Privacy or Surveillance -- Political Topic
Privacy or Surveillance?
We live in an age of heightened concerns about terrorism and public safety. The events of 9/11, the constant threat of future terrorist plots and mass shootings and public bombings have put both the American people and government on high alert. Some of the government's responses have included development of the Department of Homeland Security and terrorist threat level systems (Hiranandani, 2011). Other efforts have included intense, and oftentimes undercover, surveillance of the activities of everyday citizens. This is particularly true regarding cell phone conversations, email exchanges and web-based activities.
Recent news has highlighted that the National Security Agency (NSA) has used thousands of analysts to listen to domestic phone calls and monitor emails and text messages without the consent or knowledge of the American people (Barrett, Ballhaus & Aylward, 2013). The NSA acknowledges these practices and argues that court authorization is not always necessary; they also point out that there are numerous cases where such surveillance has stopped terrorist attacks and help ensure public safety. However, many feel that this is still a violation of the privacy of everyday citizens (Bailey, 2013). This debatable topic is the focus of this paper.
Recent News
A former NSA insider named Edward Snowden recently made headlines by blowing the whistle on the secret practices of government surveillance, pointing out that most activities are poorly regulated and that what is really meant to protect the public can at times cause more harm than good (Barrett, Ballhaus & Aylward, 2013). Snowden served as a former NSA infrastructure analyst. He claims that NSA surveillance practices often target those who are in actuality innocent and therefore the surveillance efforts pose constitution problems. In recent weeks, he has shared highly classified NSA program details with the press including the practice of intercepting and wiretapping phone lines. According to Snowden, his disclosures are an effort "to inform the public as to that which is done in their name and that which is done against them" (Barrett, Ballhaus & Aylward, 2013). It is now known that a classified NSA program called NUCLEON is often used to intercept phone calls and route spoken words to a central database (Bailey, 2013). So far, the government has not offered any public estimates of how many times this has taken place, what activities and words may trigger concern or any other NUCLEON details.
It is estimated that the NSA has the ability to record endless domestic and international phone calls and reference them for future use (Pulliam & Rothfield, 2011). Much of the surveillance takes place at a large, Utah-based data center where anywhere from 500,000 to 1 million phone calls may be recorded by those who fall on a special target list (Barrett, Ballhaus & Aylward, 2013). This has led to many questions from the American public, politicians and legal experts. Namely, is this constitutional?
The Right to Privacy
At the heart of this debate is the issue of citizen privacy. The Privacy Act of 1974 requires that the use of personal information must be limited to predefined purposes (Phillips, 2004). The Act is based on principles known as the Fair Information Practices and includes limitations on the collection of personal information; the need for knowledge and consent of the individual; the need for there to be a clear relevance to a defined purpose; limitations of information usage; and perhaps most importantly, the requirement of individual participation (Richards, 2013). Individual participation means that everyday citizens have the right to know about the collection of their personal information and challenge denial of those rights. In most cases, these principles are used in business practice. However, there are those that argue that the intent was to safeguard personal privacy in general and that components of this law should also hold weight on the subject of governmental surveillance (Richards, 2013).
In 2013 we live in a highly technical world. The web and other wireless technologies make us vulnerable in ways perhaps not fully envisioned by the designers of the Privacy Act of 1974. We face identity theft, the selling and reselling of our personal information and law enforcement monitoring. The confidentiality and security of our conversations, web purchases, online photos, financial records, personal relationships and other forms of information can be easily observed and tracked by hackers, thieves and, as it turns out, governmental agencies. Despite some general language in the law, in the wake of terrorism and national security issues there is no comprehensive privacy protection for the everyday American (Bailey, 2013).
The NSA's position is that...
This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights
Criminal Justice Edward Snowden Is Edward Snowden a hero or traitor? Is Edward Snowden a hero or traitor? Edward Snowden used to work as an intelligence contractor. Lately he leaked information about some security projects. The leaked information is about secret program carried out by NASA and is a massive surveillance program. Snowden believes that the tax money of people of America is a liability on government and government institutions and hence they have
Patriotism/Edward Snowden Intstitution: Edward Snowden, 30, well-known for his previous job as a contractor in the U.S. National Security Agency (NSA), is presently living in Russia since his escape from the United States via Hong Kong, due to a revelation of extensive internet and phone surveillance carried out by U.S. intelligence. He used to live with his girlfriend in Hawaii, but after the revelation, initially left for Hong Kong, where his identity
PRISM- Edward Snowden PRISM PRISM, deployed by the NSA (National Security Agency) of United States, is a tool used for private electronic data gathering which belongs to the people who use leading internet services such as Gmail, Outlook, Facebook, etc. In the wake of 9/11, the latest effort made by the U.S. government for electronic surveillance is the development of PRISM, which initially started in the supremacy of President Bush with the
Technology and national security / privacy issues / Edward snowden The massive 9/11 attacks revealed some obvious flaws in our security system. Terrorists not only managed to slip through the immigration and airports but also managed to live, train and plan within the United States for many years. The resulting fear of other terrorist groups who might have been living and training in U.S. were justifiable. In this regard, congress came
Quandary of Prosecuting Edward Snowden The source of law that controls the prosecution of Edward Snowden is both federal and international law. Because Snowden is an American citizen who sought asylum overseas, he is outside of the direct jurisdiction of the U.S. government. Still, the U.S. government is the entity that wants Snowden for his crimes. Snowden has not committed any crimes except for those that violated the U.S. Snowden can
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now