RIDGE POLITICAL REVIEW
  • Home
  • Domestic
  • International
  • Opinions
  • Economics
  • Local
  • About
  • Contact
  • All Articles

All Articles

The NSA: Blessing or Curse?

12/18/2013

0 Comments

 
Picture

By Saloni Singhvi

Even though much of the media makes the National Security Agency (NSA) out to be a misguided effort that infringes on basic American liberties, many analysts contend that the NSA greatly benefits Americans on a holistic level. They report that the NSA plays a key role in effectively stopping terrorism and crime.
​
The NSA’s main contribution comes from its unique ability to collect mass data in the United States, enabling it to capture terrorists. Michael Chertoff from USA Today writes that because terrorists operate “under the cover of deception, they can uniquely be detected by the use, analysis, and sharing of intelligence that allows us to see who the real threat is.” While the NSA gathers basic metadata from email and phone communication, its abilities exceed even those. A report by Access to Innovation explains, “By processing the unique pitch contour of the human voice, researchers at the NSA have developed a method of detecting altered voice recordings.” Even more importantly, the NSA has developed a patented suite of algorithms that can detect text from any image, including photos, maps, and videos, extracting critical information from covert communications. This allows them to decode terrorist communications from a wide range of sources. Additionally, an analysis by Harvard specifies that the NSA can even track terrorists on forums on the “Dark Web”, an anonymous underground Internet frequently used by terrorists and other criminals. Using these and other tools, the NSA has been able to provide the FBI and other law enforcement agencies intelligence that assisted in tracking down and capturing 300 terrorists, according to Glenn Greenwald from The Guardian.

However, the NSA uses its capabilities for purposes other than counter-terrorism. The Daily Mail notes that NSA domestic surveillance focuses on targeting underground sites on the “Dark Web.” Through these efforts, the NSA has located one of the largest underground child pornography hosting services in the world, tracked its 1,500 users, 100 gigabytes of data, over 1 million of explicit pictures and assisted the FBI in a complete shutdown of 95% of such sites. Kashmir Hill from Forbes Magazine reports that the NSA was also integral in assisting the FBI in shutting down the Silk Road, a black market drug trade website that head nearly 1 million customers during its peak of operation. Stopping these malicious activities reduces child exploitation and drug abuse across the country.

The NSA also helps to thwart cyber crime directed at the United States. Jack Goldsmith of the Brookings Institution writes that the NSA has been “been heavily involved in the development of the Einstein systems”, which are used to scan communications and block cyber attacks. According to Edward Liu of the University of Maryland, this third iteration, Einstein 3, is the only design of system which can block and respond to cyber threats. In fact, Carolyn Marsan of Network World quantifies the massive benefit to U.S. security, stating that “between 100 and 10,000 cyber‐attacks aimed at each federal agency per week [have been detected] through the Einstein appliances.” Even more significantly, according to the Council on Foreign Relations, there have been 24,000 defense files stolen by China in 2009, a massive security risk. Fortunately, since the installation of Einstein 3 in 2010, this number has been greatly diminished.

1)www.usatoday.com/story/opinion/2013/09/11/nsa‐privacy‐chertoff‐911‐column/2793063/
2)http://www.theguardian.com/world/2013/jul/31/nsa­top­secret­program­online­data
3)http://www.nsa.gov/research/_files/tech_transfers/nsa_technology_transfer_program.pdf
4)http://www.brookings.edu/~/media/research/files/papers/2010/12/08%204th%20amendment%20g oldsmith/1208_4th_amendment_goldsmith.pdf
5)http://www.foreignaffairs.com/articles/138443/brandon‐valeriano‐and‐ryan‐maness/the‐fog‐of‐cyber war?page=show
6)http://www.networkworld.com/news/2010/021110‐cybersecurity‐einstein‐2.html
7)http://www.law.umaryland.edu/marshall/crsreports/crsdocuments/R42409_04202012.pdf
8)http://www.dailymail.co.uk/news/article‐2388197/Eric‐Eoin‐Marques‐NSA‐cyber‐attacks‐took‐Dark‐We b‐used‐online‐pedophiles.html
9)http://www.wired.com/threatlevel/2013/09/freedom‐hosting‐fbi/
0 Comments



Leave a Reply.

    Archives

    December 2022
    November 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    March 2021
    February 2021
    January 2021
    November 2020
    October 2020
    September 2020
    July 2020
    June 2020
    May 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    September 2019
    June 2019
    May 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    June 2017
    May 2017
    December 2016
    November 2016
    June 2015
    May 2015
    January 2015
    November 2014
    February 2014
    December 2013
    August 2013
    May 2013
    March 2013
    November 2012
    September 2012
    April 2012
    March 2012
    February 2012
    January 2012
    November 2011
    October 2011
    September 2011
    June 2011

    Categories

    All
    Aadhavaarasan Raviarasan
    Adam Smith
    Albert Wu
    Alex Liao
    Alex Timoney
    Alicia Jen
    Alison Shim
    Andrea Lan
    Andrew Falduto
    Anvi Mahagaokar
    Atreya Misra
    Ayla D'Silva
    Bardia Vaseghi
    Benny Sun
    Bharat Sanka
    Brandon Lu
    Brian Wen
    Brinda Gurumoorthy
    Caitlin Schiffer
    Camille Shen
    Caroline Margiotta
    Caroline Sha
    Catherine Chen
    Cathy Chen
    Chloe Yang
    Christine Wang
    Daniel Pittaro
    Daniel Zhang
    Davis George
    Deeptanshu Singhvi
    Dilara Shahani
    Ellee Tomaru
    Emily Pan
    Emily Wang
    Erin Flaherty
    Felix Zheng
    Hitha Santosh
    Howard Wei
    Injae Lee
    Jacob Clott
    James Gao
    Jasmine Xie
    Jedson Boyle
    Jennifer Huang
    Joey Walter
    Jonathan Nemetz
    Jon Jen
    Julia Roos
    Kaitlin Smalling
    Katherine Wang
    Katie Kleinle
    Kevin Tang
    Kevin Yang
    Kishan Gandham
    Kunal Damaraju
    Kyanna Ouyang
    Logan Aviles
    Lucas Canteros-Paz
    Maggie Hsu
    Mariam Khan
    Mark Stachowski
    Mason Krohn
    Meghan Mangini
    Michael Shaw
    Mimi Petric
    Namita Kalghatgi
    Noah Smith
    Oliver Tang
    Omar Bekdash
    Pasha Saidi
    Priya Mullassaril
    Raheel Abubakar
    Ranen Miao
    Rayhan Murad
    Robert Johnson
    Ryan Walsh
    Saamia Khan
    Saloni Singhvi
    Sam Klein
    Sarah Ouyang
    Shaina Spector
    Shaurya Ganjoo
    Shiam Kannan
    Sunjay Melkote
    Tim O'Shea
    Tim Tang
    Vicki Liu
    Victoria Lu
    Vivek Gurumoorthy
    Wei Wen
    Willa Yu
    Zayna Kutty

rpr

About
Home
Read All
​
Contact

Sections

International
Domestic
Economics
​Opinions
Local
​
Search Site
© COPYRIGHT 2018 ALL RIGHTS RESERVED.
  • Home
  • Domestic
  • International
  • Opinions
  • Economics
  • Local
  • About
  • Contact
  • All Articles