Militia Groups Band Together
The FBI has evidence that communication between Militia Groups has steadily increased and is currently at a record high. An inside resource reported that the Groups are forming a coalition to take over the United States. They plan to seize all communication networks so they can control any information given to the general public. They will take control over food distribution, power supply, and water supply. Everything will be rationed according to the Militias' predetermined specifications. Nobody seems to know when, where, or how this is going to happen for all communications between the Militia groups are encrypted with a 60-bit key. Government Officials are trying to crack the code, but due to the
…show more content…
Encryption is a wonderful and powerful tool when trustworthy people use it in an appropriate manner. If the tool falls into the wrong hands, it becomes less wonderful and more powerful. So what are the wrong hands and what should be done about it? Many corporations from the technology industry and organizations like the American Civil Liberties Union (ACLU) say nothing should be done about it. Americans have the right to privacy and encryption can provide that. On the other sided of the controversy, the Clinton Administration wants to secure access to all encryption keys so any encrypted communication can be intercepted, which will ensure social welfare. Governmental involvement in the use of encryption is a controversial issue. Throughout history, Governmental Agencies have interfered with the development and implementation of surveillance technology; this behavior may foreshadow future involvement with encryption. The debate of the Government's involvement is ongoing with valid points on both sides. In order to fairly evaluate both arguments, one must first understand cryptography and it's history of development.
Cryptography
An Attempt For Privacy According to the Newton's Telecom Dictionary, cryptography is, "the process of concealing the contents of a message from all except those who know the key," (207). It is also defined as ". . . the science, or art, of secret writing," (Huffman 2). The word "cryptography" originated
Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from rogue nations and terrorist groups. They are increasing their attacks on government, military and civilian installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe. It is surpassing terrorism as the greatest challenge facing the nation. In response, the National Security Agency (NSA) began conducting surveillance on those who are involved in these activities and others which are threat to US national security interests. This program became so broad; it started continually collecting phone records and emails on ordinary Americans. This angered many, who felt that the US was acting in a way that circumvented established legal guidelines and procedures. To fully understand what is taking place requires focusing on the event, the government 's response and the ways it did / did not meet our national security goals. Together, these different elements will illustrate what occurred and the lasting impacts on everyone. (Greenwald 2014)
For many, the idea that government could could have access to all of an individual's personal information by manipulation of ciphertext is a violation of free speech. The applicable part of the First Amendment here prohibits the making of any law, "abridging the freedom of speech” (The First Amendment). There are an abundance of ways to communicate, we can write words, we can talk, we can take photographs, we can draw pictures. The Northwest Public Radio (NPR) published the article, “ Apple's First Amendment Argument” it states that, “during the 1990’s. There was a confrontation in court on whether code, or encryption, is a form of speech”. A student at University of California by the name of Daniel Bernstein, created an encryption software called Snuffle. He attempted to put it on the Internet, the government made an effort to stop him, using laws that were meant for the restrictions of firearms and ammunitions. Eric Goldman is a professor at Santa Clara University School of Law argued in the NPR article, “In Fighting FBI, Apple Says Free Speech Rights Mean No Forced Coding” that Daniel Bernstein's code was a “form of speech and therefore protected by the Constitution”. Goldman was saying “I believe that privacy is important and I'm going to use this software as a platform to protect this right”. The Ninth Circuit Court of Appeals acknowledged that software is a form of speech and has been treated as such ever since. Therefore if software code is speech, Apple claims the First Amendment also means the government cannot force Apple to comply with its cause. The FBI wants Apple to write software code to help it break into the iPhone. The opposing side of this argument is lead by the Federal Bureau of Investigation (FBI). The government is concerned that technology’s security will prevent them from maximizing the safety of the U.S. citizens.
The NSA performed an unlawful invasion of privacy by using web encryption. Technologist, Christopher Soghoian, states that the NSA used supercomputers to gain access to encryption that provides online privacy and security. “The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions and commercial secrets” (qtd. in Winter). Christopher’s explanation of the encryption technologies describes how anyone could be affected by this surveillance. This is considered unlawful because the NSA hacked technologies that protect our private information. This affects the security of the nation knowing that it is possible for someone to gain access to information that people have once though were private to them. This is not the first time that the NSA has tried to gain access to private information. In fact, “For the past decade, NSA has led an aggressive multipronged effort to break widely used internet encryption technologies”
The increasing power and functionality of technology has increasingly invaded privacy and complicated security. Technology has made it possible for the government to
During the past decade, an issue has arisen from the minds of people, on which is more important? Privacy or national security? The problem with the privacy is that people do not feel they have enough of it and national security is increasing causing the government to be less worried about the people. National security is growing out of control which has led to the decrease in people’s privacy and has created fear in the eyes of U.S. citizens. “Twelve years after the terrorist attacks of Sept. 11, 2001, and amid a summer of revelations about the extent of the surveillance state built up to prevent others, leaders, experts and average Americans alike are searching for the right balance between security and privacy” (Noble). Americans should be able to live their daily lives without fear of an overpowered government or a “big brother” figure taking over. “According to a CBS News poll released Tuesday evening, nearly 6 in 10 Americans said they disapproved of the federal government’s collecting phone records of ordinary Americans in order to reduce terrorism” (Gonchar). While it is good to keep our country safe with security, American’s privacy should be more important because there is a substantial amount of national security, the people 's rights should matter first.
The NSA, or National Security Agency, is an American government intelligence agency responsible for collecting data on other countries and sometimes on American citizens in order to protect the country from outside risks. They can collect anything from the people’s phone data to their browser history and use it against them in the court of law. Since the catastrophes of September 11 attacks, the NSA’s surveillance capabilities have grown with the benefit of George W. Bush and the Executive Branch (Haugen 153). This decision has left a country divided for fifteen years, with people who agree that the NSA should be strengthened and others who think their powers should be limited or terminated. Although strengthening NSA surveillance may help the
On June 6, 2013, The Guardian published a story about the National Security Agency's (NSA) secret Internet surveillance program, PRISM (Greenwald and MacAskill 2013). The story was based on documents leaked by one of the most successful whistle-blowers in American history, former NSA contractor Edward Snowden. The documents that Snowden has released up to this time have shown the NSA to be heavily engaged in the collection of personal Internet activity, bulk collection of telephone "metadata," and other forms of surveillance that have brought U.S. intelligence practices into question.
The integrity of one’s communications and privacy of online activities is the largest casualty of the National Security Agency’s (NSA) surveillance over digital lives. Years since September 11, 2009, the NSA’s mass surveillance has greatly expanded due to the heightened concern that new technology can be used by terrorists to plan and execute a terrorist attack. In today’s age of technology, there are easier ways of accessing information and communication as well as new ways of hacking and gathering personal information. The new surveillance programs and regulations are enabled by the Patriot Act and post 9/11 paranoia, but it has been over fourteen years since the incident. After whistleblower, Edward Snowden, it was revealed that the government’s mass surveillance went beyond what many considered acceptable. It can be predicted that unless the U.S Government reins in NSA mass surveillance, the
Ever since the American public was made aware of the United States government’s surveillance policies, it has been a hotly debated issue across the nation. In 2013, it was revealed that the NSA had, for some time, been collecting data on American citizens, in terms of everything from their Internet history to their phone records. When the story broke, it was a huge talking point, not only across the country, but also throughout the world. The man who introduced Americans to this idea was Edward Snowden.
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
After laying low for about 20 years the NSA was called back into the spotlight. According to Heiligenstein “In 2002 the NSA started a project called ‘data mining’. This was where they were digging through electronic data Also in 2002 George Bush allowed the NSA to warrantlessly wiretap American citizens phones. In 2007 this program would come to light and be dismissed after social pressure.”(P. 21-23) In 2013, Edward Snowden who had worked for the NSA revealed countless documents and stories of the things the NSA were doing with out the American people knowledge. He revealed that the NSA had been gathering million of phone calls, texts and emails without permission. It and it also exposed that the US had been spying on it allies for
Digital privacy concerns, which have been a major issue in our country since 2001, increasingly violate our basic human rights as global citizens. The growing amount of government surveillance has manifested in the enactment of acts such as SOPA and CISPA. Although their intent on stopping digital piracy and attacks were clear, both were immediately met with harsh criticism; they allowed big corporations to violate our privacy rights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving
Reason to Listen: As Daniel Sarewitz writes in Defending Democracy,“The time to start thinking about the impact of security technologies on democratic rights is during R&D.” Now, more than ever before should we as a country be worried about government surveillance. The government claims it is for our protection and sure they’re are some benefits. Terrorist attacks stopped, crime prevention, and leads to murders, rapes, and drug trafficking. But, where is the line drawn, how democratic is it really, and whose best interest is really in mind? Should stipulations be set? This topic is a hot discussion in newsrooms, classrooms and political institutions across the nation.
Encryption in book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis is carefully analyzed by these three Computer Science majors is from the beginning of ciphering till exploitation occurred between the NSA and the Congressmen/Presidents of 1990’s. The industry and technological advancements for encryption began with the Egyptians who ciphered their language in Hieroglyphics around 2000 years ago. This creation led to a problematic industry for the Information Age because of the abuse of privacy. Though the fraudulent consequences of privacy are not protected by any amendment limitless resistance to being exposed for personal information has been growing ever since the beginning of security standards. What happened in September 11th, 2001 was not merely an inevitable catastrophe because the FBI warned the US Government and president years before 911 occurred. Encryption being a safety requirement in our era is the encoding of data transferring through communicative means. Anyone can have access to the data however there is a password when trying to steal or intercept someone 's information. The best way to encode your translation of personal information between two or more people is by verbal talking through whispers/soft speaking. Regulating encryption has always been a request from the NSA and the FBI because of exchanging violent plans or initiatives to seek perilous outcomes. The government feeds of privacy, not protected by the Founding Fathers or the
The recent case between the FBI and Apple brought a worldwide ethical dilemma into the public eye, and it could have detrimental effects to the entire tech industry. The FBI wanted Apple to create backdoor access to encrypted data on one of San Bernardino shooter’s iPhones, and Apple refused just as many other large tech companies such as Amazon and Microsoft are doing nowadays. This situation creates the ethical dilemma of whether the government should have complete access to all encrypted data, and how consumers will react knowing their private data is not actually private.