Dismissal Of CIA Chief David Petraeus Reveals Essay

PAGES
2
WORDS
617
Cite

¶ … dismissal of CIA chief David Petraeus reveals much about the security of our nations electronic communication. Essentially if the person in charge of an extremely secretive government organization can be compromised through lax information security, than there may be larger problems on the horizon. Claburn, (2012) looked at this example in his article " The Petraeus Affair: Surveillance State Stopper." The purpose of this essay is to evaluate this article and make a qualitative assessment on the material it presented. Furthermore, I will comment on the usefulness, validity and appropriateness of the article to complete my argument. Claburn introduced an interesting argument supposing that the recent Petreaus scandal may have caused. The article documented the email exchanges between his mistress, Paula Broadwell, and another mistress Jill Kelly. Gmail was used as the email transporter in this case and unknown to any party perhaps, Gmail has the ability to track IP addresses. Claburn documented...

...

He continued to suggest that the privacy of these individuals had been clearly violated as FBI agents appeared to be snooping when no criminal activity was present. Ultimately he concludes the article by stating "Now that it's clear government officials stand as naked before online investigators as lowly citizens, maybe we'll see privacy exhumed from its grave, embalmed, and propped up as if it were alive and well again."
The article itself is succinct and direct while presenting a solid argument. Basically Claburn is questioning the power of federal agencies involvement in the personal information exchanges of people. He wants to know where the line should be drawn, and I must agree with him. Information can…

Sources Used in Documents:

Works Cited

Claburn, T. (2012). The Petraeus Affair: Surveillance State Stopper? Information Week, 14, Nov 2012. Retrieved from http://www.informationweek.com/security/privacy/the- petraeus-affair-surveillance-state-s/240124975


Cite this Document:

"Dismissal Of CIA Chief David Petraeus Reveals" (2013, January 14) Retrieved May 2, 2024, from
https://www.paperdue.com/essay/dismissal-of-cia-chief-david-petraeus-reveals-104682

"Dismissal Of CIA Chief David Petraeus Reveals" 14 January 2013. Web.2 May. 2024. <
https://www.paperdue.com/essay/dismissal-of-cia-chief-david-petraeus-reveals-104682>

"Dismissal Of CIA Chief David Petraeus Reveals", 14 January 2013, Accessed.2 May. 2024,
https://www.paperdue.com/essay/dismissal-of-cia-chief-david-petraeus-reveals-104682

Related Documents
IP Address
PAGES 2 WORDS 554

Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information. The company's computer network will not connect to the internet with this

Ip Address and Security
PAGES 16 WORDS 3513

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

TCP IP Protocol
PAGES 3 WORDS 1088

TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts

Grandmaster and Gong Er: Wong Kar Wai's Ip Man and the Women of Kung Fu Wong Kar Wai's Grandmaster begins with a stylish kung fu action sequence set in the rain. Ip Man battles a dozen or so no-names before doing a one-on-one show with another combatant who appears to be at equal skill and strength. Ip Man handily defeats him and walks away unscathed. Thanks to fight choreography by Chinese

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There