The National security agency as a producer of intelligence signals across the United States ought to have a strong sense of confidence and formality in its hiring process. In the US, the agency operates under the department of defense and reports to the national intelligence. The task and roles of NSA dwells upon areas such as global monitoring, data collection, decoding nuances, various translations, and information analysis criterion in terms with the counter intelligence forces. Such activities require staff that are diligent, and gave a strong commitment to safeguarding the activities of the agency. In the case of NSA, controversies have often emerged concerning the hiring and eviction of Snowden after his lack of integrity in revealing certain secrets of NSA to the world (Fischer, Edward & David, 85).
In one instance, one element becomes critical as to whether an agency would hire brilliant personnel with no formal credential as well as a controversial history of sabotaging their employers. This is the case of Snowden when Russia hired him as their agency expert in the technology industry despite having a history with the US agency. Many companies have a strong resolution in dealing with such personalities with no formal education and a history of sabotaging their employees (Fischer & Simon, 12). The Russian firm now hiring Snowden on a cautious nuance is akin to sitting on a time bomb awaiting the results of a government element. Therefore, this essay asserts the need for many hiring agencies, especially the national agencies, to be efficient in hiring and maintaining experts.
First, an efficient hiring system fuses the elements of ethical considerations and formal credentials in a security agency. The essence of security and administration is very critical such that every factor of governance becomes necessary in determining the outcome of association. A presidency and its affiliates depend on surveillance to determine their safety of its citizens. For instance in 2009, the NSA in the US had a trail of communication details from America citizens. Such information included nuances such as the details of congressional representatives and their conversations were intercepted leading to a lasting controversy within the environment and the citizenry. Several cases such this occur where the NSA need to intercept the telephone conversations of a citizen body. In these cases, high ethical values are necessary to avert the magnanimity of an ensuing debate. In a state where the government needs to have its operations sealed to avoid a public uproar, the subsequent events often become critical. According to Glen & Ackerman (152), an argument emerges as to whether it is possible to have the government spy on its citizens and still survive; yet a statement by the US government remarks that the government did not intend to intrude into the affairs of the citizens. In certain cases, however, the state stands a better chance of salvaging certain situations when faced with tremendous challenges. In these cases, the need to counter challenges in the system requires high ethical standards among the staff. In cases like Snowden, who acted extremely unethical, a variety of measures ought to emerge to determine the outcome of such surveillance activities.
On another scale, the efficiency of the hiring system to the NSA is a questionable standard when it emerges that the security maintenance and intelligence systems are a matter of intelligence and system analysis. When the system becomes generalized by symbols and nuances of ethical misdemeanor and affiliations, the elements are detrimental.
Efficiency is determined by the brilliancy and intelligence of the staff, many of who are not controlled by the agency. What determines a criminal offense if the activities of, say Mr. Snowden, has anything to do with state rules. The government, on the other hand, has no authority to infringe into the rights and freewill of the citizens. According to BBC news, it is explicitly illegal for the NSA to have any activity that begins to spy on the citizens of US. Such a case is nit coherent to the demands of the state where everybody claims that citizens are considered a foreigner unless data proves them legal residents (Vaux et al, 12). The case is quite delicate owing to the parameters of terror attacks that the state department of defense has to counter. Many congressional representatives have often been for the state security on this issue claiming that every element of the state has a detrimental value if not checked correctly. In many cases, the ethical values conflict, especially when the trails of many terror activities exists
The past years has seen a variety of roles of NSA emerge in the media output. The debate that has ensued over the last three years in the United States points to an issue of public policy. A debate has occurred where a direct confrontation occurred as a behind then scene element factoring several departmental advise. As a major role in debates such as the 1990s, cryptography of the US has emerged with hiring restrictions. One factor emerged then when the exports of the US had to reduce tremendously but not obviously eliminated six years later. A means of securing government communication has engulfed everybody as they try to use the NSA in technology and data encryption techniques. Ideally, certain techniques are only restricted to an esoteric public and not everyone. Therefore, the need to have efficient personnel to handle different items of registration and NSA operations is critical to enhance efficiency in the departmental areas available (Glen & Greenwald, online).
Efficiency of NSA and international relations has become a major issue where the people have adopted a reactionary approach to the different elements of the government and the heightened intrusion of the agency in world affairs. The revelations of June 2013 about the NSA decoding a variety of over 124.8 billion data items from a variety of countries including Germany, UK, as well as France became a landmark element to denounce a variety of unethical practices in the NSA (Hauseman et al, 13). The role of a staff depends on the nature of activities of the agency and, in many cases, the intrusions of the state agencies are often top-secret ideals not confined to the elementariness of other organizations without the details of other nations. The arrest and interdiction of Assanges in the past decade has elicited the matter of wiki leaks exposition and the ideals of counter-operations in action. Such ethical concern in a matter that has equal significance in the affairs of the nation determines the action and nuances of each state. Therefore, equal adaptations of the various elements determine a rejuvenated nature in the security breaches and nuances.
The media has displayed a variety of information over time to denote the actuality of such inherent NSA security status. In the case of Associated Press, reporting on intelligence has often the kind of déjà vu often wrought in films and the romantic film elements. The reporting of Snowden for instance revealed various intelligence substances evident in the case studies elementariness of every hiring service. The events following the leaking of information for any employer in any country would amount to treason and necessitate the breakdown of one’s career. However, the actions of Snowden and his apparent asylum in Russia raised eyebrows for many people who felt the need to re evaluate the structures of international relations and political activities in the region. One factor that enhanced media exposition emerged in the previous time when actually, a Russian agency hired the Snowden fellow amidst fears of his activities and operations. In the coming events, the operations determined fateful nuances of relationship often wrought in the security agencies. After the act of stealing the secrets of his former employer and exposing them to the international community, the record of accomplishment of Snowden appears false and hideous in the nature of operations. Many human resource agencies would fear having such an employee in their midst due to the manner of affiliations evident in the constrictions. In the case of Snowden, he has had a variety of job offers that he has had to stop actually over the past decades (Glen & Ackerman Online). Such job offers reveal the level of efficiency required by certain firms.
In ideal sense, the “bad guy” syndrome in dating and relationships affects even the security firms where the brilliant person becomes the centre of attraction in a bid to enact security operations. Media reports reveal a variety of firms including the Russian VKontakte, which uses face book in a Russian manner to derive a variety of communication and coordination operations. The firms such as Vkontakte view the behavior of Snowden as valuable as opposed to the attitude, which always informs the nature of employees hired in a firm.
According to Smith, a behavioral economist, different nuances of associations and explicitness are detrimental to the hiring process if major elements of association are not factored in a cohesive manner (Cited in Vaux et al 121). However, different values are of importance to the manner and order of influence relevant in the nemesis. Snowden emerges as a self confident and opinionated personality who has a mind of his own unlike the government trodden firms with a responsibility to protect act in place. On a more liberal note, the idea of counter actions becomes a major element of reality as the media try to interview Snowden but fail. Ideally, the firms find his manner interesting and brilliant as he juxtaposes with his jacking techniques quite unmatched. Perhaps this may appear unique and contrary to formed conventions of the state, however, different mannerisms of association become evident in the coordination of the state issues.
Another media element contrary to the activities and expectations of the states dwell upon the demands and nuances of every partner affiliate such that the media tries to expose the events of a personality in accordance with the factors that surround the person unlike the personality element (Vombatker, 12). Auerbach reports in an Associated Press output that Snowden’s act that made him famous was a singular element and not his true self. In many ways than one, he beats the records of many traits, which carries the ideals of every state at hand to connote every factors of association along (Newman 240). Besides his rather abrasive character, the diverse skills and major elements of Snowden are similar and often determined by the elements of affiliation. Snowden, despite the queer character and offensive manner of portraying his employer is still a brilliant character full of sharp skills and thriving in technology.
In a more relevant perspective, the process of hiring a staff in certain firms requires skills and expertise as well as the ethical paradigms of work. When the firms close their eyes to different elements of abrasive and queer behaviors in striking their employment contract, then they are bound to face various elements of failures in their security and data records. As firm meaning to hire Snowden must first establish whether it is ready p deal with the details of such exposure that Snowden may avail to them. Suppose all staff was as Snowden exposing the events and secret data of their staff then the employment system would become really clogged with unethical practices and competitive advantage disparities. Technology may differ with other firms where they may stress more on the need to have the skills without paying close attention to the character value of an employee. Nevertheless, still important in many dimensions, is the need to have different values and criteria in evaluating the character and perspective of all employees if the employment agency and the security system are to thrive and maintain the security they purport to keep. Otherwise, the security agency just as many agencies have multidisciplinary approach and must be safeguarded.
Fischer, Robert J., Edward P. Halibozek, and David C. Walters. Introduction to security. Butterworth-Heinemann, 2012.
Fischer-Hübner, Simone. IT-security and privacy: design and use of privacy-enhancing security mechanisms. Springer-Verlag, 2001.
Greenwald, Glen, and Glenn Greenwald. "XKeyscore: NSA tool collects' nearly everything a user does on the internet'." The Guardian (2013).
Greenwald, Glenn, E. MacAskill, and S. Ackerman. "NSA collecting phone records of millions of Verizon customers daily." The Guardian 6.5 (2013): 13.
Houseman, Susan N., Arne L. Kalleberg, and George A. Erickcek. "Role of Temporary Agency Employment in Tight Labor Markets, The." Indus. & Lab. Rel. Rev. 57 (2003): 105.
Newman, Edward. "Human security and constructivism." International studies perspectives 2.3 (2001): 239-251.
Vaux, Toni, et al. "humanitarian action and private security companies."London: International Alert (2002).
Vombatkere, S. G. "Edward Snowden’s Wake-Up Call–Cyber Security, Surveillance and Democracy." Countercurrents. org (2013).