Topic:
The US government’s background investigation process for individuals seeking employment with US Federal, State, and Local government agencies and private sector organizations is an important part of US homeland security. Through a thorough investigation of an individual’s biographical, residential, employment, education, military, medical, financial and legal histories, etc., information regarding an applicant’s background is obtained and a report of investigation (ROI) is prepared and submitted to an adjudicator for review. After review of the ROI, the adjudicator makes a determination of an individual’s suitability to obtain a security clearance for a position impacting the US national security. If the results of a background investigation are favorably adjudicated, the individual is eligible to receive a security clearance; if certain derogatory information is obtained during the background investigation, an individual can be denied a security clearance.
Problem:
Although much personal and private information is obtained and reviewed during most background investigations, there is one glaring omission of information that can prove to be valuable in determining the suitability for an individual to obtain a security clearance. The information listed on an individual’s social media accounts (e.g. Facebook, Twitter, Myspace, Internet Chat rooms) can provide invaluable insight into a subject’s character, integrity, loyalty, allegiance and other characteristics
Today, Canadian’s lives today are as translucent as ever. Most organizations especially the government constantly watches each and every one of our moves. By definition, surveillance is any systematic focus on any information in order to influence, manage, entitle, or control those whose information is collected. (Bennet et Al, 6). From driving to the shopping mall to withdrawing money from the ATM machine, Canadians are being watched constantly. With Canada’s commitment to advance technology and infrastructure in the 1960s, government surveillance is much easier and much more prevalent than it was hundreds of years ago. Even as early as 1940s, the Dominion Bureau of Statistics used punch cards and machines to determine who is available
The simplest and most common type of warrantless searches are searches based upon consent. [1] No warrant or probable cause is required to perform a search if a person with the proper authority consents to a search. [2] A consent search requires the person being searched to freely and voluntarily waive their Fourth Amendment rights, granting the officer permission to perform the
With the seemingly exponential propagation of inexpensive digital communications technologies over recent years, the general public is becoming more aware of the issues surrounding information privacy and government surveillance in the digital age. Every Tom, Dick, and Harry with a smart-phone has to be wary of how they use their private information for fear of that information being collected and used in a way contrary to their wishes. "Leaky" smartphone apps that transmit private information across the internet can be unethically used by government agencies. The issue of privacy is a balancing act; the public usually wants increased privacy and the government usually wants increased access.
In the 21st century, the world as we know it suffers from psychotic, demented, treacherous and, sophisticated crimes. This world would be corrupt without a tunnel of light if it was not for the Federal Bureau of Investigation. The Federal Bureau of Investigation, also known as the FBI, is a corporation that seeks fidelity, bravery and, integrity for the United States of America. The FBI researches shocking and concerning crimes the news reports about politics, war and, safety that we hear on the television about issues that are being reported to the people. These cases of transgression are missions the FBI analyzes, such as hacking information from double spies, locating terrorists, seeking pedophiles, cracking down unknown mobsters,
The Brady bill mandated federal background checks on firearm purchasers in the United States, and imposed a five-day waiting period on purchases, the Brady Bill requires that background checks be conducted on individuals before a firearm may be purchased from a federally licensed dealer or manufacturer or to a have it imported. Background check can be used to bypass the NICS check.to make sure urn not a feline or drug lords to get gun the National Instant Criminal Background Check System (NICS) the Federal Firearms Licensee (FFL) initiates the background check by phone or computer. Most checks are determined within minutes These states either require gun sales to be processed through a Federal Firearms License (FFL) holder, or they require
The Federal Bureau of Investigation (FBI) originated on July 26, 1908, as the Bureau of Investigation by U.S. Attorney General Charles Bonaparte. In 1935 the name was changed to the Federal Bureau of Investigation. Director Mueller reconstructed the FBI to support the changes the Bureau made “to meet newly articulated strategic priorities” from 2001 to 2013 (Brief History).On September 4, 2013, James B. Comey was sworn in as the seventh Director of the FBI. The main focus of the Federal Bureau of Investigation is to prevent terrorist attacks against the United States. The Federal Bureau of Investigation enforces and carries out the criminal laws of the United States. “The mission of the Federal Bureau of Investigation is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners” (Quick Facts).
Throughout the mid to late 1980s Katrina consistently provided valuable information to the FBI, some of her reports were even seen at the White House. Katrina and her family frequently went on FBI sanctioned trips to China and government events in the U.S. to collect information. During this time Katrina started another affair with Special Agent William Cleveland, however Cleveland did not disclose any information to her at any time nor tasked her to gather any information. During the late 1980s Katrina had only one incident where she made an unauthorized contact with the Chinese Consulate via a pay phone. However, the FBI did not do a full investigation, because she was an asset, and Smith did not even document that it even happened in her file. Even with the incident, Katrina passed multiple polygraphs in the late 1980s and was vetted of any wrongdoing. By the end of the 1980s, multiple analysts, a defector, and the CIA gave positive assessments of information Katrina was providing and rated some of it invaluable.
In 1908, Attorney General Charles Bonaparte made a force of special agents now called the FBI. Amid the administration of Theodore Roosevelt, Bonaparte and Roosevelt needed an organization that was effective, aptitude, no political associations, and would best serve in government. This lead to the advancement of a gathering of specialists that had no pioneer, however were the precursors of the FBI. By 1909, the 34 specialists, prescribed by Bonaparte and Roosevelt turned into a perpetual piece of the Department of Justice. Attorney General George Wickersham, a successor of Bonaparte, named the unique constrains the Bureau of Investigation ("FBI-History").
The agency now known as the Federal Bureau of Investigation (FBI) was founded in 1908 when Attorney General Charles J. Bonaparte appointed an unnamed force of Special Agents to be the investigative force of the Department of Justice (DOJ). Prior to that time, DOJ borrowed Agents from the U.S. Secret Service to investigate violations of federal criminal laws within its jurisdiction.
After the devastating attacks on the United States on September 11, 2001, this country scrambled to take action to provide future protection. New techniques had to be developed to protect the nation from the menace of terrorism. Along with the new techniques came the decision to enact laws that some believed crossed the threshold of violating civil liberties this county and those living in it were guaranteed by the Constitution of the United States. “On October 26, 2001, the Public Law 107-56, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also known as the USA Patriot Act, was signed into effect” (Stern, 2004, p. 1112). While speaking to Congress,
Imagine a world where your every move was being monitored. A dark world where it is no secret who you are, where you have been and who you associate with; now include who you love, who you pray to and what you just ate for dinner. The word privacy doesn’t exist in such world and it is such world that we are heading to.“Big Brother is watching you!” This quote by George Orwell couldn’t have been truer. Every aspect of our lives is being sorted through as Big Data this very moment. Government surveillance has prevailed by the name of security. But, is government surveillance of internet digital communications like social networks, cell phone calls, text messages, and emails really a public service of security? Or
The right to privacy was not established as a constitutional doctrine until after the result of the Supreme Court ruling in the 1965 case of Griswold vs. Connecticut. The court decision was based on the interpretation of several amendments within the Bill of Rights. Although the Bill of Rights does not explicitly state anything about the right to privacy, a combination of its sections was used as the framework for establishing the right (“Griswold v. Connecticut (1965),” 2007).
According to Renee Fricks, vice president of human resources at Imperial Capital, “Your social media profile can be more revealing that your resume” (Cohen, 10). Social media has become a normal use of technology of an average college student. From Facebook and Twitter, there is a means of connecting students on diverse planes via the Internet. This allows employers to search any potential job candidate’s social media to investigate user’s posts to determine if they fit their position and hold themselves with high moral regard. If students do not monitor what they post, potential employers may be turned away because of inappropriate pictures, conversations, or other behaviors. Learning about proper social media uses can prevent qualified candidates from losing job opportunities.
Today, individuals are sacrificing privacy in order to feel safe. These sacrifices have made a significant impact on the current meaning of privacy, but may have greater consequences in the future. According to Debbie Kasper in her journal, “The Evolution (Or Devolution) of Privacy,” privacy is a struggling dilemma in America. Kasper asks, “If it is gone, when did it disappear, and why?”(Kasper 69). Our past generation has experienced the baby boom, and the world today is witnessing a technological boom. Technology is growing at an exponential rate, thus making information easier to access and share than ever before. The rapid diminishing of privacy is leaving Americans desperate for change.
The sharing of photos picturing wild, late-night college parties, alcohol consumption, and new tattoos or piercings is becoming commonplace in social media. Though they may vary in degree, none are the particularly “good” traits that one would expect to find in a good employee. Practices such as these should stand out as “red flags” that are not typically desired by employers. Other, more subtle, red flags include: obvious mood swings, overly emotional postings, and overly personal content. All of these, potentially detrimental, characteristics can be detected, and avoided, easily with a quick review of a candidate’s social media profile(s).