-
Essay / NSA Spying - 1476
Technology is present in everything we do, from using our home refrigerator, our washing machine, our cellular device, our automobile and/or our computer systems. When you use certain devices, you could potentially transmit information about your personal and private information to others. This information may include bank account and credit card numbers, PINs and/or passwords. Subconsciously, we don't even realize that we could share this information. We provide information that is randomly requested when we enter a dentist or doctor's office, a local liquor store, or when we use social media sites like Instagram, Facebook, Yahoo and/or Google. All of this is collected, stored and tracked by Big Brother, and what does our government do with it and how does it secure this data? What surprises me most is that most Americans don't even recognize the National Security Agency (NSA). has been collecting data on Americans' personal phones and electronic devices for several years. This had happened long before NSA analyst Edward Snowden leaked these facts to the world in late 2013. The NSA was established in the 1950s, and during that time it released intelligence information to from electronic signals for foreign counterintelligence and counterintelligence purposes that supported our military. needs. Today, the NSA has refocused its espionage tactics with current technological changes and has an extensive "telephone metadata program, since 2001, and has collected the telephone records of virtually every American" (Lizza, 2013) . “In addition to phone records and email logs, the NSA uses Facebook and other social media profiles to create maps of social connections – including those of American citizens” (Simpson & Brown, 2013). NSA spends “$25... middle of paper......anization. Retrieved from http://www.niso.org/publications/press/RFP_Writers_Guide.pdfLabott, E. and Shoichet, C. (October 28, 2013). NSA Spying Allegations: Five Things You Need to Know. Retrieved from http://www.cnn.com/2013/10/28/politics/nsa-spying-key-questions/Lizza, R. (December 31, 2013). The metadata program in eleven documents. THE NEW YORKER, retrieved from http://www.newyorker.com/online/blogs/comment/2013/12/a-history-of-the-metadata-program-in-eleven-documents.htmlMusil, S. (2013 , December 10). The NSA said it uses Google cookies to track surveillance targets. Retrieved from http://news.cnet.com/8301-13578_3-57615206-38/nsa-said-to-use-google-cookies-to-track-surveillance-targets/Simpson, D. and Brown, P. ( September 30, 2013). The NSA exploits Facebook for connections, including American profiles. Retrieved from http://www.cnn.com/2013/09/30/us/nsa-social-networks/