You are on page 1of 11

Saikumar Dass Malcolm Campbell Honors English 1103 07 November 2013 I SPY: An Inside Look at the NSAs Surveillance

System Do you every have the feeling you are being watched? Do you have the feeling you are being followed (Twitter doesnt count)? This is because you are being watched. Every cellphone call, text, email and all your information on social media is monitored and stored by the US government. Anytime you use your cellphone or laptop the government is constantly being fed information about your Iinternet and cellphone activities. This information was recently released by US whistleblower Edward Snowden. He released over 200,000 documents tons of classified information, but most of it was nothing that would compromise people undercover American agents in other countries (Hosenball). The information he released was the most damaging to the credibility of the government of the United States, but it and also affectsed normal civilian people all around the world. This study will be focusing on to what extent the NSAs surveillance programs are monitoring the people of the United States. There are a multitude of programs the NSA uses to monitor communications including PRISM, MARINA, NUCLEON, and MAINWAY are just a few (Everything You). PRISM is the program the government uses to monitor all people connected to the Internet around the US, and in foreign countries. NUCLEON is used to get phone content and other information from phone companies. Programs like MARINA and MAINWAY are used to sift through all the data collected by PRISM and NUCLEON. The documents leaked by Edward Snowden also included a similar program of surveillance in the

United Kingdom called Tempora, but these other programs are of more relevance to the American people. Edward Snowden is a 29 year old who was a computer analyst for the National Security Agency (NSA) workeding in Hawaii. He had access to on top secret government information. He was initially a security guard for the NSA, then eventually moved to the information technology sector of the NSA. The information technology field was where he analyzed all the data he had coming in and the place where he was eventually able to copy all the information from the government. He later leaked the information to The Guardian (a British newspaper) in May of 2013 which caused a shockwave throughout the world. It had sensitive information about the surveillance programs currently being used in the United StatesSA and the United Kingdom Kingdom along with how this surveillance was doneand how they were doing all this surveillance. He is currentlynow living ins Moscow, Russia after President Vladimir Putin gave him asylum (Edward Snowden). This study will be focusing on to what extent the NSAs surveillance programs are monitoring the people of the United States. There are a multitude of programs the NSA uses to monitor communications including PRISM, MARINA, NUCLEON, and MAINWAY are just a few (Everything You). PRISM is the program the government uses to monitor all people connected to the internet around the US, and in foreign countries. NUCLEON is used to get phone content and other information from phone companies. But the other programs are used to sift through all the data collected by PRISM and NUCLEON. The documents leaked by Edward Snowden also included a similar program of surveillance in the United Kingdom called Tempora, but these other programs are of more relevance to the American people.

Some people call Snowden a hero, others call him a traitor. It all depends on the point of view both Snowden and the government of the United States are portrayed in. Snowden either caused mass panic among the American people or just awareness to what the United States is doing on a daily basis to protect this country. This may lead to decades of protests claiming that the government is trying to act like a Big Brother and see everything that happens. But it could also lead to citizens being more cooperative since it may help to identify terrorists in the United States. Whatever way this situation is viewed in, there will always be positives and negatives to what Edward Snowden did and the repercussions of his actions.
Formatted: Indent: First line: 0.5"

To show the extent to which the NSA surveillance programs impact everyday Iinternet users, here are some facts about Iinternet usage. In just 60 seconds (1 minute) there are 100 thousands tweets posted, 204 million emails sent, 48 hours of YouTube video uploaded, and 3125 pictures shared on Flickr (Wood). If this is just one minute, imagine how much information is flowing in an hour, a day, or even a year. This doesnt even include the number of phone calls and text messages made. These facts give just a small glimpse into the amount of information the NSA is collecting on a regular basis from both the citizens of the United States and international users of technology. According to the documents released by Greenwald and MacAskill of The Guardian, PRISM and NUCLEON monitor all cellphone calls, text messages, emails, Iinternet searches, search locations, and files stored on the cloud., Wwhile MARINA and MAINWAY filter through all of the information that was previously to analyze it. All this information can basically build a profile of the any person who uses some sort of technology every day. Usually tThis would be concerning to many people but surprisingly many most people are fine with the NSAs

surveillance tactics. According to a survey taken by ABC News right after the Snowden leaks, 58 percent of the public agree with how the NSA has been trying to track down terrorists, while 39 percent are against the surveillance measures. But 48 percent of the people also want congressional hearings (which have already started) on the subject of surveillance (Langer). The benefit of having a congressional hearing will make the actions of the government seem more transparent by revealing more information to both the legislative branch of the government and the American people. But at the same time, the hearings have potential for unneeded conflict in an already divided government and revealing of information that could threaten national Evensecurity. Even after the information was leaked, the government denied that any sort of program existed for a short period of time. Some of the companies involved in the PRISM program, such as Google and Facebook, also denied giving private/secure information to the government (OHarrow Jr.). Eventually both the government and the Iinternet companies did acknowledge the existence of the program and said it was a vital part of the NSA to crack down on terrorists and foreign threats to the United States. The director of the NSA, Keith Alexander, said that 50 plus terrorist plots have been stopped as a direct result of the surveillance program, but we have yet to hear about them. The tragic Boston Bombings that took place earlier this year during the Boston Marathon, was not able to be stopped before, and they only found the suspects because of the help of the citizens. A few years ago the Times Square bomb attempt was foiled only because of the help of the citizens yet again. Two street vendors thought the car was parked suspiciously and smelled smoke coming from it. There were a few more major plots that were foiled, but no thanks to the surveillance program. This information was gathered from The Verge, an online technology news source.

It will never be known if these supposedly foiled attempts by the government will be released. For now none of these plots have ever happened and we only have the governments word. The facts for classified documents usually get released by the government several decades after the actual incidents. So it will be a significant amount of time before it is known what actually happened in regard to the failed terrorist plots being a direct result of the NSAs surveillance programs. To be able to process all this data the government has a brand new state-of-the-art facility in Utah that cost 1.5 billion dollars (NSA Utah). The servers for all this are located near a secure military base in Utah where it stores all the data collected from calls, messages, emails, etc. Based on the information from The Verge, the government has access to all this information through companies like Google, Facebook, Microsoft, Yahoo, Apple, and cellphone companies such as AT&T, Verizon, and Sprint. The NSA has back door access to all these companies servers to access all the information at any time. They already had access to phone records from cellphone companies through the Patriot Act-2001, but to get Iinternet information they have to go through the Foreign Intelligence Surveillance Court (FISC), a group of judges that oversee and regulate what information the government can use as intelligence through issued warrants. FISC either approves or disproves of warrants submitted by the government, more specifically the NSA, as of today, they have not rejected a single warrant. This was all approved by Congress through a multitude of different acts and amendments. This includes The Patriot Act, amendments to the Foreign Intelligence Surveillance Act, and Protect America Act of 2007 (Kaminski). This may be made legal by laws passed over the years, but many people could find this a breach of privacy. Especially when they are agreeing to all the privacy terms set by companies like Google and Facebook. These policies are constantly changing, yet people are

unaware of what they are signing up for when clicking the I Agree check box. Most people do not even read any of the words on the agreement, but after they think their privacy has been compromised the public sees a major outcry. According to The Verge, the data that PRISM collects is classified into two different groups: metadata and content. Metadata is the information generated from the use of technology, as stated in The Guardian. For example, if you were to send an email, it would have the exact date, time, and location of the email, the sender and receiver of the email, and even the subject. Sometimes it can go as far as seeing if the email has been opened or not yet. When using an Iinternet browser PRISM collects all web searches, cache, cookies, and even information about the computer you were using while browsing the website. The program leaves no stone unturned and even takes metadata from social media like Facebook and Twitter. From the social media websites, PRISM knows locations, all personal data you post (or tweet), people you interact with the most, times, dates, and even apps you sync social media with (A Guardian Guide). In a nutshell, metadata collected by PRISM knows everything about you and when and where you use technology technology(A Guardian Guide). This should concern everyone because nowadays the Internet is ever present in daily life. It is used to search little things from how to tie a shoe to major life decisions like choosing what college to attend. Pictures and thoughts are all posted on social media and then used on news sources like CNN and ESPN to portray public opinions. Many people live their lives through the Internet and this information the government is collecting, helps the government build entire profiles without them physically asking a single question. Metadata can help the government recreate a persons activities on a daily basis and see everything they have done throughout a day.

In regard to cellphones, metadata records phones numbers, call durations, and locations of all your calls (A Guardian Guide). But for phone data the government uses the program NUCLEON and MAINWAY. The government, by law, needs approval from the FISC and the phone companies, but the NSAs does have direct access to phone companies access to phone records is still in question. Once this data is collected by NUCLEON, it is then analyzed by MAINWAY. It monitors anyone on any of the big three American cellphone companies, which are AT&T, Sprint, and Verizon (Everything You). What this essentially means is that the NSA can potentially access phone records without a warrant. Content is the other type of data that The Verge reported that PRISM collects. This is more specific and is exactly what people say in conversations and messages. So if two people were talking over a cellphone, PRISM could collect exactly what they say in the conversation along with all the other information previously stated. On emails, the subjects of the email and what is stated in the message are also collected by the NSA. This is basically like bugging a line, but on a much wider scale.

The following graphic will help explain how the NSA gets their information.
Formatted: Font: (Default) Times New Roman, 12 pt

Fig. 1. Flowchart of NSA Data. "Everything You Need to Know About PRISM." The Verge. 17 July 2013. Web. 21 Oct. 2013. As seen in the graphic above the information for cellphones comes directly from the cellphone companies such as AT&T, Sprint, and Verizon, which then goes on to Department of Justice. It is up to the Department of Justice, which houses the FISC, to approve or deny the

requests by the NSA to release cellphone information, but it has yet to be denied. This information that the NSA later receives shares it with the Central Intelligence Agency and British Intelligence. When it comes to Internet data the NSA gets direct access to the information from the major Internet companies as seen in the graphic above. The jump from metadata to content data is enormous in terms of the amount of information that is being monitored by the government. When the government monitors metadata it is just basic info like locations, times, and people. But when its content data, they can listen in on details of conversations and even hear what someone is physically saying. Someone could be having a private (or supposedly private) conversation with someone else about an important life decision and the NSA surveillance programs would be able to catch all of it. This is what many consider a breach of security and privacy even for average citizens. There is also evidence suggesting that the NSA spied on more than just civilians. A recently revealed report shows that the US has also been spying on its allies. The latest one to draw attention was the spying on German Chancellor, Angela Merkel. The NSA has been spying on Merkel since 2002 by getting information from her cellphone. This has caused international outrage, especially from the Europeans. President Obama has assured Chancellor Merkel that he did not know about the spying the NSA was doing on her cellphone (McGuinness). The justification according to experts was that the US has been spying on allies forever, and that it is common practice. They also want to find additional information that some foreign governments may not be telling the US (Martinez). It is one thing to spy on enemies, but when the US spies on their own allies, it is a completely different story. They are betraying the trust they built with their allies over decades of partnerships. Even if spying on them is for the greater good it could have negative implications for the United States in the future. It may even slow the process of

getting help from allies since the USA has broken our trust with them on this issue. When the United States spied on allies it may have caused irreparable damage. The monitoring of American civilians is considered necessary by the government because it provides valuable information and helps weed out the terrorists. But the number of terrorists they would be able to find in over 300 million people would be very small. There is the argument that it is not a good way of spending federal money since the program has had minimal results. There is also the counterargument that those few threats that have been stopped have been successful in protecting America. People say that back in the days of WWII and Vietnam, you knew exactly who the enemy was. But today the enemy could a next door neighbor or a coworker. They have evolved from being people wearing uniforms to regular civilians. This is the reasoning behind surveying everyone in the country because there is no way of knowing who the actual enemy is. Widespread surveillance has been made popular through recent pop culture like the movies The Dark Knight and Skyfall and the TV shows Person of Interest and 24. But we didnt feel the impact it has on everyones daily life until Edward Snowden leaked the information to the public. Every step you take on the Iinternet is monitored and stored by the federal government on their servers. They have claimed it is only to monitor foreigners in America and abroad, but there is only so much we knowthat is true and dont know how much transparency there is from our government. there is limited transparency from the government.
Formatted: Font: 14 pt

Works Cited "A Guardian Guide to Metadata." The Guardian. The Guardian, 12 June 2013. Web. 07 Nov. 2013. "Edward Snowden: Timeline." BBC News. BBC, 20 Aug. 2013. Web. 07 Nov. 2013. "Everything You Need to Know About PRISM." The Verge. Ed. The Verge. N.p., 17 July 2013. Web. 21 Oct. 2013. Greenwald, Glenn, and Ewen MacAskill. "NSA Prism Program Taps in to User Data of Apple, Google and Others." The Guardian. The Guardian, 6 June 2013. Web. 30 Aug. 2013. Hosenball, Mark. "NSA Chief Says Snowden Leaked up to 200,000 Secret Documents."Reuters. Thomson Reuters, 14 Mar. 2013. Web. 30 Nov. 2013. Jr., Robert OHarrow, Ellen Nakashima, and Barton Gellman. "U.S., Company Officials: Internet Surveillance Does Not Indiscriminately Mine Data." Washington Post. The Washington Post, 09 June 2013. Web. 23 Oct. 2013. Kaminski, Margot. "The Atlantic." The Atlantic. The Atlantic Monthly Group, 7 June 2013. Web. 06 Nov. 2013 Langer, Gary. "Most Back NSA Surveillance Efforts But Also Seek Congressional Hearings." ABC News. ABC News Network, 19 June 2013. Web. 07 Nov. 2013. Martinez, Michael. "Allies Spy on Allies Because a Friend Today May Not Be One Tomorrow." CNN. Cable News Network, 01 Jan. 1970. Web. 06 Nov. 2013. McGuinness, Damien. "US Bugged Merkel's Phone from 2002 until 2013, Report Claims."BBC News. BBC, 27 Oct. 2013. Web. 06 Nov. 2013. "NSA Utah Data Center - Serving Our Nation's Intelligence Community." NSA Utah Data Center - Serving Our Nation's Intelligence Community. Domestic Surveillance Directorate, n.d. Web. 07 Nov. 2013. Wood, Colin. "Snoop-Gate." Government Technology (2013): 36-37. Print

You might also like