Verified Document

Edward Snowden Essay

Related Topics:

This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights is followed by a summary of the research and important findings concerning this issue in the conclusion.

Background of the Issue



Beginning in June 2013, Edward Snowden, a computer analyst working for the National Security Agency began leaking thousands of classified documents. These classified documents were disclosed to the Guardian and alleged that the NSA routinely gathered telephonic metadata from telecommunications companies, allowing them to scrutinize American citizens’ Internet activities (Morrison, 2014). According to Francheschi-Bicchierai (2014), among the thousands of documents that were leaked by Snowden, the secrets that were the most harmful to the NSA included the following:

Secret court orders authorized the NSA to review American citizens’ telephone records (Francheschi-Bicchierai, 2014), operating essentially as a domestic intelligence agency (Stein, 2013). In addition, Snowden revealed how the NSA’s telephone surveillance program can gather data on American citizens’ telephone calls including the numbers dialed, the length of the conversations and the dates on which they occurred (McCarthy, 2013).

The disclosure of PRISM, an initiative by the NSA’s to gain direct access to servers in major online providers such as Google, Yahoo, Facebook, Microsoft and Apple, and others (Francheschi-Bicchierai, 2014). This disclosure caused a flood of criticism from the international community in general and the citizens of the U.S. and the U.K. concerning security, privacy, and government spying (Be very afraid, 2013). The PRISM initiative enables NSA officials to collect data from these major Internet companies has been in effect since 2007 as part of the global war on terrorism (Taking liberties in the name of freedom, 2013).

The NSA routinely conducts espionage on foreign countries and world leaders, even those friendly to the U.S. (Francheschi-Bicchierai, 2014).

The disclosure of XKeyscore, which allows the NSA to determine everything that a computer user does online (Francheschi-Bicchierai, 2014).

The NSA attempt to decode encrypted data and sabotage Internet security (Francheschi-Bicchierai, 2014).

The disclosure that an NSA team of hackers exists and what techniques they use (Francheschi-Bicchierai, 2014).

The NSA had access to the Google and Yahoo data centers (Francheschi-Bicchierai, 2014).

The NSA routinely gathers private citizens’ text messages (Francheschi-Bicchierai, 2014) and likely has access to audio versions of telephone calls (Be very afraid, 2013).

The NSA intercepts all telephone calls in Afghanistan and the Bahamas (Francheschi-Bicchierai, 2014).

An NSA program routinely intercepts e-mails of non-U.S. persons outside the United States (Yoo, 2014).

The disclosure of MonsterMind, an NSA cyberattack tool that automatically unleashes a hostile response when network intrusions are detected, a tool that Snowden alleges brought down Syria’s Internet service in 2003 (Ackerman, 2014).

Taken together, it is not surprising that the U.S. government wants to get their hands on Snowden who, following an international odyssey in search of asylum (Stein, 2013), is currently living in an unknown part of Russia temporarily while he seeks long-term sanctuary elsewhere (Be very afraid, 2013). To date, U.S. federal prosecutors have charged Snowden with theft of government property and espionage (Be very afraid, 2013) and has been characterized alternatively as a traitor and even an anarchist (McCarthy, 2013).

Given the clandestine nature...
Government in cryptology that encompasses both Signals Intelligence and Information Assurance (IA) products and services, and enables Computer Network Operations in order to gain a decision advantage for the Nation and our allies under all circumstances” (NSA mission, 2014, para. 2).
Some indication of how the NSA goes about collecting intelligence data can be discerned from the Executive Order 12333 of December 4, 1981 that created the agency and its roles and responsibilities. Today, the NSA Director is tasked with the following

Collect (including through clandestine means), process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions;

Act as the National Manager for National Security Systems as established in law and policy, and in this capacity be responsible to the Secretary of Defense and to the Director, National Intelligence; and,

Prescribe security regulations covering operating practices, including the transmission, handling, and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the National Security Agency, and exercise the necessary supervisory control to ensure compliance with the regulations (NSA mission, 2014).

Likewise, the mission of the NSA’s Information Assurance is to “confront the formidable challenge of preventing foreign adversaries from gaining access to sensitive or classified national security information” (NSA mission, 2014, para. 2). In addition, the mission of the NSA’s The Signals Intelligence division is to “collect, process, and disseminate intelligence information from foreign signals for intelligence and counterintelligence purposes and to support military operations” (NSA mission, 2014, para. 3). The NSA emphasizes that the nature of its mission prevents further disclosure concerning its intelligence-gathering activities. In this regard, the NSA emphasizes that, “The National Security Agency/Central Security Service (NSA/CSS) is a key member of the Intelligence Community and, by its very nature, requires a high degree of confidentiality” (NSA frequently asked questions, 2014). Despite these vagaries, the NSA does state how it goes about intelligence-gathering today:  

The Agency collects, processes, and disseminates intelligence information from foreign electronic signals for national foreign intelligence and counterintelligence purposes and to support military operations. NSA/CSS is also tasked with preventing foreign adversaries from gaining access to classified national security information. (NSA frequently asked questions, 2014, para. 3).

Finally, the same Executive Order that created the NSA also outlined the NSA Director’s roles and responsibilities as follows:

Collect (including through clandestine means), process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions;

Act as the National Manager for National Security Systems as established in law and policy, and in this capacity be responsible to the Secretary of Defense and to the Director, National Intelligence; and,

Prescribe security regulations covering operating practices, including the transmission, handling, and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the National Security Agency, and exercise the necessary supervisory control to ensure compliance with the regulations (NSA mission, 2014, para. 4)..

The Executive Order establishing the NSA and outlining its roles…

Cite this Document:
Copy Bibliography Citation

Related Documents

Analyzing Patriotism and Edward Snowden
Words: 873 Length: 2 Document Type: Essay

Patriotism/Edward Snowden Intstitution: Edward Snowden, 30, well-known for his previous job as a contractor in the U.S. National Security Agency (NSA), is presently living in Russia since his escape from the United States via Hong Kong, due to a revelation of extensive internet and phone surveillance carried out by U.S. intelligence. He used to live with his girlfriend in Hawaii, but after the revelation, initially left for Hong Kong, where his identity

Analyzing Prism Edward Snowden
Words: 1015 Length: 2 Document Type: Essay

PRISM- Edward Snowden PRISM PRISM, deployed by the NSA (National Security Agency) of United States, is a tool used for private electronic data gathering which belongs to the people who use leading internet services such as Gmail, Outlook, Facebook, etc. In the wake of 9/11, the latest effort made by the U.S. government for electronic surveillance is the development of PRISM, which initially started in the supremacy of President Bush with the

Argument Analysis Applied to Homeland Security
Words: 935 Length: 2 Document Type: Essay

Privacy, Security, Whistleblowing [Surveillance is a necessary evil to prevent terrorist attacks from happening.]A [For example, the secret "PRISM" effort saved New York City's subways from a 2009 terrorist plot led by a young Afghan-American, Najibullah Zazi.] A = Main Argument Surveillance is a necessary evil to prevent terrorist attacks B = Level The secret PRISM effort saved New York City's subways in 2009 from a terrorist plot. Claim B. is Level 1 and supports Argument

Issues With Whistle Blowing
Words: 1996 Length: 7 Document Type: Term Paper

Whistle Blowing Introduction and History of Whistle Blowing Whistle blowing is the revealing of immoral, illegal or illegitimate deeds to authorities. The authorities may be insiders or from outside the affected organization. Many cases of whistle blowing involve people revealing information to outsiders especially media organizations or pressure groups about an act they consider to be irresponsible, irregular or illegal (Robbins, 1993). Cases of whistle blowing have increased dramatically in the recent

Privacy Security National Security Vs. Individual Liberties
Words: 2034 Length: 7 Document Type: Essay

Privacy Security National Security vs. Individual Liberties A Long Standing Debate has Taken a New Turn in the Modern Digital Era WikiLeaks The Edward Snowden Leaks Liberty and National Security The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. The events that occurred on September 11th, 2001, definitely changed the political and social landscape within the United

Privacy or Surveillance -- Political Topic Privacy
Words: 1904 Length: 6 Document Type: Essay

Privacy or Surveillance -- Political Topic Privacy or Surveillance? We live in an age of heightened concerns about terrorism and public safety. The events of 9/11, the constant threat of future terrorist plots and mass shootings and public bombings have put both the American people and government on high alert. Some of the government's responses have included development of the Department of Homeland Security and terrorist threat level systems (Hiranandani, 2011). Other

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now