.

Wednesday, January 23, 2019

Edward Snowden Essay

On June 6, 2013 The Guardian unseasonedspaper printed a story alleging that the National Security post (NSA) was collecting telephone records of millions of Verizon customers in a top secret political sympathies sanctioned program. This would be just the first glimpse at the numerous disturbing actions revealed by a man named Edward Snowden, a former central Intelligence Agency (CIA) employee and NSA contractor who employ his computer prowess and protective covering clearance to collect information about how the United States govern workforcet activity has been supervise its own citizens. Mr. Snowdens actions retain prompted the authorities to file criminal charges against him including larceny of government property and espionage. This situation raises serious questions about the legality and ethicality of government surveillance programs as well as security of personal information. thither has always been a debate over the trade-off between retirement and security, an d this is a perfect ex adenylic acidle of that discussion. This is an issue that affects anyone who utilizes the technological advancements of today, regardless of the criminalness (or lack thereof) of their actions. To better understand this issue we must(prenominal) first topic a look at the righteousnesss that govern surveillance and the laws that protects our individual freedom from unwarranted surveillance. Two of the most important documents that focus on these issues argon the Fourth Amendment to the US Constitution, which protects Americans against unwarranted surveillance, and the electronic communication theory Privacy Act, which was instituted in 1986 as an update to the law governing government wiretapping programs.Since the issue at hand regards government surveillance in general and the Fourth Amendment was indite to protect Americans from this act, it is worth quoting in full The right of the mickle to be secure in their persons, houses, papers, and effects, ag ainst unreasonable searches and seizures, shall not be violated, and no warrants shall issue, solely upon probable cause, supported by oath or affirmation, and particularly describing the bit to be searched, and the persons or functions to be seized. According to Jackson Lears (2013), the Board of Governors professor of History at Rutgers University and Editor in Chief of the Raritan Quarterly Review, this Amendment was compose by men who had rejected imperial power and were determined to foreclose its reassertion in their bracing nationNothing could more flagrantly violate those requirements than the NSA dragnet (p. 4).Although our Constitution was written almost 230 years ago, and the men who wrote this document could not pee-pee possibly foreseen the technological advancements that would be do in that time (i.e. the telephone, nuclear weapons or the mesh), they were witness to the abuse of government power and tried to institute broad principles to mitigate the possi bility of their new government becoming corrupt in that way. The problem our country faces, however, is that in order to regulate this type of behavior it must first be known, which until Edward Snowden appeared had only been considered speculative, and then addressed (Richards, 2013, p. 1934).The government has made attempts, however feeble, at implementing additional laws to prevent this type of abuse of power in the past, unless has not kept up with the times when it comes to updating these safeguards. The Supreme royal court ruled in 1928 that warrantless wiretapping was not illegal, only that ruling was overturned in 1967 and it was not until 1968 that Congress passed legislation governing wiretapping. In the same fashion, the Electronic Communications Privacy Act was passed in 1986 as an amendment to the Wiretap Act, just has not been updated in the nearly 30 years since it was enacted (Freiwald & Mtille, 2013, p. 1291).The only two times Congress has clarified what may or not be done in conjunction with the Electronic Communications Privacy Act was in 1994 with the passing of the Communications Assistance for police force Enforcement Act and the Patriot Act (passed in 2001 only 6 weeks after(prenominal) the attacks on September 11), which both further eased the restrictions on law enforcement surveillance (Freiwald & Mtille, 2013, p. 1292) and ensuredd that providers of telecommunications services maintained the accessibility of their systems to wiretapping (Freiwald & Mtille, 2013, p. 1293). Friewald and Mtille (2013) also explain that surveillance that proceeds outback(a) the bounds of the ECPA (and related statutes), either by virtue of not creative activity historically covered, or by virtue of be too new to be included, can proceed without any judicial review, so unyielding as a court has not yet held that the Fourth Amendment requires statute (p. 1295-1296). The question we must ask is whether or not this type of surveilla nce is necessarily dangerous or if it is necessary to protect our country and content security.According to Neil Richards (2013), First, surveillance is harmful because it can chill the exercise of our cultivated libertiesSecond, we must recognize that secret surveillance is dickhead and prohibit the creation of any domestic-surveillance programs whose existence is secretThird, we should recognize that total surveillance is illegitimate and reject the idea that it is acceptable for the government to record all Internet activity without authorization (p. 1935-1936). The first idea that Richards raises deal with our civil liberties such(prenominal) as freedom of speech. When people are constantly under the tending of government surveillance, they may be less likely to speak their opinion when they disagree with public policy because they may fear retaliation or retribution for their dissent.The second point of secret surveillance deals with the idea of accountability for those w ho are performing the surveillance. If a blank check is written by Congress for surveillance with no oversight as to what surveillance is being performed, then there can be no guarantee that the people performing the surveillance are not violating our personal privacy. If the government wants its people to invest them, then they should be comfortable with the idea of trust but verify. Finally, the idea of total surveillance is the most cover example of the violation of the Fourth Amendment which requires probably cause as a basis for any intrusive action by the government.I am not against the idea of surveillance, especially in the dangerous world we function in, but at the same time we must find a balance and understand our limits. In order to preserve our individual freedoms we must be willing to accept a trusted level of insecurity and a certain level of personal duty. The level of personal responsibility we must accept is to be willing, and able, to defend ourselves withou t relying on the government to do it for us all the time. One example of this is the attacks of September 11, 2001 where 4 planes were hijacked and used as weapons. Out of these 4 planes, only the passengers of one, United flight 93, were willing to stand up for themselves against the hijackers. If the hijackers knew that the passengers on each and every plane would have acted with the bravery and heroism of those on the United flight, I doubt they would have hijacked any of them.As far as accepting a certain level of insecurity goes, that is just a part of life there is no way we can prevent every horrible thing from happening. I understand the human desire to prevent bad things from happening, but what cost are we willing to pay for it? If we want to prevent cable car accidents that occur from deer running into the road, does that mean we should kill all the deer? In the words of Benjamin Franklin, one of our Founding Fathers and signatories of our Constitution, They who can transmit up essential liberty to obtain a little fugitive safety deserve neither liberty nor safety.ReferencesLears, J. (2013). EDITORS NOTE. Raritan, 33(1), 1-6. Retrieved from EBSCOhost. Richards, N. M. (2013). THE DANGERS OF SURVEILLANCE. Harvard jurisprudence Review, 126(7), 1934-1965. Retrieved from EBSCOhost. Freiwald, S., & Mtille, S. (2013). REFORMING SURVEILLANCE LAW THE SWISS MODEL. Berkeley Technology justice Journal, 28(2), 1261-1332. Retrieved from EBSCOhost.

No comments:

Post a Comment