Saturday, March 16, 2019
Government Surveillance vs Privacy Essay -- Communications Surveillanc
Is the American organisation trustworthy? Edward Joseph Snowden (2013) released to the United States press* selected in rollation about the superintendence of characterless citizens by the U.S.A.s National Security Agency (N.S.A.), and its interconnection to bring forward and social media companies. The motion picture Citizenfour (2014), shows the original taping of those revelations. Snowden said that just about people do zip fastener about this tracking because they have nothing to hide. He claims that this inverts the model of responsibility. He believes that everyone should encrypt Internet messages and abandon electronic media companies that track personal cultivation and Internet behavior (op.cit, 2014). Snowden also disquieted to Lawrence Lessig (2014) the importance of the press and the first amendment (Lessig Snowden Interview Transcript, 1628). These dynamics illustrate Lessigs (2006) constrain-enable pattern of powers that keep society in check (2006, Code varian t 2.0, p. 122). Consider Lessigs (2006) question what is the threat to liberty? (2006, p. 120). Terrorism is a real threat (Weber, 2013). Surveillance by social media and websites, rather than the organisation, has the greater negative impact on its users. What is the historic context of command, whose current form is electronic? We now know that the N.S.A. has no fewer than 46 surveillance political platforms (three in conjunction with the UKs GCHQ) as described by surveillance reporter Julia Angwin (2014). For examplePrism collects data from the servers of U.S. technology companiesSqueaky dolphin (UK) monitors YouTube video views, URLS Liked on Facebook and Blogger visitsBullrun, a joint UK and US program weakens cryptography (2014, chart)Surveillance, however, is as old as man. Anthony Zurcher (2013) for the BBC said, Chinese general fair weather Tzu in 544 - 496 BC wroteEnlightened rulers and good generals who are able to obtain intelligent agents as spies are ce rtain for great achievements (Zurcher, 2013). Surveillance has been around for centuries.Ancient capital of Italy had mechanisms for surveillance. The eavesdropping, of course, was done directly by people with no electronic mediation. Col. rosiness Mary Sheldon (2000) of the Virginia Military Institute wrote that supply sergeants were employed to collect information because they came and went openly in the course of distributing grain. H... ... E. (2011). The net delusion. The dark side of internet freedom. New York, NY, USA PublicAffairs.Poitras, L, Bonnefoy, M., & Wilutzky, D. (Producers), & Poitras, L. (Director). (2014, October 24). Citizenfour Motion Picture. United States The Weinstein Company.Sheldon, Col. R. M., Virginia Military Institute. (2000). Military History Quarterly, Autumn,pp. 28-33. Retrieved from http//www.historynet.com/espionage-in-ancient-rome.htmsthash.iSybKnYa.dpuf on 11/29/2014.TEDSalon. (2014, June). Hubertus Knabe The dark secrets of a surveillance st ate. TED. Retrieved from http//www.ted.com/talks/hubertus_knabe_the_dark_secrets_of_a_surveillance_state? on 11/17/2014.Weber, P. (2013, June 12). 6 reasons you should, and shouldnt, freak out about the NSA data-mining. The Week. Retrieved from http//theweek.com/clause/index/245461/6-reasons-you-should-and-shouldnt-freak-out-about-the-nsa-data-mining on 11/29/2014. how we should balance national security measures with civil liberties.Zurcher. A. (2013, October 31). Roman Empire to the NSA A world history of government spying. BBC News Magazine. Retrieved from http//www.bbc.com/news/magazine-24749166 on 11/29/2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment