Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Surveillance in america
Government surveillance expsitory essay
Cybersecurity Act
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Surveillance in america
I chose to take a stab at a Dilbert’s cartoon strip regarding the controversial area of government being able to tap into encrypted databases to retrieved sensitive information. This is contentious as it involves the privacy of many who are much opposed to this form of information gathering. I can relate to this closely when my current job which has had employees undergo annual background checks since we work with vulnerable populations for the state of Nebraska. As of August 2016, we now are required to undergo fingerprinting which are placed in “the integrated automated fingerprint identification system (IAFIS)” in the event employees violate clients, or government programs (FBI, n.d.).
The relevance of this comic strip is applicable to
…show more content…
This appears to be a major concern for he/she. However, there are so many ways that terrorists can infiltrate systems unnoticed as we have seen over the last several decades. When we take note of “We the People” as stated in the Constitutions preamble can cause uneasiness as this does not apply to government allowing its people to have a say in who will, or will not have their privacy invaded. Since government structure involves a realm of actors, it may be nearly impossible on the other to deem encryption unlocking illegal if the government says otherwise. This comic strip blatantly shows the viewpoint of the CEO and how he/she feels about the encryption issue among both private, and national security in relation to an organizations network as a means of encouraging terrorism (Adams, 2015). According to Perlroth (2015), there is also a correlation between the monitoring of various criminals and the encryption debate. There is an issue of trust which is also a hard pill to swallow (para. 7). With so many having mixed feeling about government. Having a degree in Criminal Justice makes it easier to understand the apprehensions which go with how this type of unlocked encryption is not only an effective way of tracking potential terrorists, but can also protect organizations from internal/external stakeholders while detecting suspicious activity for law …show more content…
9). If the playing field for organizations is the same as government, then all networks including email should be encryption mandated to avoid backlash.
References
Adams, S. (2016, April 18). Government Wants Access to Data. Retrieved June 7, 2017, from Dilbert.com/strip/2016-04-18 website: http://dilbert.com/strip/2016-04-18
FBI. (n.d.). Privacy Impact Assessment Integrated Automated Fingerprint Identification System National Security Enhancements. Retrieved June 7, 2017, from FBI.gov website: https://www.fbi.gov/services/records-management/foipa/privacy-impact-assessments/iafis
Perlroth, N. (2015, July 7). Security Experts Oppose Government Access to Encrypted Communication. New York Times, Technology, p. n.p. Retrieved from
When it comes to personal information in America, the genie is out of the bottle. As such, information security will continue to be a pressing concern especially to most of our top three-letter-agencies such as the CIA (Central Intelligence Agency), NSA (National Security Agency), DOD (Department of Defense), and HS (Homeland Security) as most of them are staffed with employees with top secret security clearances (also known as TS).When someone is given this clearance, not only are they slated to uphold an allegiance to core values but they are also entrusted with our nations’ sensitive secrets and are held to the highest standards. Many of these professionals are honest and loyal to their country, but all humans are susceptible to preservation, desires, and needs that the famous psychologist Maslow showed in his famous hierarchy of needs pyramid. As such, without undue temptation and trickery most handle their jobs well and uphold their commitments to quietly (sometimes loudly) dedicate their lives to patriotism.
The use of criminal record databases by employers has greatly increased since the 1990s when the information first became relevant (Appelbaum, 2015). The biggest rise in background searches began after the terrorist attacks in New York City on September 11, 2001. Mr. Uggen, a criminologist at the University of Minnesota, states that there is a problem with criminal background checks considering most employers have no idea what they should be looking for. With every business owner having different concerns about potential applicants, “we haven’t really figured out what a disqualifying offense should be for particular activities (Appelbaum,
Taylor, James Stacey. "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance." Public Affairs Quarterly July 2005: 227-246.
In today's society with the increased use of computers, internet, and wireless communications, the need for safety and security has risen dramatically. The internet has become the number one communication medium and is more accessible than ever. Through the internet, vast amount of information is being transmitted between computers. At times, some of the information transmitted can be intercepted illegally, such as personal information and private messages. The percentage of information that is illegally intercepted has been dramatically reduced due to the use of encryption software technology, which was once used by the United States military and government. This technology has given businesses and private users the sense of security in transmitting information through the internet as well as to maintain national security. The use of encryption has been a topic of discussion for the past 20 years. The U.S government has attempted several times to regulate encryption because they felt that it was a matter of national security that they should have control of the technology and protect us from vulnerability if software is shared or sold to other countries. The effort of encryption regulation by the U.S. was unsuccessful and today there are least restrictions on the use and export of encryption technology. The introduction of encryption regulation in the United States has made a global impact. Other countries, such as China, Russia, and others around the world, have implemented encryption regulations to due to the influence of the U.S. but have restrictions that are far more stringent and harsh. The strong regulations by these countries are creating conflict among private users and foreign companies that export encryption software to these countries. This argument and debate continues between the government, businesses, and encryption companies. The question is should the government have the right to monitor and regulate encryption and what ethical questions does it raise?
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
"NSA Surveillance Programs." Issues & Controversies. Facts On File News Services, 14 Oct. 2013. Web. 20 Nov. 2013. .
Carr, Pete. “Tracking Is an Assault on Liberty, With Real Dangers.” The Wall Street Journal. 6 Aug. 2010. Web.
The attacks on American soil that solemn day of September 11, 2001, ignited a quarrel that the grade of singular privacy, need not be given away in the hunt of grander security. The security measures in place were planned to protect our democracy and its liberties yet, they are merely eroding the very existence with the start of a socialistic paradigm. Benjamin Franklin (1759), warned more than two centuries ago: “they that can give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.” Implementing security measures comes at a cost both economically and socially. Government bureaucrats can and will utilize information for personal political objectives. The Supreme Court is the final arbitrator of what the ‘law is”, causing a lack of circulated rule. The actual leaders with political purposes jeopardize our individual privacy rights, liberties, and freedoms.
The freedom of speech that was possible on the Internet could now be subjected to governmental approvals. For example, China is attempting to restrict political expression, in the name of security and social stability. It requires users of the Internet and electronic mail (e-mail) to register, so that it may monitor their activities. In the United Kingdom, state secrets and personal attacks are off limits on the Internet. Laws are strict and the government is extremely interested in regulating the Intern et with respect to these issues.10 Laws intended for other types of communication will not necessarily apply in this medium.
Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place. ”(“5 Myths about Privacy”). The fight for privacy rights is by no means a recent conflict.
Pictures are not made without a reason. Every visual construct has some underlying purpose. Often times this purpose is to express the thoughts or emotions of its constructer. Political cartoons are used to this effect. These cartoons speak volumes about a period or event in time. If a picture truly is worth a thousand words, a political cartoon is worth one thousand one. Political cartoons are almost always drawn from the ideas of the public. Because of their significance to an event in time, they can be examined to reveal the opinion of the people during the time frame. Cartoonists are voices of the public and Greenberg is not an exception.
Computers have also allowed the use of fingerprinting to expand. Agencies can now take someone’s fingerprints and send them through the computer and find out if they are linked to any other cases going on at the time, or any other cases in the past.
Gonchar, Michael. “What Is More Important: Our Privacy or National Security?” New York Times. New York Times, 17 Sept. 2013. Web. 22 Feb. 2014.
People want the freedom and empowerment to use technology, while being protected against malicious actions. Protection starts with awareness and education, the government needs to begin empirical goals around previous campaign successes. President Obama noted, “The government is bringing about unprecedented transparency and liability for Americans to take part in their democracy.” (Obama, 2009).