totalitarian government of Oceania has over it’s citizens are made very clear, and are quite alarming to the average reader. Residing in a “free” country without freedom, this is totalitarianism, this is 1984.…

    • 1550 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The NSA’s surveillance system is a big help in stopping terrorist attacks and disrupts future plans. PRISM replaced another mass Internet data mining program, the Terrorist Surveillance Program, which was launched by the US government after the 9/11 terrorist attacks but heavily criticized and considered illegal. Through PRISM, the NSA monitor and collect internet communications from internet service providers using Data Intercept Technology.…

    • 63 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    NSA Surveillance Report

    • 217 Words
    • 1 Pages

    As a brief overview, the NSA surveillance program was a secret program, code-named PRISM, which allowed the agency to gain access to end-user information stored by big-name and popular internet and social media organizations, such as Microsoft, Apple, Skype, Google, Yahoo!, AOL and Facebook. PRISM tracks user “metadata” information of photos, content of e-mails, live chat, videos, and login alerts. This program was reported to have been authorized by President George W. Bush in 2007 along with other changes to the US surveillance rules. President Barack Obama renewed the edict during his term. Rahul Sagar, assistant professor of politics at Princeton University, argues State secrecy is vital for national security, but it can also be used to…

    • 217 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    NSA Spying On People

    • 840 Words
    • 4 Pages

    Not all websites are created equal. There are many reasons for this inconsistency in website quality, including: age of information, how often the website is updated, and the credibility of the author. For this reason finding an article using a simple google search is difficult, because you will never know if the article you are looking at is spreading misinformation, biased views, or even plagiarism. On a controversial issue such as the NSA, (National Security Agency) a government agency created to conduct surveillance on people, the issue of misinformation and bias becomes relevant in an abundance of sources checked.…

    • 840 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To begin, the government should not be permitted to use surveillance on its citizens because it violates the constitution. According to a series of secret court orders issued by the Foreign Intelligence Surveillance Court, “the NSA effectively granted itself unrestricted access to every American’s complete phone and Internet records, all without any independent oversight.” This means that American citizens are being violated of their right to freedom of speech guaranteed by the constitution. This goes against what the United States stands for, and is unfair to citizens. Additionally, in the article Actually, Most Countries Are Increasingly Spying on Their Citizens, the UN Says by Olga Khazan “countless other Western nations engage in similar…

    • 437 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Forward: When Edward Snowden revealed that the NSA was spying on us in 2012, I expected people to be outraged. I expected a massive public backlash that would lead to reform. By and large, the public’s reaction has been underwhelming. For one reason or another, government surveillance is a topic that many people don’t know about or don’t talk about. I’ve talked to people about surveillance before, and many of them were unaware of key details about it.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Social Surveillance

    • 2149 Words
    • 9 Pages

    Surveillance is everywhere. Even if people do not notice, it is all around us. When creating my surveillance diary and analyzing the results, I noticed several differences in surveillance depending on the locations and settings that I was in. While I was at work, most of the time there was always the feeling that you were being watched, and by the information collected, it was made clear to me that it was not just a feeling. On the other hand, while being in places such as York University for school, although there is security and surveillance, the feeling of being watched was not present as much versus being at work.…

    • 2149 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    The Y2K Crisis

    • 1120 Words
    • 5 Pages

    Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time, there are bound to be security issues at times. When attacks happen on the government and big businesses the outcome can disrupt the world around us.…

    • 1120 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Protecting ones creations or inventions is done by copyrighting. Unfortunately copyright ones creation does not stop some people or companies from trying to take ones idea and make it seem like it is their own. This essay will exploring how easy it is toe copy and share material on the internet and the effects of copyrighting, influence of the open-source movement on attitudes toward copyright, and relationship between creativity and innovation with intellectual property rights. Next we will discuss how personal and professional effects of digital surveillance versus organizational needs for information and control, such as employer monitoring of employee computer use, business monitoring of customers’ Internet behavior, government monitoring…

    • 1009 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    If those that are serving our country isn’t allowed to fully operate, unnecessary conflict will occur which will not only affect the U.S but become a worldwide problem. Terrorist are viewed as people that have given up their rights, therefore obtaining their information shouldn’t be questioned unless the company supports…

    • 1810 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays