With computers on the rise, and the government converting to computers, the government needed a way to discourage and prosecute someone that damaged or gained access to the government’s information, and any other kind of computer. This law was also made to protect any kind of businesses computers or servers. The CFAA also is considered a net that Congress throws all the bad fish in. Including “fraud, hacking, piracy, DOS (Denial of Service) attacks, trafficking passwords, (selling, stealing, and buying passwords), and distributing malicious code.” To summarize the Computer Fraud and Abuse Act it protects “anything that connects to the internet”. Computers were on the rise (being used more often), and so were computer crimes.
In 2013, classified information from the US government was leaked out to major media outlets. The information revealed a mass surveillance of millions of civilians, including U.S citizens, undertaken by the National Security Agency (NSA) and their UK counterpart, the Government Communications Headquarters (GCHQ), and distributed the information they gathered to other government agencies, such as the CIA and the FBI. This was not the first time an American government agency was caught spying on US citizens. For example, a program that ran from 1945-1978, conducted by the Armed Forces Security Agency (AFSA) and its successor, the NSA, analyzed all telegrams entering and leaving the United States, or Project MINARET, where over 1,600 U.S citizens were targeted for being anti-war in the 1960’s, and included spying on important figures such as Martin Luther King, and Muhammad Ali. Today, however, the NSA has access to more information than any time before, in a digital age where millions of people in the US use the internet, led by the rise of the smartphones and tablets.
how we should balance national security with civil liberties. Zurcher. A. (2013, October 31). Roman Empire to the NSA: A world history of government spying.
This loophole allowed the NSA to perform searches on Americans’ phone calls and emails and whatever else they could get their hands on. The NSA programs that used this loophole are Prism and Upstream. Prism being used to collect information from many tech companies, ranging from Apple to Yahoo and everything in between. In another move reminiscent of 1984 was president Barack Obama’s defense of this broad surveillance in June of last year.1 However, it;s not just American spy agencies doing surveillance on citizens. According to recently leaked documents say that the GCHQ, a British spy agency, has tapped into fibre-optic cables and begun to share the information with their American counterparts,the NSA.
19 Feb. 2014. International Business, Times. "Snowden Leaks: NSA Storing Internet Cookies, Location Data for Spying." International Business Times 16 Feb. 2014: Regional Business News. Web. 18 Feb. 2014.
This requires an ongoing attention to protect sensitive business and personal information, as well as safeguard national security. In March 2013, the intelligence officials believed cyber-attacks and digital spying are the highest threat to national security. Unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the sensitive information is known as data breaching. Between January 2005 and May 2008, there were a total of 227,052,199 records containing sensitive personal information that was involved in security breaches in the United States, according to the nonprofit consumer organization Privacy Rights Clearinghouse. Operation Aurora was first publicly disclosed by Google on January 12, 2010.
To the shock of the public in June 2013, Edward Snowden released information concerning a government programme, the National Security Agency, that has been listening in on virtually all phone conversation and viewing almost all internet activity(Gidda "Edward Snowden and the NSA files – timeline". )If Oceania had the technology that is available to society today, our world would parallel that of 1984. Since 1948, technology has become extensively more high-tech. Unforeseen items such as the modern day computer, video game consoles, cellular telephones, and the internet have become realities. Prior to Edward Snowden, many were unaware that the government was tracking their every click and navigation.
Retrieved May 27, 2012, from http://www.faqs.org/espionage/A-An/Ames-Aldrich-H-Espionage-Case.html Trahair, R. C., & Miller, R. L. (2009). Encyclopedia of Cold War espionage, spies, and secret operations (1. pbk. ed.). New York: Enigma Books.