scholarly journals The National Counterterrorism Center: Foreign and Domestic Intelligence Fusion and the Potential Threat to Privacy

Author(s):  
Bennie G. Thompson

Late last year, Americans woke, dressed, read the newspaper, and learned that the Federal Government had been spying on them for over three years. The White House had asked theNew York Times not to publish an article detailing President Bush’s authorization of National Security Agency (NSA) wiretapping of American citizens.1 The paper consequently delayed publication of the story for a year.2 When the news finally broke, it ignited a firestorm of public controversy.

Significance Both groups are backed financially by the Koch brothers, who are leading conservative political donors and have sought to shape the Republican Party in favour of strictly limiting the role of the federal government. Congressional Republicans with similar views currently claim that they have the votes to block the AHCA from advancing despite the vocal backing of Trump and their party's congressional leadership. Trump ran as a non-politician, but now as a de facto leader of the party, his ability to push through policy priorities will force him to engage with the ideological and factional divisions of the Republican Party. Impacts Republican objections to Trump policies on fiscal and national security grounds will prove the most contentious. Few Cabinet secretaries or agency heads will enjoy autonomy from a vigilant White House team. However, lack of central direction will make clashes on policy inevitable. Dysfunction will harm congressional leaders more than Trump, who has relatively fewer discrete policy pledges.


Author(s):  
O. B. Berezovska-Chmil

  In this article theoretical and еmpirical analysis of social security are conducted. Ways of the optimization social security are argumented. The author notes that significant transformation processes are taking place in the country. They affect the state of security. It is noted that with the development of scientific and technological progress the number of threats and dangers does not decrease. At the same time, the essence of the phenomenon of "danger" is revealed. Empirical studies have been carried out on the basis of an analysis of problems related to ensuring the necessary safety of people. It is established that in recent times organized crime, including cybercrime, has spread widely in Ukraine. It has a negative impact on ensuring national security and sustainable development. A number of factors have been singled out. They are a potential threat to national security. Groups of possible dangers are determined. Summarizing the opinions of scientists, the essence of the concept of "social security" is characterized. It is emphasized that its state is influenced by the level of economic development, the effectiveness of social policy of the state and state regulation of social development. The authors have grounded the formation of national and social security, have proved that sustainable development is connected with the observance of social standards; have considered the development and implementation of a balanced social and environmental and economic policy. This policy would involve active use of the latest production technologies, minimizing the amount of harmful emissions to the environment, strengthening the role of the state in solving social and economic problems and sustainable development.


Author(s):  
Rebecca Sanders

This chapter explores shifting patterns of intelligence surveillance in the United States. The Fourth Amendment protects Americans from unreasonable search and seizure without a warrant, but foreign spying is subject to few constraints. During the Cold War, surveillance power was abused for political purposes. Operating in a culture of secrecy, American intelligence agencies engaged in extensive illegal domestic spying. The intelligence scandals of the 1970s revealed these abuses, prompting new laws, notably the Foreign Intelligence Surveillance Act. Fearing further recrimination, the national security establishment increasingly demanded legal cover. After 9/11, Congress expanded lawful surveillance powers with the PATRIOT Act. Meanwhile, the Bush administration directed the National Security Agency to conduct warrantless domestic wiretapping. To justify this program, officials sought to redefine unconstrained foreign surveillance to subsume previously protected communications. The Obama administration continued to authorize mass surveillance and data mining programs and legally rationalize bulk collection of Americans’ data.


Author(s):  
Matthew M. Aid

This article discusses the National Security Agency under the Obama Administration. Upon his inauguration on January 20, 2009, Obama inherited from the Bush administration an intelligence community embroiled in political controversies. Of the sixteen agencies of the intelligence community, the National Security Agency (NSA) faced the greatest scrutiny from the new Obama administration and the Congress. NSA was the largest and the most powerful member of the U.S. intelligence community. Since its formation in 1952, NSA has managed and directed all U.S. government signals intelligence (SIGINT) collection. It is the collector and processor of communications intelligence (COMINT) and the primary processor of foreign instrumentation signals intelligence (FISINT). And since 1958, NSA has been the coordinator of the U.S. government's national electronics intelligence (ELINT) program. It has also the task of overseeing the security of the U.S. government's communications and data processing systems, and since the 1980s, NSA has managed the U.S. government's national operation security (OPSEC) program. In this article, the focus is on the challenges faced by the NSA during the Bush administration; the role played by the NSA during the wars in Afghanistan and Iraq; and the challenges faced by the Obama administration in confronting a series of thorny legal and policy issues relating to NSA's eavesdropping program.


Author(s):  
Carlos A. Ball

Progressives who opposed the Trump administration’s policies found themselves repeatedly relying on constitutional principles grounded in federalism, separation of powers, and free speech to resist the federal government. Although many progressives had either criticized or underemphasized those principles before Trump, the principles became vital to progressive causes after Trump was elected. Using dozens of examples from the ways in which Trump abused presidential powers, this book explains how the three sets of principles can help mitigate the harms that autocratic leaders in the Trump mold can inflict on both democratic institutions and vulnerable minorities. In doing so, the book urges progressives to follow this rule of thumb in the post-Trump era: if a constitutional principle was worth deploying to resist Trump’s harmful policies and autocratic governance, then it is likely worth defending in the post-Trump era even if it makes the short-term attainment of progressive objectives more difficult. This type of principled constitutionalism is essential not only because being principled is good in and of itself, but also because being principled in matters related to federalism, separation of powers, and free speech will help both advance progressive causes over the long run and reduce the threats posed by future autocratic leaders in the Trump mold to our system of self-governance, to our democratic values, and to traditionally subordinated minorities. Going forward, progressives should promote and defend constitutional principles grounded in federalism, separation of powers, and free speech regardless of whether they have an ally or an opponent in the White House.


Author(s):  
Min-hyung Kim

Abstract Given the limits of the prevailing hedging account for Seoul’s puzzling behavior that is in conformity with the interests of its adversary (i.e. North Korea) and potential threat (i.e. China) rather than those of its principal ally (i.e. the United States) and security cooperation partner (i.e. Japan), this article emphasizes the impact of the progressive ideology on Seoul’s security policy. In doing so, it calls for attention to a domestic source of ideology in explaining the security behaviors of a secondary state, which is under-researched and thus is poorly understood.


Author(s):  
Alison Harcourt ◽  
George Christou ◽  
Seamus Simpson

Chapter 4 examines the effect of Snowden on security protocols. For twenty years, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) provided security for Internet traffic. However, the TLS 1.2 protocol developed in 2008 suffered from a series of implementation and security issues. The 2013 Snowden revelations sent shock waves through the engineering community. The extent of the targeting of protocol vulnerabilities by security agencies had been greatly underestimated by the IETF. By 2016, Cisco, Fortinet, and Juniper revealed that the National Security Agency (NSA) had successfully targeted its firewalls for years. However, stasis within the IETF barred upgrade to TLS 1.3. The chapter analyses the emergence and contestation of potential solutions to TLS and how the parallel development of the QUIC protocol by Google opened a window of opportunity to enhance security. The agreement on TLS 1.3 in March 2018 was supported by digital rights groups.


Sign in / Sign up

Export Citation Format

Share Document