Private Communication: Any Amount Of Physical Or Electronic Contact Between People In A Private And Secretive Communication.

National Security: The Protection Of The Peoples In That Nation Or State. Value: Utilitarianism: The Pursuit Of Benefit For The Greater Amount Of Peoples. In this case benefit means the prevention of the loss of lives of a greater amount of people regardless the cost. Value Criterion: Laws barring government surveillance groups be lifted in regards to amount of laws.

These surveillance programs be allocated more money so as to purchase or acquire automated systems to filter through metadata acquired by these programs.The U. S. government can fully monitor air, space, and sea for potential attacks from abroad. But it has limited access to the channels of cyber-attack and cyber-theft, because they are owned by private telecommunication firms, and because Congress strictly limits government access to private communications. “I can’t defend the country until I’m into all the networks,” General Alexander reportedly told senior government officials a few months ago.

Contention 1: Domestic Surveillances are utilized properly and are being used effectively towards threats to the United States.Subpoint A: The NSA domestic surveillance programs have assisted in the prevention of over 50 terrorist activities. During the “lifetime” of the two domestic surveillance programs being utilized by the NSA, these programs have assisted in stopping a total of 54 terrorist activities, including potential terrorist plots. These two programs involve the collection of metadata of phone calls made in the U.

S. and the monitoring of Internet use. These terrorist activities that were halted included funding to a terrorist group in Somalia and an attack on the New York Stock Exchange.Deputy FBI Director Sean Joyce told a House committee yesterday. Surveillance of communications between a known al-Qaeda extremist in Yemen and an individual in the U.

S. allowed the FBI to “detect a nascent plot” to bomb the exchange and arrest those involved, he said. “The tools as I outlined to you and their uses today have been valuable to stopping some of those plots,” Joyce said at a House Intelligence Committee hearing on U. S. collection of data on telephone calls and Internet communications.

Joyce also provided new details about how the surveillance programs helped stop a plot by Najibullah Zazi to bomb New York City subways in 2009. The government intercepted an e-mail from a suspected terrorist in Pakistan to identify and find Zazi, Joyce said, and used phone records to help identify one of Zazi’s co-conspirators, Adis Medunjanin Subpoint B: Terrorist Attacks during the Bush Administration have been countered and eluted with the help of the NSA program. People cannot deny the fact that the information the National Security Agency has gathered has successfully prevented multiple Al Qaeda attacks on the United States.General Michael Hayden, President Bush’s nominee for the head of the Central Intelligence Agency and leader of the NSA Program for much of its existence, has said, “[t]his program has been successful in detecting and preventing attacks inside the United States. I can say unequivocally that we have got information through this program that would not otherwise have been available.

” Attorney General Alberto Gonzales has stated that the NSA program was one of the most helpful resources to help prevent attacks within the United States.According to intelligence directors, placing a spy in a terrorist organization is not as easy as the movies. Contention 2: We must move forward with our current methods of surveillance and security. Subpoint A: We do not have direct connections into the Al Qaeda and other groups so we must use their virtual traffic to our advantage.

The Al- Qaeda are an enemy that cannot be prevented by watching an embassy or diplomat, we do not have connections or communication to the radical organization, ergo we must find other methods, such as the NSA controlling virtual communication traffic.Judge Richard Posner, the judge for the US Court of Appeals for the Seventh Circuit in Chicago, says the intelligence agency must cast a wide net with a fine mesh to catch the clues that may enable the next attack to be prevented. Our best information about al Qaeda will be scattered and tough to gather, and our agents must be able to follow many leads quickly and move fast on hunches and educated guesses. Members of the al Qaeda network can be detected, with good intelligence work or luck, by examining phone and email communications, as well as evidence of joint travel, shared assets, common histories or families, meetings, and so on. As the time for an attack nears, “chatter” on this network will increase as al Qaeda operatives communicate to coordinate plans, move and position assets, and conduct target reconnaissance.

When our intelligence agents successfully locate or capture an al Qaeda member, they must be able to move quickly to connect new information to other operatives before news of the capture causes these operatives to disappear. It is more important to chase them down quickly inside the United States than outside.