In 1984 the journey of one individual, Winston Smith is narrated. His life characterizes the recklessness and deprivation of totalitarian... ... middle of paper ... ...ctive polices in place but don't want those actions used against them. What government has done is manipulated this fear, while 1984 helps those who welcomed over intrusive surveillance question this as another form of government manipulation to bolster government power over its citizens. Ultimately, common ideas found in the novel 1984, totalitarianism, surveillance, and lack of privacy are also ubiquitous in modern society and government. Big Brother and modern day government have been able to control its citizens through surveillance equipment, and fear all for a little more power.
Live under oppression cause Winston can no longer stand for spiritual oppression and resist, which leads to his death. We can see Winston as present Snowden who exposed top secrets and now is to flee to avoid threats and doubt his role in the government. Snowden finds what he does was against human moral and resists government just as he expose secrets and flee to the HK for shelter. Back to 1984, people were basically living under the telescreen, an item that obligates people’s life and observe people. Now days, people are able to collect secrets through the internet.
Also these phone companies allowed the National Security Agency to install practical transmission surveillance equipment Where the NSA could analyze certain key words or keyboard patterns and the connections. No warrant was issued for this as well it violat... ... middle of paper ... ...here that are relatively safe from outside prying eyes, they are called Mesh, and a mesh can be used as a cheap way to access the regular Internet. Thousands of communities worldwide have been building these build your own networks to keep the government from prying into regular people business. It is said when a person runs this network nobody can shut it down. But if somehow, even though these mesh groups are private, and there broken encryptions, mesh can hook up to regular internet, for instance Via satellite then this person can be sending signals back out to where the NSA can get access to be able to set up taps.
Now, reforms are being pressed against the government’s throat as citizens fight for their rights. However, American citizens are slammed with the counterargument of the innocent forte the NSA tries to pass off in claims of good doing, such as how the NSA prevents terrorism. In fear of privacy violations, limitations should be put on the NSA to better protect the privacy of our honest citizens. Recently in global news, the name Edward Snowden has became quite popular as he snatched millions of people’s attention along with breaking news headlines. Snowden released numerous documents via internet that were private to the NSA; these leaks revealed the dirty work the NSA and government have ... ... middle of paper ... ...A was watching their every moment at this very second?
People should understand that NSA is just collecting your data, not listening to your phone conversations nor reading your texts. They just look into people with alarming behavior. If you’ve done nothing wrong, you don’t need to worry. Looking at their previous record, they have managed to stop 42-50 terrorist plots. Just imagine that if there were no NSA, we would have 42-50 attacks like that of 9/11’s.
With computers on the rise, and the government converting to computers, the government needed a way to discourage and prosecute someone that damaged or gained access to the government’s information, and any other kind of computer. This law was also made to protect any kind of businesses computers or servers. The CFAA also is considered a net that Congress throws all the bad fish in. Including “fraud, hacking, piracy, DOS (Denial of Service) attacks, trafficking passwords, (selling, stealing, and buying passwords), and distributing malicious code.” To summarize the Computer Fraud and Abuse Act it protects “anything that connects to the internet”. Computers were on the rise (being used more often), and so were computer crimes.
Orwell is explaining that there are extreme instances that are already existed in American society. He described that our society is not too far away from the present condition that our government could easily turn into the fictional world of 1984. Orwell’s point out some of the issues as a major issue including psychological control, political misinform and propaganda. Government is monitoring the individual lives with technology seems that most important evidences that could result our country to be in that situation in near future. During the fictional world of 1984, the government used telescreens on individual room to make sure that they were not against them.
You are being watched. Your phone calls are listened to, your internet usage is monitored, and almost everything you do is tracked. The technological invasion of privacy that takes place in 1984 by George Orwell is a realistic warning about life today, which can be supported by current technology, potential technology, and the real-life “Brotherhood” movements in the world today. Although not prevalent knowledge, the electronics portrayed in 1984 are already being used to violate civil rights in 2011. For example, in the United Kingdom, ironically where George Orwell lived, the BBC claims that there are currently over 4.2 million closed circuit television cameras – about one for every fourteen people.
American citizens deserve the rights given to them and need to fight for the right to keep them by changing privacy laws to include Internet privacy. The American government used to be able to keep the people in happy ignorance to the fact that they watch every move they make. After certain revelations of people like Edward Snowden, the public knows the extent of the government spying. On June 5, 2013 Edward Snowden leaked documents of the NSA to the Guardian (The Guardian 2). The whistleblower Edward Snowden revealed to the world how the American government collects information like cell phone metadata, Internet history, emails, location from phones, and more.