Tuesday, May 28, 2019
Government Surveillance vs Privacy Essay -- Communications Surveillanc
Is the American government trustworthy? Edward Joseph Snowden (2013) released to the United States press* selected information about the surveillance of ordinary citizens by the U.S.A.s National pledge Agency (N.S.A.), and its interconnection to phone and social media companies. The motion picture Citizenfour (2014), shows the original taping of those revelations. Snowden said that some people do nothing about this introduce because they have nothing to hide. He claims that this inverts the model of responsibility. He believes that everyone should encrypt Internet messages and abandon electronic media companies that track personal information and Internet behavior (op.cit, 2014). Snowden as well as stressed to Lawrence Lessig (2014) the importance of the press and the first amendment (Lessig Snowden Interview Transcript, 1628). These dynamics illustrate Lessigs (2006) constrain-en fit pattern of powers that keep society in check (2006, Code meter reading 2.0, p. 122). Con boldne ssr Lessigs (2006) question what is the threat to liberty? (2006, p. 120). Terrorism is a real threat (Weber, 2013). Surveillance by social media and websites, rather than the government, has the greater detrimental impact on its users. What is the historic context of surveillance, whose current form is electronic? We now know that the N.S.A. has no fewer than 46 surveillance programs (three in association with the UKs GCHQ) as described by surveillance reporter Julia Angwin (2014). For examplePrism collects data from the servers of U.S. technology companiesSqueaky Dolphin (UK) monitors YouTube video views, URLS Liked on Facebook and Blogger visitsBullrun, a joint UK and US program weakens cryptography (2014, chart)Surveillance, however, is as old as man. Anthony Zurcher (2013) for the BBC said, Chinese general Sun Tzu in 544 - 496 BC wroteEnlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements (Zurcher, 2013). Surveillance has been around for centuries.Ancient Rome had mechanisms for surveillance. The eavesdropping, of course, was done directly by people with no electronic mediation. Col. Rose Mary Sheldon (2000) of the Virginia Military Institute wrote that supply sergeants were employed to collect information because they came and went openly in the course of distributing grain. H... ... E. (2011). The net delusion. The dark side of internet freedom. New York, NY, USA PublicAffairs.Poitras, L, Bonnefoy, M., & Wilutzky, D. (Producers), & Poitras, L. (Director). (2014, October 24). Citizenfour Motion Picture. United States The Weinstein Company.Sheldon, Col. R. M., Virginia Military Institute. (2000). Military History Quarterly, Autumn,pp. 28-33. Retrieved from http//www.historynet.com/espionage-in-ancient-rome.htmsthash.iSybKnYa.dpuf on 11/29/2014.TEDSalon. (2014, June). Hubertus Knabe The dark secrets of a surveillance state. TED. Retrieved from http//www.ted.com/talks/hubertu s_knabe_the_dark_secrets_of_a_surveillance_state? on 11/17/2014.Weber, P. (2013, June 12). 6 reasons you should, and shouldnt, freak out about the NSA data-mining. The Week. Retrieved from http//theweek.com/article/index/245461/6-reasons-you-should-and-shouldnt-freak-out-about-the-nsa-data-mining on 11/29/2014. how we should balance national security with cultured liberties.Zurcher. A. (2013, October 31). Roman Empire to the NSA A world history of government spying. BBC News Magazine. Retrieved from http//www.bbc.com/news/magazine-24749166 on 11/29/2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment