Government Surveillance and Our Privacy
In the world we live in today, the general populous is being spied on constantly. In the name of national security, our government is turning our electronic devices against us. This precedent was started in 1992 with the DEA collecting the metadata from all US calls to countries linked to drug trafficking (Heath 1). The DEA gathered the information without the approval of the courts, analyzed the data and put them into large databases and investigative reports. This arm of the DEA was only shut down in 2013 due to turmoil from documents leaked by Edward Snowden. From this point on many legislations have been passed authorizing the bulk collection of americans' data, which is a direct violation of our
…show more content…
This bill was designed to thwart terrorism and is called Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, and is better known as the USA Patriot Act (Wilson 265-269). Thanks to the surge of emotion and want for revenge, the act passed with almost no opposition. In the house, the bill passed with 357 votes for and 66 against. Supporters of the Patriot Act say that it strengthens national security and so far it has, albeit controversially. Titles V, VI, VII of the bill are not a source of controversy and are concerned with rewarding people for tipping the government off to potential attacks, providing assistance to those affected by terrorism, and increasing communication to all levels of government in case of a terrorist attack respectively. The part of the bill that is the main source of controversy, however, is title II which enhances the United States ability to gather intelligence through the internet and wiretaps. Title II has enabled the government, namely the NSA, to bypass the privacy granted to us in the fourth amendment of the …show more content…
The answer is yes, it is possible to maintain a modicum of privacy on the internet and cryptography is the mechanism to do so. Cryptography, however, has a bit of a dilemma. How is it possible to send your cryptographic key over an insecure medium, such as the internet, without it being intercepted. Thanks to the work of Diffie and Hellman we now have a way to exchange cryptographic keys with an eavesdropping third party without said third party knowing the key (Hoffstein, Pipher, Silverman 65). To explain how the Diffie-Hellman key exchange works I first have to establish a cast of characters, Joseph, NSA, and Thomas. When Joseph and Thomas want to exchange cryptographic keys over the internet without the NSA knowing what it is, they must agree on a prime number represented by p, and a number greater than zero represented by g (Hoffstein, Pipher, Silverman 66). Numbers p and g are public knowledge and the NSA has. Thomas and Joseph then select numbers that they don't reveal. For Thomas the secret number is represented by a, and for Joseph the secret number is represented by b. To generate the key Joseph plugs his values into the equation A= ga(mod p) and thomas plugs his values into the equation B= gb(mod p). Thomas and Joseph exchange these values, again with the NSA intercepting, and do some further calculation to make the key. Thomas takes Joseph's value and
The Patriot Act, an act passed by Congress in 2001 that addressed the topic of privacy in terrorist or radical situations, is controversial in today's society. Although it helps with protection against terroristic events, The Patriot Act is not fair, nor is it constitutional, because it allows the government to intrude on citizens' privacy, it gives governmental individuals too much power, and because the act is invasive to the 4th amendment right. To further describe key points in the act, it states that it allows investigators to use the tools that were already available to investigate organized crime and drug trafficking, and it allows law enforcement officials to obtain a search warrant anywhere a terrorist-related activity occurred.
“The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act” (PATRIOT ACT) was signed into the law by former president bush on October 26, 2001. It was sought by the administration and passed by Congress in response to 9/11. It intended to expand the authority of law enforcement officials and intelligence agents to combat terrorism in the united states. The patriot act revised many of the existing United States statutes, including immigration laws, banking laws, and the “Foreign Intelligence Surveillance Act” (FISA). Even though the law had widespread approval in Congress when it was passed, many of its augmentations have been highly controversial and has been challenged in court. This
After the terrorist attacks on the World Trade Center on September 11th, 2001 the United States became a very different place. This drastic change was caused by the initial emotional reactions that American citizens, as well as government leaders had towards the tragic event. The government, in an effort to assure that these events never happen again passed the USA PATRIOT Act, which is an acronym that stands for the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act. The major goal of this act is to combat terrorism by giving the government more leeway in what areas they are allowed to use their surveillance tools and also to what circumstances these tools can be used. The major issue that arise with this act are the fact that many of the act can be seen as unconstitutional.
After the attacks on September 11th of 2001, George W. Bush and his administration, along with Congress, agreed that national security needed more power within the executive branch. Our government leaders then rushed the legislative and review process and got the USA Patriot Act signed to law on October 26th of 2001 by President George W. Bush. The USA Patriot Act is an acronym that stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. It was passed to prevent future threats and acts of terrorism in the United States and to strengthen our national defense against terrorism. Since this act came into effect, lawmakers and citizens have heavily criticized it. The USA Patriot Act has been said to contradict civil liberties and be a violation of Constitutional rights, but its most controversial sections have continued to be extended
The act was passed by the Senate 98-1 and 357-66 in the House of Representatives. With its ten letter Backronym expanded the full title is uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism act of 2001. The Patriot act played a key role after the September 11,2001 attack on the World Trade Center. Congress took legal principles and retrofitted them to preserve the lives and liberty of the American people from the challenges posed by a global terrorist network. This act allowed investigators to use the tools that were already available to investigate organized crime and drug trafficking. The act enabled investigators to gather information when looking into full range of terrorism related crimes. It also allowed the law enforcement to tap the phones and put a wire on certain people this allowed them to investigate without tipping off the terrorist so they wouldn't damage the evidence or kill any witnesses.The Patriot Act open so many doors for the law enforcement to investigate business record to see what people are buying thing to make a bomb or looking at bank transactions to see if there sending money to
The provisions of the Patriot Act sought to beef up security against homegrown terrorism increase surveillance procedures, including phone taps against an individual rather than just one phone number. Next, the act aimed at the removal of access to funding for terrorist groups and made it a requirement for financial institutions to prevent money laundering wherever possible. Title four was aimed specifically at providing more funding for protecting our borders. The most important part of title five was the use of National Security Letters and included an order which kept the target from knowing about it or even telling anyone else. Then, the act outlined compensation for victims of acts of terrorism and their families. Also, there was a sharp increase in information sharing between law enforcement entities and jurisdictions. Afterward, several criminal acts were added to the list of things considered acts of terrorism and the penalties increased for these acts as well. All of these things are, to me, a utilitarian effort to make our best moral effort to secure our country. Viewed from a consequentialist standpoint, things like the Patriot Act are
The most controversial title of the Patriot Act is Title II. This title is intended to help law enforcement enhance their surveillance capabilities to capture terrorists. It allows “...for the seizure of voice mail messages under a warrant, authorized intelligence agencies and federal law enforcement agencies to share noncriminal information, it permitted pen registers and trap and trace orders of electronic communication such as e-mail, and it encouraged cooperation between law enforcement and foreign intelligence investigators...” (Oliver, 2007, p. 70). Of course, the most controversial part of this title is that it gives free reign for law enforcement to conduct surveillance, as long as there is some suspicion of terrorist activity.
After the terrorist attacks that occurred on September 11, 2001, a controversial piece of legislation was adopted and passed called the U.S.A. Patriot Act. The title for this bill is an acronym for "the United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act" (USA Patriot Act).
In this day and age it is very hard to be secretive or private about affair, whether it be business or the other sense of the word when two people come together as forbidden lovers, ask Bill Clinton. One often acquires a feeling of eeriness while alone or when the phone rings and no one is there. And that individual labels these incidents as paranoia or thinks nothing of it. But what if this isn’t coincidence? What if someone has tapped lines and to ensure it is working the phone rings. Remember that “Collect call from”, the government you received yesterday? Wake up people. Surveillance of U.S. Citizens is real. The NSA is videotaping, tapping the phone lines and watching us watching them. That
Public Law 107-56 otherwise known as the USA PATRIOT Act was signed into law by President George W. Bush on October 26, 2001. USA PATRIOT Act is an acronym which stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act. (justice.gov) This law was instated in response to the terrorist attacks on September 11, 2001. The Islamic terrorist group known as Al-Qaeda, coordinated four different plane hijackings killing 2,996 people, and injuring 6,000+ others. (9/11 memorial.org) Just weeks after the attacks congress rushed to pass this bill, passing the senate 98 to 1, and the house 357 to 66 (justice.gov), so that we can have more security controls within the United States. It gives the United States government the same powers and tools used to investigate organized crime and drug trafficking in decades prior, to investigate current suspected terrorist. The Patriot act has several different titles that cover different grounds, all which have the same purpose of preventing future acts of terrorism. The patriot act allows the government to track and intercept any form of electronic communications of suspected terrorist in order to prevent any acts of terror, and also for intelligence gathering. The act also aids the government in securing borders, and removing those that are here with the intent to cause harm.
Over the past few years, government surveillance in the United States has become a widely debated issue with two completely different sides. The National Security Agency, a government agency known for it’s efforts in spying and surveillance, has been at the center of this issue since it’s founding in the 1950’s. The Cold War had just begun and the United States government was doing anything they could to find potential terrorists and communists. In fact, many famous people including Einstein were being spied on by the government to find citizens with potential ties to the Soviet Union. (New York Times - New Details Emerge from the Einstein Files; How the FBI Tracked His Phone Calls and His Trash) As the cold war came to an end in the early 90’s, NSA spying seemed to come to an end as well.
Thesis statement: Government surveillance should be stopped because it is an invasion of privacy and gives the government control that is not enumerated in the constitution.
Ever since the American public was made aware of the United States government’s surveillance policies, it has been a hotly debated issue across the nation. In 2013, it was revealed that the NSA had, for some time, been collecting data on American citizens, in terms of everything from their Internet history to their phone records. When the story broke, it was a huge talking point, not only across the country, but also throughout the world. The man who introduced Americans to this idea was Edward Snowden.
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
The part of Dr. Christ’s lecture that remained in my mind was his input on the topic of surveillance. In fact when he mentioned that google is able to track us, I immediately opened my phone and shut down the ability for google to track my location. My animation connects to Dr. Christ’s lecture in the sphere of “surveillance” while at first this doesn’t seem to connect with my project I will show you why. Notice when you were playing the game as you moved smug, the cat, the ball followed. This is my way of showing government surveillance. The ball reacting to smug’s movements serve as a metaphor for the way that the government is able to track us via google, our phones and various other mechanisms. Also notice that you can trick the ball into going away from smug. This trick is a metaphor for how people can encrypt information and use the dark web to keep information away from the government. Also the ability to trick the ball into going in the wrong direction serves as a metaphor for how the government is a massive inept bureaucracy that struggles to complete even the most simple tasks with easy and swiftness.