Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Technology as a threat to privacy
Government surveillance cons
Technology as a threat to privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Many people are excited when it comes to the new technological advances and next-generation devices that are being invented and discovered. The world is advancing at an extremely fast rate; so fast that it's nearly impossible to keep up with the latest and greatest. The “latest and greatest”, however is not exactly what people think. Some of the more interesting inventions range from giant billion dollar global satellites that record and store your every text and call to the seemingly harmless front cameras on your iphones that could be on and recording at any given moment. This is such a crisis that a recent study from MIT by Gary T. Marx showed that technology has become so bad that “The ratio of what an individual knows about himself (or is capable of knowing ) compared to what a government official can obtain as far as personal information is shifting towards the official.” Just the sheer thought that someone has the ability to know more about you than yourself shows just what technology is capable of. The only solution to such a problem like this would be for the government to be public about every bit and byte of data they collect and provide the people a way to know when their information is being collected.
The reason for not going for a complete removal of government spying is simply a case of the ends justifying the means. Fortunately our government believes there is actually some genuine good that comes from invading everyone's personal information. One of the major government-proposed benefits is stopping terrorism. With just a few key words, an individual's text messages can be flagged and prioritized for review as a possible terrorism attempt. According to a recent 2013 survey from the Pew Research Center, 56% of Am...
... middle of paper ...
...s the people to have this right, while still being able to operate and perhaps prevent terrorism for real.
Works Cited
Marx, Gary T. "Privacy and Technology." Privacy and Technology. N.p., n.d. Web. 30 Mar. 2014.
Nakashima, Ellen. "NSA Phone Record Collection Does Little to Prevent Terrorist Attacks, Group Says." Washington Post. The Washington Post, 12 Jan. 2014. Web. 01 Apr. 2014.
"Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic." Pew Research Center for the People and the Press RSS. Pew Research Center, 10 June 2013. Web. 1 Apr. 2014.
Avirgan, Jody. "A Running List of What We Know the NSA Can Do. So Far." The Brian Lehrer Show. New York Public Radio, 17 Jan. 2014. Web. 01 Apr. 2014.
Mick, Jason. "DailyTech - Audit: NSA Agents Broke the Law Nearly 3,000 Times from 2011 to 2012." DailyTech.com. DailyTech LLC, 16 Aug. 2013. Web. 29 Mar. 2014.
The NSA is a U.S. intelligence agency responsible for providing the government with information on inner and foreign affairs, particularly for the prevention of terrorism and crime. The NSA maintains several database networks in which they receive private information on American citizens. The agency has access to phone calls, emails, photos, recordings, and backgrounds of practically all people residing in the United States. Started in 1952 by President Harry Truman, the NSA is tasked with the global monitoring and surveillance of targeted individuals in American territory. As part of the growing practice of mass surveillance in the United States, the agency collects and stores all phone records of all American citizens. People argue that this collected information is very intrusive, and the NSA may find something personal that someone may not have wanted anyone to know. While this intrusion's main purpose is to avoid events of terrorism, recent information leaks by Edward Snowden, a former NSA contractor, show that the agency may actually be infringing upon the rights of the American citizen. Whether people like it or not, it seems that the NSA will continue to spy on the people of the United States in an attempt to avert acts of terrorism. Although there are many pros and cons to this surveillance of American citizens, the agency is ultimately just doing its job to protect the lives of the people. Unless a person is actually planning on committing a major crime, there is no real reason for citizens to worry about the NSA and it's invasion of our privacy. The agency is not out to look for embarrassing information about its citizens, rather, only searches for and analyzes information which may lead to the identification of a targe...
Since the terrorist attacks at Sept. 11, 2001, the surveillance issue often has turned away the table in the debate of individual privacy or counterterrorism. By passing the Patriot Act, Congress gave President Bush an immense law enforcement authority to boost U.S's counterterrorism, and the President used his enlarged powers to forward specific programs in order to reduce the threat of terrorism and defend the country’s safety.
"Going soft on the NSA." Philadelphia Inquirer, The (PA) 25 May 2006: Newspaper Source. Web. 18 Nov. 2013.
Don’t put it on the internet, although I guess some people would! “Don Tapscott can see the future coming ... and works to identify the new concepts we need to understand in a world transformed by the Internet.” (“Don Tapscott” Ted Conferences LLC) Tapscott is an Adjunct Professor of Management at the Rotman School of Management and the Inaugural Fellow at the Martin Prosperity Institute. In 2013, Tapscott was appointed Chancellor of Trent University. He has written extensively on the topic of information security in the digital age over the past fifteen years. In his essay entitled, “Should We Ditch the Idea of Privacy?”(Tapscott p.117). Tapscott considers a new, emerging theory
Dagar, Anil. “Internet, Economy and Privacy.” Fung Institute for Engineering Leadership. 16 April 2013. Web.
The recent terrorists attacks of 9/11 has brought security to an all-time high, and more importantly brought the NSA to the limelight. Facts don 't change however, terrorist attacks are not common as history has shown. So what has domestic surveillance actually protected? There are no records to date that they have stopped any harm from being caused. If it is well known by every American that they are being watched, then why would a terrorist with the intention of harming use these devices to talk about their heinous acts? The real criminals are smarter than this, and it has shown with every attack in our history. Petty acts of crime are not what domestic surveillance should be used for. Terrorism has been happening for decades before any electronics were introduced, and even in third world countries where electronics are not accessible. The government needs a different way to locate these terrorists, rather than spy on every innocent human being. Andrew Bacevich states in his article The Cult of National Security: What Happened to Check and Balances? that until Americans set free the idea of national security, empowering presidents will continue to treat us improperly, causing a persistent risk to independence at home. Complete and total security will never happen as long as there is malicious intent in the mind of a criminal, and sacrificing freedoms for the false sense of safety should not be
The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat to the nation. This collection of mass data without issued warrants violates the Fourth Amendment and brings the potential abuses with this program into view. Not to mention possible cyber security threats: if a subcontractor was able to commandeer this information and leak it, what is stopping hackers from doing the same, or worse.
Solove, Daniel J. "Why Privacy Matters Even if You Have 'Nothing to Hide'." Chronicle of Higher Education. 15 May. 2011: n.p. SIRS Issues Researcher. Web. 17 Feb. 2014.
5 Dec. 2013. Gorman, Siobhan, and Jennifer Valentino-Deveries. New Details Show Broader NSA Surveillance Reach. " The Wall Street Journal. N.p., 20 Aug. 2013.
Although many people could not explain or define the concept of privacy very precisely, based on Baase, S. (2012), A gift of fire: Social, legal, and ethical issues for computing technology, he mentioned three key aspects of privacy:
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
The inevitable truth about our technological advances has become an ongoing controversial dilemma. It begs to question whether or not our technology is taking us closer to the world of Big Brother. It even subjects us to address all the pros and cons this said technology, as a whole, has to offer. These days when people talk to each other, some no longer share eye contact because they are too busy on social media, texting, checking emails, looking for the next big thing, and so forth. Many people are blinded by the fancy & entertaining applications, availability of gps, and most importantly, being able to surf the web at the palm of their hands, but little do they know that those
Technology is constantly changing, growing, and evolving but with each change in technology we risk our own privacy. With each new update we get we are told it improves our network or life but in reality it makes it easier to invade our privacy just like in the novel 1984 by George Orwell. There are many parallels between 1984 and our present day like the over watchful eyes of the government for our own good.
However, government agencies, especially in America, continue to lobby for increased surveillance capabilities, particularly as technologies change and move in the direction of social media. Communications surveillance has extended to Internet and digital communications. law enforcement agencies, like the NSA, have required internet providers and telecommunications companies to monitor users’ traffic. Many of these activities are performed under ambiguous legal basis and remain unknown to the general public, although the media’s recent preoccupation with these surveillance and privacy issues is a setting a trending agenda.
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.