Throughout history each new-fangled communication revolution arrived with warnings and forecasts of the upcoming termination of civilization as we know it. In Nikki Swartz article “Mobile Phone Tracking Scrutinized," and "Reach Out and Track Someone," published by Terry J. Allen, are two articles that address the topic of accessible cell phone tracking data. Both of the articles list the companies who are guilty of obtaining and possessing the information of people’s whereabouts via cellphones. Swartz scrutiny on whether cell phone tracking by the government is right or wrong, and Allen’s belief that unauthorized phone tracking should be allowed and that law enforcement and government use this information to solve crimes and aid in putting the people who do horrible things in our society away, have forced me to consider how cell phones have affected the lives of American citizens. According to author, Nikki Swartz in her article “Mobile Phone Tracking Scrutinized”, she suggests “Cellular technology is used as a tool for easily and secretly monitoring the movements of suspects” (Pg.1). Swartz supports her opinion by first, pointing out that countless Americans do not know that cell phone corporations, and also the U.S. government, can track each and every move the cell owner makes, regardless if it is on or off. There is always constant communication between cell tower sites and cellphones. Verizon Wireless and Cingular Wireless, two telephone companies know, within 300
5 Ways You Give The Government Control” written by Kenneth Coats shows how the devices we use daily slowly take over individuals lives. Coats states, “Today, most people in the United States carry a mobile phone that accompanies them wherever they go. We use them for everything...This essentially makes them the perfect tracking and bugging devices”. Although electronic devices are known to be safe, they allow outside people to figure out individuals personal life. Due to the need for devices such as cell phones, each individual has a high chance of being socially stalked once in their lifetime. Coats then states, “Not only do intelligence agencies gather information via mobile companies, but… your phone can be hacked using spyware. Even if your phone is turned off, it can be remotely accessed to recorded conversations and take photographs”. This issue causes a panic due to the wide spread of inappropriate pictures and private conversations in one's life. Even though technology is viewed as a privileged, it is also taking away people's lives without their
With the seemingly exponential propagation of inexpensive digital communications technologies over recent years, the general public is becoming more aware of the issues surrounding information privacy and government surveillance in the digital age. Every Tom, Dick, and Harry with a smart-phone has to be wary of how they use their private information for fear of that information being collected and used in a way contrary to their wishes. "Leaky" smartphone apps that transmit private information across the internet can be unethically used by government agencies. The issue of privacy is a balancing act; the public usually wants increased privacy and the government usually wants increased access.
Technology has become more accessible to the point it has become easier for government to watch everyone's move. In this generation technology takes over everyone's daily life, where people wakes up and the first thing is look at is the phone. A phone there are many things on it, like text, pictures and videos. Phones can do many things, but there is a possibility where the government can tap into a phone and look through it. The government can watch everyone’s: text, history, private info, and pictures. Government has no right to looking through people’s personal info because it violates Fourth amendment, Blackmail, and Creates fear.
Nowadays, phones have been glued to our hands. But how many people would be attracted to their phones if they know they are being tracked? Over the recent years as technology began to grow phones has been a big success. People are making calls, sending text messages, accessing the Internet , and sharing personal data.It doesn't matter whether your phone is a smartphone or whether you use it to make calls; as long as your phone is turned on, it registers its location with cell phone networks several times a minute, and all U.S. cell phone companies hold on to that data, some of them for years.
Whenever a call is made, phone companies record the who, what, when, and how long of
Technology, generally, cell phones are a significant part of our generation; therefore, they must be dealt with in a practical manner. Following the ruling of 2014, police began treating cell phones and electronic storage devices differently than traditional physically possessed items (Kerr, 2014). Kerr (2014) stated, “This is a new digital world that we are talking about, we need to come up with new rules that provide the traditional balance of the fourth amendment for the new environment of computers.” Kerr is exactly right; technology is evolving therefore, we as Americans need to evolve with it in all
Cell phones contain call history, contacts, text messages, web browser history, email, a Global Positioning System (GPS), and other location information that police and law enforcement agencies find valuable. Evidence from cell phones can help investigators piece together motives and events and provide new leads.(Darice Britt, 2016). The use of Ashley Smiths phone record was one of the strategies used in the investigation to link someone to Ashley’s death. Once they received Ashley Smiths phone records they were able to go one by one and filter the times the phone was used or called within the parameters of the investigation. The phone records of Ashley Smith was a big strategy within the law enforcement
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
Performing everyday tasks have become much simpler here in the 21st century. With advances in technology making it possible to live such easy lives, the world is now at humanities fingertips. People can now keep their entire lives with them in their pockets in the form of a cell phone; but due to the fact that technology is so new and advanced, no one has been able to deal with the major issues of having this luxury, such as privacy violations of personal information and who should be allowed to access this information when in a time of need. In recent news, the FBI has filed a court case against one of the largest technological companies, Apple, for not allowing them access into a phone to further an investigation. This case has asked more
In recent months, lawmakers introduced laws that will regulate phone searching at border points. This came in wake of increasing personal scrutiny since the new administration took office. Many human right groups believe that this form of scrutiny is taking a new dimension. They termed the actions as an infringement of humans right. CBP agents have been strict on visitors visiting the US. Some of them have been asked to disclose their Cell Phone passwords. And in some instances, even the legal residents of the US have not been spared.
In Montgomery, Robert Chae was murdered and cell phone tracking helped police find the three attackers. The Federal Bureau of Investigation (FBI) traced the movements of the phones and were eventually able to find the murderers (Nunnally). With this new technology, the FBI and police can easily track down criminals. Cell phone tracking can also help police accumulate knowledge about the clandestine locations of terrorist groups. Terrorists are hard to recognize because they blend in so well, so “it is necessary to unusual means to gather information about their whereabouts” (Baker). The FBI can immediately find the location of terrorist after they turn on their cell phone because the signal is received in space (Baker). Once police receive the signal, they can send alerts to patrolling agencies nearby. It is imperative for the police and FBI agents to to use modern warfare technology to pinpoint where terrorists reside and prevent them from carrying out their destructive plans. Contemporary technology is very useful because alerts come within seconds and it is extremely precise. Kidnapped victims can also be found using cell phone tracking. A woman called 911 in Salem, Massachusetts when she was kidnapped. Immediately after she hung up, The dispatcher was able to track down the truck and the woman using her phone (“Police Track”). Cell phone tracking can play a
Do you ever feel like someone’s watching you? What if I told you that you were being watched? Would you rethink that message you sent? Would you rethink that comment you made about “killing her”? Maybe, that comment was said jokingly, but do you think someone else would know that? Do you think all calls and text messages are monitored now? Do you think the government should be allowed to monitor calls to help cut down terrorism? I’m sure your answer is yes because, who wouldn’t want to cut down terrorism. What if I told you it was going to be your phone being monitored? Are you still on board with monitoring phones, or did you
Edward Snowden who work for Central Intelligence Agency (CIA) divulge some top secret documents about tracking citizen cell phone and worldwide of National Security Agency (NSA) (Washington Post,2013). Most of the news channels in the world show new about Snowden’s files in this time. Americans knew that they are tracked everywhere without turning on their cell phone. For example, Government use some fake towers which look like mobile tower, but these tower can record your cell phone and track them. Some people do not know government can or cannot records their phone, but the government can do that. Therefore, government can track citizen cell phone for some reason such
Having your phone tracked is not all that bad. It can improve your shopping experience by giving the store owners information about what interests you and about what things you may like. Once store owners know what you like they might be able to give you coupons for those items and that will be helping you save money. Also if you have your phone tracked and your favorite store is closing they will be able to bring you back in, then with you in the store you will hopefully buy items and help the store.
Cellphones have become increasingly ubiquitous in society becoming an essential part of everyday life; holding all of our information about our personal lives, from bank information to private text messages. With our nation’s security being weakened by terrorists utilizing cell phone encryption, it could be believed that companies such as Apple should comply with the FBI and government officials to grant access to terrorist’s cell phones. Most recently in San Bernardino an iPhone 5c supposedly holding crucial information was locked to the FBI and they requested Apples help to unlock the iPhone. It would be expected that Apple is to comply and help the FBI aiding the prosecution of terrorists to help better society, however this is not the case, helping unlock terrorist’s cellphones would have multiple irrevocable consequences that would undoubtedly change the landscape of the physical and digital world for the worse.