National Security Agency and Foreign Intelligence Surveillance Term Paper by Nicky

A look at preventing future terrorist attacks in the US.
# 146187 | 1,290 words | 6 sources | APA | 2010 | US

$19.95 Buy and instantly download this paper now


This paper exanines the US National Security Agency's ability to identify and monitor the communications of terrorists and prevent terrorism from occurring. The research also investigates how the implications of employing these techniques for foreign intelligence surveillance suggest that the Foreign Intelligence Surveillance Act ("FISA") is inadequate in addressing recent technological developments. These developments include the transition from circuit-based to packet-based communications; the globalization of communications infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis. The paper concludes by describing in detail how FISA is challenged by technological developments.


The Monitoring of Communications
The Adequacy of the Foreign Intelligence Surveillance Act (FISA)
Advances in Technology and FISA

From the Paper:

"One of the ways in which the National security agency is able to carry out the aforementioned responsibilities is to monitor communications and identify terrorists before they commit terrorist crimes. The NSA has the ability to monitor both public and private comminications. This includes telephones, internet communications, mobile phones. The US National Security Agency was supported greatly by the Bush administration as it pertained to having the ability to monitor communication amongst terrorists throughout the world."

Sample of Sources Used:

  • Bill to Amend FISA. (2007) The United States Select Committee on Intelligence. Retrieved March 4, 2009 from;
  • Feingold, R. (2008) Remarks of U.S. Senator Russ Feingold Opposing H.R. 6304, FISA Amendments Act of 2008. Retrieved March 4, 2009 from
  • NSA/CSS Strategic Plan (2009). Retrieved March 4, 2009 from;
  • Risen, J. (Dec. 28, 2005 ) Bush Lets U.S. Spy on Callers Without Courts. The New York Times.
  • Taipale, K. A. (Spring 2006) Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance. NYU Review of Law & Security, No. 7, Supl. Bull. on L. & Sec.

Cite this Term Paper:

APA Format

National Security Agency and Foreign Intelligence Surveillance (2010, December 21) Retrieved February 06, 2023, from

MLA Format

"National Security Agency and Foreign Intelligence Surveillance" 21 December 2010. Web. 06 February. 2023. <>