National Security Agency Program Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

The Controversy Surrounding NSA Program

Terrorism is a rising concern that is not only bothering first world countries but also third world countries as well. Terrorist activities have spread so much in the last two decades that they now threaten countries that were previously considered immune, such countries as Kenya, Nigeria, and Tanzania.

The government of the United States has taken this concern and in the effort to contain terrorism formed the National Security Agency (NSA) in 1952. The program targeted calling behavior of Americans both within and without USA who “had suspected links to terrorist activities” (Fisher 199).

Its would not have bee successful had it incorporated the help of American Telephone companies such as AT&T while those who refused cooperation collapsed (Levy et al 5; Fisher 198). (NSA could not operate legally without the necessary legal requirements thus the enactment of Foreign Intelligence Surveillance Act, FISA in 1978 (Fisher 185).

The purpose of this paper is to explore how the controversy surrounding the NSA program since its enactment especially during the reign of President George bush

Yale University School of Law Symposium explains that FISA initial intension was to ensure that all intelligence wiretaps were done for “a probable reason” (404). FISA statute required the establishment of FISA courts to grant permission for such wiretap.

However, the New York Times revealed a gross violation of this statute by the Bush administration, which eavesdropped on thousands of telephone conversations secretly, and without permission from FISA courts (Lichtblau para 1; Yale University School of Law Symposium 404).

Supporters of this move argue that FISA statutes were meant for times of peace thus did not cater for the current security threats. This belief lead to The President lifting some of the “legal restrictions” in the act that did not allowed warrant less electronic surveillance (Risen and Eric para 14).

Proponents continue to argue that this program not only needed implementation in full but also total privacy. Exposing classified information such as documents detailing war on terror to the public is equal to “advertising American war on terror” (Yale University School of Law Symposium 405).

Furthermore collecting information on ones war enemies is an age-old practice and therefore not abnormal in the war against terrorism. This makes the “Terrorist Surveillance Program” intended to collect terrorist information thousands of citizen inside and outside USA without FISA courts approval necessary as it was also in line with the US constitution (406).

FISA statute had several loopholes especially regarding executive authority. It did not address the question of the extent of presidential powers in exercising official authority.

It also does not answer the question whether the president has discretionary powers when national security is at stake and lastly legal experts question its constitutionality if in its provision too restrict executive power, limits the power of the president to act in protecting and securing Americans in dire times (Centre for Law and Security 3).

However, several people have opposed this program vehemently. Opponents state that it amounted to abuse of the law by the Bush administration. They claim that unwarranted wire taps are illegal for whatever reason and that bypassing the FISA policies is unconstitutional in two ways: it amounts to making the FISA statute optional, and it is also a grave abuse of executive authority by the president (Savage and Risen para 11).

Several US judges have also ruled unwarranted eavesdropping illegal as it intrudes into peoples private phone calls without any good reason. The knowledge that phone calls could be tapped unwarrantedly makes Americans paranoid and afraid of free phone speech, which curtails freedom of speech (Holding para 4, 5).

The initial intention of this program was to gain information that would help in the war against terrorism. However, the changing nature of the terrorism coupled with creative manipulation of the law has lead to what many calls abuse of the executive authority. In the meantime, controversy ranges on about the legality and necessity of the program.

Works Cited

Center for Law and Security. “.” For The Record. 2007. Web.

Fisher, Louis. “National Security Surveillance: Unchecked or Limited Presidential Power,” in Carter, Contemporary Cases in U.S. Foreign Policy, 2011. Print.

Holding, Reynolds “Time. 2006. Web.

Levy, David, Leong, Joy, Bus, Lawrence & Plunkett, Michael. “Benefits- Cost Regulation of Negotiated Service Agreements.” n.d. Web.

Lichtblau, Eric. “.” New York Times. July 10, 2008. Web.

Risen, James and Lichtblau, Eric. “.” New York Times. December 15, 2005. Web.

Savage, Charlie and Risen, James. “Federal Judge Finds N.S.A. Wiretaps Were Illegal.” New York Times. March 31, 2010.

Yale University School of Law Symposium, “Warrant less Wiretaps,” in A Loch Johnson and James Wirtz, ed., Intelligence and National Security New York: Oxford University Press, 2008. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, May 27). National Security Agency Program. https://ivypanda.com/essays/the-nsa-program-research-paper/

Work Cited

"National Security Agency Program." IvyPanda, 27 May 2019, ivypanda.com/essays/the-nsa-program-research-paper/.

References

IvyPanda. (2019) 'National Security Agency Program'. 27 May.

References

IvyPanda. 2019. "National Security Agency Program." May 27, 2019. https://ivypanda.com/essays/the-nsa-program-research-paper/.

1. IvyPanda. "National Security Agency Program." May 27, 2019. https://ivypanda.com/essays/the-nsa-program-research-paper/.


Bibliography


IvyPanda. "National Security Agency Program." May 27, 2019. https://ivypanda.com/essays/the-nsa-program-research-paper/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1