Wednesday, May 29, 2019

Transformation of Global Technology :: essays research papers

The increase in the flow of entropy between nations has proven to be a critical part of the developing outside(a) community. Deficiencies in this field have lead to the ill-preparation by the United States during the Bombing of Pearl Harbor and the attacks on the World Trade Center in phratry 2001. In both cases, critical data was received from surveillance instruments but was not acted upon expediently enough to avoid disaster. With the transition from a state-based threat to non-state terrorist organizations, the make for more thorough scrutiny then before has become paramount to the national security of the United States. When the term global surveillance is mentioned, it is usually referring to what has been deemed signals intelligence. This is the analytic thinking of the targets communication signals and it consists of four distinct parts collection, processing, analysis and dissemination. In 1952, President Truman established the National Security Agency (NSA) with the d ual responsibilities of providing information security for the U.S. government as well as organizing and obtaining intelligence information. Most recently, a global communications cooperative between the U.S. and the U.K. known as ECHELON, has been implemented to collect national security intelligence and spread critical information to its members. This program monitors commercial communications both over phones lines as well as the internet. In 1978, the U.S. Foreign Intelligence Surveillance Act (FISA) was passed which limited the wiretapping of U.S. persons for national security purposes. This legislation developed out of concerns that the United States was abusing its power to unjustly learn to citizenss conversations. In order to avoid the dissemination of personal as well as national information, cryptography can be implemented to specifically keep unwanted viewers from tampering with internet and mail transactions.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.