No Online Privacy in America

  • Length: 1596 words (4.6 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

No Online Privacy in America

Along with its many benefits, the march of technology makes an encompassing surveillance network seem almost inevitable. We owe much of the privacy we have enjoyed in the past to a combination of immature technology and insufficient manpower to monitor us. But these protective inefficiencies are giving way to efficient technologies of data processing and digital surveillance that threaten to eliminate our privacy. Already we are tracked by our credit-card transactions, our passes through the fast-lanes at toll booths, our cell phone calls.

Each year brings more sensitive and widespread sensing devices, including cameras, microphones, and, potentially, biological sensors, all of which are being connected through increasingly efficient networks to increasingly more powerful data processing and storage. Cameras are proliferating, in toll plazas, on public streets, and in public parks. We welcome them as crime-fighters, even as they eliminate our ability to move through the world untracked. Face and voice recognition software may soon permit image data from surveillance cameras to be cross-referenced to data based profiles of each person observed. To get a hint of the future, enter your street address at You will see a satellite picture nearly good enough to show a car parked in your driveway, or in mine. Better resolution is coming soon.

We are moving toward a transparent society in which our actions and transactions are followed, our lives tracked and documented, by folks we neither know nor trust; each of us a star in our own Truman Show. (online Privacy)

By now, you have probably heard a lot of debate over the USA Patriot Act, the federal legislation passed to give investigators more tools for apprehending terrorists. Proponents of the law say we need it to protect ourselves. Opponents say it threatens our constitutional rights. Nevertheless, whatever position you take on these issues, it is important to know how the new law will affect your life online.

The Patriot Act is complex and powerful. It broadens the definition of terrorism and increases the penalties for terrorism.

Some of the more sweeping changes involve electronic surveillance. The act permits federal investigators to use more-powerful tools to monitor phone calls, e-mail messages, and even Web surfing. We all hope that means agents will be better able to arrest terrorists and foil their plans. But the changes also mean we now have even less guarantee of privacy on the Net.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"No Online Privacy in America." 23 Jun 2018
Title Length Color Rating  
Surveillance and Privacy Issues Essay - 2) It is getting ever easier to record anything, or everything, that you see. This opens fascinating possibilities-and alarming ones.” The Economist, Nov. 16, 2013 Discuss this statement in the light of the medias recent preoccupation with surveillance and privacy issues. Include government surveillance and social media. For example the young woman who accused Florida state quarterback jameis Winston of rape was identified by football fans on social media and had ugly anonymous things posted about her....   [tags: social media, government, privacy, policies] 1006 words
(2.9 pages)
Strong Essays [preview]
Privacy and Security Issues on Facebook Essay - Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named Mark Zuckerburg in his college dorm room at Harvard University....   [tags: Social Networking, Online Privacy]
:: 2 Works Cited
2055 words
(5.9 pages)
Term Papers [preview]
Privacy of Digitized Personal Information Essay - Privacy of Digitized Personal Information Privacy of personal information is a fundamental right of any person. No one wants his/her private details to be known to other people, especially ones who they are not familiar with. However, human society is based on cooperation between people. Society simply cannot function without this vital interaction between two human beings. No one is that capable or skillful enough to fulfill his/her daily requirements alone. The very fabric of society exists because a person has to depend on other people to get things done....   [tags: Private Privacy Information Argumentative Essays]
:: 5 Works Cited
3497 words
(10 pages)
Strong Essays [preview]
American Rights to Privacy Essay - ... Safety is a big concern among the American people, so if the government says they are doing something to protect them, people will believe it, even if the government is stretching the truth. The only thing that the constitution directly states about privacy is against unwarranted search and seizure, which kind of counters the Patriot’s Act.(#5) The patriot act does allow the NSA to search your laptop, phone, or other electronic devices without a warrant, which does violate that part of the constitution.(#10) Which begs the question, how are they getting away with making these acts when the constitution prohibits their actions....   [tags: constitution, technology, privacy] 641 words
(1.8 pages)
Better Essays [preview]
Essay on Privacy in a Digital World - Privacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the “right to privacy” is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The “Carnivore” is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligence gathering tool that was supposed to be used by the FBI to fight crime....   [tags: Privacy America] 855 words
(2.4 pages)
Better Essays [preview]
The Internet, Technology, and Privacy Essay - ... For example, most of the information required to steal someones identity can be found on social networking sites that users are a part of. According to the RCMP, some of the information required for identity theft includes full name, date of birth, and address. [4] With the amount of private information being collected and shared across networks and their services, a need for protection of information begins to rise. About 68% of internet users' in America believe that the current laws that are in place are not good enough in protecting people's online privacy, according to a report on Anonymity, Privacy, and Security Online....   [tags: privacy on the web, growing concern]
:: 12 Works Cited
960 words
(2.7 pages)
Strong Essays [preview]
We Cannot Permit Infringements on Privacy Essay - George Orwell foresees a nightmarish-future for the world in his book 1984, where individualism loses precedence to "the good of society," and with it goes the individual's private life. "The [controlling] Party" in the socialist government knows the intimate details of all citizens, and prosecutes those who violate social orders through threatening speech, behavior or thoughts. The omnipresent visual warning "Big Brother is Watching You,” reminds citizens that no personal information is safe from the "Thought Police." While this may seem far-fetched to some, Orwell envisioned technology facilitating government's abuse of power in 1950; in the twenty-first century, progress has left one's pr...   [tags: Privacy Essays]
:: 10 Works Cited
3921 words
(11.2 pages)
Strong Essays [preview]
Essay on Privacy: Security, Confidentiality, or Convenience? - Privacy: Security, Confidentiality, or Convenience. INTRODUCTION The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others. Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998....   [tags: Internet Privacy Secure Cyberspace Essays]
:: 9 Works Cited
3152 words
(9 pages)
Powerful Essays [preview]
Online Privacy at What Cost Essay - Online Privacy at What Cost When the constitution was written over two hundred years ago, our founding fathers probably did not have the Internet in mind. Since then, United States citizen along with their elected officials have tried to keep the rights of each American sacred, no matter what the cost. The major right that has been fought over since the dawn of the USA, has been that of the freedom of speech. Now, with the beginning of the twenty-first century, a new freedom of speech is again being examined....   [tags: Essays Papers]
:: 5 Works Cited
1489 words
(4.3 pages)
Powerful Essays [preview]
No Privacy in America Essay - No Privacy in America Feeling the need to be “at the cutting edge of the new” and “the first on your block to have it” puts us in a race with ourselves to keep pace with the evolving technological world. Cell phones, e-mail, GPS, EZ-Pass, and the entire World Wide Web – all these inventions enable us to live in a world where people across the planet are only milliseconds away. All these new inventions, however, also have a drawback in common – they serve as locating devices for each and every one of us....   [tags: George Orwell 1984 Technology Essays] 1540 words
(4.4 pages)
Strong Essays [preview]

Related Searches

The new law, along with new surveillance tools, will create a dragnet wide enough that anyone's e-mail note, text chat, or search inquiry might be snared.( Pcworld consumer watch)

It's difficult to say exactly that what are the implications of this new type of surveillance. The Patriot Act is vague on many key points and understandably, law enforcement officials are not eager to reveal details about tools like the controversial Internet surveillance system, Carnivore and The magic lantern. It is probably fair to say that joking in an e-mail about planting a bomb is a very bad idea these days. And researching biological terror techniques over the Internet could conceivably draw suspicion.

The new law opens the door for increased use of tools like Magic lantern and Carnivore and similar broad-based electronic surveillance systems. (Pc world consumer). Magic Lantern will allow an agent to plant a keystroke logger in a specific computer by using a virus-like program. Once activated, the logger will capture words and numbers as a subject types them (before encryption kicks in), and will transmit them back to the agent. Magic Lantern will give the agency unprecedented access to digital communications.

The program goes too far, however. More than just getting into your data, it lets the FBI get "into your brain." (PC world). The program would not only capture messages you sent, it would capture messages that you wrote but never sent--things that perhaps you thought were a bad idea and deleted. This is the government using the Internet to get into people's houses and into their minds. ( PC world). The Magic Lantern technology, would allow investigators to secretly install over the Internet powerful eavesdropping software that records every keystroke on a person's computer, according to people familiar with the effort. While on the other hand, FBI’s Carnivore is a high-speed packet "sniffer" program developed by the FBI's Engineering Research Facility (ERF) to conduct electronic surveillance of e-mail and Internet communications. Carnivore is installed at an Internet Service Provider's (ISP's) facility to monitor selected transmissions. This spy tool provides law enforcement with access to the private communications of all subscribers of a particular service provider. It is this unique aspect of Carnivore that gives rise to fundamental privacy risks. (giga law legal controversy). This program can scan millions of emails per second in an effort to finds its target (Ashcrosft to appoint internet)

The Patriotic Act loosens the rules for roving wiretaps, conferring broad authority to listen in on a suspect's communications. Under previous laws, officials had to specify certain phone lines they wanted to monitor, along with proof that their suspect used them. Federal authorities said that “the old rules were outdated, since many people have phone lines at home, a mobile phone, and Internet access at home, at work”. The act lets agents wiretap any phone line--again, without showing probable cause--and monitor everything on that line whether the suspect is using it or not. (PC world)

There are a large number of problems with the FBI's use of a system like Carnivore and Magic lantern, and many Americans disagree on number of different points about it. First use of such kind of tools are Unconstitutional. The Constitution is largely a document of limits- limits on the ways in which Government may interfere with our lives. The Bill of Rights is a short list of specific aspects of our lives, which Government may not interfere. The 4th Amendment clearly prohibits such sweeping invasions of privacy and property as Carnivore and magic lantern commits.

The best thing about the Internet, the thing which has allowed it to prosper as much as it has, is lack of centralized control. An while there are those who would use this lack of control to their criminal advantage, it would be a far worse consequence to give up the "chaos" in favor of stringent control. All of the wondrous possibilities that the Internet offers us come at the price of it having no central control or governing body. To impose that type of control will be at the expense of the freedoms, which have made the Internet what it is today. For 30 years, Government control stifled and suppressed the growth of the Internet. We must not allow such a fate to be reinstated.

Moreover, it sets a bad precedent.What if the FBI said they wanted to monitor all telephone calls, for information about suspected criminals? What if they wanted to intercept all postal mail, to check and see if any of it was related to any of their suspects? What if they wanted to do a "profile" of the average marijuana user, by scanning huge amounts of electronic data, and compiling the marijuana-related communications? What if they wanted keys to everyone's houses, in case they had to get inside to investigate a crime? Use of the Carnivore and magic lantern system plants the seeds for all of those types of developments, and many more frightening ones.
Another reason is that it will harm Innocent people. The FBI can hardly be trusted to conduct their investigations with proper handling and precision, but even if they could, Magic lantern and Carnivore will end up hurting innocent people. The amount of guesswork involved in a sweeping search like these tools does insures that many "dead ends" and "bad leads" will be pursued. What this means is that the FBI will inevitably end up investigating (including search, seizure, intimidation, prosecution) innocent people. The use of a mass-level tool like simply insures that these will occur more frequently, and at a more widespread level. (Why it is bad for you#4)

Carnivore is the most severe threat yet to our Information Age. Its implementation sets the stage for Government to have a truly disturbing role in our society- that of switchboard operator. If we do not stop Carnivore, we will be blindly handing the bulk of the world's information to Federal Agents, and trusting that they will not use it improperly, or overstep their limitations. These programs go too far, and that fact has implications well beyond the fourth Amendment and it is in clear and disturbing violation of the fourth Amendment. First amendment rights are also at stake since communications and associations will be chilled, if they are subject to government snooping. The government's use of such tool is troubling to many ways. Americans value their privacy guaranteed by the Constitution, and many see the government's use of such tools as erosion of these rights. The "trust us, we are the government" argument does not sit well with those already concerned with the growing number of traditional wiretaps and, consequently, the growing number of private conversations monitored by government agencies today.

Works Cited

Kim, Zetter. “New Technologies, Laws Threaten Privacy.” PC World March 2002: 22-24

Andrew, Brandt. “National Security vs. Online Privacy.” PC World January 2002: 18-22

Tim, McDonald “Ashcrosft to Appoint Internet Privacy Aide.”E-commerce News. 2001.April 16, 2002

Margaret ,Smith. “Legal Controversy and the FBI’s Carnivore Program.” 22 October 2001.

Ted, Bridis. “FBI Building a “Magic Lantern”.” Washington Post. 23 November, 2001.

Carroll, Robert. “Why Carnivore/DCS1000 is Bad for you”. 9 December, 2001.

Return to