Verified Document

Homeland Security And FISA Term Paper

NSA/FISA Following the terrorist attacks of September 11, 2001 there has been a significant effort to protect America from any further terrorist attacks. The purpose of this discussion is to examine the U.S. National Security Agency's ability to identify and monitor the communications of terrorists and prevent terrorism from occuring. The research will also investigate how the implications of employing these techniques for foreign intelligence surveillance suggests that the Foreign Intelligence Surveillance Act ("FISA") is inadequate in addressing recent technological developments. These developments include the transition from circuit-based to packet-based communications; the globalization of communications infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis. The research will also focus on how FISA is challenged by technological developments.

The Monitoring of Communications

The National Security agency was created to "protect U.S. national security systems and to produce foreign signals intelligence information." The strategic plan of the agency is to control cryptology throughout the world; maintain a network of systems, sensors, information and people throughout the world, ensure the safety of America's security systems and to advantageously utilize relationships with academia, industry, foreign partners and government (NSA/CSS Strategic Plan, 2009).

One of the ways in which the National security agency is able to carry out the aforementioned responsibilities is to monitor communications and identify terrorists before they commit terrorist crimes. The NSA has the ability to monitor both public and private comminications. This includes telephones, internet communications, mobile phones. The U.S. National Security Agency was supported greatly by the Bush administration as it pertained to having the ability to monitor communication amongst terrorists throughout the world.

In recent years the NSA has endured a great deal of controversy. This controversy existed because the monitoring of communications by the agency has changed over the years to include a greater amount of surveillance of domestic communications. Not only was it changed, but the Bush administration did not make American's aware of such changes until some three years after the changes went into effect.

An article in the New York Times published in 2008 explains,

Months after the Sept. 11 attacks, President Bush secretly authorized the National Security...

Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible "dirty numbers" linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications (Risen, 2005)."
The controversy over increased use of domestic spying without warrants has sparked a great deal of debate about such surveillance as a violation of civil liberties as it pertains to undue searches. However, many in within the agency and the Bush administration contend that the ability to conduct such surveillance has aided in the ability of the agency to keep the country safe. In addtion the government has argued that such surveillance allows law enforcement agencies to prevent terrorists attacks before they occur.

The adequacy of the Foreign Intelligence Surveillance Act (FISA)

According to the American Civil Liberties Union (ACLU) FISA was developed after the Watergate debauchery. It was initially designed to establish the manner in which the United States government was allowed to gather communications in America and abroad (Bill to Amend FISA). The act was also originally passed to permit the government to gather foreign intelligence information including communications with "agents of foreign powers (The Foreign Intelligence Act)."

Since the inception of the act there have been amendments to the act. One such amendment was signed by President Bush in July of 2008. The amendment lessened even further the role of judicial oversight as it pertains to surveillance. This amendment is in stark contrast to the original act in which judicial oversight was a key component. In addition this amendment also absolved telecommunications companies of any legal responsibility for allowing the government to eavesdrop on U.S. citizens without a warrant.

Advances in Technology and FISA

Although the NSA and FISA seems to be adequate and even relentless in the desire to gather communications, there are also problems related to FISA and technological advancements. NSA and FISA have to deal with other technological developments…

Sources used in this document:
Works Cited

Bill to Amend FISA. (2007) The United States Select Committee on Intelligence. Retrieved March 4, 2009 from; http://intelligence.senate.gov/071019/fisa.pdf

Feingold, R. (2008) Remarks of U.S. Senator Russ Feingold

Opposing H.R. 6304, FISA Amendments Act of 2008. Retrieved March 4, 2009 from;

http://feingold.senate.gov/statements/08/06/20080625f.htm
NSA/CSS Strategic Plan (2009). Retrieved March 4, 2009 from; http://www.nsa.gov/about/strategic_plan/index.shtml
http://www.aclu.org/safefree/spying/fisa.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Analyzing Constitution and Homeland Security
Words: 2793 Length: 6 Document Type:

Constitution/Homeland Security FISA FISA -- The Foreign Intelligence Surveillance Act dictates the way the United States government carries out communication surveillance (e.g., telefaxes, emails, telephone calls, Internet websites, etc.) that passes through the United States physically and both the recipient and the sender or either of the two are/is a foreign power, according to FISA definition. FISA's initial purpose, as far back as in 1978, was to make use of the FISA

Ethics and Technology at Homeland Security
Words: 2368 Length: 8 Document Type: Essay

Ethical Considerations for the Use of Technology to Meet Selected Homeland Security Objectives Introduction The Digital Age has transformed the way the world works for better or worse. Technology exists to bring down nations’ infrastructures without ever firing a missile (Ten, Manimaran & Liu, 2010). New technology has been developed that can allow agencies to spy, snoop, monitor, and retrieve conversations had online, through email, on cell phones, or via text messaging.

Homeland Security and the Privacy of the Citizens
Words: 1291 Length: 4 Document Type: Term Paper

Patriot Act also has the ability to strip the American public of their basic rights to privacy. The Patriot Act allows easy access to financial records, pen registers and trap-trace devices could be installed on personal computers and telephones, and student records can be accessed without consent of the school (Unpatriotic Acts). These unregulated powers are guaranteed by the Patriot Act in three amendments. These three amendments include the

Foreign Intelligence Surveillance Act FISA of 1978
Words: 896 Length: 3 Document Type: Essay

Foreign Intelligence Surveillance Act (FISA) of 1978 and Other Laws The terrorist activities of Sept 11, 2001 serve as the source of the U. S fight against terrorism as made popular by the Bush regime. Previously, United States strategies to combat terrorism targeted on attacks against its interests overseas, and support for other governments' initiatives to control terrorism functions within their borders. However, Sept 11 exposed weaknesses to terrorism by non-state

Foreign Intelligence Surveillance Act FISA 1978, Antiterrorism
Words: 687 Length: 2 Document Type: Essay

Foreign Intelligence Surveillance Act (FISA) 1978, Antiterrorism Effective Death Penalty Acts of Terror There are a number of similarities and points of interest between the Foreign Intelligence Surveillance Act of 1978 FISA, the Antiterrorism and Effective Death Penalty Act of 1996, and the U.S.A. PATRIOT Act of 2001. Collectively, these acts make it exceedingly difficult for those involved in acts of terrorism to operate and, when caught, to get any sort

Counter-Terrorism and Social Media: Freedom Vs. Security
Words: 5692 Length: 20 Document Type: Essay

Counter-Terrorism and Social Media: Freedom vs. Security The United States prides itself to being the most democratic nation of the world, with the highest respect for the human being, for its values, norms, and dreams. At the same time, before 9/11, it was also considered to be one of the safest nations of the world. The attacks on the World Trade Center towers, in particular pointed out that there are gaps

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now