Essays /

Ten Ways The Government Invades Privacy Essay

Essay preview

Ten Ways the Government Invades Privacy Today

Ten Ways the Government Invades Our Privacy Today
The book 1984 by George Orwell is one of the most powerful warnings ever issued against the dangers of a totalitarian society. It illustrates the worst human society imaginable, in an effort to convince readers to avoid any path that might lead toward such societal degradation. In his book, Orwell talked about the invasion of government into our lives, the effect that it would be on our freedom and the repercussions in everyday life. He describes a world beyond our imagination. Now it is being said the Fourth Amendment’s promise of protection from government invasion of privacy is in danger of being replaced by the futuristic surveillance state Orwell described (Liptak, 2011).” By the same token, does 1984 present a startling and haunting vision of the world today?

In Chapter One, Orwell writes about “Big Brother,” the authoritarian leader of Oceania, a totalitarian state where the ruling Party wields total power for its own sake over the inhabitants. Big Brother is the face of the Party and he sees all, knows all and controls all. Big Brother is watching everyone. The citizens are told that he is the leader of the nation and the head of the Party. Orwell is focusing on the fact that we may someday live with cameras around every corner and “Big Brother” constantly looking over our shoulder. Americans will now too have their every utterance listened to by Big Brother in public through surveillance-capable street lights now being installed in major cities across the country which can record private conversations. Just as the citizens of Oceania could never be sure of their privacy, a deputy of Homeland Security Director told FOX News Charlotte, “you would never know” if Big Sis was watching (Watson, 2011). The system detects movement and if too much movement is detected, the police are notified. Many citizens view this as an invasion of privacy, “creepy” and the feeling that Big Brother is watching. Others see the system as a way to keep their neighborhoods safer. Recently, Edward Joseph "Ed" Snowden (born June 21, 1983) an American computer specialist, a former CIA employee, and former National Security Agency (NSA) contractor disclosed up to 200,000 classified documents to the press. Details released from the cache have revolved primarily around the United States' NSA mass surveillance program (Edward Snowden, 2013). In his very first public words, Snowden himself addressed the alarming consequences of the NSA's hunger for obtaining and storing an incomprehensibly vast record of our lives: Even if you're not doing anything wrong, you're being watched and recorded. [T]hey can use the system to go back in time and scrutinize every decision you've ever made, every friend you've ever discussed something with, and attack you on that basis, to sort of derive suspicion from an innocent life and paint anyone in the context of a wrong-doer (Kaufman, 2013).

Since media reports revealed that National Security Agency is collecting millions of Americans’ telephone records as well as data from the servers of major technology firms, there have been discussions in the public square about the relationship between the government’s efforts to protect national security and citizens’ expectations about the privacy of their personal data. President Obama and leaders in Congress have defended these efforts, declaring that they have prevented terrorist attacks, and there is evidence of public support (John P. Mello, 2013). Is “Big Brother” watching causing this to be an invasion on American’s privacy, or is it an effort to prevent terrorist attacks? Another example of how the government invades our privacy, similar to “Big Brother” in 1984, is "Carnivore," a system the FBI uses to scan Internet traffic for e-mail associated with criminal suspects. You pick up the phone, you drop a letter in the mail, and you reasonably expect that no one will be listening in or secretly reading your notes (Moran, 2000). Think again. According to John Moran: In congressional hearings, the FBI said the Carnivore system is used infrequently (25 times overall, 16 times so far this year, according to news reports) and only with proper legal authorization. The agency says the system is the Internet version of a telephone wiretap...

Read more


/2011/09/11/us/11gps.html?_r=2& /2011/12/12/the_growing_menace_of_domestic_drones/ /blog/national-security/echoing-dirty-past-nsa-sought-reveal-porn-habits-discredit-targets /facts-about-the-national-security-agencys-data-collection-program/ /facts-about-the-national-security-agencys-data-collection-program/#sthash.oz0uqfeo.dpuf. /facts-about-the-national-security-agencys-data-collection-program/#sthash.vyzh3dil.dpuf. /if-you-see-something-say-something%e2%84%a2-campaign /jhr/v06/v06p--9_bennett.html /list_6742657_video-surveillance-privacy-rights-u_s.html /question/index?qid=20070228135806aa4czse /term/c/clipper_chip.html /threatlevel/2011/11/scotus-big-brother-gps/ /wiki/edward_snowden /wire/govt /wnet/need-to-know/five-things/drones/12659/ /wp-dyn/articles/a62776-2004jul19.html 000 10 11 12 13 14 16 1949 1979 1983 1984 1986 1992 1994 1998 1999/2000 2 20 200 2000 2001 2004 2010 2011 2012 2013 21 25 27 29 3 6 60 8 9th abid abil abl accept accord account acknowledg across act action activ actual address administr advis age agenc agent agre air al al-qaeda alarm alex algorithm also although alway amend american analysi analyz anim anoth answer anyon anyth anywher appar appeal appropri archiv area aren arguabl argument arm around arsenal ask assist associ assum attach attack auspic author authoritarian avail avoid b back backlash base basi basic beacon believ bennett berger better beyond big biggest bill bit bomb bombard book born brainwash breach brother brought bug build bureau busi cach calea call camera camera-lik campaign cannot capabl captur car career cargo carnivor carri case caus certain certifi chapter charlott cheaper chief child children chip cia circuit citi citizen civil classifi clear click clinton clinton/gore clipper cloth codenam collect come comfort commerci commiss commit communic commut compani compromis comput conceal concept concern conduct conflict congress congression connect conscript consequ consist conspiraci constant construct contain content context contractor control convers convinc corner correct could countri countrysid cours court covert creat creepi crime crimin crucial custom d daili damag danger data datainform day death debat decemb decid decis declar decrypt deem defend defens degrad deploy deputi deriv describ design destroy detail detect deterr devic dial dictat direct director dirti disclos discredit discuss disloyalti dismantl disturb document doer doesn domest driveway drone drop e e-mail easi easier easili eavesdrop echelon echo econom ed edward effect effici effort eggen ehow electron email employe enabl encourag encrypt end enemi enforc engag enhanc ensur equip essenti establish european even event eventu ever everi everyday everyon everyth evid evil evolv exampl exist expand expect expos express extrem face fact fair famili far fax fbi fear featur februari feder feel fellow fierc figur find firm first five focus follow footbal forev form former fought fourth fox francisco freedom friend frontlin futurist g gain game gave general georg get give given global go goal good govern gps greater greatest greenwald ground grow habit hand happen haunt head headlin hear helicopt help hey hidden high histor histori hold home homeland hotel hover howev human hunger idea illustr imagin import impress improv incent includ incomprehens incorrect inde indic individu induct industri inform infrequ inhabit innoc insight instal instanc instead institut insurg intellig intercept interest intern internet internet-ag introduc intrus invad invas investig invok isn issu j john joseph jr judg juli julia june junior justic justifi kaufman keep knew know kozinski kravet lack larger last later launch law law-abid lawrenc lawsuit lead leader least lee left legal legisl legitim less let letter level liberti life light like limit liptak listen littl live london longer look lost lower luckili m made mail maintain major make mani mart maryland mass matur may mean measur media meet mello menac mere messag microphon might militari million missil modem modifi money monitor moran moreov mous movement movi much multicultur must n n.d narrow nation near need neighborhood network never new news ninth normal north note notifi notori novel novemb nsa number obama obtain oceania often omnipres one one-way onlin oper opinion option order organ origin orwel other otherwis outrag outsid overal p paint parent park parliament part parti pass passiv past path pay pbs pen pen/trap peopl perfect permiss person phone physic pick place plan plant polic policymak polit poll pool popular porn pornograph pose post power predict premier prepar present presid press prevent primarili privaci privat probabl probable-caus probe procedur process program project promis promot propaganda proper propos protect provid public purport purpos qaeda question rais rather re read reader realiz realli realm reason recent recogn record recov refer referenc reflect regist regul regular relat relationship releas relev remain remedi remot remov repercuss replac report reput requir respect result retract retriev reveal review revolv right risk riski roadsid robot room round rout routin rule sacrific safer said sake salon san sandi satellit say scan school screen scrutin search second secret sector secur see seem seen seizur send sens sent septemb serious server servic sever shade shoulder show shred side silent similar simpl sinc sis site situat sixti size slant slaveri small smith snoop snowden social societ societi solut someday someon someth sort sought south space specialist specter spi squar stanc standard startl state statist statut steal stealth sterl store stori street strike structur studi stuf subject substanti support suprem sure surveil surveillance-cap suscept suspect suspici suspicion symbol system tactic take taken talk tap target task teach technic technolog telecommun telephon telescreen televis telex ten term terrorist testimoni therebi thereof thing think thirti thought thought-crim threat threaten three time today token told total totalitarian toward trace track traffic trap trespass tri true truth turn two two-part u.s uncheck undermin union unit unlik unpreced unresolv unsettl us use useless user usual utter v vast ve vehicl version vest video view violat virtual visibl vision visual voic volum voluntarili wal wal-mart want war warn warrant warrior washington watch watson way weak weapon webobedia weiss well went whether wield will winston wire wiretap wish without wonder word world worldwid worri worst worth would write wrong wrong-doer wrote yahoo year york youman