Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The NSA and Edward Snowden: surveillance in the 21st century
Verble J. ACM SIGCAS Computers and Society44 (3):14-20,2014.Type:Article
Date Reviewed: Nov 30 2015

There have been many works about surveillance issues in the modern Information Age, especially connected to privacy in a world of ever-growing information technology (IT) use in tracing an individual, group, or organization. They are not only about the Internet, but also about advanced technology and software ecosystems capable of mass surveillance attacks on freedom. The public was pretty well informed about these issues and the media covered many activities regarding information leaks from giant systems working on surveillance. However, the media is not always scientifically critical and objective, and some misinformation may occur. As you likely recall, Edward Snowden exposed programs from the National Security Agency (NSA) and other intelligence agencies. In this paper, Joseph Verble tries to present comprehensive research on the surveillance issues from the Edward Snowden case, giving readers a more detailed view of the problems that could occur from the current activities of intelligence agencies.

To introduce readers to the scope of the NSA and its activities, the author briefly presents some relevant facts about its origin and purpose. These preliminary views on the NSA are followed by a description of Snowden’s work and case, with detailed insight into media coverage of the case. Some notions on how information is stolen are also briefly explained.

Since there are illegal actions and questions of legality regarding surveillance activities in the Snowden case, Verble analyzes the process of making charges against Snowden as well as the surveillance program PRISM, which is especially prevalent in the Snowden case. These legal observations are followed by insight into public opinion on leakers and overall surveillance programs. The author stresses some interesting points that present novel questions in the field of privacy issues and the freedom of information. In the conclusion section, the author points out some obstacles of privacy as well as some practical advice for individuals on how to share personal information across the Internet.

The paper is undoubtedly an interesting read, giving more information on the current state of privacy in an Information Age populated with more and more intelligent technology used to process a huge amount of personal information for various purposes, but mostly to strengthen national security as a whole.

Reviewer:  F. J. Ruzic Review #: CR143978 (1606-0446)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Privacy (K.4.1 ... )
 
 
Governmental Issues (K.5.2 )
 
 
Social Issues (K.4.2 )
 
 
Computers And Society (K.4 )
 
 
Legal Aspects Of Computing (K.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy