Security in the News Essay - 862 Words



  • Since 2008
  • Free revisions
  • Money-back guaranty
  • Up to 5% for the first order. Up to 15% for the orders starting from 2nd

from $9.97/pp

visit site

  • Since 2009
  • Free title page, revisions
  • Discount policy
  • Satisfaction guarantee
  • More than 100 000 orders delivered

from $9.97/pp

visit site

  • Since 2010
  • PhD holding authors only
  • SMS notifications & VIP support
  • Discount policy

from $22/pp

visit site

  • Since 2010
  • 24/7 support team
  • More than 500 writers
  • Money-back guaranty
  • Up to 15% discounts

from $9.97/pp

visit site


StudyMode - Premium and Free Essays, Term Papers & Book Notes





  1. Home >
  2. Essays >
  3. Security in the News

Security in the News

Only available on StudyMode Open Document Save to my library

Please sign up to read full document.

Professional Practices Online Course (MGMT6051)
3 June 2014

Security In The News
The latest security leaks coming from Edward Snowden, American whistleblower, dissident and fugitive who was reportedly obtained millions of documents from his former employer National Security Agency (NSA)1, reveal the amount of hypocrisy American officials have being portraying in dealing with alleged cyber security issues in recent years. United States Government has made a public case about the dangers of buying Information Technology equipment from the largest Chinese telecommunications giant, Huawei, however revelations by Snowden show that NSA was actually creating its own backdoors directly into Huwaei's networks2. The agency has successfully hacked into the company's Chinese headquarters, and obtained information about the workings of giant routers and complex digital switches that are used to connect a third of the worlds' population to the internet, and also monitored communications of all company executives3. Operation was code-named "Shotgiant," and aim was to find links between Huawei Corp and Chinese People Liberation Army4. However, plans went further into exploiting technology so that when Huawei sold their IT equipment to other countries, both allied and non-allied, the NSA could freely browse through foreign computer and telephone networks to conduct unlimited surveillance5. All of this raises another important question beside legitimacy of these actions all together. Is NSA also involved in classic corporate espionage in order to help US based companies of choice to perhaps improve their technological competitive levels in both domestic and international markets? A White House official, Caitlin M. Hayden, stated the flowing: " We do not give intelligence we collect to U.S. companies to enhance their international competitiveness or increase their bottom line. Many countries cannot say the same.6" While American and Chinese establishments are repeatedly hacking each other with high degree or reciprocity around the clock, they are also supposedly trying to deescalate tensions in their cyber cold war7. This raises another question, who will protect basic privacy rights of an average law-obeying internet user? Why does governments think they have right to spy without any limits on general population and not face any consequences while doing so? In his latest appearance via video link during TED conference in Vancouver, BC (Technology, Entertainment and Design converged) Snowden has proposed standardization of usage of SSL cryptographic protocols in all internet browsers8. While such proposal seems rather reasonable and achievable in the immediate future, it only patches the issue and does not even tackles root cause of a problem itself. The permanent solution would be some sort of digital bill of rights, perhaps an United Nations resolution or treaty signed by the governments around the world and adopted in their respective national institutions (parliaments). This idea was initially propped by Tim Berners-Lee, one of the world wide web founders9. Berners-Lee believes that the concept of the open web is under constant threat from the governments and corporations that want to have control over internet10. His proposal is part of the larger campaign currently underway, called Web at 25 (25th anniversary of the world wide web)11. Current situation of unlimited and unsupervised cyber espionage done by everyone on everyone is not sustainable in the long run. There is a big possibility that certain countries may resort into limiting and restricting internet connections with the outside world due to outgoing security issues. Another point of view comes from hacktivist entities such as Anonymous group, who are justifying their own activities as "protest in digital space12". Their view on the US state today is that it reassembles a nexus of power solely for corporate interests. Since it... Show More

Please sign up to read full document.



Country Lovers - Analysis Rubbish dont read Hypnosis Essay Elie Wiesel Essay Truth Essay Erik Erikson Essay Health Essay Male Essay

Share this Document

Cancel Send

Join millions of other students and start your research

Become a StudyMode Member


Have a great research document you think will help inspire other StudyMode members?

Share your document

Upload Now

Get full access to more research and tools for only $0.33/day

Upgrade your Membership

GET PREMIUM @2017 Legal Site Map Advertise, Online Education, Hollywood, CA

More great study tools:

{"hostname":"","essaysImgCdnUrl":"\/\/\/pi\/","useDefaultThumbs":true,"defaultThumbImgs":["\/\/\/stm\/images\/placeholders\/default_paper_1.png","\/\/\/stm\/images\/placeholders\/default_paper_2.png","\/\/\/stm\/images\/placeholders\/default_paper_3.png","\/\/\/stm\/images\/placeholders\/default_paper_4.png","\/\/\/stm\/images\/placeholders\/default_paper_5.png"],"thumb_default_size":"160x220","thumb_ac_size":"80x110","isPayOrJoin":false,"essayUpload":false,"site_id":1,"autoComplete":false,"isPremiumCountry":false,"userCountryCode":"US","logPixelPath":"\/\/\/pixel.gif","tracking_url":"\/\/\/pixel.gif","cookies":{"unlimitedBanner":"off"},"essay":{"essayId":53392598,"categoryName":"Organizations","categoryParentId":"3","currentPage":1,"format":"html","pageMeta":{"text":{"startPage":1,"endPage":3,"pageRange":"1-3","totalPages":3},"html":{"startPage":1,"endPage":5,"pageRange":"1-5","totalPages":5}},"access":"premium","title":"Security in the News","additionalIds":[17,9,10,5],"additional":["Literature","Entertainment","Geography","Computer Science"],"loadedPages":{"html":[1,2,3,4,5],"text":[1,2,3]}},"user":null,"canonicalUrl":"http:\/\/\/essays\/Security-In-The-News-53392598.html","pagesPerLoad":50,"userType":"member_guest","ct":10,"ndocs":"1,500,000","pdocs":"6,000","cc":"10_PERCENT_1MO_AND_6MO","signUpUrl":"https:\/\/\/signup\/","joinUrl":"https:\/\/\/join","payPlanUrl":"\/checkout\/pay","upgradeUrl":"\/checkout\/upgrade","freeTrialUrl":"https:\/\/\/signup\/?\u0026bypassPaymentPage=1","showModal":"get-access","showModalUrl":"https:\/\/\/signup\/?","joinFreeUrl":"\/essays\/?newuser=1","siteId":1,"facebook":{"clientId":"306058689489023","version":"v2.9","language":"en_US"}} tracking img