Cyber Surveillance

Superior Essays
The United States government has been invading the privacy of its citizens for the past several decades. After the terrorist attacks in 2001, the United States Government has gained more access to personal information of not only citizens of the U.S., but to “alleged” or “suspected” people around the world who are viewed as threats to the United States. According to an article by Andrew Napolitano, “We already knew that the NSA, our 60,000 domestic spies, has captured and retained the contents of nearly all emails, text messages, telephone calls, bank statements, utility bills and credit card bills of all Americans since 2009.” The U.S. government seems to operate like the song “Every Breath You Take” by the Police, where every step, every …show more content…
According to an article by David Rosen, “The leading agencies gathering data on Americans (and others) include the National Security Agency (NSA), Department of Homeland Security (DHS) and Department of Defense (DoD) as well as the FBI and IRS.” This means every financial statement, gun purchase, traffic citation, basic personal information, and past travel destinations can be accessed and analyzed within seconds. These basic surveillances are understandable, but the government continues to dig deeper into your personal life and information. Also, according to an article by David Rosen, “The House’s Bipartisan Congressional Privacy Caucus found that over 1.3 million federal, state and local law enforcement data requests were made to cell phone companies for personal records in 2011. Among the tracking information provided to law enforcement entities were: geo-locational or GPS data, 911 call responses, text message content, billing records, wiretaps, PING location data.” Today, nearly every American citizen owns a cell phone. These phones allow us to keep photos, private conversations, music, calendars, notes, contacts, health data, financial information, and virtually anything else you want to store on your phone. However, what most people don’t know is that these cell phones are becoming a popular tool for government agencies to keep tabs on us. In an …show more content…
This could lead to the U.S. government having access to any cell phone at a moments notice, and creating possible threats of hackers and other agencies gaining access to this backdoor policy. The United States government needs to wise up and back down on their continued attempts to gain the ability to invade our personal

Related Documents

  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Ethical Dilemmas

    • 1132 Words
    • 5 Pages

    The attacks on September 11, 2001 instilled great fear in the government as well as millions of Americans. In order to protect ourselves and prevent future terrorists attacks, President George W. Bush signed a bill called The USA Patriot Act which allowed government agencies such as The National Security Agency access to anything they needed to intercept acts of terrorism. The NSA then gained the power to wiretap individual’s phones,obtain their business records and spy on anyone they deemed could be suspected of terrorism. It was a time of panic for the United States, and these excessive searches without warrants weren’t given a second thought. However, it is now 2014 and citizen’s privacy is still being compromised more than ever without…

    • 1132 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In today’s society, technology plays a major role. With the increase in technology comes an apparent decrease in privacy. Ultimately, leading to the question of: when and under what circumstances should the government be able to access information encrypted on personal devices? Universal Law…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With this collected data, the United States government can monitor internet users. These technological advancements, along with the rising fear of terrorism and international crime, has led to the surveillance of many innocent American citizens. The United States government can easily collect information about anyone, with little or no judicial supervision. For example, in 2008, the FBI sought out a robbery suspect, and, without a warrant, collected information on the suspect along with 180 other…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    If there are few or no restraints to the power of agencies such as the FBI, there is a real danger of citizens’ rights being infringed. There are a few aspects of such surveillance that can be focused on for further research. These topics include the surveillance of specific groups of people within the United States, the surveillance abilities of specific agencies that work for the United States government, or specific records that can be accessed by the government. Through the research, it would be nice to know that the government isn’t able to look through anyone’s records without reason. However, there is also the possibility that the claims of the mass media aren’t completely unfounded and that the government has near unrestricted access to private records of civilians within the United…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    National Security Agency (NSA) can withdraw any information from the following list of the U.S. Service Providers; Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype YouTube and Apple. Everyone at least uses these two to ten times a day, especially teens who chain themselves to social media. The U.S. Service Provider, Microsoft, began collecting data for six years and when attackers in Congress found changes in the FISA Amendments Act, any lawmaker who knew about PRISM or NSA been obligated by promise to hold their tongue (Gellman, Poitras, @0143). Who in what mind would want to do that? No one wants to feel a cold breath against their skin that makes them shiver of fear from not being protected by people…

    • 122 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Americans had experienced this privacy invasion with the British many times. Before the revolution, British claimed the authority to issue Writs of Assistance allowing officials to enter private homes in search for evidence of smuggling. Writs of Assistance never expired and were transferable. The federalists violate the fourth amendment on a daily basis. When federal agency collects our electric data, emails, phone calls, and other private information, that violates this amendment, if they don’t have a legitimate reason.…

    • 590 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Edward snowden is a computer professional that is famously known for leaking information on the U.S. National Security Agency in 2013. Snowden said in an interview that “ The NSA has built an infrastructure that allows it to intercept almost everything that is uses telecommunications.”(www.cfr.org). This infrastructure collects data all around the United States. This is private information that is being collected without our consent or a warrant being present. The Obama Administration defended the surveillance program saying “ it 's legal, limited and effective with preventing terrorist acts” (www.cfr.org).…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Violation Of The NSA

    • 1435 Words
    • 6 Pages

    The National Security Agency (NSA) is an organization that is a part of the United States government that is responsible for the collection and processing of worldwide data records as well as global monitoring. According to an article from Electronic Frontier Foundation, the NSA is “responsible for collecting, processing, and disseminating intelligence information from foreign electronic signals for national foreign intelligence and counterintelligence purposes and to support military operations” (EFF). Incorporated in that professional and sophisticated definition, one of the rights that the administration owns is the right to view mobile phone data of those inhabiting the United States and globally across the world.…

    • 1435 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Also, it would help law enforcement solve mysteries by allowing them to learn what was said by suspects of a crime. Often there would be many clues inside of the phones of these criminals and these clues could help lead law enforcement to the answers that they are searching for. Although some Americans may use the argument that letting the government monitor citizens cell phone use would be an invasion of privacy, as many reasons show this is a small price to pay for safety. If the government monitored cell phone use in the united states, terrorism, cyber bullying and crime would all decrease…

    • 536 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Smartphone Privacy Issues

    • 1447 Words
    • 6 Pages

    Smartphone users sometimes worry about who is exactly invading their smartphones, but little do some smartphone users know is that the their own government is secretly trying to spy them. The government is trying…

    • 1447 Words
    • 6 Pages
    Improved Essays