The integrity of one’s communications and privacy of online activities is the largest casualty of the National Security Agency’s (NSA) surveillance over digital lives. Years since September 11, 2009, the NSA’s mass surveillance has greatly expanded due to the heightened concern that new technology can be used by terrorists to plan and execute a terrorist attack. In today’s age of technology, there are easier ways of accessing information and communication as well as new ways of hacking and gathering personal information. The new surveillance programs and regulations are enabled by the Patriot Act and post 9/11 paranoia, but it has been over fourteen years since the incident. After whistleblower, Edward Snowden, it was revealed that the government’s mass surveillance went beyond what many considered acceptable. It can be predicted that unless the U.S Government reins in NSA mass surveillance, the …show more content…
The Amendment states that “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation” (Bill of Rights). The amendment’s intention was to create a constitutional defense for Americans and limit the intimidating power of law enforcement. It established and protected the people’s privacy by recognizing their rights by restricting activities that are "unreasonable" or not authorized by a warrant based upon probable cause. The amendment still remains as vitally important today as when it was enacted by balancing the interests of the government with that of the people’s right to be free of unreasonable conduct. Though during post 9/11, the context of the amendment was utilized in a different way than the Founding Fathers
The Patriot Act was hastily passed just a month later October and it severely limited the privacy of Americans and gave unprecedented power to the government and private agencies to track innocent Americans, turning regular citizens into suspects.5 In addition, the great technological evolution and emerged of social media that occurred round the same time, and shortly thereafter, created the perfect storm for the emergence of the largely unregulated surveillance society that we live in today.6 The result is digitization of people’s personal and professional lives so that every single digital trace that people leave can be identified, stored, and aggregated to constitute a composite sketch of ourselves and its only getting worse. In 2008, passed the FISA Amendments Act, which expands the government’s authority to monitor Americans’ international communications, in addition to domestic communications.7 In short, after 9/11 the U.S is left with a national surveillance state, in which “the proliferation of government technology and bureaucracies that are able to acquire vast and detailed amounts of digital information about individuals with minimal or no judicial supervision and often in complete secrecy,” giving the government and corporations with access to the data that the government compiles the ability to single
Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from rogue nations and terrorist groups. They are increasing their attacks on government, military and civilian installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe. It is surpassing terrorism as the greatest challenge facing the nation. In response, the National Security Agency (NSA) began conducting surveillance on those who are involved in these activities and others which are threat to US national security interests. This program became so broad; it started continually collecting phone records and emails on ordinary Americans. This angered many, who felt that the US was acting in a way that circumvented established legal guidelines and procedures. To fully understand what is taking place requires focusing on the event, the government 's response and the ways it did / did not meet our national security goals. Together, these different elements will illustrate what occurred and the lasting impacts on everyone. (Greenwald 2014)
The NSA performed an unlawful invasion of privacy by using web encryption. Technologist, Christopher Soghoian, states that the NSA used supercomputers to gain access to encryption that provides online privacy and security. “The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions and commercial secrets” (qtd. in Winter). Christopher’s explanation of the encryption technologies describes how anyone could be affected by this surveillance. This is considered unlawful because the NSA hacked technologies that protect our private information. This affects the security of the nation knowing that it is possible for someone to gain access to information that people have once though were private to them. This is not the first time that the NSA has tried to gain access to private information. In fact, “For the past decade, NSA has led an aggressive multipronged effort to break widely used internet encryption technologies”
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” –U.S. Constitutional Amendments
The increasing power and functionality of technology has increasingly invaded privacy and complicated security. Technology has made it possible for the government to
In the year of 2017, it is hard to find any person whose life does not revolve around their electronic devices. The Internet has changed the way people function, and become a crucial resource in schools, workplaces, and homes all over the world. There are people who feel they could not survive a day without it, and, of course, there are people who are wary of its dangers. Children are taught from a young age to tread carefully when using the Internet, and teenagers can recite lectures they have received from their parents time and time again: “Don’t talk to strangers,” “Be careful what you download,” and most importantly, “Never share your personal information online.” What most of these parents do not know, however, is that you do not have to share your personal information for it to be collected. Not only is your information collected without your consent—it can legally be used against you. Many statutes involving Internet surveillance were rudimentary and non-invasive at their creation, but on October 26th, 2001, everything changed. The Patriot Act was signed into law, just forty-five days after the horrifying terrorist attack on the Twin Towers. The USA PATRIOT Act, more commonly known as the Patriot Act, was not a single piece of legislature, but a package of amendments to preexisting laws. The most notable changes in the Patriot Act are the amendments to the Foreign Intelligence Surveillance Act of 1978 (FISA), the Electronic Communications Privacy Act of 1968 (ECPA),
The most important part of the amendment is the right to be secure from unwarranted search and seizures.
With the seemingly exponential propagation of inexpensive digital communications technologies over recent years, the general public is becoming more aware of the issues surrounding information privacy and government surveillance in the digital age. Every Tom, Dick, and Harry with a smart-phone has to be wary of how they use their private information for fear of that information being collected and used in a way contrary to their wishes. "Leaky" smartphone apps that transmit private information across the internet can be unethically used by government agencies. The issue of privacy is a balancing act; the public usually wants increased privacy and the government usually wants increased access.
“Amendment IV (1791)- The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” (United States Senate)
Privacy is very important to some citizens, especially privacy in regards to personal and family matters. No one wants someone following and observing their every move, they also do not always enjoy the outside input of people who do not know their whole situations. The Fourth Amendment in the Constitution “protects people from unreasonable searches and seizures by the government” (What Does the Fourth Amendment Mean?). This has provided citizens with a way to protect their privacy and prohibits the government and law officials from search through one’s personal and private belongings without having a cause to do so. The amendment “is not a guarantee against all searches and seizures, but only those that are deemed unreasonable under the law” (What Does the Fourth Amendment Mean?). Those who are not participating in illegal activities and have given no reason for their property to be searched are protected by this amendment. However, those who have provided law enforcement with a reason to search their property should be presented with a warrant justifying the search and seizure.
“Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Ever since the American public was made aware of the United States government’s surveillance policies, it has been a hotly debated issue across the nation. In 2013, it was revealed that the NSA had, for some time, been collecting data on American citizens, in terms of everything from their Internet history to their phone records. When the story broke, it was a huge talking point, not only across the country, but also throughout the world. The man who introduced Americans to this idea was Edward Snowden.
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
The cause of terrorist attacks like 9/11 tragedy the government has ramped ups the security and surveillance of the activist, journalist and dissidents. It is no secret that the government are able to have assess of people phone call records and text messages but for that reason that, activists avoid using telephones, instead they use tools like Skype. Which they think they are immune to interception but they are wrong. Over the last years there has been an industry of companies who provide surveillance technology to the government, technology that allows the government to hack into computers. Rather that intercepting the commutations as they go over the wire, instead the government now hacks into your computer, enable your webcam and your microphone and able to steal and look through documents from your computer. In the article “ Quasi- Constitutional Protection and Government Surveillance” by Emily Berman argues “ The government may collect and analyze unprecedented amounts of information about U.S persons’ communications, but without concomitant safeguards against infringing on individual privacy” (781). According to this, it indicates that all the access the government is able to see and how it is invading American’s privacy.
The mass surveillance and the invasion of privacy has been on a steady incline since the 1980s. No one knows for sure how many closed-circuit television cameras have be are installed, but estimates range from 3.2 to 4.2 million. (“Right of Privacy”). Not only has mass surveillance increased but also the amount of terror attacks have also increased around the world. The protection of a nation's citizens is the most crucial and is highly important for a nation's success. Although privacy should never be taken away, terror attacks and domestic violence can be avoided if government had access to emails, phones, and documents; therefore, surveillance of individuals suspected of foreign or domestic terrorists is necessary.