National Security Agency

2021 ◽  
pp. 345-378
Author(s):  
Craig P. Bauer
Author(s):  
Rebecca Sanders

This chapter explores shifting patterns of intelligence surveillance in the United States. The Fourth Amendment protects Americans from unreasonable search and seizure without a warrant, but foreign spying is subject to few constraints. During the Cold War, surveillance power was abused for political purposes. Operating in a culture of secrecy, American intelligence agencies engaged in extensive illegal domestic spying. The intelligence scandals of the 1970s revealed these abuses, prompting new laws, notably the Foreign Intelligence Surveillance Act. Fearing further recrimination, the national security establishment increasingly demanded legal cover. After 9/11, Congress expanded lawful surveillance powers with the PATRIOT Act. Meanwhile, the Bush administration directed the National Security Agency to conduct warrantless domestic wiretapping. To justify this program, officials sought to redefine unconstrained foreign surveillance to subsume previously protected communications. The Obama administration continued to authorize mass surveillance and data mining programs and legally rationalize bulk collection of Americans’ data.


Author(s):  
Matthew M. Aid

This article discusses the National Security Agency under the Obama Administration. Upon his inauguration on January 20, 2009, Obama inherited from the Bush administration an intelligence community embroiled in political controversies. Of the sixteen agencies of the intelligence community, the National Security Agency (NSA) faced the greatest scrutiny from the new Obama administration and the Congress. NSA was the largest and the most powerful member of the U.S. intelligence community. Since its formation in 1952, NSA has managed and directed all U.S. government signals intelligence (SIGINT) collection. It is the collector and processor of communications intelligence (COMINT) and the primary processor of foreign instrumentation signals intelligence (FISINT). And since 1958, NSA has been the coordinator of the U.S. government's national electronics intelligence (ELINT) program. It has also the task of overseeing the security of the U.S. government's communications and data processing systems, and since the 1980s, NSA has managed the U.S. government's national operation security (OPSEC) program. In this article, the focus is on the challenges faced by the NSA during the Bush administration; the role played by the NSA during the wars in Afghanistan and Iraq; and the challenges faced by the Obama administration in confronting a series of thorny legal and policy issues relating to NSA's eavesdropping program.


Author(s):  
Alison Harcourt ◽  
George Christou ◽  
Seamus Simpson

Chapter 4 examines the effect of Snowden on security protocols. For twenty years, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) provided security for Internet traffic. However, the TLS 1.2 protocol developed in 2008 suffered from a series of implementation and security issues. The 2013 Snowden revelations sent shock waves through the engineering community. The extent of the targeting of protocol vulnerabilities by security agencies had been greatly underestimated by the IETF. By 2016, Cisco, Fortinet, and Juniper revealed that the National Security Agency (NSA) had successfully targeted its firewalls for years. However, stasis within the IETF barred upgrade to TLS 1.3. The chapter analyses the emergence and contestation of potential solutions to TLS and how the parallel development of the QUIC protocol by Google opened a window of opportunity to enhance security. The agreement on TLS 1.3 in March 2018 was supported by digital rights groups.


IEEE Network ◽  
1996 ◽  
Vol 10 (4) ◽  
pp. 42-47 ◽  
Author(s):  
C.A. Wilcox

2020 ◽  
Vol 22 (11) ◽  
pp. 1976-1995
Author(s):  
Mark Rosso ◽  
ABM Nasir ◽  
Mohsen Farhadloo

This study analyzes the changes in individuals’ Internet search behavior and economic variables following Edward Snowden’s revelation of National Security Agency (NSA) surveillance activities of global Internet communications. We refer to the abrupt changes in individual search behavior beginning in June 2013 following Snowden’s revelations as the “Snowden effect.” The “Snowden effect” is a form of chilling effect. Using data from a unique search engine, DuckDuckGo, we show that chilling effects indeed exist. However, further analysis including the stock prices of the largest cybersecurity companies demonstrate a muted market response to the revelations, while cybersecurity spending data suggest resulting economic harm in the form of increased opportunity costs of buyers of cybersecurity services.


2015 ◽  
Vol 8 (4) ◽  
pp. 539-544 ◽  
Author(s):  
Juliet R. Aiken ◽  
Paul J. Hanges

Big data is becoming a buzzword in today's corporate language and lay discussions. From individually targeting advertising based on previous consumer behavior or Internet searches to debates by Congress concerning National Security Agency (NSA) access to phone metadata, the era of big data has arrived. Thus, the Guzzo, Fink, King, Tonidandel, and Landis (2015) discussion of the challenges (e.g., confidentiality, informed consent) that big data projects present to industrial and organizational (I-O) psychologists is timely. If the hype associated with these techniques is warranted, then our field has a clear imperative to debate the ethics and best practices surrounding use of these techniques. We believe that Guzzo et al. have done our field a service by starting this discussion.


2009 ◽  
Vol 12 (3) ◽  
pp. 149-162
Author(s):  
Cathleen L. Civiello ◽  
Nancy Welker

Sign in / Sign up

Export Citation Format

Share Document