preview

Government Surveillance

Decent Essays

Government Surveillance and Our Privacy
In the world we live in today, the general populous is being spied on constantly. In the name of national security, our government is turning our electronic devices against us. This precedent was started in 1992 with the DEA collecting the metadata from all US calls to countries linked to drug trafficking (Heath 1). The DEA gathered the information without the approval of the courts, analyzed the data and put them into large databases and investigative reports. This arm of the DEA was only shut down in 2013 due to turmoil from documents leaked by Edward Snowden. From this point on many legislations have been passed authorizing the bulk collection of americans' data, which is a direct violation of our …show more content…

This bill was designed to thwart terrorism and is called Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, and is better known as the USA Patriot Act (Wilson 265-269). Thanks to the surge of emotion and want for revenge, the act passed with almost no opposition. In the house, the bill passed with 357 votes for and 66 against. Supporters of the Patriot Act say that it strengthens national security and so far it has, albeit controversially. Titles V, VI, VII of the bill are not a source of controversy and are concerned with rewarding people for tipping the government off to potential attacks, providing assistance to those affected by terrorism, and increasing communication to all levels of government in case of a terrorist attack respectively. The part of the bill that is the main source of controversy, however, is title II which enhances the United States ability to gather intelligence through the internet and wiretaps. Title II has enabled the government, namely the NSA, to bypass the privacy granted to us in the fourth amendment of the …show more content…

The answer is yes, it is possible to maintain a modicum of privacy on the internet and cryptography is the mechanism to do so. Cryptography, however, has a bit of a dilemma. How is it possible to send your cryptographic key over an insecure medium, such as the internet, without it being intercepted. Thanks to the work of Diffie and Hellman we now have a way to exchange cryptographic keys with an eavesdropping third party without said third party knowing the key (Hoffstein, Pipher, Silverman 65). To explain how the Diffie-Hellman key exchange works I first have to establish a cast of characters, Joseph, NSA, and Thomas. When Joseph and Thomas want to exchange cryptographic keys over the internet without the NSA knowing what it is, they must agree on a prime number represented by p, and a number greater than zero represented by g (Hoffstein, Pipher, Silverman 66). Numbers p and g are public knowledge and the NSA has. Thomas and Joseph then select numbers that they don't reveal. For Thomas the secret number is represented by a, and for Joseph the secret number is represented by b. To generate the key Joseph plugs his values into the equation A= ga(mod p) and thomas plugs his values into the equation B= gb(mod p). Thomas and Joseph exchange these values, again with the NSA intercepting, and do some further calculation to make the key. Thomas takes Joseph's value and

Get Access