Privacy: The Government's From Fear To Facebook

Improved Essays
For the past few years, technology is a gateway to forms of communication that rapidly grow with age. The internet has been a helpful tool in solving crimes because of not having to obtain a warrant and to take the time to go through the courts. With people able to manipulate computers and other electronic devices better and quicker than others, this may lead to problems for issues like privacy. This gives a person some control over another person. This is especially bad when it is the government who is manipulating technology faster than the average citizens. In the book, From Fear to Facebook, it talks about how there was a school system that used the technology at a school to spy on the children that use the school’s computers (Levinson). …show more content…
The initial purpose of this surveillance was to track terrorists who may have been plotting to attack the United States, but is now being used to track down the average person for breaking some kind of law (Penny). The government can go on a suspect’s Facebook page and browse through their information or pictures until they find something incriminating about the person and use that convicting information in a court of law. A similar situation to this would be panopticon, a type of prison where a guard can watch what a person is doing without the person knowing that they are being watched. Facebook can be considered a panopticon because the government or police can use Facebook as a way to spy on the users, without the users knowing. There have been many crimes solved through this method. Some of these crimes include robbery, cyberstalking, and the occasional murder …show more content…
Facebook may be a place to catch up with long lost friends, but while catching up with friends, people can share too much information that could jeopardize their lives, not only with the law, but also with their jobs. With this being the norm, there are people like the police, who are using Facebook as a way to surveil people. The police can go online and visit the suspects Facebook profile and as long as the user does not have proper privacy settings, or has limited privacy settings, the police are able to use that information to file a crime. This is not only the case for the police; companies can look at a potential employee’s profile to uncover information that would not be revealed in a resume. For instance, if there are a lot of pictures on a person’s profile of them partying all the time or statuses with foul language, that employer can see that and decide not to hire that person because of the way they are perceived through Facebook. The employers do not want those bad images being associated with the companies’ name. There are many solutions to how a person can control what others can view on a Facebook

Related Documents

  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Its a well known fact that technology is becoming more embodied in our lives. The Pew Internet and American Life Project released a study stating the number of adults that own cellphones, laptops or tablets is rising. This increase in ownership of technology has revolutionized access to information through the internet. One notable case is O’Grady v. Superior Court of Santa Clara County (2006). Apple filed a case against an unnamed individual who allegedly leaked information on several online sites regarding new Apple products.…

    • 315 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    He creates a persona that society isn’t bothered by it so the reader shouldn’t be either. He attempts to persuade readers that these tools are needed to keep society safe and wholesome. If society were real “okay” with this surveillance one would think that no legislation or laws would be passed to peel back and limit the reach of the surveillance. That would not be the case, though; on June 2, 2015, the USA Freedom Act was signed into law. This act is aimed at protected the rights of citizens and limiting the government ‘s ability to track, store, and monitor us.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Since the horrific events of September 11 2001, the Congress has passed the Patriot Act and approved by the Senate and the House of Representatives. But on October 26, when the President Bush signed the Act, no House of Representatives or the Senate reports this. The extensive terrorist attack may be decreased, but the Patriot Act still have false charge and still be accused of dangerous rise of the government surveillance. It’s true that the Patriot Act has acted to violate privacy expectations and suspect regular Americans citizens. “It violates the privacy of millions of innocent people” (source 1).…

    • 338 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It also allows for the employers to make sure none of their employees are breaking any policies or laws such as HIPAA. Only about 1 in 5 employers have a policy governing social media access and usage. Employers must decide where to strike the difference between a congenial workplace that permits access to social media collaboration sites and one that protects confidentiality, security, employer legal interests (Lyncheski,…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In “The Internet is a Surveillance State,” an article by Bruce Schneier, he argues that the internet is a surveillance state because we are constantly being watched and monitored. He starts off the article by giving three examples of individuals who were caught because of the internet. The first example was of Chinese military hackers who were caught because the internet surveyor they had use to carry out their attacks against the U.S government they had also use to access Facebook. Second example he gave was of hacker Hector Mosegur, who was caught by the FBI after slipping up. Last example Schneier discussed was Paula Broadwell, who was discovered to be having an affair with the CIA director.…

    • 332 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Hell's Angels Identity

    • 1181 Words
    • 5 Pages

    The most frequent of these crimes is illegal drug trafficking, but other crimes, such as intimidation, assault, use…

    • 1181 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Losing Privacy to Capture Criminals With the loss of privacy becoming an uncompromising way of the future, the internet and electronic devices has become an asset in capturing criminals. The loss of privacy has affected all users; the ordinary citizen that is not involved in criminal activities has suffered a loss of privacy as well. This loss of privacy has thwarted terror attacks on United States (US) soil, helped catch thieves of small petty crimes all the way to federal crimes such as “Identity Theft”. According to the Telecommunications Act of 1996, the "Communication Service Providers (CSP) are required to keep records of your internet usage” (Poullet, Y. 2004 Pg. 251-273) becoming a digital record of your activities.…

    • 2226 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Individuals and the government are falling behind as the internet is continuing to grow with technology advancing. Although, individuals are more to blame than the government, both are at fault. Individuals are careless about the things they do on the internet but are quick to care when they learn their privacy is being invaded. In the video “Why Care About Internet Privacy?” by Epipheo, Alan Henry from Lifehacker.com stated “every time you click from one website to another you click the link to go to the next page and that`s information that people are collecting about you. That information that you think is meaningless.”…

    • 1646 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Our world is full of controversy and innovation. Privacy is one of the biggest arguments today. We have laws that prevent the government from listening in on our private conversations, text messages, and home lives. Even though these laws are in action, the government surpasses them in special occasion. “ The Circle” opened up my eyes to the possibility that in the future, the government would be watching and listening to our every move.…

    • 81 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    With surveillance, everything will have a record, which violate citizen’s freedom of speech, movement and association (Flew, 2011) having everything recorded without permission and is constantly being watched of the activities that the user is doing. It may help provide a safer environment for citizens but it does not mean that it is the right thing to do. Users use social media to enjoy the social interaction with other users and is unreasonable that they will be monitored in every…

    • 1343 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Will the government go too far and give us no privacy at all and track our every move. According to the government we are not being tracked at all and the government is only doing this to protect the majority of the people to the criminals that wonder around us. The democratic government we have presented the people to protect us from any law that is not legal. We also have the constitution to protect us against the agencies that try to not give us any privacy. People think that the government is getting to strong or are turning out to be like Big Brother like in the book 1984 by George Orwell.…

    • 604 Words
    • 3 Pages
    Decent Essays