Subject: Cybersecurity and Surveillance: Data and Metadata in BulkSummary:Recent leaks, revelations, and actions by government agencies, particularly the National Security Administration (NSA) , have captured the public's attention and focused it on the protection of privacy and civil liberties. The NSA participates in a mass data collection program that has amassed telephone data over the past five years in order to track down people suspected of threatening the nation. This mass data collection without issued warrants violates the Fourth Amendment and highlights the potential abuses of this program. Not to mention the possible cybersecurity threats: if a subcontractor managed to get hold of this information and leak it, what's to stop hackers from doing the same, or worse. One of the factors at play is the perception of the United States government by both the national and international communities. The United States is generally seen as the “land of the free,” but these leaks suggest otherwise and create distrust of the government. Furthermore, the information collected is only as secure as the program designed; that is, where this data will end up and who will be able to access it. The administration should consider addressing these issues quickly to prevent cybersecurity problems, at a minimum, from escalating. The main focus should be on how to proceed and move forward in terms of the NSA's data collection program. There are three options: 1) Authorize or renew the current program; 2) Transfer data to a telephone company or third party within legal limits; 3) End the program completely. Context: The events of September 11 raised the issue of attack prevention and transformation of the American intelligence community. These technological advances… are at the heart of the paper…nt: The United States still has enemies and threats, so what might intelligence agencies do to address them? Cyber attacks or threats cannot be prevented without some communication-penetrating capabilities. The balance between security and freedom could be discussed publicly to enable potentially better public understanding. A new and/or different program could be created with transparency in initiatives and legal aspects. Next steps: Further research should be conducted to find potential phone companies and/or third parties who could take on this huge and important responsibility. Cyber security measures should be strengthened and any kind of loopholes should be addressed. The urgency lies in potential threats to the collected data from external hackers or enemies of the United States – this is deemed urgent as it could lead to cyber warfare.
tags