Essays /

Government Surveillance Essay

Essay preview

Government Surveillance

Imagine a world where your every move was being monitored. A dark world where it is no secret who you are, where you have been and who you associate with; now include who you love, who you pray to and what you just ate for dinner. The word privacy doesn’t exist in such world and it is such world that we are heading to.“Big Brother is watching you!” This quote by George Orwell couldn’t have been truer. Every aspect of our lives is being sorted through as Big Data this very moment. Government surveillance has prevailed by the name of security. But, is government surveillance of internet digital communications like social networks, cell phone calls, text messages, and emails really a public service of security? Or is it simply a form of short-term security with long-term dangerous effects to the freedom of the public? How much are we willing to give up in the name of so called security? I believe that the issue of government surveillance of the internet and digital devices is a very important and relevant issue in the current day where more and more, both young and old, are logging in to social media sites, buying cell phones, and depending on services like email and “in the cloud” storage. The government’s exploitation of Internet and digital data is slowly chipping away at our privacy, our civil rights and the future of democracy itself. This issue doesn’t only affect my own privacy but also more than 75% of Americans that use the Internet. Government surveillance by the NSA (National Security Agency) is not something new. It has been going on for decades, just without our knowledge. With the recent outbreaks and leaks about the secret surveillance programs, more and more Americans are arising with privacy questions. The most well-known and recent leaks have been from ex-CIA employee and former NSA contractor Edward Snowden. It was his leaks that rattled the American community. “He succeeded beyond anything the journalists or Snowden himself ever imagined. His disclosures about the NSA resonated with Americans from day one. But they also exploded round the world” (Macaskill and Dance). Thereafter, many Americans have come forward declaring answers. Is the government collecting records of our telephone calls? Is the NSA using sources like Face book or Skype to conduct surveillance on us? The answer is yes. According to Elizabeth Gotein, co-director of the Liberty and National Security Project, a project that pursues to make sure our human rights and fundamental freedoms are respected, “The director of National Intelligence today [July 31 2013] declassified and released documents describing the National Security Agency's (NSA) ‘bulk collection’ of Americans' telephone records as taking place ‘on a very large scale’” (Gotein). Not only are American’s telephone records being stored as metadata, in addition, a personal profile of many Americans is being constructed. According to former Washington bureau chief Ewan Macaskill and multimedia journalist Gabriel Dance, “Cell phones, laptops, Face book, Skype, chat-rooms: all allow the NSA to build what it calls ‘a pattern of life’, a detailed profile of a target and anyone associated with them”(Macaskill and Dance). At this moment, a collection of what is called “Big Data”, which includes phone calls, tweets and social media posts and e-mail messages, is being stored by the government for future scrutiny. However, keep in mind that this is just a glimpse of what the government has been doing: “But like other aspects of NSA surveillance, virtually everything about this kind of NSA surveillance is highly secret and we’re left with far from a full picture” (Elliot). What we know so far of the surveillance programs that the government conducts, is just the little information that has been leaked; everything else is still kept secret. This indicates that the government possibly has many other surveillance programs that we are oblivious to. Government Surveillance programs

Why is government surveillance such an issue now if it has been going on for decades? It might be because the growing number of new technology is making it much more easier for the government to spy on its people. Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices. Some Americans may argue that the government surveillance programs target only foreigners, that we, as Americans, are exempted from this type of scrutiny. They are even reassured by President Barrack Obama in an interview on Charlie Rose: "If you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your emails" (qtd. in Greenberg). However, Edward Snowden persists that, in fact, American are being targeted: “The NSA . . . targets the communications of everyone . . . It ingests them by default . . . and it stores them . . . simply because that's the easiest, most efficient, and most valuable way. . . . So while they may be intending to target someone associated with a foreign government or someone they suspect of terrorism, they're collecting your communications to do so" (qtd. in Greenberg). So, who is right? Who is telling the truth? Clearly, most would believe the trusted President of the United States. It is possible both, in a way, are telling the truth. The answer is to focus on their definition of “targeting”. Greenberg, former executive editor at New Hampshire Public Radio and former Washington reporter for National Public Radio, explains, “Snowden used the word target in its broadest sense. When Obama defended the program, he used it more narrowly. . . . As it turns out, FISA [the Foreign Intelligence Surveillance Act] uses the word both ways” (Greenberg). Some sections of the law don’t mention targeting whatsoever and even though some sections, like section 1881, prohibit the NSA to read the e-mails of Americans who are not linked to terrorism, that doesn’t mean that “the government might not end up with some of those emails in its data fi...

Read more

Keywords

-1965 -22 -25 -265 -40 -9 /11 /4 072 1 10 111 12 126.7 15 16 17 17.3 17.4 18 1881 1934 1978 1989 2 20 2001 2003 2004 2005 2007 2008 2010 2012 2013 21 2103 215 22 24 251 3 30 31 46 5.5 572-588.academic 7 702 717 75 8 91.1 911 ab abil abl abs-clio academ accept access accord achiev acknowledg aclu acquiesc acquisit across act action activ activist actual ad add addit address advanc advantag advis advocaci affect age agenc agent ago agre agreement aim al all-know all-se alleg allen allow alon alreadi also although amass amend america american amount amplifi analysi analyst analyt anita anonym anoth answer anti anti-spi anyon anyth apart apathi appear appl appli approach approv april arab argu aris art articl ask aspect assert assess associ assur ate attack attain attempt attent attorney audit aug author avail avoid away b back bad balanc ball bank barbara barrack barrier base bay be becom behalf believ belli benefici benefit bent best bewar beyond big bill bit blackmail blend bodi bolster book border bound bring british broaden broadest broken brother brows browser budget buffer build bulk bureau busi button buy bypass c cabl california call calm cannot car care case cell censorship center certain challeng charg charli chat chat-room check chief chip choic choos christian chuck cia cincinnati circumv cite citizen citizenri civil clear clio cloud co co-director co-oper collect combat come comment commot communic communiti compani complet complic comprehens comput concern conclud conclus conduct confidenti confirm congress congressmen conscienc conserv consist constel constitut construct consum contain contemporari content context continu contract contractor contribut contributor control controversi corpor correct could couldn count counter counter-technolog counterintellig counterterror countri cours court cq craft creat creepi crime critic curios current custom cyberlaw cyberspac d danc danger dark data date day debat debunk dec decad decent decid declar declassifi decod deepli default defend defin definit deliber democraci democrat depend depriv deriv describ design desir desk detail detriment develop devic diann dictatorship difficult digit digniti diminish dinner direct director disagr disclosur discov discrimin dismiss dissemin distribut dmitri document doesn domest domin donat done doubt download downsid drive due e e-mail earlier eas easi easier easiest eavesdrop ebook editor edward eff effect efficaci effici effort either electron elit elizabeth elliot els email embodi emerg employe enact encrypt end enemi engag engin enhanc enough ensur enter entir eric essenti et etc ethic eva even ever everi everyon everyth everywher evil ewan ewen ex ex-cia exact examin exampl except execut exempt exist expand expans expect expert expertis explain explod exploit expos express extend extent extern extrem eye faa face facebook facet facil fact fake far faster favor fbi feder feel feinstein ferrera fibr fibre-opt fight file filter financi find first fisa fit five fix focus folder fool foreign form former forth fortress fortun forward found foundat fourth frank free freedom freelanc freeli frequent frontier full full-tak fulli fundament futur gabriel gain galparin galperin gather gchq general generat georg gerald german gertler get give given glimps global glossari go goitein googl gotein govern grant greenberg grow guardian guid hacker halt hampshir hand hard harm harvard head headquart help hemispher hidden hide high higher hint holland homeland honor howev https huge human hundr idea identifi iii.32 illeg imagin immens impart impli import improv includ inclus inconveni increas inde indic individu infer inform information-gath infrastructur ingest initi insid instal instead intact intellectu intellig intend intensif intent intercept interchang interfer intern internet interview intrud intrus invad invas investig irresist isn issu j jacobsen jeopard jessica jon journal journalist judg juli jumbl june justifi justin kadhim katherin keenan keep kept kevin key kind kirsti knife know knowledg known kohn l lack laptop larg last later law lawmak lawsuit lawyer layer leak least lee left legal less less-privileg let letter level liberti life light like likelihood limit linda link listen littl live ll log london long long-term look loophol loosen loui love lowest lye m macaskil magazin mail maintain major make male mandat mani manila margaret margin market martin mason mass matt matter may mccutcheon mean meant media meet member menac mention mere messag meta metadata method microsoft middl might mind mine minim miss modifi mold moment monist monitor month moral motiv move movement much multimedia multipl must n.d n.p name narrowli nathan nation navi ncryption near need neil network never new nine non non-profit nonchal northern note noth nsa nudg nullifi number numer nyst o obama oblivi obstacl obtain occas oct off old one onlin open oper opinion optic option order organ orwel other outbreak outdat outlin outsid outstretch overcom overpow oversea paper part particip partnership pass passiv past patriot pattern pay peopl percent permit persist person persuas phone physic pictur place pluto point polici polit politi popular pose possibl post pounc power practic pray precaut prefer pregnant premier present presid press prevail prevent pri primarili print prism privaci privat privileg pro problem procedur proclaim product professor profici profil profit program programm progress prohibit project proper propos propublica prospect protect protecting-national-secur proud provid provis public publish purchas pure purpos pursu push put qtd question quiet quot r radio rais random rational rattl ray re reach read readi realiti realli reason reassur receiv recent recogn record recov reestablish regular relat relationship releas relev render report request requir research resolv reson respect restor restrain restrict result retail retent retroact reuter reveal revel review revolut richard riddl right risk robert roll room rose rough rough-shod round rule run sacrif safeti said sale sane santa say scale schoen school scienc scrutini search secreci secret section secur see seek seem seen senat send senior sens seri serv servic set seth shadow share shod shop short short-term shouldn show shubber sic signal signific simpl simpli sinc singl site situat sketchi skype slow slowli small snarf snowden social socialist societi socket softwar solut solv someon someth soon sophist sort sourc specif spectrum speech spetalnick spi spiegel spread st staff stand state state-of-the-art statut step steve steven still stop storag store stori stretch strip subject succeed sum superstor supplier support suppos sure surgeon surgic surveil suspect suspicion system take taken talk tampa tap target taylor technolog technologist telephon tell tempora term terror terrorist text text-messag theori thereaft think thomson though thought threat threaten three thus time timothi titl today tool topic tor track trade trade-off transmit transpar treasur trend tri trick troubl trove truer trust truth tuck turn tweet two type u.s uk ultim unabl unawar unblink unconstitut understand unfair unintent union unit uniti univers unknown unlock unscrambl up-to-d upend upon upper urgent us usa usb use user valid valuabl varieti vast ve veral verdict victori video violat virtual virtuous visibl visit vital vitaliev voic volumin vpns want war warfar warn warrant warrantless washington wasn watch watchdog watcher watt way weak web webpag websit webster well well-known whatsoev whistleblow whittl whole will william win wire without won word work world worri worst would wouldn write writer wrong wrote x x-ray yahoo year yes yet york young zero